Logo
IMAGINEEER LLC

Cybersecurity Technical Writer IV

IMAGINEEER LLC, Washington, District of Columbia, us, 20022

Save Job

Benefits: 401(k) matching Competitive salary Health insurance Paid time off About this Role:

We are seeking a highly skilled

Cybersecurity Technical Writer - Level 4

to support enterprise cybersecurity initiatives for the U.S. Department of Health and Human Services (HHS). This role provides expert-level documentation, communication strategy development, and technical writing support across cybersecurity governance, compliance, and risk management programs. The ideal candidate will translate complex cybersecurity policies and technical security requirements into clear, accurate, and accessible documentation for executive, technical, and non-technical audiences.

This position is critical to supporting cyber program transparency, audit readiness, compliance reporting, and federal coordination efforts. Experience with

FISMA, NIST SP 800-53, RMF, FedRAMP, Privacy Act, and Controlled Unclassified Information (CUI)

is required.

Key Responsibilities:

Cybersecurity Documentation & Communication

Develop, edit, and maintain cybersecurity documentation including policies, standard operating procedures (SOPs), playbooks, technical guides, reports, and executive briefings. Author and maintain security documentation in support of

RMF and FISMA compliance . Produce

ATO packages ,

POA&M documentation , and

security control narratives

in collaboration with ISSOs and system owners. Document FedRAMP processes and cloud security control implementations. Cyber Affairs and Information Management

Support cyber stakeholder engagement and federal coordination by developing communication plans, briefings, and cyber awareness content. Translate technical cyber findings, risk reports, and compliance metrics into executive-ready communications. Develop cyber program status reports and dashboard summaries. Cyber Governance & Compliance Documentation

Support

policy lifecycle management

through drafting, editing, and formatting security policies and governance artifacts. Ensure alignment to

NIST 800-53 Rev 5 ,

HHS IS2P , and federal cyber mandates. Assist with external audit responses and

audit readiness documentation . Risk Management & Continuous Monitoring Support

Document processes for

Enterprise Risk Management (ERM)

integration and cyber risk scoring. Capture technical procedures for

C-SCRM, High Value Assets (HVA), and ISCM

activities. Maintain consistent documentation standards across cybersecurity program areas. Quality Assurance & Section 508 Compliance

Ensure all deliverables meet

quality standards

and

Section 508 accessibility requirements . Apply document control and version management processes. Support contract deliverables including

weekly reports, technical presentations, meeting minutes , and program communications. Security and Compliance Requirements

Ensure compliance with: FISMA, NIST SP 800-53 Rev 5 FedRAMP Moderate/High CUI and Privacy Act guidelines Mandatory

1-hour cyber incident reporting Qualifications and Skills:

Bachelor's degree in Cybersecurity, Technical Writing, Information Technology, Communications, or related field. 10+ years of technical writing experience , with

5+ years supporting cybersecurity or federal IT programs . Strong understanding of cybersecurity concepts and federal compliance frameworks: NIST SP 800-53, FISMA, NIST CSF, FedRAMP RMF documentation and ATO process CUI and Privacy Act information handling Proven experience drafting IT security policies, procedures, and governance documentation. Proficiency in Microsoft Office Suite, SharePoint, and documentation templates. Excellent writing, editing, and communication skills with attention to detail. Ability to obtain and maintain a

Public Trust clearance/Must be a US citizen Desired Skills and Competencies:

Experience supporting cybersecurity programs at

HHS, DHS, VA, DoD, DOJ, or other federal agencies . Certifications such as

Security+, CISSP, CAP, CGRC, PMP, or CCSP .

Flexible work from home options available.

About Us

Our Approach

We firmly believe in the uniqueness of every business, necessitating a personalized approach to transformation. This conviction drives us to invest time in comprehending an organization's historical challenges and operational framework. Our commitment is to foster innovation by adopting a tailored strategy that optimizes the utilization of an organization's human resources and data assets. With a wealth of experience, we specialize in guiding organizations through the implementation of post-quantum security, protocols for autonomy, and artificial intelligence.

We are committed to working with clients to positively disrupt, modernize, and transform their organizations and business processes. Noteworthy achievements include initiatives aimed at enhancing human resilience in the food supply chain, leveraging autonomy for streamlined operations, establishing root-of-trust capabilities for high-quality, trusted data, and designing ecosystems and tools for securing and transferring digital value through digital wallets. . Our proficiency extends to using artificial intelligence and data to fortify security and enhance visibility in data assets, aiding in the management of health issues at local, state, and national levels. We've developed a modern security posture to effectively mitigate risks associated with cyber attacks from nation-states. Our wealth of experience is underpinned by collaborative work with diverse multidisciplinary teams, thriving in highly complex and rapidly changing environments.

Our Mission

Imagineeer's mission is to empower transformation through the operationalization of intuition. We establish an innovation pipeline, reimagining operations by delving into data analysis to optimize outcomes for our valued customers.

Collaborating closely with our clients, we strive to actualize the inherent genius embedded within their organizational structure. Our efforts focus on the transformation of organizations, emphasizing the development of foundational strengths in key areas, including data, personnel, hypothesis development, and the cultivation of a learning-from-failure mindset.