Full-Time

Information System Security Engineer

Posted on 11/7/2025

Deadline 1/22/27
Ishpi Information Technologies

Ishpi Information Technologies

51-200 employees

Holistic cyber defense services and training

No salary listed

Philadelphia, PA, USA

Hybrid

US Top Secret Clearance Required

Category
IT & Security (1)
Requirements
  • Bachelor's degree in Computer Science, Information Technology, or an equivalent technical degree from an accredited college or university.
  • Three (3) years professional experience capturing and refining information security operational and security requirements, and ensuring those requirements are properly addressed through purposeful architecting, design, development, and configuration; and implementing security controls, configuration changes, software/hardware updates/patches, vulnerability scanning, and securing configurations.
  • Minimum Certification Requirement includes one of the following: CCNA-Security, CySA+, GICSP, GSEC or Security+ CE.
  • Security Clearance: Requires U.S. Citizenship and an active government security clearance.
  • Ishpi Information Technologies, Inc. is an Equal Opportunity Employer. All qualified candidates will be considered without regard to legally protected characteristics.
Responsibilities
  • Assessment & Authorization (A&A)
  • Cybersecurity Compliance and Audit Readiness
  • Information Assurance Vulnerability Management (IAVM)
  • Vulnerability Scanning and Remediation
  • Application and Implementation of Security Technical Implementation Guides (STIGs) and Security Requirements Guide (SRGs)
  • assist with the developing, maintaining, and tracking Risk Management Framework (RMF) system security plans which include System Categorization Forms, Platform Information Technology (PIT) Determination Checklists, Assess Only (AO) Determination Checklists, Implementation Plans, System Level Continuous Monitoring (SLCM) Strategies, System Level Policies, Hardware Lists, Software List, System Diagrams, Privacy Impact Assessments (PIA), and Plans of Action and Milestones (POA&M).
  • Execute the RMF process in support of obtaining and maintaining Interim Authority to Test (IATT), AO approval, Authorization to Operate (ATO), and Denial of Authorization to Operate (DATO).
  • Identify and tailor IT and CS security control baselines based on RMF guidelines and categorization of the RMF boundary
  • Perform Ports, Protocols, and Services Management (PPSM).
  • Perform IT and CS vulnerability-level risk assessments.
  • Execute security control testing as required by a risk assessment or annual security review (ASR).
  • Mitigate and remediate IT and CS system level vulnerabilities for all assets withing the boundary per STIG requirements
  • Develop and maintain Plans of Actions and Milestones (POA&M) in Enterprise Mission Assurance Support Service (eMASS).
  • Develop and maintain system level IT and CS policies and procedures for respective RMF boundaries and/or guidance provided by the command ISSMs
  • Implement and assess STIG and SRGs.
  • Perform and develop vulnerability assessments with automated tools such as Assured Compliance Assessment Solution (ACAS), Security Content Automation Protocol (SCAP) Compliance Check (SCC) and Evaluate STIG.
  • Deploy security updates to Information System components.
  • Perform routine audits of IT system hardware and software components.
  • Maintain inventory of Information System components.
  • Participate in IT change control and configuration management processes.
  • Upload vulnerability data in Vulnerability Remediation Asset Manager (VRAM).
  • Image or re-image assets that are part of the assigned RMF boundary
  • Install software and troubleshoot software issues as necessary to support compliance of the RMF boundaries’ assets.
  • Assist with removal of SSD, HDD or other critical components of assets before destruction and removal from the RMF boundary.
  • Provide cybersecurity patching of assets in times of DoD and DoN TASKORDs, FRAGORDs, or even designated by Command ISSM, ACIO, and/or Code 104 management.
  • Support configuration change documentation and control processes and maintaining DOD STIG Compliance.
  • Support cyber compliance of assets that are part of an enterprise IT network to include Windows server and CISCO networking hardware. This includes assessing vulnerabilities, patching and meeting requirements of the STIG for the hardware.
  • Report compliance issues of network hardware to management as not cause an operational of the network.
Ishpi Information Technologies

Ishpi Information Technologies

View

Ishpi Information Technologies provides cybersecurity, information operations, and engineering services to the U.S. Armed Forces and homeland security agencies. The company delivers these services through an integrated approach that combines secure software development, technical consulting, and training to protect every layer of a digital network. Unlike competitors that may focus only on software or hardware, Ishpi uses a "holistic" strategy that accounts for human input and high-level software quality standards to ensure systems are ready for both defense and active engagement. Their goal is to provide national defenders with a state of constant readiness to anticipate, defend against, and counter threats within the cyber domain.

Company Size

51-200

Company Stage

N/A

Total Funding

N/A

Headquarters

null

Founded

2006

Simplify Jobs

Simplify's Take

What believers are saying

  • Federal and Fortune 500 clients drive growth from comprehensive cybersecurity services.
  • Proprietary CMMI-maturity software fortifies integrated holistic service solutions.
  • Experienced personnel enable endpoint protection and intrusion detection monitoring.

What critics are saying

  • DOD CMMC 2.0 exclusion blocks contracts, causing revenue loss in 3-6 months.
  • Booz Allen wins 40% more C5ISR contracts, undercutting $59.9M revenue in FY2025.
  • Revenue past $60M ends SBA set-asides, pitting against Leidos in 6-12 months.

What makes Ishpi Information Technologies unique

  • Holistic CyberStance framework integrates CyberSmithed and ActiveDefense for cyber anticipation.
  • Seven-layer security model emphasizes human-link interaction for federal clients.
  • C5ISR engineering delivers full-spectrum cyber capabilities via proven processes.

Help us improve and share your feedback! Did you find this helpful?

Benefits

Company News

Ishpi Information Technologies
Dec 16th, 2022
ISHPI AIS Division to Receive IEEE CS/SEI Humphrey Software Quality Award

Ishpi Information Technologies, Inc. is humbled to receive this Software Quality Award named in his honor.

Ishpi Information Technologies
Aug 3rd, 2021
Ishpi recognized as Virginia Values Veterans

Ishpi Information Technologies, Inc. (“ ISHPI ”) announced they have become certified as a Virginia Values Veterans (V3) company.

INACTIVE