Skip to Main Content

ISSO/Information Technology Manager - AZ

Tucson, AZ
  • Expired: over a month ago. Applications are no longer accepted.
Job Description

An Information Systems (IS) Security Officer (ISSO) is an individual responsible for ensuring the appropriate technical and operational security posture is maintained, specified, installed, and supported on all Company-owned computer
 systems as required. The ISSO ensures that the company’s information systems comply with regulations and customer requirements by performing duties as defined in DoD 5220.22-M (NISPOM), DAAPM, NIST-SP 800-53, NIST SP 800-171, CMMC, and other requirements. The ISSO is also responsible for planning and responding to service outages and other issues. 


The ISSO is responsible for managing the A-10 TSSC SCARS IS administration and assisting manage the A-10 TSSC IS administration in conjunction with the company Information Systems Security Manager (ISSM) and team. This is a hands-on position that includes analysis of requirements, proposing solutions, managing and participating in project implementations, and on-going support of the IS infrastructure.  The objective of this position is to meet program requirements while continually improving operating efficiencies by enhancing the IS process.


  • Perform general administration and conduct routine audits of systems and software and maintain records documenting purchase/acquisition/disposal of all IS related inventory in accordance with security policies and procedures. 
  • Perform regular backups, ensure integrity of backup systems & media, and retain backups for all systems in accordance with approved policies and procedures. 
  • Ensure that proper decisions are made concerning risk levels for the systems and of concern for confidentiality, integrity, and availability of the data. 
  • Participate in risk assessment procedures for verification of Assessment and Accreditation RMF safeguards. 
  • Apply updates, patches and configuration changes to IS equipment. 
  • Add, remove and update user account information and ensure all proper account management documentation is completed prior to adding/deleting IS accounts. 
  • Verifying all IS security-related and system related documentation is current and accessible to properly authorized individuals Ensure software, hardware, and firmware complies with appropriate security configuration guidelines (e.g., Security Technical Implementation Guides (STIGs)/Security Requirement Guides (SRG)). 
  • Initiate protective or corrective measures, in coordination with the security manager, when a security incident or vulnerability is discovered. 
  • Report security incidents or vulnerabilities to the ISSM
  • Initiate exceptions, deviations, or waivers to cybersecurity requirements. 
  • Conducting periodic assessments of authorized ISs and providing corrective actions for all identified findings and vulnerabilities to the ISSM. 
  • Conduct vulnerability assessments of the information systems using ACAS and generate assessment reports. 
  • Respond to technical and security inquiries. 
  • Applies various analysis tools and techniques to identify, develop, procure, implement, and support IS solutions that increases quality, productivity, and overall effectiveness of the Company departments.  
  • Complete required technical and security training relative to assigned duties. 
  • Specifies system requirements for information systems for improvements; 
  • Keeps system users informed of progress and updates; 
  • Works with Information System Technology and Security Department to ensure appropriate security protections are in place to protect against malicious external penetrations and/or data loss. 
  • Act as a backup for ISSM-related tasks on all accredited systems. This includes documentation updates, user security briefings, and auditing. 
  • Verifying the implementation of delegated aspects of the IS security program. 
  • Adheres to company and client department policies on information security and risk management.  
  • Coordinates the inclusion of other staff and technical resources as necessary.
  • Attends necessary weekly, monthly, and quarterly meetings as required or directed.
  • Perform other tasks as assigned by supervisor. 

To perform this job successfully, an individual must be able to perform each essential duty satisfactorily.  The requirements listed below are representative of the knowledge, skill, and/or ability required.  Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.



Bachelors Degree (B.S.) in related field and at least 5 years related experience and/or training. Experience or working knowledge of vulnerability canning procedures. Experience with ACAS, eMASS, STIG’s, CIS Benchmarks, SCAP Compliance Checker (SCC), McAfee ePO, and or other related security compliance solutions to oversee the implementation and enforcement of security policies. Experience preparing documentation required to obtain an Authorization to Operate (ATO) following assessment and authorization in an RMF environment.


To have or acquire within 6 months of hire date, any one of the following Certificates:

  • GSEC
  • Security+
  • SSCP

Ability to read, analyze, and interpret common professional literature. Ability to respond to common inquiries or complaints from customers, regulatory agencies, or members of the business community. Ability to effectively present information to management, and colleagues.


Ability to comprehend and apply basic mathematical skills.


Experience with implementation, configuration, and management of Microsoft Windows and Linux operating systems. Experience with implementing and troubleshooting computer networks. Technology skills including proficiency with Microsoft Office applications are essential. Experienced and proficient in the use of standard personal computer software tools; including word processors, spreadsheets, presentation graphics and databases.


Ability to define problems, collect data, establish facts, and draw valid conclusions.


U.S. Citizenship. Must be able to obtain a Secret Level Clearance



Experienced and proficient in the use of standard Personal Computer productivity software tools including word processors, spreadsheets, presentation graphics, project management, and databases.


  • The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
  • While performing the duties of this job, the employee is regularly required to sit; use hands to finger, handle, or feel objects, tools, or controls; reach with hands and arms; and talk or hear. The employee is frequently required to stand; walk; climb or balance; and stoop, kneel, crouch, or crawl.
  • The employee must regularly lift and/or move up to 10 pounds, must frequently lift and/or move up to 25 pounds, and must occasionally lift and/or move up to 50 pounds. Specific vision abilities required by this job include close vision, color vision, depth perception, and the ability to adjust focus.


  • The work environment characteristics described here are representative of those an employee encounters while performing the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
  • While performing the duties of this job, the employee is occasionally exposed to fumes or airborne particles, electrical shock, moving parts and vibration.  
  • The noise level in the work environment is usually quiet.
  • The employee is occasionally required to work holidays, weekends, and odd shifts.


  • Comply with company policies and procedures and work instructions
  • Follow company standards of professionalism
  • Treat customers and coworkers with respect
  • Be honest and dedicated in your work
  • Follow directions of supervisory and management staff
  • Comply with Company quality standards

Maintain a professional appearance and comply with any company dress code

CymSTAR is an Equal Opportunity Employer, and as such affirms the right of every person to participate in all aspects of employment without regard to race, religion, color, national origin, citizenship, sex, sexual orientation, gender identity, age, veteran status, disability, genetic information, or any other protected characteristic. If you are interested in applying for employment and need special assistance or an accommodation to apply for a posted position, contact our Human Resources department via phone at 918-251-8100.



Tucson, AZ
85707 USA



View all jobs at CymSTAR LLC