Logo
Medium

Information System Security Manager (ISSM) Skill Level 2

Medium, Baltimore, Maryland, United States

Save Job

Prime Time Consulting provides clients with expert intelligence analysis services. Our clients include defense contractors, industrial and service corporations, and departments and agencies of the U.S. Federal Government.

We are actively searching for

Information System Security Manager (ISSM) Skill Level 2 , located in

Maryland

to support our team. We have varying levels of this position, depending on years of experience and education.

Responsibilities

Provide management support for a program, organization, system, or enclave’s Information Assurance program. Provide management support for proposing, coordinating, implementing, and enforcing Information System Security policies, standards, and methodologies. Manage operational security posture for an Information System or program to ensure Information System Security policies, standards, and procedures are established and followed. Provide management of security aspects of the Information System and perform day-to-day security operations of the system. Assist ISSEs and ISSOs with evaluating security solutions to ensure they meet security requirements for processing classified information. Manage the performance of vulnerability/risk assessment analysis to support security authorization. Provide management support to configuration management (CM) for information system security SW, HW, and FW. Manage changes to systems and assess the security impact of those changes. Manage the process and preparation of documentation reviews to include SSPs, Risk Assessment Reports, C&A packages, and System Requirements Traceability Matrices (SRTMs). Support security authorization activities in compliance with DoD RMF process and DIACAP.

Additional Capabilities - Level 3

Perform requirements gathering and analysis of said requirements

Perform functional analysis to identify required tasks and their interrelationships

Identify and map current security infrastructure as a foundation to define future programs

Collaborate with engineers on systems integration efforts

Plan and coordinate implementation of IT security programs and policies

Analyze user needs to determine functional and cross-functional requirements

Gather and organize technical information about an organization’s mission goals and needs, existing security products, and ongoing programs in the multi-level security arena

Perform functional allocation and identify resources required for each task

Perform risk analysis that also includes risk assessment

Enable Government planning, coordination, and oversight of organizational implementation of information security services

Enable design and implementation of future IT systems and related security

Assist Program Managers with administrative and technical oversight with specific program’s within the portfolio

Facilitate issue resolution through integrated product teams and Technical Exchange Meetings (TEM)

Provide support for a program, organization, system, or enclave’s information assurance program

Provide daily oversight and direction to contractor ISSOs

Oversee efforts of engineering staff to design, develop, engineer and implement solutions to security requirements

Interact with customers, IT staff, and high-level corporate officers to define and achieve required Cybersecurity objectives

Serve as the Program’s ISSM

Enable the Government with the development and implementation of DoD IT security services

Collaborate with engineers on systems integration and life cycle requirements

Advise Program Managers on administrative and technical oversight matters in regards to portfolio programs

Required Qualifications

10 years of work-related experience in the field of security authorization is required. Experience in the following areas is required: knowledge of current security tools, HW/SW security implementation; communication protocols; or encryption tools and techniques.

Familiarity with commercial security products, security authorization techniques, security incident management, and PKI and authorization services.

Bachelor’s degree in Computer Science or a related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Systems Engineering, Mathematics, Computer Forensics, Cybersecurity, Information Technology, Information Assurance, Information Security, and Information Systems) is required.

In lieu of a Bachelor’s degree, an additional 4 years of work-related experience may be substituted.

Certifications Required

DoD 8570 compliance with IAM II is required.

Company Perks

200 hours of PTO annually

6% 401k Contribution

Competitive Health Care Options

Short Term/Long Term/Life Insurance

Annual Training Budget

$189,468.24 - $214,468.24 a year

We are an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, creed, sex, age, national origin, disability, Veteran status, or any other category protected by federal, state, or local laws.

#J-18808-Ljbffr