Information System Security Manager (ISSM) at Swift
Annapolis Junction, Maryland, United States -
Full Time


Start Date

Immediate

Expiry Date

31 May, 26

Salary

0.0

Posted On

02 Mar, 26

Experience

10 year(s) or above

Remote Job

Yes

Telecommute

Yes

Sponsor Visa

No

Skills

Information Assurance, Cybersecurity, Security Policies, Risk Management Framework, DoD Requirements, Vulnerability Management, Risk Assessment, Configuration Control, Security Authorization, SSPs, Risk Assessment Reports, Authorization Packages, IAM Level II, IAM Level III, NIST 800-53, Communication Protocols

Industry

IT Services and IT Consulting

Description
For the OPS Consulting team, ‘the power to help’ means helping our clients, helping serve the mission, helping our employees and their families, and helping the community. Headquartered in Hanover, MD. OPS Consulting has over two decades of experience specializing in the most mission-critical operations. We are thought leaders and innovators. The ingenuity of our developers, engineers, cyber experts, linguists, and analysts are dedicated to empowering our clients, fulfilling The Mission, and remaining trusted leaders and advisers in national security and technology solutions. We are looking for an Information Systems Security Manager to join a growing team in Annapolis Junction, MD. The Information System Security Manager (ISSM) provides leadership and oversight for a program, organization, system, or enclave’s Information Assurance program. This role is responsible for implementing and enforcing security policies, maintaining the operational security posture of assigned systems, and supporting security authorization activities in accordance with Risk Management Framework (RMF) and applicable DoD requirements. The ISSM partners closely with engineering, operations, and government stakeholders to ensure secure, compliant, and mission-aligned environments. Responsibilities: * Provide management oversight for information assurance and cybersecurity programs * Coordinate implementation of IT security policies and security control requirements * Manage and maintain the operational security posture of systems and enclaves * Oversee vulnerability management and risk assessment activities * Manage configuration control and security-related change management processes * Assess and document security impacts of system modifications * Oversee preparation and review of SSPs, Risk Assessment Reports, and authorization packages * Support and guide security authorization activities under RMF * Provide leadership and oversight to ISSOs and engineering staff * Interface directly with Government stakeholders to achieve cybersecurity objectives Requirements: Skill Level 2: * Ten (10) years of experience in security authorization and RMF-based environments * Experience with security tools, hardware/software security implementation, encryption, and/or communication protocols * Bachelor’s degree in Computer Science, Cyber Security, IT Engineering, or related field * In lieu of a Bachelor’s degree, four (4) additional years of relevant experience may be substituted * DoD 8570 / 8140 compliance with IAM Level II required Skill Level 3: * Twelve (12) years of experience in security authorization * Experience with security tools, authorization techniques, incident management, and enterprise security architecture * Bachelor’s degree in Computer Science, Cyber Security, IT Engineering, or related field * In lieu of a Bachelor’s degree, four (4) additional years of relevant experience may be substituted * DoD 8570 / 8140 compliance with IAM Level III required * US citizenship and an active TS/SCI with Polygraph security clearance required Desired Experience: * Strong working knowledge of NIST 800-53 and RMF processes * Experience briefing senior leadership and government customers * Familiarity with enterprise security architecture and system engineering integration * Strong written and verbal communication skills  
Responsibilities
The Information System Security Manager provides leadership and oversight for an organization’s Information Assurance program, implementing and enforcing security policies and maintaining the operational security posture of assigned systems. This role involves coordinating IT security policy implementation, overseeing vulnerability management, and guiding security authorization activities under the Risk Management Framework (RMF).
Loading...