Assisting technical/management leadership on major tasks or technology assignments • Establishing goals and plans that meet project objectives • Assisting in direction and control activities, having overall responsibility for security management, methods, and staffing to ensure that technical requirements are met • Participating in client negotiations and interfacing with senior management • Supporting decision making and domain knowledge that may have … a critical impact on overall project implementation • Providing support to plan, coordinate, and implement a cybersecurity lab's informationsecurity - Providing support for facilitating and helping the lab identify its current security infrastructure and define future programs, design and implementation of security related to lab systems • Assisting the efforts of security staff to design, develop … engineer and implement solutions to security requirements • Implementing and development of the DHS IT security standards • Gathering and organizing technical information about the lab's mission goals and needs, existing security products, and ongoing programs • Performing risk analyses which also includes risk assessment • Planning and leading major technology assignments • Evaluating performance results and recommends major changes More ❯
Role: InformationSecurityManager Location: Utrecht Type: Permanent Workplace Type: Hybrid/3 days on site Language: Dutch speaking role Job Description Develop, implement, and maintain the organization's informationsecurity strategy, policies, and procedures. Lead risk assessments, security audits, and vulnerability assessments to identify and mitigate threats. Oversee compliance with industry regulations (e.g. … ISO 27001, NIS2, GDPR). Coordinate with IT, legal, and business units to ensure security is integrated into all processes. Conduct security awareness training and promote a culture of cybersecurity. Monitor and report on security performance and risk to senior leadership. Manage relationships with external vendors and consultants for security services. Lead and mentor a team … of security professionals, if applicable. Requirements Dutch speaking role A bachelor's or master's degree (Desirable) One informationsecurity-related certification such as CISM, ISO27001, CRISC, CISSP Minimum of 5+ years relevant experience Strong foundational knowledge and experience in information security. Benefits Base Salary: 6k - 8k depending on experience (excluding all of the below) Bonus More ❯
Job Description Senior Information Systems Security Officer (ISSO)/Project Manager Work Location: Reston, VA; work may also be performed at locations in the Washington, DC National Capital Region (NCR) (i.e., The District of Columbia; Arlington, Fairfax, Loudon, Prince William, and Stafford counties in VA (including incorporated cities) and Prince George and Montgomery Counties in Maryland and … support of combatant commanders, as needed. Kwaan Tech is seeking a highly qualified professional to join our team in support of a government customer. We are looking for Senior Information Systems Security Officer (ISSO) to act as the onsite Project Manager for both on-premises and cloud-native environments. The Senior ISSO/Project manager will … serve as an on-site Project Manager/Team Leader with managerial and supervisory authorities to ensure the effective performance of the contract, to include monitoring the work assignments of contractor personnel. The Senior ISSO shall have the detailed knowledge and expertise required to manage the security aspects of an information system and will be assigned responsibility More ❯
La Fosse has partnered with a well-established financial services organisation. They are looking for its first InformationSecurity Senior Manager. This is a newly created role to lead and own the organisation’s security capability. You’ll be the go-to person for all things security – managing policy and risk, aligning to ISO27001, CE+ and … DORA. There’s strong executive buy-in, a healthy security budget, and a clear commitment to maturing the function. The culture is collaborative, flat-structured and outcome-focused – a mix of long-term stability with start-up energy when it comes to technology. What you'll be doing: Own and lead the security function, frameworks and controls across … multiple entities Deliver CE+ certification and support alignment to ISO27001, DORA, and other regulatory requirements Provide oversight of security tools including Sentinel, Defender and Azure infrastructure Represent security in governance forums, and provide regular reporting to internal committees and stakeholders Work with internal teams and the MSP to ensure effective security operations and incident response. What they More ❯
La Fosse has partnered with a well-established financial services organisation. They are looking for its first InformationSecurity Senior Manager. This is a newly created role to lead and own the organisation’s security capability. You’ll be the go-to person for all things security – managing policy and risk, aligning to ISO27001, CE+ and … DORA. There’s strong executive buy-in, a healthy security budget, and a clear commitment to maturing the function. The culture is collaborative, flat-structured and outcome-focused – a mix of long-term stability with start-up energy when it comes to technology. What you'll be doing: Own and lead the security function, frameworks and controls across … multiple entities Deliver CE+ certification and support alignment to ISO27001, DORA, and other regulatory requirements Provide oversight of security tools including Sentinel, Defender and Azure infrastructure Represent security in governance forums, and provide regular reporting to internal committees and stakeholders Work with internal teams and the MSP to ensure effective security operations and incident response. What they More ❯
La Fosse has partnered with a well-established financial services organisation. They are looking for its first InformationSecurity Senior Manager. This is a newly created role to lead and own the organisation’s security capability. You’ll be the go-to person for all things security – managing policy and risk, aligning to ISO27001, CE+ and … DORA. There’s strong executive buy-in, a healthy security budget, and a clear commitment to maturing the function. The culture is collaborative, flat-structured and outcome-focused – a mix of long-term stability with start-up energy when it comes to technology. What you'll be doing: Own and lead the security function, frameworks and controls across … multiple entities Deliver CE+ certification and support alignment to ISO27001, DORA, and other regulatory requirements Provide oversight of security tools including Sentinel, Defender and Azure infrastructure Represent security in governance forums, and provide regular reporting to internal committees and stakeholders Work with internal teams and the MSP to ensure effective security operations and incident response. What they More ❯
Client is a growing woman-owned Cyber & Physical Security Contractor located in Columbia, Maryland. Client strives to make every employee belong, be heard and be successful in their career. This includes listening to your needs, providing rewarding and challenging opportunities, and offering tools to succeed in your current role while preparing you for advancement. We are looking for ambitious … hand with experts across the technical spectrum? At Helm Point Solutions, we will provide the challenge and you will be the differentiator in what can be accomplished. The Job: Information Systems SecurityManager (ISSM) supporting our government customer Virginia. Responsible for the Information Assurance (IA) program as stipulated by various US Government requirements including but not … limited to the National Industrial Security Operating Manuel (NISPOM), DSS Authorization and the Joint Special Access Implementation Guide (JSIG) Monitor cybersecurity compliance by performing periodic self-inspections, test and reviews of information systems to ensure that workstations/servers are operating as authorized/accredited and that conditions have not changes Develop corrective solutions and maintain associated documentation More ❯
critical communications, and logistics. Our people bring unparalleled expertise and dedication, and we are always looking to expand our team. Consulting Services Group (CSG) is hiring a highly skilled Information Systems SecurityManager (ISSM) to support a mission-critical program. This position plays a pivotal role in the implementation, management, and oversight of information assurance and … cybersecurity compliance for Department of Defense (DoD) information systems. The ISSM will ensure all systems under their responsibility comply with DoD cybersecurity directives and will serve as the primary liaison between cybersecurity operations, program management, and government security stakeholders. Duties/Tasks and Responsibilities: Developing processes and protocols for storing information, making it accessible, controlling access, and … process. Conduct independent risk assessments and guide others through the process to ensure stakeholders are able to make risk-informed decisions. Manage and maintain the cybersecurity posture of classified information systems in accordance with DoD, NIST, and USCYBERCOM security requirements. Develop, implement, and maintain system security plans (SSPs), risk assessments, and contingency plans. Ensure compliance with the More ❯
This position is contingent on contract award Description: Provide management support for a program, organization, system, or enclave's Information Assurance program. Provide management support for proposing, coordinating, implementing, and enforcing Information System Security policies, standards, and methodologies. Manage operational security posture for an Information System or program to ensure Information System Security policies, standards, and procedures are established and followed. Provide management of security aspects of the Information System and perform day-to-day security operations of the system. Assist ISSEs and ISSOs with evaluating security solutions to ensure they meet security requirements for processing classified information. Manage the performance of vulnerability/risk assessment analysis … to support security authorization. Provide management support to configuration management (CM) for information system security software, hardware, and firmware. Manage changes to systems and assess the security impact of those changes. Manage the process and preparation of documentation reviews to include System Security Plans (SSPs), Risk Assessment Reports, Certification and Accreditation (C&A) packages, and More ❯
This position is contingent on contract award Description: Provide management support for a program, organization, system, or enclave's Information Assurance program. Provide management support for proposing, coordinating, implementing, and enforcing Information System Security policies, standards, and methodologies. Manage operational security posture for an Information System or program to ensure Information System Security policies, standards, and procedures are established and followed. Provide management of security aspects of the Information System and perform day-to-day security operations of the system. Assist ISSEs and ISSOs with evaluating security solutions to ensure they meet security requirements for processing classified information. Manage the performance of vulnerability/risk assessment analysis … to support security authorization. Provide management support to configuration management (CM) for information system security software, hardware, and firmware. Manage changes to systems and assess the security impact of those changes. Manage the process and preparation of documentation reviews to include System Security Plans (SSPs), Risk Assessment Reports, Certification and Accreditation (C&A) packages, and More ❯
Information System SecurityManager Clearance: TS/SCI with Polygraph Reston, VA Supporting the Most Exciting and Meaningful Missions in the World Cyber and InformationSecurity Specialist (INFOSEC) perform functions in support of the directorate's Information System SecurityManager (ISSM) and deliver outcomes as follows: Review and analyze systems architecture diagrams … system owners and/or service providers on the creation of required system documentation or body of evidence; review and provide recommendation for approval or disapproval, as appropriate. Assess security and privacy controls and data protection in sponsor information systems and environments of operation as part of the initial security assessment and during operational changes affecting information systems' security posture. Assist the security control accessors (SCA), as appropriate, in performing security systems assessments and reviewing risk elements in the executive Risk System (ERS) report. Create plans of action & milestones (POA&Ms) and/or request risk acceptance through a security assessor(SA) , who will certify the ERS report to the appropriate authorizing More ❯
cycle development and mission support with a focus in areas such as cybersecurity, systems engineering, programmatic and acquisition support. Our specialists hold numerous credentials including Top Secret/SCI security clearances, post graduate degrees, and professionals certifications that provides value added solutions. Strategic Analytix is a privately held minority owned, small-business headquarter in Fulton, MD just outside of … Baltimore and Washington D.C. About the role Job Description Strategic Analytix is looking for a skilled and experienced Information Systems SecurityManager (ISSM). This employee will perform a wide range of duties regarding program organization management and system security. The ISSM will perform management support within the operational security posture for programs to ensure policies … are followed. Manage the security aspects of the information systems and perform day-to-day security operations. Responsible for managing all vulnerability and risk assessments, configuration management, system changes and various other processes. The ISSM will have familiarity in the NSA/CSS Risk Management Framework (RMF) process and DoD Information Assurance Certification and Accreditation Process More ❯
Contract personnel perform investigations to characterize the severity of breaches, develop mitigation plans, and assist with restoring services. Responsibilities: - Providing support to plan, coordinate, and implement the lab's informationsecurity - Providing support for facilitating and helping the lab identify its current security infrastructure and defining future programs, design, and implementation of security related to lab … systems - Assisting the efforts of security staff to design, develop, engineer, and implement solutions to security requirements - Responsible for implementing and developing the DHS IT security - Gathering and organizing technical information about the lab's mission goals and needs, existing security products, and ongoing programs - Performing risk analyses, which also includes risk assessment - Providing support … to plan, coordinate, and implement the lab's informationsecurity - Providing support for facilitating and helping the lab identify its current security infrastructure and define future programs, design, and implementation of security related to lab systems - Possessing and applying expertise on multiple complex work assignments that are broad, requiring originality and innovation in determining how to More ❯
This is a contingent opportunity Information Systems SecurityManager (ISSM) K2 Group is searching for an ISSM to support the Air Force Research Laboratory Sensors Directorate (AFRL/RY) at Wright-Patterson Air Force Base, OH. Duties: Be the Directorate's Certification & Accreditation (C&A) process expert. Perform C&A duties in compliance with the Risk Management … Interim Approval to Operate IATO/Approval to Operate (ATO). Prepare, submit, and track all Directorate C&A packages of all Research, Development, Test, & Evaluation (RDT&E) computer information systems for base-level and higher headquarters approval, and ensure that all systems are following DoD Information Technology (IT) C&A guidance. Submit a quarterly Plan of Action … eMASS; review eMASS registration workbooks, recommend changes/clarification and submit updated workbooks to HQ AFRL for registration of Point-to-Point, Standalone, Standalone Enclave systems having a Federal InformationSecurity Management Act (FISMA) requirement. Coordinate any changes or modifications to hardware, software, or firmware of a system directly with the Authorizing Official (AO)/Delegated Authorizing Official More ❯
Job Title: Information System SecurityManager Level 2 Location(s): Annapolis Junction, MD Hours: Regular Full-Time Salary Range: $133k/yr - $200k/yr Clearance Requirements: This position requires a current and active TS/SCI with FS Poly at the time of application. What you will be doing: Provide management support for a program, organization … system, or enclave s Information Assurance program. Provide management support for proposing, coordinating, implementing, and enforcing Information System Security policies, standards, and methodologies. Manage operational security posture for an Information System or program to ensure Information System Security policies, standards, and procedures are established and followed. Provide management of security aspects of … the Information System and perform day-to-day security operations of the system. Assist ISSEs and ISSOs with evaluating security solutions to ensure they meet security requirements for processing classified information. Manage the performance of vulnerability/risk assessment analysis to support security authorization. Provide management support to configuration management (CM) for information system More ❯
Job Title: Information System SecurityManager Level 3 Location(s): Annapolis Junction, MD Hours: Regular Full-Time Salary Range: $139k/yr - $210k/yr Clearance Requirements: This position requires a current and active TS/SCI with FS Poly at the time of application. What you will be doing: Provide management support for a program, organization … system, or enclave s Information Assurance program. Provide management support for proposing, coordinating, implementing, and enforcing Information System Security policies, standards, and methodologies. Manage operational security posture for an Information System or program to ensure Information System Security policies, standards, and procedures are established and followed. Provide management of security aspects of … the Information System and perform day-to-day security operations of the system. Assist ISSEs and ISSOs with evaluating security solutions to ensure they meet security requirements for processing classified information. Manage the performance of vulnerability/risk assessment analysis to support security authorization. Provide management support to configuration management (CM) for information system More ❯
for every teammate that's welcoming, respectful and inclusive, with great opportunity for professional growth. Find your future with us. Boeing Classified Cybersecurity is currently seeking a Cybersecurity - Senior Information System SecurityManager (ISSM) to join the team in Herndon, VA. The selected candidate will be a highly motivated Cybersecurity Professional on our Enterprise Government Cybersecurity team. … The ISSM will rely on a Cybersecurity and Information Assurance (IA) background to be a technical leader and support Enterprise activities and Boeing customers throughout multiple classified computing domains. The ISSM is responsible for maintaining and enforcing all Information System Security policies, standards, and directives to ensure assessment and authorization of information systems processing classified information. … Position Responsibilities: Perform security analysis of operational and development environments, threats, vulnerabilities and internal interfaces to define and assess compliance with accepted Boeing, industry, and government standards Manage, develop, and conduct assessment procedures for verification of Risk Management Framework (RMF) and Assessment and Authorization (A&A) safeguards to meet regulatory requirements based on upcoming NISPOM/DAAPM, RMF, JSIG More ❯
InformationSecurityManager III Job Description SECURITY CLEARANCE: Active Top Secret/SCI with ability to obtain DHS Suitability Clearance. LOCATION: Arlington, Virginia (Glebe Road DHS location) OPEN POSITIONS: • ISM03 = Bachelor's Degree and 5+ years of experience COMPENSATION RANGE: • ISM03 = $110,000 - $125,000 Final compensation will be determined, but not limited to, through a … cloud-based cybersecurity analysis capabilities. Team personnel provide front line response for digital forensics/incident response (DFIR) and proactively hunting for malicious cyber activity. We are seeking an InformationSecurityManager III to support this critical customer mission. JOB DESCRIPTION: InformationSecurityManager - III - ISM03 MicroSys is supporting a U.S. Government customer to … immediate investigation and resolution. Contract personnel perform investigations to characterize of the severity of breaches, develop mitigation plans, and assist with the restoration of services. MicroSys is seeking an InformationSecurityManager to support this critical customer mission. Responsibilities: • Correlating incident data to identify specific trends in reported incidents • Recommending defense in depth principles and practices (i.e. More ❯
Overview i3 is seeking an Information Systems SecurityManager (ISSM) to support a Navy Contract. The selected candidate will provide Information Assurance and Cyber Systems expertise supporting information systems and ATO/ATC packages. The ISSM will have a customer centric approach and provide all levels of support for the user base community. Responsibilities Interact … and collaborate with ISSOs/ISSEs and technical teams at various organizational levels. Manage information system accreditation packages, documentation, and continuous monitoring practices. Generate and maintain system documentation such as RMF Artifacts, SSP and SOPs. Conduct and/or participate in Technical/Cyber meetings with organizational team members. Spearhead the integration of established Cyber policies and methodologies in … a highly technical environment. Conduct, configure, and manage system scans and remediation to meet DoD compliance requirements. Perform security log reviews utilizing tools such as SCAP, ACAS, HBSS, GrayLog and others. Utilize security-oriented tools such as HBSS, ACAS, and WSUS to provide reporting on compliance and patching levels. Assess, maintain, and continuously monitor the integrity and securityMore ❯
for new technology insertion by keeping up with new technologies and capabilities such as encryption, transport, networking, and routing, among other duties. Support the development or modification of System Security Plans (SSPs), security requirements, and other supporting documentation for the Assessment and Authorization process. Assist projects in determining their security requirements by analyzing project's business needs … and help evaluate industry offerings to identify products that meet security requirements. Develop and implement test plans for commercial off-the-shelf (COTS) and custom developed systems. Collaborate with stakeholders to create and perform quality control on Sponsor's partners' RMF body of evidence documentation. Review assessment reports and assist projects in identifying security risks (technical and non … and developing effective mitigation strategies such as Plans of Action and Milestones (PoAMs). Ensure the project completes mitigation strategies as scheduled to ensure timely delivery to customer. Provide security review and approval for changes to accredited systems, such as installation of new software and opening new ports, and determination of Security Relevant Changes. Provide security review More ❯
by creating and delivering innovative solutions to our nation and global customers. Kratos is looking for an ISSM to lead and support other cybersecurity professionals in the execution of information assurance programs and will support other IT teams in implementing security measures. This is accomplished in compliance with CMMC and Risk Management Framework policies and procedures such as … System Security Plans, Risk Assessment Reports, Plans of Actions and Milestones, Assessment & Authorization packages, and Security Control Traceability Matrices. The ISSM will maintain an operational security posture and ensure security policies, standards, and procedures are established and followed. The ISSM will perform vulnerability and risk assessment analyses to support Assessment & Authorization and will provide configuration management … for security software, hardware, and firmware. This position is based on multiple DoD Directives; including DoD 5205.07 volumes 1-4; DoDD 5205.02E; DoDI 5025.01, 5205.11, 5200.39, 5220.22, DoDM 3305.13; DoD 8140 series; Intelligence Community Directive Series 500/600/700; NIST 800 series special publications; Executive Orders 13556 and 13636, the Joint Special Access Program Implementation Guide Rev More ❯
About us We are a leading provider of advanced technology solutions for the defense and aerospace industries. Our team specializes in delivering innovative security solutions to support critical defense programs. Join us and be part of a dynamic team that is dedicated to excellence in security and technology. Position Summary We are seeking a skilled and experienced Information Systems Security Officer/Manager (ISSO/ISSM) to join our team at the USAFWC in Las Vegas, NV. In this role, you will be responsible for ensuring the security of information systems and networks in compliance with government regulations and security policies. This is an exciting opportunity to work on cutting-edge defense … primary point of contact for cybersecurity matters related to assigned systems and networks. Implement and enforce cybersecurity policies, procedures, and controls to protect classified and sensitive information. Conduct regular security assessments, audits, and inspections to ensure compliance with security requirements and standards. Develop and maintain system security plans (SSPs), contingency plans, and incident response plans. Monitor and More ❯
Work Location: NIWC PAC, Point Loma, CA Work Schedule: Full-time, onsite Security Clearance: Secret Requisition: ISSM2-001-SD Job Summary: The Information System SecurityManager II will support the Naval Information Warfare Center Pacific (NIWC PAC) and provide In-Service-Engineering-Activity (ISEA) functions for tactical data links and related systems sponsored by PEO … governmental In-Service engineering activities, Configuration Management, Readiness and Life Cycle Analysis, Technical Documentation Development and Reliability/Availability and Maintainability (RAM) reporting and metrics. Responsibilities: Oversee and manage informationsecurity program implementation within the organization or other area of responsibility. Manage strategy, personnel, infrastructure, policy enforcement, emergency planning, security awareness, and/or other resources. Acquire … and manage the necessary resources, including leadership support, financial resources, and key security personnel, to support information technology (IT) security goals, and reduce overall organizational risk. Requirements: Must be IATII certified and hold a CompTIA Security + (CE) or CAP or CASP or Project Management Professional (PMP). Bachelor's Degree from an accredited University or More ❯
Work Location: NIWC PAC, Point Loma, CA Work Schedule: Full-time, onsite Security Clearance: Secret Requisition: ISSM1-001-SD Job Summary: The Information System SecurityManager I will support the Naval Information Warfare Center Pacific (NIWC PAC) and provide In-Service-Engineering-Activity (ISEA) functions for tactical data links and related systems sponsored by PEO … governmental In-Service engineering activities, Configuration Management, Readiness and Life Cycle Analysis, Technical Documentation Development and Reliability/Availability and Maintainability (RAM) reporting and metrics. Responsibilities: Oversee and manage informationsecurity program implementation within the organization or other area of responsibility. Manage strategy, personnel, infrastructure, policy enforcement, emergency planning, security awareness, and/or other resources. Acquire … and manage the necessary resources, including leadership support, financial resources, and key security personnel, to support information technology (IT) security goals, and reduce overall organizational risk. Requirements: Must be IATII certified and hold a CompTIA Security + (CE) certification. Associate's Degree from accredited University or CNSSI 4011 Certificate or successful completion of military training course More ❯
InformationSecurityManager 📍 Bristol | Hybrid | circa £70,000 TRIA are supporting a leading Logistics & Transportation company in Bristol, seeking an InformationSecurityManager to drive cybersecurity strategy and enhance security across critical infrastructure. You’ll be at the forefront of their informationsecurity strategy, ensuring the confidentiality, integrity, and availability of … cyber and informationsecurity assets. You will lead the security team, manage third-party SOC operations, and be accountable for progressing the Cyber Assurance Framework (CAF). The Role Lead and mature the Cyber Assurance Framework (CAF) Assess and mitigate risks across networks, systems, and applications Manage security team & third-party SOC operations Implement security controls, policies & awareness programs Monitor threats, lead incident response & drive security culture Report security posture & metrics to IT Director & leadership Oversee security assessments, audits & penetration testing What You’ll Bring CISSP or equivalent + 6-7 years in InfoSec Experience maturing security programs & frameworks ( ISO27001, NIST CAF, OWASP ) Strong knowledge of SIEM, IDS/IPS More ❯