Skip to content
  Tuesday 14 April 2026
Trending
February 2, 2026Cybersecurity SIEM Engineer ( Security Information Event Mgmt. Engineer) April 12, 2024SITEC – Cybersecurity Analyst (SME) – MacDill AFB January 23, 2024Gcore Radar Signals the Emergence of a New Era in DDoS Attacks January 21, 2024Senior Cybersecurity Analyst August 21, 2025<h3>FBI Alert: Russian Hackers Targeting Vital Infrastructure</h3> September 2, 2025<h3>Salesloft and Drift Breach: Zscaler Customer Data at Risk</h3> July 26, 2025Cybersecurity Engineer – Firewall Audit June 14, 2025<h3>Black Basta Data Breach: Unveiling Phishing Dangers and Google Hijack Threats</h3> November 26, 2024<h3>AI Startup Leaders Advocate for Easier Access to UK Funding</h3> November 7, 2024Bosch Rexroth IndraDrive | CISA
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
  Careers  Junior Cybersecurity Analyst / Information System Security Officer (ISSO)
Careers

Junior Cybersecurity Analyst / Information System Security Officer (ISSO)

SecuredyouadmSecuredyouadm—May 6, 20250
FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail
More stories

Cybersecurity Engineer, Littoral Combat Ship Software Support (San Diego, CA)

June 11, 2025

Cybersecurity Architect

August 10, 2025

Lead Cybersecurity Architect

January 20, 2026

Cybersecurity Capabilities and Tools Specialist, Senior

July 14, 2025

Job Summary::Join our team to support a federal customer within the Department of the Air Force, Lifecycle Management Center. The Junior Cybersecurity Analyst / ISSO will contribute to the cybersecurity posture of an Enterprise ERP environment based on Oracle E-Business Suite (EBS) and its supporting technology stack. This position includes involvement in the development, test, and production environments and will support Risk Management Framework (RMF) compliance, security control implementation, and vulnerability management activities. Job Duties and Responsibilities: :

  • Assist in maintaining the Authority to Operate (ATO) and supporting RMF processes aligned with NIST SP 800-37 and AF component policies.
  • Support system hardening efforts using DISA STIGs across servers, databases, and applications.
  • Monitor and track vulnerabilities using tools such as ACAS and contribute to mitigation and POA&M development.
  • Maintain and update system security documentation, including but not limited to, System Security Plans (SSPs), Account Management Policy, Audit Policy and Continuous Monitoring deliverables.
  • Collaborate with system administrators, developers, and cybersecurity leadership to ensure security is incorporated throughout the system lifecycle.
  • Participate in security audits, patch management processes, and other compliance activities.
  • Track and maintain cybersecurity artifacts and evidence to meet customer and AF requirements.
  • Other duties asssigned.

Job Requirements (Education/Skills/Experience)::

  • Active DoD Secret clearance required.
  • Must be 8570 IAT Level II compliant (e.g., CompTIA Sec+ CE)
  • Familiarity with DISA STIGs, RMF, and NIST SP 800-53 controls.
  • Strong attention to detail, ability to quickly learn and follow process documentation

Preferred Qualifications:

  • Experience supporting DoD ERP systems.
  • Exposure to tools such as eMASS, ACAS, STIG Viewer, Splunk and ESPS.
  • Bachelor’s degree in Cybersecurity, Information Systems, or related discipline (or equivalent experience).
  • Understanding of Oracle EBS architecture and/or enterprise IT environments is a plus.

Diné Development Corporation (DDC) is a Navajo Nation owned family of companies that delivers IT, professional, and environmental solutions to advance the missions of federal, state, and tribal government agencies. As thought leaders and innovators, our team of specialists build client-centric solutions that solve critical challenges faced by defense, civilian, and healthcare organizations. Employing a mission-focused approach, we deliver value that not only enhances current operations, but also drives future change. Closely aligned with this approach is our commitment to advancing the Navajo Nation and its People. Through economic development and community empowerment, we elevate the Navajo Nation to provide lasting impact and sustainable growth for future generations. DDC’s ability to unite legacy-inspired technologies, industry best practices, and proven methodologies has contributed to our success for twenty years.This contractor and subcontractor shall abide by the requirements of 41 CFR 60-1.4(a), 60-300.5(a) and 60-741.5(a). These regulations prohibit discrimination against qualified individuals based on their status as protected veterans or individuals with disabilities, and prohibit discrimination against all individuals based on their race, color, religion, sex, sexual orientation, gender identity, national origin, or for inquiring about, discussing, or disclosing information about compensation, or any other basis prohibited by law. We participate in E-Verify.#dinesourcejobs
Read More

FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail

Securedyouadm

Senior Manager, Cybersecurity
IT Cybersecurity Architect, FCH – IT – SECURITY
Related posts
  • Related posts
  • More from author
Careers

Lead Cybersecurity WAF Engineer

April 14, 20260
Careers

Senior Manager, Cybersecurity Detection Engineering

April 14, 20260
Careers

Lead Cybersecurity WAF Engineer

April 14, 20260
Load more
Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Read also
Threat Advisories

CISA Adds Two Known Exploited Vulnerabilities to Catalog

April 14, 20260
Careers

Lead Cybersecurity WAF Engineer

April 14, 20260
Careers

Senior Manager, Cybersecurity Detection Engineering

April 14, 20260
Careers

Lead Cybersecurity WAF Engineer

April 14, 20260
Careers

Lead Cybersecurity WAF Engineer

April 14, 20260
Careers

Lead Cybersecurity WAF Engineer

April 14, 20260
Load more
Stay Social!
192Likes
4,500Followers
13Subscribers
46Followers
Recent posts
  • CISA Adds Two Known Exploited Vulnerabilities to Catalog
  • Lead Cybersecurity WAF Engineer
  • Senior Manager, Cybersecurity Detection Engineering
  • Lead Cybersecurity WAF Engineer
  • Lead Cybersecurity WAF Engineer

    # TRENDING

    how old is my computerhow old is my dell laptophow old is my HP laptophow old is my laptophow old is my toshiba laptophow to find computer ageverify computer agestar wars theme wallpapersThe Best Hacking Bookswiresharkusb device not found windows 10/11usb device not recognized windows 10/11 errorWhat is AIGPUSnifferuTorrentvulnerability scanner downloadWifi Hacking SoftwareWifi Hacking Appsolved windows 10/11 usb device not recognizedstar wars windows 7 theme downloadTwitter Account Security
    © Copyright Mister Cybersecurity LLC 2023, All Rights Reserved
    • About
    • Contact
    • Privacy
    • ToS
    • Disclosures