Information Systems Security Manager (ISSM) 3 – TS/SCI w/Poly - Security Clearance Required

Amentum
Fort Meade, Maryland
Full-time

Your Impact :

We are seeking an Information Systems Security Manager (ISSM) 3 for a prime contract that is based out of our Columbia, MD office.

Responsibilities :

  • Provide management support for a program, organization, system, or enclave's Information Assurance program.
  • Provide management support for proposing, coordinating, implementing, and enforcing Information System Security policies, standards, and methodologies.
  • Manage operational security posture for an Information System or program to ensure Information System Security policies, standards, and procedures are established and followed.
  • Provide management of security aspects of the Information System and perform day-to-day security operations of the system.
  • Assist ISSEs and ISSOs with evaluating security 1solutions to ensure they meet security requirements for processing classified information.
  • Manage the performance of vulnerability / risk assessment analysis to support security authorization. Provide management support to configuration management (CM) for information system security software, hardware, and firmware.
  • Manage changes to systems and assess the security impact of those changes.
  • Manage the process and preparation of documentation reviews to include System Security Plans (SSPs), Risk Assessment Reports, Certification and Accreditation (C&A) packages, and System Requirements
  • Traceability Matrices (SRTMs). Support security authorization activities in compliance with NSA / CSS Risk Management Framework (RMF) process and DoD Information Assurance Certification and Accreditation Process (DIACAP).

DIVERGENT

DIVERGENTSOLUTIONS

Here’s What You’ll Need :

  • Twelve (12) years of related work experience in the field of security authorization.
  • Bachelor's degree in Computer Science, Cyber Security or IT Engineering is required.
  • In lieu of a Bachelor's degree, an additional four (4) years of work-related experience may be substituted for a total of sixteen (16) years.
  • Compliance with DoD 8570.01-M with a minimum certification of IAM Level II is required.
  • Experience in the following areas is required : knowledge of current security tools, hardware / software security implementation;

communication protocols; or encryption tools and techniques. Familiarity with commercial security products, security authorization techniques, security incident management, and PKI and authorization services.

US Citizen with an active TS / SCI and a current full scope polygraph

Other Requirements :

  • Perform requirements gathering and analysis of said requirements
  • Perform functional analysis to identify required tasks and their interrelationships
  • Identify and map current security infrastructure as a foundation to define future programs
  • Collaborate with engineers on systems integration efforts
  • Plan and coordinate implementation of IT security programs and policies
  • Analyze user needs to determine functional and cross-functional requirements
  • Gather and organize technical information about an organization's mission goals and needs, existing security products, and ongoing programs in the multi-level security arena
  • Perform functional allocation and identify resources required for each task
  • Perform risk analysis that also includes risk assessment
  • Enable Government planning, coordination, and oversight of organizational implementation of information security services
  • Enable design and implementation of future IT systems and related security
  • Assist Program Managers with administrative and technical oversight with specific programs within the portfolio
  • Facilitate issue resolution through integrated product teams and Technical Exchange Meetings (TEM)
  • Provide support for a program, organization, system, or enclave's information assurance program
  • Provide daily oversight and direction to contractor ISSOs
  • Oversee efforts of engineering staff to design, develop, engineer, and implement solutions to security requirements
  • Interact with customers, IT staff, and high-level corporate officers to define and achieve required Cybersecurity objectives
  • Serve as the Program's ISSM
  • Enable the Government with the development and implementation of NSA IT security services
  • Collaborate with engineers on systems integration and life cycle requirements
  • Advise Program Managers on administrative and technical oversight matters regarding portfolio programs
  • Enable Program Managers with administrative and technical oversight assistance with specific programs within the portfolio
  • Enable design and implementation of future IT systems and related security.
  • 5 days ago
Related jobs
Promoted
CACI
Hanover, Maryland

Minimum Clearance Required to Start: TS/SCI with Polygraph. Active TS/SCI w/ Polygraph (US Citizenship Required). NET Developer - TS/SCI w/ Poly. At CACI, you will receive comprehensive benefits such as; healthcare, wellness, financial, retirement, family support, continuing education, and time off ...

Promoted
Jacobs
Fort Meade, Maryland

Configures and manages UNIX and Windows operating systems and installs/loads operating system software, troubleshoots, maintains integrity and configures network components along with implementing operating systems enhancements to improve reliability and performance. In this role you will support ch...

Promoted
ManTech
Annapolis Junction, Maryland

Support MQ queue managers and objects running client operating systems. Security Clearance Requirements:. At ManTech International Corporation, you’ll help protect our national security while working on innovative projects that offer opportunities for advancement. Utilize that information to establi...

Promoted
Northrop Grumman
Linthicum Heights, Maryland

Clearance and Access: * Candidates must have a current DoD *Top* *Secret *level security clearance, to include *SCI access *and a recent *Polygraph *(adjudicated within the last 5 years), or must be enrolled in the DoD Continuous Evaluation (CE) Program, in order to be considered ; the required secu...

Promoted
Accenture Federal Services
Annapolis Junction, Maryland

Additionally, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclos...

Promoted
Northrop Grumman
Linthicum Heights, Maryland

Requisition ID: R10163398 * *Category:* Information Technology * *Location:* Linthicum, Maryland, United States of America * *Clearance Type:* Secret * *Telecommute:* No- Teleworking not available for this position * *Shift:* 12 Hour Night Shift - I (United States of America) * *Travel Required:* Ye...

Promoted
ManTech
Hanover, Maryland

A bachelor’s degree in system engineering, Computer Science, Information Systems, Engineering Science, Engineering Management, or related professional engineering discipline for an accredited college or university. Shall have a minimum of fifteen (15) years’ experience as a Systems Engineer in progr...

Amentum
Annapolis Junction, Maryland

Bachelor’s, Master’s degree or PhD in Aeronautics, Biomedical, Chemical, Civil, Computer, Electrical, Environmental, Mechanical, Nuclear, Software, Systems and Engineering Management or Chemistry, Computer Science, Information Systems, Mathematics or Physics from an accredited college or university ...

Northrop Grumman
Linthicum Heights, Maryland

Active DoD TS/SCI with poly security clearance per business requirements. Requisition ID: R10170442 * *Category:* Engineering * *Location:* Linthicum, Maryland, United States of America | Annapolis Junction, Maryland, United States of America * *Clearance Type:* Polygraph * *Telecommute:* No- Telewo...

Amentum
Fort Meade, Maryland

Employ multiple analysis disciplines such as pattern recognition against targets' communications, network usage and digital footprints. Ensure target continuity, profile targets and their activities, and develop techniques to gain additional target information. We are seeking Target Digital Network ...