Overview
On Site
USD 107,900.00 - 195,050.00 per year
Full Time
Skills
IT Management
Conceptualization
Acceptance Testing
Data Security
Presentations
Technical Training
Recovery
Incident Management
Issue Tracking
Security Controls
Configuration Management
Content Management
Computer Hardware
Firmware
Customer Care and Billing
Leadership
Training
Mentorship
Software Development
Auditing
Risk Assessment
Continuous Monitoring
IT Security
Reporting
FSO
Information Security
Policies and Procedures
Information System Security
Management Information Systems
Information Assurance
Information Architecture
Impact Analysis
ISSM
CNSS
Cyber Security
Risk Management
Industrial Security
NISP
Authorization
Information Systems
LAN
WAN
Cryptography
Management
Network
Vulnerability Scanning
Splunk
STIG
Workflow
Documentation
Change Management
JIRA
Confluence
eMASS
Regulatory Compliance
Communication
DoD
Security Clearance
CISSP
Microsoft Windows
Linux
Operating Systems
Cloud Computing
Risk Management Framework
RMF
Market Analysis
Law
Job Details
Leidos Chief Information Security Office, reporting through our Digital Modernization sector, has an opening for an Information Systems Security Manager (ISSM) in our St. Petersburg, FL office. The ISSM will support our Defense Systems business, overseeing several DCSA-approved Collateral Information Systems and maintaining accreditation throughout the system lifecycle. In this role, you will serve as the Subject Matter Expert (SME) within the Information Assurance (IA) technical domain, supporting enclaves across the enterprise. You will oversee day-to-day information system security operations and may manage junior Information System Security Officers (ISSOs), resolve complex problems, and develop innovative solutions to meet changing security requirements. To be successful in this role, you must be able to work independently with a team of analysts, information technology management and staff, and site management.
Location: Fully onsite, St Petersburg, FL office
Clearance: Active Secret Clearance with ability to obtain Top Secret.
Primary Responsibilities
This role may include a combination of duties to protect information and maintain security controls for an entire system, site, or program to reduce risk.
Develop and lead Information Security projects from conceptualization to full deployment and user acceptance.
Create comprehensive training programs on information assurance, data security, cybersecurity best practices, and relevant policies and procedures.
Design training materials, including manuals, operating procedures, and presentations, and assign online courses and other resources.
Coordinate technical training on security tools, software, and technologies used within the organization to enhance the skills of IT staff and other relevant personnel.
Develop and lead training on responding to security incidents, including reporting procedures, containment, eradication, recovery, and post-incident analysis.
Implement and manage the Risk Management Framework (RMF) Continuous Monitoring process by utilizing an automated ticketing system, ensuring accurate tracking, monitoring, and reporting of security controls, vulnerabilities, and remediation efforts within the organization's information systems.
Perform continuous monitoring, analysis, and response to Information System network and security events.
Document compliance activities in accordance with the governing authority-approved authorization package.
Support the maintenance of system accreditation packages, including SSPs, CONOPS, security control evidence, POA&Ms, and continuous monitoring documentation.
Develop procedures and documentation to ensure compliance with Configuration Management (CM) for security-relevant Information System (IS) software, hardware, and firmware.
Facilitate CCB meetings; assess security impacts of proposed changes; document change requests, approvals, and implementation evidence.
Ensure systems are operated, maintained, and disposed of in accordance with the governing authority-approved authorization package and customer directives.
Evaluate proposed changes or additions to the information system and advise senior site leadership of the security relevance.
Develop and conduct cybersecurity education and training, mentor other information assurance professionals in cybersecurity and secure software development practices.
Participate in internal/external security audits/assessments/inspections coordinating corrective actions as necessary; participate in the risk management process; perform risk assessments and Continuous Monitoring
Lead investigations of computer security violations and incidents, report as necessary to the Facility Security and Senior Program Managers.
Ensure proper protection and/or corrective measures have been taken when an incident or vulnerability has been discovered.
Work with the Facility Security Officer (FSO), developing, implementing, and managing a formal Information Security/Information Systems Security Program.
Develop, implement, and enforce information security policies and procedures.
Author, review, and update IS Authorization documentation (Body of Evidence) to support IS Assessment and Authorization activities
Basic Qualifications
An active DoD Secret clearance is required for consideration.
Bachelor's degree in an IT-related subject matter area from an accredited college or university and 8+ years of experience in being in an operational cyber security-specific role (e.g., information system security manager, information system security officer, cyber security specialist) or have 12+ years of experience in an IT related position with at least 10 of those years in an operational cyber security specific role.
At least 5 years of IA Cyber management experience.
Current DoD 8570 IAM Level II certified.
Past or current ISSM/ISSO experience.
Detailed understanding of the Risk Management Framework (RMF), National Institute of Standards and Technology (NIST), and Committee on National Security Systems (CNSS) cyber security requirements and guidance, cybersecurity-related risk management techniques.
Working knowledge in maintaining compliance with National Industrial Security Program Operating Manual (NISPOM) and DCSA Assessment and Authorization Process Manual (DAAPM) / DCSA Assessment and Authorization Guide (DAAG) security requirements for classified information systems.
Familiarity with network technologies (LAN & WAN) and best practices within a classified environment, including crypto and key management.
Working knowledge of Microsoft Windows (workstation & server) and Linux operating systems in a secure network environment.
Experience with compliance and vulnerability scanning tools (e.g., Tenable, Splunk, ACAS, STIG Viewer).
Experience with workflow, documentation, and configuration/change management tools (e.g., JIRA, Confluence, eMASS).
Must be able to work in a constantly changing regulatory environment with short-, mid-and long-term timelines for remediating any non-compliance.
Must work well within a team environment and adapt quickly to change.
Excellent verbal and written communication skills.
Preferred Qualifications
Current DoD Top Secret clearance
CISSP
Proficient in using Microsoft Windows and Linux operating systems and cloud computing.
Experience with developing policies, procedures, and guidance, including providing artifacts for the RMF
Come break things (in a good way). Then build them smarter.
We're the tech company everyone calls when things get weird. We don't wear capes (they're a safety hazard), but we do solve high-stakes problems with code, caffeine, and a healthy disregard for "how it's always been done."
Original Posting:
December 18, 2025
For U.S. Positions: While subject to change based on business needs, Leidos reasonably anticipates that this job requisition will remain open for at least 3 days with an anticipated close date of no earlier than 3 days after the original posting date as listed above.
Pay Range:
Pay Range $107,900.00 - $195,050.00
The Leidos pay range for this job level is a general guideline only and not a guarantee of compensation or salary. Additional factors considered in extending an offer include (but are not limited to) responsibilities of the job, education, experience, knowledge, skills, and abilities, as well as internal equity, alignment with market data, applicable bargaining agreement (if any), or other law.
Location: Fully onsite, St Petersburg, FL office
Clearance: Active Secret Clearance with ability to obtain Top Secret.
Primary Responsibilities
This role may include a combination of duties to protect information and maintain security controls for an entire system, site, or program to reduce risk.
Develop and lead Information Security projects from conceptualization to full deployment and user acceptance.
Create comprehensive training programs on information assurance, data security, cybersecurity best practices, and relevant policies and procedures.
Design training materials, including manuals, operating procedures, and presentations, and assign online courses and other resources.
Coordinate technical training on security tools, software, and technologies used within the organization to enhance the skills of IT staff and other relevant personnel.
Develop and lead training on responding to security incidents, including reporting procedures, containment, eradication, recovery, and post-incident analysis.
Implement and manage the Risk Management Framework (RMF) Continuous Monitoring process by utilizing an automated ticketing system, ensuring accurate tracking, monitoring, and reporting of security controls, vulnerabilities, and remediation efforts within the organization's information systems.
Perform continuous monitoring, analysis, and response to Information System network and security events.
Document compliance activities in accordance with the governing authority-approved authorization package.
Support the maintenance of system accreditation packages, including SSPs, CONOPS, security control evidence, POA&Ms, and continuous monitoring documentation.
Develop procedures and documentation to ensure compliance with Configuration Management (CM) for security-relevant Information System (IS) software, hardware, and firmware.
Facilitate CCB meetings; assess security impacts of proposed changes; document change requests, approvals, and implementation evidence.
Ensure systems are operated, maintained, and disposed of in accordance with the governing authority-approved authorization package and customer directives.
Evaluate proposed changes or additions to the information system and advise senior site leadership of the security relevance.
Develop and conduct cybersecurity education and training, mentor other information assurance professionals in cybersecurity and secure software development practices.
Participate in internal/external security audits/assessments/inspections coordinating corrective actions as necessary; participate in the risk management process; perform risk assessments and Continuous Monitoring
Lead investigations of computer security violations and incidents, report as necessary to the Facility Security and Senior Program Managers.
Ensure proper protection and/or corrective measures have been taken when an incident or vulnerability has been discovered.
Work with the Facility Security Officer (FSO), developing, implementing, and managing a formal Information Security/Information Systems Security Program.
Develop, implement, and enforce information security policies and procedures.
Author, review, and update IS Authorization documentation (Body of Evidence) to support IS Assessment and Authorization activities
Basic Qualifications
An active DoD Secret clearance is required for consideration.
Bachelor's degree in an IT-related subject matter area from an accredited college or university and 8+ years of experience in being in an operational cyber security-specific role (e.g., information system security manager, information system security officer, cyber security specialist) or have 12+ years of experience in an IT related position with at least 10 of those years in an operational cyber security specific role.
At least 5 years of IA Cyber management experience.
Current DoD 8570 IAM Level II certified.
Past or current ISSM/ISSO experience.
Detailed understanding of the Risk Management Framework (RMF), National Institute of Standards and Technology (NIST), and Committee on National Security Systems (CNSS) cyber security requirements and guidance, cybersecurity-related risk management techniques.
Working knowledge in maintaining compliance with National Industrial Security Program Operating Manual (NISPOM) and DCSA Assessment and Authorization Process Manual (DAAPM) / DCSA Assessment and Authorization Guide (DAAG) security requirements for classified information systems.
Familiarity with network technologies (LAN & WAN) and best practices within a classified environment, including crypto and key management.
Working knowledge of Microsoft Windows (workstation & server) and Linux operating systems in a secure network environment.
Experience with compliance and vulnerability scanning tools (e.g., Tenable, Splunk, ACAS, STIG Viewer).
Experience with workflow, documentation, and configuration/change management tools (e.g., JIRA, Confluence, eMASS).
Must be able to work in a constantly changing regulatory environment with short-, mid-and long-term timelines for remediating any non-compliance.
Must work well within a team environment and adapt quickly to change.
Excellent verbal and written communication skills.
Preferred Qualifications
Current DoD Top Secret clearance
CISSP
Proficient in using Microsoft Windows and Linux operating systems and cloud computing.
Experience with developing policies, procedures, and guidance, including providing artifacts for the RMF
Come break things (in a good way). Then build them smarter.
We're the tech company everyone calls when things get weird. We don't wear capes (they're a safety hazard), but we do solve high-stakes problems with code, caffeine, and a healthy disregard for "how it's always been done."
Original Posting:
December 18, 2025
For U.S. Positions: While subject to change based on business needs, Leidos reasonably anticipates that this job requisition will remain open for at least 3 days with an anticipated close date of no earlier than 3 days after the original posting date as listed above.
Pay Range:
Pay Range $107,900.00 - $195,050.00
The Leidos pay range for this job level is a general guideline only and not a guarantee of compensation or salary. Additional factors considered in extending an offer include (but are not limited to) responsibilities of the job, education, experience, knowledge, skills, and abilities, as well as internal equity, alignment with market data, applicable bargaining agreement (if any), or other law.
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.