Career Opportunities with Epsilon Systems Inc

A great place to work.

Careers At Epsilon Systems Inc
Share with friends or Subscribe!

Current job opportunities are posted here as they become available.

Subscribe to our RSS feeds to receive instant updates as new positions become available.

Force Information Systems Security Management Support

Department: TTS
Location: San Diego, CA

Epsilon Systems Solutions, Inc. ( is a 100% employee-owned company providing full-lifecycle support to the defense industry. Our Technology and Technical Solutions (TTS) sector focuses on the development and integration of solutions that support mission success of critical systems such as secure communications, satellite systems, nuclear operations solutions, network operations, program, training, and administrative services and environmental management services.

Our TTS team is currently looking to hire a Force Information Systems Security Management Support with 3+ years of work experience in San Diego, CA. If you enjoy working on mission critical projects in a team-oriented environment, please read on!

Summary:  This position will support a new services contract to provide ‘Command, Control, Communications, Computers, Combat Systems, and Intelligence’ (C5I)/Cyber Readiness Program Mission and Infrastructure Support Services to Commander, Naval Surface Forces, Pacific (CNSP) N6 Department Staff and Divisions.


  • Perform RMF support in accordance with DoDI 8510.01 “Risk Management Framework (RMF) for DoD Information Technology, including control validation, documentation development and support, Navy Approving Official (NAO) coordination assistance, and continuous monitoring support, as required, for CNSP Centrally Managed Programs (CMPs).
  • Develop and maintain the cybersecurity architecture of the CMP, perform Business Case Analysis (BCA) development, and perform required site surveys for both site and system Authority to Operate (ATOs).
  • Perform all required and approved Information System Security Engineer (ISSE) RMF process steps including the following:
  • Overseeing the development and maintenance of a system’s cybersecurity solutions
  • Identifying system type (IS, PIT, IT product, IT service) and any special considerations including multi-service/agency, joint, cross domain, Privacy Impact Information (PII), Protected Health Information (PHI), tactical, space, etc., to support RMF Step 1 System Categorization
  • Identifying the security control baseline set and any applicable overlays and tailoring
  • Perform development, maintenance, and tracking of the SP
  • Perform security control implementation and testing efforts
  • Initiating the Risk Assessment Report (RAR)
  • Perform security testing required as part of Authorization and Accreditation (A&A) or annual reviews, to include scanning, patching, and HBSS implementation and policy development.
  • Mitigate and close open vulnerabilities under the system’s change control process
  • Participate in any related meetings or teleconferences with assessors, validators, or approving authorities to support A&A requirements.
  • Develop the documents required for Authority to Operate (ATOs) decisions and maintaining compliance.
  • Support eMASS, DITPR-DON, and DADMS entries for CMPs.
  • Support VRAM tracking, acknowledgment, and scanning, as required, for CMPs.
  • Command Policy development. The contractor shall perform research and development of command cybersecurity and information assurance policies under the Force ISSM’s purview. (CDRL A009 Comments and Review Matrixes).
  • Perform research and development of requirements and processes for command cybersecurity and information assurance inspections.
  • Develop briefs, checklists, and documentation necessary to self-assess and conduct inspection requirements.
  • Provide track command Situation Report (SITREP) actions, reports, and submittals.
  • Perform e-spillage coordination, tracking, and reporting.


Required Qualifications:

  • Bachelor of Science (BS) degree in STEM or related work experience
  • Possess the requisite training, experience, and/or certifications necessary to perform Risk Management and Information Systems Security functions in accordance with DOD and DON requirements.
  • Documented experience, capabilities, training, and technical certification in accordance with DoD 8140 and SECNAV 5239 requirements.
  • Documented experience in Assured Compliance Assessment Solution (ACAS) scanning procedures and Security Center development; Host Based Security System (HBSS) to include policy development and tuning for all DOD-mandated point products; and patching experience for both Windows and Linux systems
  • Experience with DISA Security Technical Implementation Guides (STIGs)
  • Experience with various information system security assessment/hardening tools - SCAP Compliance Checker, STIG Viewer, ACAS/Nessus, etc.
  • Engineering knowledge and problem-solving skills required to maintain, support and troubleshoot computer networks
  • Experience in troubleshooting Windows and Linux machines
  • Experience in implementing GPOs related to DISA STIGs or hardening machines
  • Proficient in use of Microsoft Office applications
  • Excellent oral and written communication skills at all levels
  • Strong customer focus and effective inter-personal skills
  • Strong organizational and time management skills, prioritization, and follow through
  • Strong analytical and critical thinking skills
  • Possess active listening skills
  • Pursuant to the various government contractual requirements, all applicants must be U.S. Citizens
  • Ability to obtain and maintain a Common Access Card (CAC) 
  • Must have an active Secret security clearance

Preferred Qualifications:

  • At least 3+ years of experience in ISSM-related role
  • Security+ certification or CISSP certification
  • Technical knowledge and understanding in Information Technology and Information Assurance (IA)/Cybersecurity disciplines, technologies, Cross Domain Solution (CDS) and practices preferred
  • Knowledge of Risk Management Framework (RMF) processes and knowledge of applicable DoD, NSA, DISA, NISPOM, and NIST cybersecurity policies and guidance
  • Knowledge of DoD IA security requirements and the basic suite of Cybersecurity tools (firewalls, IDS, antivirus and correlation tools)


ADA Notification:

  • Regular communication (hearing/speaking).
  • May be required to lift, carry and transport equipment and boxes.
  • Must be able to work in an office environment.
  • May stand prone or sit at a computer for hours at a time.
  • Job may require bending, stooping, lifting.
  • Ability to travel by car, air or other means of transportation, if required


Epsilon Systems Solutions, Inc. and its subsidiaries are proud to be Equal Employment Opportunity and Affirmative Action employers, Minority/Female/Disabled/Veterans.



Applicant Tracking System Powered by ClearCompany HRM Applicant Tracking System