System High Corporation
Information Systems Security Manager II (ISSM II)
System High Corporation, Hampton, Virginia, United States, 23661
Overview
Information Systems Security Manager II (ISSM II) position at System High Corporation. We protect and advance national missions across SAP, SCI, and Collateral programs. The ISSM II serves as a principal advisor on information system security matters, with primary support for Special Access Programs (SAPs) supporting DoD agencies. The role involves day-to-day security activities for Collateral, SCI, and SAP environments. System High Corporation delivers advanced protection and secrecy solutions for critical missions. We seek a qualified ISSM II to contribute to our success through innovative approaches in intelligence and cybersecurity. Responsibilities
Perform oversight of the development, implementation and evaluation of information system security program policy, with emphasis on integrating existing SAP network infrastructures. Develop and oversee operational information systems security policy and guidelines for network security based on RMF, with emphasis on the JSIG authorization process. Advise customers on RMF assessment and authorization issues. Perform risk assessments and provide recommendations to DoD agency customers. Advise government program managers on security testing methodologies and processes. Evaluate authorization documentation and provide written recommendations for authorization to government PMs. Develop and maintain a formal Information Systems Security Program. Ensure training for IADs, network administrators, and other cybersecurity personnel. Develop, review, endorse, and recommend action on system assessment documentation. Ensure procedures for clearing, sanitizing, and destroying hardware and media are in place. Develop and execute security assessment plans to verify required protections. Maintain repositories for system authorization documentation and changes. Develop policies to respond to security incidents, investigate and report violations. Ensure remediation measures for discovered incidents or vulnerabilities. Clarify data ownership and responsibilities at each authorization boundary (accountability, access, handling requirements). Develop and implement an information security education, training, and awareness program. Evaluate threats and vulnerabilities to determine if additional safeguards are needed. Assess changes in the system, environment, and operational needs affecting authorization. Ensure authorization is granted for all boundaries under the ISSM’s purview. Review AIS assessment plans. Coordinate with PSO or cognizant security official on approval of external information systems. Conduct periodic assessments of the security posture of authorization boundaries. Institute and implement a Configuration Control Board (CCB) charter. Ensure configuration management for security-relevant changes to software, hardware, and firmware with proper documentation. Ensure periodic testing using intrusion/attack detection and monitoring tools (shared with ISSOs). Ensure system recovery and reconstitution processes support availability requirements. Ensure all authorization documentation is current and accessible to properly authorized individuals. Ensure system security requirements are addressed during all phases of the system life cycle. Participate in self-inspections and periodic reviews to accommodate policy or technology changes. Coordinate technical security issues with ISSE when outside area of expertise. Provide expert research and analysis to support expanding programs and cyber security activities. Develop Assured File Transfers (AFT) in accordance with JSIG. Provide leadership, mentoring, and quality assurance for Cyber Security and IT team members. Experience
7 - 9 years related experience. Prior performance in roles such as ISSO or ISSM. Education
Bachelor’s degree or equivalent experience (4 years). Certifications
Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level 2 or Information Assurance Manager Level 2 within 6 months of hire. Clearance
Current Top-Secret Clearance with SCI Eligibility. Eligibility for access to Special Access Program Information. Willingness to submit to a Counterintelligence polygraph. Other Requirements
Must have working knowledge of DoD, National and applicable service and agency security policy, manuals and standards. Must be able to regularly lift up to 50 lbs. Additional Information
This job description is not designed to cover all duties required; there may be additional activities and responsibilities. In compliance with federal law, all hired individuals must verify identity and eligibility to work in the United States. System High is a military-friendly employer and values diverse backgrounds; we strive for an inclusive culture. System High is an equal employment opportunity employer. We do not discriminate on protected characteristics. If you require a reasonable accommodation to apply, please email recruiting@systemhigh.com. Legal notices can be viewed in our Know Your Rights PDFs. Warning
Beware of recruitment scams: System High will never request money or personal purchases during the hiring process. Verify all communications come from systemhigh.com or msg.paycomonline.com email addresses. Seniority level
Mid-Senior level Employment type
Full-time Job function
Information Technology Industries: Defense & Space Referrals increase your chances of interviewing at System High Corporation. Get notified about new Information System Security Manager jobs in Hampton, VA.
#J-18808-Ljbffr
Information Systems Security Manager II (ISSM II) position at System High Corporation. We protect and advance national missions across SAP, SCI, and Collateral programs. The ISSM II serves as a principal advisor on information system security matters, with primary support for Special Access Programs (SAPs) supporting DoD agencies. The role involves day-to-day security activities for Collateral, SCI, and SAP environments. System High Corporation delivers advanced protection and secrecy solutions for critical missions. We seek a qualified ISSM II to contribute to our success through innovative approaches in intelligence and cybersecurity. Responsibilities
Perform oversight of the development, implementation and evaluation of information system security program policy, with emphasis on integrating existing SAP network infrastructures. Develop and oversee operational information systems security policy and guidelines for network security based on RMF, with emphasis on the JSIG authorization process. Advise customers on RMF assessment and authorization issues. Perform risk assessments and provide recommendations to DoD agency customers. Advise government program managers on security testing methodologies and processes. Evaluate authorization documentation and provide written recommendations for authorization to government PMs. Develop and maintain a formal Information Systems Security Program. Ensure training for IADs, network administrators, and other cybersecurity personnel. Develop, review, endorse, and recommend action on system assessment documentation. Ensure procedures for clearing, sanitizing, and destroying hardware and media are in place. Develop and execute security assessment plans to verify required protections. Maintain repositories for system authorization documentation and changes. Develop policies to respond to security incidents, investigate and report violations. Ensure remediation measures for discovered incidents or vulnerabilities. Clarify data ownership and responsibilities at each authorization boundary (accountability, access, handling requirements). Develop and implement an information security education, training, and awareness program. Evaluate threats and vulnerabilities to determine if additional safeguards are needed. Assess changes in the system, environment, and operational needs affecting authorization. Ensure authorization is granted for all boundaries under the ISSM’s purview. Review AIS assessment plans. Coordinate with PSO or cognizant security official on approval of external information systems. Conduct periodic assessments of the security posture of authorization boundaries. Institute and implement a Configuration Control Board (CCB) charter. Ensure configuration management for security-relevant changes to software, hardware, and firmware with proper documentation. Ensure periodic testing using intrusion/attack detection and monitoring tools (shared with ISSOs). Ensure system recovery and reconstitution processes support availability requirements. Ensure all authorization documentation is current and accessible to properly authorized individuals. Ensure system security requirements are addressed during all phases of the system life cycle. Participate in self-inspections and periodic reviews to accommodate policy or technology changes. Coordinate technical security issues with ISSE when outside area of expertise. Provide expert research and analysis to support expanding programs and cyber security activities. Develop Assured File Transfers (AFT) in accordance with JSIG. Provide leadership, mentoring, and quality assurance for Cyber Security and IT team members. Experience
7 - 9 years related experience. Prior performance in roles such as ISSO or ISSM. Education
Bachelor’s degree or equivalent experience (4 years). Certifications
Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level 2 or Information Assurance Manager Level 2 within 6 months of hire. Clearance
Current Top-Secret Clearance with SCI Eligibility. Eligibility for access to Special Access Program Information. Willingness to submit to a Counterintelligence polygraph. Other Requirements
Must have working knowledge of DoD, National and applicable service and agency security policy, manuals and standards. Must be able to regularly lift up to 50 lbs. Additional Information
This job description is not designed to cover all duties required; there may be additional activities and responsibilities. In compliance with federal law, all hired individuals must verify identity and eligibility to work in the United States. System High is a military-friendly employer and values diverse backgrounds; we strive for an inclusive culture. System High is an equal employment opportunity employer. We do not discriminate on protected characteristics. If you require a reasonable accommodation to apply, please email recruiting@systemhigh.com. Legal notices can be viewed in our Know Your Rights PDFs. Warning
Beware of recruitment scams: System High will never request money or personal purchases during the hiring process. Verify all communications come from systemhigh.com or msg.paycomonline.com email addresses. Seniority level
Mid-Senior level Employment type
Full-time Job function
Information Technology Industries: Defense & Space Referrals increase your chances of interviewing at System High Corporation. Get notified about new Information System Security Manager jobs in Hampton, VA.
#J-18808-Ljbffr