Know ATS Score
CV/Résumé Score
  • Expertini Resume Scoring: Our Semantic Matching Algorithm evaluates your CV/Résumé before you apply for this job role: Information Systems Security Officer (ISSO) II.
United States Jobs Expertini

Urgent! Information Systems Security Officer (ISSO) II Job Opening In San Antonio – Now Hiring gTANGIBLE Corporation

Information Systems Security Officer (ISSO) II



Job description

gTANGIBLE Corporation (gTC), , is a S corporation and a registered Government contractor that provides services and solutions in:

  • National Security Programs
  • Professional, Administrative, and Management Support
  • Mission and Warfighter Support

We are a Service Disabled Veteran Owned Small Business (SDVOSB) and the founder has years of successful experience in the Government contracting arena.

Our leadership team is an exceptional group of Government contracting professionals.

gTANGIBLE is in the process of identifying candidates for the following position.


Requisition Type: Contingent (Open)

Position Status: Full Time

Position Title: Information Systems Security Officer (ISSO) II

Location: San Antonio, TX

Security Clearance Level: Top Secret/SCI, SAP Information eligible, consent for Counterintelligence polygraph

Duties and Responsibilities

The Air Force (AF) Special Access Program (SAP) Security Support Services

(SSS) assists the AF cognizant security authority in oversight of enhanced National Security Objectives supporting AF SAP interests through active and integrated security operations, processes, mechanisms, and management.

This support provides multi- disciplinary security support, including specialized analytical/program protection support, while being responsive and flexible to dynamic SAP security situations.

The ISSO is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO.

The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is assigned responsibility for the day-to-day security operations of a system.

This also will include physical and environmental protection, personnel security, incident handling, and security training and awareness.

It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing
configuration management across authorization boundaries.

This will include assessing the security impact of those changes and making recommendation to the ISSM.

The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts.

The position will provide day-to-day support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities..

Duties include the following:

  • Develop physical or logical topologies for a system.
  • Assist the ISSM in meeting their duties and responsibilities.
  • Prepare, review, and update authorization packages.
  • Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media.
  • Conduct periodic reviews of information systems to ensure compliance with the security authorization package.
  • Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change.
  • Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly.
  • Ensure all IS security-related documentation is current and accessible to properly authorized individuals.
  • Ensure audit records are collected, reviewed, and documented (to include any anomalies).
  • Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties.
  • Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans.
  • Identify cyber security vulnerabilities and assist with the implementation of the countermeasures for them.
  • Prepare reports on the status of security safeguards applied to computer systems.
  • Perform ISSO duties in support of in-house and external customers.
  • Conduct security impact analysis activities and provide to the ISSM on all configuration management changes to the authorization boundaries.

Knowledge and Qualifications

  • Bachelor's degree and 2-5 years of related experience especially in developing RMF packages or body of evidence or 6-9 years of related experience especially in developing RMF packages or body of evidence without a degree.

  • Prior performance in roles such as System, Network Administrator, or ISSO.

  • Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level II or Information Assurance Manager II within 6 months of the date of hire.
  • Must be able to regularly lift up to 50 lbs.
  • SAP experience required.
  • Prior active duty in the U.S. Air Force a plus.

Equal Opportunity Employer.

All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, pregnancy, genetic information, disability, status as a protected veteran, or any other protected category under applicable federal, state, and local laws.


Required Skill Profession

Military Enlisted Tactical Operations And Air/weapons Specialists And Crew Members



Your Complete Job Search Toolkit

✨ Smart • Intelligent • Private • Secure

Start Using Our Tools

Join thousands of professionals who've advanced their careers with our platform

Rate or Report This Job
If you feel this job is inaccurate or spam kindly report to us using below form.
Please Note: This is NOT a job application form.


    Unlock Your Information Systems Potential: Insight & Career Growth Guide


  • Real-time Information Systems Jobs Trends in San Antonio, United States (Graphical Representation)

    Explore profound insights with Expertini's real-time, in-depth analysis, showcased through the graph below. This graph displays the job market trends for Information Systems in San Antonio, United States using a bar chart to represent the number of jobs available and a trend line to illustrate the trend over time. Specifically, the graph shows 35442 jobs in United States and 1068 jobs in San Antonio. This comprehensive analysis highlights market share and opportunities for professionals in Information Systems roles. These dynamic trends provide a better understanding of the job market landscape in these regions.

  • Are You Looking for Information Systems Security Officer (ISSO) II Job?

    Great news! is currently hiring and seeking a Information Systems Security Officer (ISSO) II to join their team. Feel free to download the job details.

    Wait no longer! Are you also interested in exploring similar jobs? Search now: .

  • The Work Culture

    An organization's rules and standards set how people should be treated in the office and how different situations should be handled. The work culture at gTANGIBLE Corporation adheres to the cultural norms as outlined by Expertini.

    The fundamental ethical values are:
    • 1. Independence
    • 2. Loyalty
    • 3. Impartiality
    • 4. Integrity
    • 5. Accountability
    • 6. Respect for human rights
    • 7. Obeying United States laws and regulations
  • What Is the Average Salary Range for Information Systems Security Officer (ISSO) II Positions?

    The average salary range for a varies, but the pay scale is rated "Standard" in San Antonio. Salary levels may vary depending on your industry, experience, and skills. It's essential to research and negotiate effectively. We advise reading the full job specification before proceeding with the application to understand the salary package.

  • What Are the Key Qualifications for Information Systems Security Officer (ISSO) II?

    Key qualifications for Information Systems Security Officer (ISSO) II typically include Military Enlisted Tactical Operations And Air/weapons Specialists And Crew Members and a list of qualifications and expertise as mentioned in the job specification. Be sure to check the specific job listing for detailed requirements and qualifications.

  • How Can I Improve My Chances of Getting Hired for Information Systems Security Officer (ISSO) II?

    To improve your chances of getting hired for Information Systems Security Officer (ISSO) II, consider enhancing your skills. Check your CV/Résumé Score with our free Tool. We have an in-built Resume Scoring tool that gives you the matching score for each job based on your CV/Résumé once it is uploaded. This can help you align your CV/Résumé according to the job requirements and enhance your skills if needed.

  • Interview Tips for Information Systems Security Officer (ISSO) II Job Success
    gTANGIBLE Corporation interview tips for Information Systems Security Officer (ISSO) II

    Here are some tips to help you prepare for and ace your job interview:

    Before the Interview:
    • Research: Learn about the gTANGIBLE Corporation's mission, values, products, and the specific job requirements and get further information about
    • Other Openings
    • Practice: Prepare answers to common interview questions and rehearse using the STAR method (Situation, Task, Action, Result) to showcase your skills and experiences.
    • Dress Professionally: Choose attire appropriate for the company culture.
    • Prepare Questions: Show your interest by having thoughtful questions for the interviewer.
    • Plan Your Commute: Allow ample time to arrive on time and avoid feeling rushed.
    During the Interview:
    • Be Punctual: Arrive on time to demonstrate professionalism and respect.
    • Make a Great First Impression: Greet the interviewer with a handshake, smile, and eye contact.
    • Confidence and Enthusiasm: Project a positive attitude and show your genuine interest in the opportunity.
    • Answer Thoughtfully: Listen carefully, take a moment to formulate clear and concise responses. Highlight relevant skills and experiences using the STAR method.
    • Ask Prepared Questions: Demonstrate curiosity and engagement with the role and company.
    • Follow Up: Send a thank-you email to the interviewer within 24 hours.
    Additional Tips:
    • Be Yourself: Let your personality shine through while maintaining professionalism.
    • Be Honest: Don't exaggerate your skills or experience.
    • Be Positive: Focus on your strengths and accomplishments.
    • Body Language: Maintain good posture, avoid fidgeting, and make eye contact.
    • Turn Off Phone: Avoid distractions during the interview.
    Final Thought:

    To prepare for your Information Systems Security Officer (ISSO) II interview at gTANGIBLE Corporation, research the company, understand the job requirements, and practice common interview questions.

    Highlight your leadership skills, achievements, and strategic thinking abilities. Be prepared to discuss your experience with HR, including your approach to meeting targets as a team player. Additionally, review the gTANGIBLE Corporation's products or services and be prepared to discuss how you can contribute to their success.

    By following these tips, you can increase your chances of making a positive impression and landing the job!

  • How to Set Up Job Alerts for Information Systems Security Officer (ISSO) II Positions

    Setting up job alerts for Information Systems Security Officer (ISSO) II is easy with United States Jobs Expertini. Simply visit our job alerts page here, enter your preferred job title and location, and choose how often you want to receive notifications. You'll get the latest job openings sent directly to your email for FREE!