Herndon, Virginia, United States Hybrid / WFH Options
Optiv+ClearShark
This position will be hybrid and can be hired in the Washington, DC metropolitan area. The Information Systems SecurityManager (ISSM) will perform duties for the Optiv+ClearShark information systems environments, both unclassified and classified, will own and manage the information system security program for … How you'll make an impact Develop, administer, and sustain a CMMC Program and Certification. Ensure NIST 800-171 compliance for all applicable corporate information systems. Lead the development and implementation of security solutions and process improvements. Lead the enhancement of key security solutions in the GRC … Security Operations, and IAM space. Ability to manage security vendors to resolve issues and maximize configurations. Lead the deployment, monitoring, troubleshooting, and changing of security solutions. Partner with IT and business colleagues to ensure proper security controls are included in new solutions. Research and evaluate the More ❯
Stockton-On-Tees, County Durham, North East, United Kingdom
The Bridge (IT Recruitment) Limited
Infomation Secruity Manager Stockton on Tees (North East) Hybrid (1 - 2 twice a week) Up to £80k Need for UK Right to Work Bridge are delighted to be recruiting for one of our clients based in North East looking to recruit an experienced InformationSecurityManager role. Requirements: Previous experience as an InformationSecurityManager leading cyber/data security & compliance teams in a medium size company Experience managing InfoSec gathering and reporting metrics. Experience spearheading offensive security activities. Certifications such as CISSP, CISM, CISA, or similar are highly preferred. More ❯
Position Summary The position serves as the ISSM for the Warren, MA site and is responsible for the Information Assurance (IA) program as stipulated by various US Government requirements from the DoD and regulatory bodies. This person maintains the formal IS security program and policies for their assigned … area of responsibility and oversees the operational information systems security implementation policy and guidelines. The InformationSecurity System Manager deploys, maintains, and supports on premise services. The incumbent also provides impeccable customer service by responding to customer service requests timely and accurately. Responsible for the … effectively and efficiently to current documented standards and agreed levels of service. The ISSM provides support for a program, organization, system, or enclave's information assurance program. Maintains operational security posture for an information system or program to ensure information systems security policies, standards, and More ❯
Infomation Secruity Manager Stockton on Tees (North East) Hybrid (1 - 2 twice a week) Up to £80k Need for UK Right to Work Bridge are delighted to be recruiting for one of our clients based in North East looking to recruit an experienced InformationSecurityManager role. Requirements: Previous experience as an InformationSecurityManager leading cyber/data security & compliance teams in a medium size click apply for full job details More ❯
Herndon, Virginia, United States Hybrid / WFH Options
VTG
Overview The Information System SecurityManager (ISSM) is responsible for the overall security posture of information systems within the SCIF and other secured environments. The ISSM ensures compliance with federal regulations, security policies, and accreditation requirements to safeguard classified information. This role requires strong … technical expertise, a proactive mindset, and a commitment to maintaining the confidentiality, integrity, and availability of information systems. The individual will lead a small classified systems compliance team. This role is hybrid, based out of Herndon, and supports multiple facilities in the DMV area (Herndon, Manassas, and Washington D.C. … . What will you do? System Security Management: Oversee the implementation and management of system security measures in compliance with National Industrial Security Program Operating Manual (NISPOM), Risk Management Framework (RMF), Intelligence Community Directives (ICDs), and other applicable regulations. Maintain the security posture of classified systems More ❯
This position is a contingency opportunity. Information Systems SecurityManager (ISSM) Seeking an ISSM for an InformationSecurity Program of the Department of Defense's Strategic Terrestrial and Space Weather National Security systems. Duties: Perform oversight of the development, implementation and evaluation of information system security program policy Perform analysis of network security, based upon the DCID 6/3, DITSCAP, DIACAP, and NISPOM Chapter 8 certification and accreditation process; advise customer on IT certification and accreditation issues Perform risk assessments and make recommendations to customers Evaluate certification documentation and provide … written recommendations for accreditation to government PM's Ensure that all IAOs, network administrators, and other AIS personnel receive the necessary technical and security training to carry out their duties Develop, review, endorse, and recommend action by the designated approval authority (DAA) of system certification documentation Ensure approved procedures More ❯
Bolton, Greater Manchester, North West, United Kingdom Hybrid / WFH Options
Reed Technology
It's an exciting time to join the Security team here with significant investment planned in all UK businesses to transform, deliver new digital services to our customers, and streamline our business processes. With a consultive approach and a variety of exciting change projects on the horizon, we support … solutions through assessing risk and building pragmatic solutions to mitigate those risks. What you'll be doing : Liaise with UK COO & CTO, Head of InformationSecurity, and the project teams to manage the security portions of strategic projects, working within the project teams to achieve goals on … time and on budget. Deliver assigned UK Security projects, enhancing our controls and closing new risks, on time and on budget. Provide consultancy within the UK Security team on the security aspects of business goals and plans outside CTO. Build secure solutions which can be measured, for More ❯
Alexander Mann Solutions - Public Sector Resourcing
On behalf of NRS, we are looking for a Senior InformationSecurityManager for a 6 Month contract based on site in Bristol 5 days per week. PSR is working with NRS (formerly known as Magnox) to identify the most talented people on the market. NRS is … at which we require a postholder in situ) preference may be given to candidates who meet all of the essential criteria and hold active security clearance. As a Senior InformationSecurityManager, your main responsibilities will be: . To lead and manage CS&IA interactions across … with strong initiative. . Excellent stakeholder management skills, with experience liaising with senior leaders and external entities. . Deep technical expertise in cybersecurity and information assurance (CS&IA). . Thorough understanding of regulatory and legislative requirement. Please be aware that this role can only be worked within the More ❯
One of the UK's leading providers of critical UK logistics infrastructure requires an experienced InformationSecurity Operations Manager to join a dynamic, group-wide technology team. This is a key role responsible for leading security operations and ensuring the integrity of IT systems across a … broad estate, including cloud, server infrastructure, end-user computing, and operational technologies. You'll support day-to-day cyber defence activities, manage key security partners, and help shape the long-term InfoSec strategy. The ideal InformationSecurity Operations Manager will have the following skills/experience … Proven Experience working in InfoSec Management Strong IT/Technical Background Previously worked with MS Security Suite Strong Interpersonal and Stakeholder Management Skills Salary is flexible - they're looking to pay up to £65,000pa! This role requires you to be onsite at one of their offices in London More ❯
using open source software and cloud platforms. We predominantly work with central government agencies and adhere to the Government Digital Service standard. We take security seriously, and are certified to ISO 27001 and Cyber Essentials Plus, demonstrating our commitment to robust informationsecurity practices. To support our … continued growth, we are seeking an experienced InformationSecurity Manager. In this role, you will be responsible for ensuring our ongoing compliance with ISO27001 and Cyber Essentials Plus, including the management of quarterly external audits and the facilitation of Integrated Management System (IMS) meetings. You will also oversee … and external risk management workshops, supporting both our own compliance and that of our clients. You will provide expert analysis and advisory services on security compliance standards for the applications and cloud solutions we develop and support. Compliance and Security Management: Develop, implement, and maintain comprehensive compliance programs More ❯
Work Location: NIWC PAC, Point Loma, CA Work Schedule: Full-time, onsite Security Clearance: Secret Requisition: ISSM2-001-SD Job Summary: The Information System SecurityManager II will support the Naval Information Warfare Center Pacific (NIWC PAC) and provide In-Service-Engineering-Activity (ISEA) functions … Configuration Management, Readiness and Life Cycle Analysis, Technical Documentation Development and Reliability/Availability and Maintainability (RAM) reporting and metrics. Responsibilities: Oversee and manage informationsecurity program implementation within the organization or other area of responsibility. Manage strategy, personnel, infrastructure, policy enforcement, emergency planning, security awareness, and …/or other resources. Acquire and manage the necessary resources, including leadership support, financial resources, and key security personnel, to support information technology (IT) security goals, and reduce overall organizational risk. Requirements: Must be IATII certified and hold a CompTIA Security + (CE) or CAP or More ❯
Work Location: NIWC PAC, Point Loma, CA Work Schedule: Full-time, onsite Security Clearance: Secret Requisition: ISSM1-001-SD Job Summary: The Information System SecurityManager I will support the Naval Information Warfare Center Pacific (NIWC PAC) and provide In-Service-Engineering-Activity (ISEA) functions … Configuration Management, Readiness and Life Cycle Analysis, Technical Documentation Development and Reliability/Availability and Maintainability (RAM) reporting and metrics. Responsibilities: Oversee and manage informationsecurity program implementation within the organization or other area of responsibility. Manage strategy, personnel, infrastructure, policy enforcement, emergency planning, security awareness, and …/or other resources. Acquire and manage the necessary resources, including leadership support, financial resources, and key security personnel, to support information technology (IT) security goals, and reduce overall organizational risk. Requirements: Must be IATII certified and hold a CompTIA Security + (CE) certification. Associate's More ❯
our nation and global customers. Kratos has an exciting opportunity for an ISSM to lead and support other cybersecurity professionals in the execution of information assurance programs and will support other IT teams in implementing security measures. This is accomplished in compliance with CMMC and Risk Management Framework … policies and procedures such as System Security Plans, Risk Assessment Reports, Plans of Actions and Milestones, Assessment & Authorization packages, and Security Control Traceability Matrices. The ISSM will maintain an operational security posture and ensure security policies, standards, and procedures are established and followed. The ISSM will … perform vulnerability and risk assessment analyses to support Assessment & Authorization and will provide configuration management for security software, hardware, and firmware. This position is based on multiple DoD Directives; including DoD 5205.07 volumes 1-4; DoDD 5205.02E; DoDI 5025.01, 5205.11, 5200.39, 5220.22, DoDM 3305.13; DoD 8140 series; Intelligence Community More ❯
solutions to our nation and global customers. Kratos is looking for an ISSM to lead and support other cybersecurity professionals in the execution of information assurance programs and will support other IT teams in implementing security measures. This is accomplished in compliance with CMMC and Risk Management Framework … policies and procedures such as System Security Plans, Risk Assessment Reports, Plans of Actions and Milestones, Assessment & Authorization packages, and Security Control Traceability Matrices. The ISSM will maintain an operational security posture and ensure security policies, standards, and procedures are established and followed. The ISSM will … perform vulnerability and risk assessment analyses to support Assessment & Authorization and will provide configuration management for security software, hardware, and firmware. This position is based on multiple DoD Directives; including DoD 5205.07 volumes 1-4; DoDD 5205.02E; DoDI 5025.01, 5205.11, 5200.39, 5220.22, DoDM 3305.13; DoD 8140 series; Intelligence Community More ❯
on major tasks or technology assignments • Establishing goals and plans that meet project objectives • Assisting in direction and control activities, having overall responsibility for security management, methods, and staffing to ensure that technical requirements are met • Participating in client negotiations and interfacing with senior management • Supporting decision making and … domain knowledge that may have a critical impact on overall project implementation • Providing support to plan, coordinate, and implement a cybersecurity lab's informationsecurity - Providing support for facilitating and helping the lab identify its current security infrastructure and define future programs, design and implementation of security related to lab systems • Assisting the efforts of security staff to design, develop, engineer and implement solutions to security requirements • Implementing and development of the DHS IT security standards • Gathering and organizing technical information about the lab's mission goals and needs, existing securityMore ❯
Title: InformationSecurityManager Location: Alexandria, VA Clearance: TS/SCI with a CI polygraph Responsibilities: Recommend, schedule and/or implement IA related repairs Coordinate and/or provide support for all applications and operations Lead teams and/or support actions to quickly resolve or … mitigate IA problems for the IS environment Support the installation of new or modified hardware, operating systems, and software applications ensuring integration with security requirements Identify and/or determine whether a security incident is indicative of a violation of law that requires specific legal action Direct and …/or implement operational structures and processes to ensure an effective security program including boundary defense, incident detection and response, and key management Provide direction and/or support to system developers regarding correction of security problems identified during testing Evaluate functional operations and performance in light of More ❯
We are seeking a Senior Information Systems SecurityManager (ISSM) with extensive hands-on experience driving cybersecurity compliance within a defense contractor environment. This on-site position, based in Dayton, Ohio, requires a highly skilled professional with a minimum of 10 years of real world ISSM experience … leading classified network security initiatives, ensuring compliance with Risk Management Framework (RMF), NIST 800-53, DFARS , and 32 CFR Part 117 (NISPOM). The role includes 20% travel to our Florida site for mentorship and support of related security projects. This is a top-level security leadership … role, responsible for building and leading a security team, including hiring ISSOs and mentoring System Administrators to ensure cybersecurity best practices across classified environments. Essential Functions: Lead and manage the security posture of classified SIPR networks, ensuring compliance with DoD security policies and CMMC requirements. Develop, implement More ❯
Oldham, Greater Manchester, North West, United Kingdom Hybrid / WFH Options
Guinness Partnership
maternity, race, religion or belief and marriage and civil partnerships. JOB DESCRIPTION About the role We have a new opportunity for a Records and InformationSecurityManager who can drive transformation and deliver records management solutions to the highest standards. This is a full-time role, working … knowledge of records management standards, with experience of working with a broad range of colleagues and stakeholders to develop business focused records management and informationsecurity polices, systems and procedures. You will also be able to demonstrate: Experience of managing an information governance team. Highly structured and … level or equivalent) or higher. Or the equivalent of 5 years records management experience. Desirable Qualifications: Recognised qualification in Records Management and/or Information Security. Benefits Holidays: We offer 25 27 days holiday a year, plus bank holidays. We will also give you the opportunity to buy up More ❯
All Qualified Candidates will be responded to within 48 business hours of submittal. Information System SecurityManager (ISSM), located in Silver Spring, MD. This position supports a successful, long standing program. Responsibilities: Responsible for implementing, maintaining, reviewing, and enforcing security policies on various classified information systems (IS). Serve adjacent to/support the Program Security Officer (PSO/CPSO) in the enforcement of DoD/Risk Management Framework (RMF) security policies and ensuring that existing and new ISs are fully compliant. Responsible for management of the ConMon activities in support of … DCSA RMF Accreditation and customer RMF Accreditation processes with the in place Operating Procedures and other security directive. Ensure general user, privileged user and DTA training to technical staff & management on proper security procedures. Required Qualifications: Bachelor's degree in Information Technology, Computer Science or comparable field More ❯
InformationSecurity Analyst/Manager £600 p/day (Outside IR35) 4 Days per Week Onsite (London) BurnsSheehan are exclusively partnering with one of Britain's most successful FinTech's who offer card payment solutions, designed to streamline transactions and enhance customer relationships. As they continue their … growth, they are engaging with larger customers who are wary of security, particularly around SOC 2 and data protection. As a result, they are looking for a highly skilled and experienced InformationSecurity Analyst/Manager to help lead them through an end-to-end SOC More ❯
Client is a growing woman-owned Cyber & Physical Security Contractor located in Columbia, Maryland. Client strives to make every employee belong, be heard and be successful in their career. This includes listening to your needs, providing rewarding and challenging opportunities, and offering tools to succeed in your current role … technical spectrum? At Helm Point Solutions, we will provide the challenge and you will be the differentiator in what can be accomplished. The Job: Information Systems SecurityManager (ISSM) supporting our government customer Virginia. Responsible for the Information Assurance (IA) program as stipulated by various US … Government requirements including but not limited to the National Industrial Security Operating Manuel (NISPOM), DSS Authorization and the Joint Special Access Implementation Guide (JSIG) Monitor cybersecurity compliance by performing periodic self-inspections, test and reviews of information systems to ensure that workstations/servers are operating as authorized More ❯
STS Systems Defense (SSD) is seeking an Information System SecurityManager (IAM Level 3) with an active TS clearance at Hill AFB, UT. The contractor shall prepare Cybersecurity and Information Assurance (IA) documents and specifications used to protect critical program information. The contractor shall assess critical … in the technical source data, contained in the following master documentation: • Architectural Analysis Report (AAR) • Requirements Drawing Data Path Identification Data Type Identification System Security Plan (SSP) • Security Control Traceability Matrix (SCTM) Risk Assessment Report (RAR) • Hardware and Memory Architectural Analysis Report (HAMMAR) Cybersecurity Impact Evaluation Recommendation (CIER … Interim Authority to Operate (IATT) • Authority to Operate (ATO) • Supply Chain Risk Management (SCRUM) Program Protection Plan (PPP) • Anti-Tamper Plan (AT) • Critical Program Information Identification (CPI) Residual CPI • Criticality Analysis (CA) • Counterintelligence Support Plan (CISP) Security Classification Guide (SCG) Cybersecurity Strategy (CSS) Active TS Clearance Required To More ❯
In-depth knowledge of the security authorization processes and procedures as defined in the RMF in NIST SP800-37 and familiarity with the ICD503, CNSSI1253, NIST SP800-53, etc. • Knowledge of commercial security tools and their uses. • Experience with hardware/software security implementations. • Knowledge of different … communication protocols, encryption techniques/tools, and PKI and authorization services. • Familiarity with security incident management, experience collaborating with Incident Response Teams, and able to provide viable recommendations for the resolution or computer security incidents and vulnerability compliance. • Experience creating and presenting documentation and management reports. Qualifications • Twelve … years of related work experience in the field of security authorization. • A Bachelor's degree in Computer Science, Information Technology Engineering, or a related field may be substituted for four (4) years' experience. • DoD 8570.1 compliant IAM Level III certification, such as GSLC, CISM and/or CISSP More ❯
In-depth knowledge of the security authorization processes and procedures as defined in the RMF in NIST SP800-37 and familiarity with the ICD503, CNSSI1253, NIST SP800-53, etc. • Knowledge of commercial security tools and their uses. • Experience with hardware/software security implementations. • Knowledge of different … communication protocols, encryption techniques/tools, and PKI and authorization services. • Familiarity with security incident management, experience collaborating with Incident Response Teams, and able to provide viable recommendations for the resolution or computer security incidents and vulnerability compliance. • Experience creating and presenting documentation and management reports. Qualifications • Ten … years of related work experience in the field of security authorization. • A Bachelor's degree in Computer Science, Information Technology Engineering, or a related field may be substituted for four (4) years' experience. • DoD 8570.1 compliant IAM Level I certification, such as CompTIA Security+ certification. A higher-level More ❯
We are Riverty. And we believe everyone should be in control of their financials. We ask you to join in. Because together with you, we build the most human-centric fintech. We build on experience of more than 50 years. More ❯