Information Systems Security Manager (ISSM) 3 - TS/SCI w/Poly

  • Fort Meade, MD
  • Posted 6 hours ago | Updated 6 hours ago

Overview

On Site
USD 179,000.00 - 223,000.00 per year
Full Time

Skills

Information Systems
Security Operations
Configuration Management
Content Management
Change Management
Information System Security
Firmware
Documentation
System Security
System Requirements
Traceability Matrix
Cascading Style Sheets
Risk Management Framework
RMF
DIACAP
Computer Science
Regulatory Compliance
DoD
Computer Hardware
Software Security
Communication
Encryption
Incident Management
PKI
Authorization
Requirements Elicitation
Functional Analysis
Functional Requirements
Arena
Risk Analysis
Risk Assessment
Information Security
Issue Resolution
Microsoft Exchange
TEM
Tivoli Endpoint Manager
Information Assurance
Management
Cyber Security
ISSM
IT Security
Collaboration
System Integration
Life Insurance
Training

Job Details

Your Impact:

We are seeking an Information Systems Security Manager (ISSM) 3 for a prime contract that is based out of our Columbia, MD office.

Responsibilities:
Provide management support for a program, organization, system, or enclave's Information Assurance program.
Provide management support for proposing, coordinating, implementing, and enforcing Information System Security policies, standards, and methodologies.
Manage operational security posture for an Information System or program to ensure Information System Security policies, standards, and procedures are established and followed.
Provide management of security aspects of the Information System and perform day-to-day security operations of the system.
Assist ISSEs and ISSOs with evaluating security 1solutions to ensure they meet security requirements for processing classified information.
Manage the performance of vulnerability/risk assessment analysis to support security authorization. Provide management support to configuration management (CM) for information system security software, hardware, and firmware.
Manage changes to systems and assess the security impact of those changes.
Manage the process and preparation of documentation reviews to include System Security Plans (SSPs), Risk Assessment Reports, Certification and Accreditation (C&A) packages, and System Requirements
Traceability Matrices (SRTMs). Support security authorization activities in compliance with NSA/CSS Risk Management Framework (RMF) process and DoD Information Assurance Certification and Accreditation Process (DIACAP).

Here's What You'll Need:
Twelve (12) years of related work experience in the field of security authorization.
Bachelor's degree in Computer Science, Cyber Security or IT Engineering is required.
In lieu of a Bachelor's degree, an additional four (4) years of work-related experience may be substituted for a total of sixteen (16) years.
Compliance with DoD 8570.01-M with a minimum certification of IAM Level II is required.
Experience in the following areas is required: knowledge of current security tools, hardware/software security implementation; communication protocols; or encryption tools and techniques. Familiarity with commercial security products, security authorization techniques, security incident management, and PKI and authorization services.
with an active TS/SCI with Poly

Other Requirements:
Perform requirements gathering and analysis of said requirements
Perform functional analysis to identify required tasks and their interrelationships
Identify and map current security infrastructure as a foundation to define future programs
Collaborate with engineers on systems integration efforts
Plan and coordinate implementation of IT security programs and policies
Analyze user needs to determine functional and cross-functional requirements
Gather and organize technical information about an organization's mission goals and needs, existing security products, and ongoing programs in the multi-level security arena
Perform functional allocation and identify resources required for each task
Perform risk analysis that also includes risk assessment
Enable Government planning, coordination, and oversight of organizational implementation of information security services
Enable design and implementation of future IT systems and related security
Assist Program Managers with administrative and technical oversight with specific programs within the portfolio
Facilitate issue resolution through integrated product teams and Technical Exchange Meetings (TEM)
Provide support for a program, organization, system, or enclave's information assurance program
Provide daily oversight and direction to contractor ISSOs
Oversee efforts of engineering staff to design, develop, engineer, and implement solutions to security requirements
Interact with customers, IT staff, and high-level corporate officers to define and achieve required Cybersecurity objectives
Serve as the Program's ISSM
Enable the Government with the development and implementation of NSA IT security services
Collaborate with engineers on systems integration and life cycle requirements
Advise Program Managers on administrative and technical oversight matters regarding portfolio programs
Enable Program Managers with administrative and technical oversight assistance with specific programs within the portfolio
Enable design and implementation of future IT systems and related security.

Pay Transparency

Amentum's health and welfare benefits are designed to invest in you and in the things you care about. Your health. Your well-being. Your security. Your future. Eligible employees and their dependents may elect medical, dental, vision, and basic life insurance. Employees are able to enroll in our company's 401k plan, and, if eligible, a deferred compensation plan and Executive Deferral Plan. Employees will also receive 17 days of vacation per year, seven paid holidays, plus floating holidays and caregiver leave. Hired applicants will be able to purchase company stock and have the opportunity to receive a performance discretionary bonus.

The base salary range for this position is $179K to $223K. This range reflects the minimum and maximum target for new hire salaries for the position across all US locations. Within the range, individual pay is determined by work location and additional factors, including job-related skills, experience, and relevant education or training.
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.