Information Systems Security Manager (ISSM)
Raleigh, NC, US
Full Time Mid-level / Intermediate Clearance required USD 68K - 169K *
Vadum Inc.
Description
Company Overview
Since 2004, Vadum has built a brand known for practical innovation that delivers solutions to customers in the competitive field of national defense research and development. Vadum’s expertise is bringing concepts to life in the form of products or prototypes to address challenging national defense problems. The Vadum team has a wide range of deep operational and technical expertise to develop concepts that work in conjunction with legacy capabilities or create new capabilities.
Vadum Inc. is currently seeking an Information Systems Security Manager to serve as a principal advisor on matters involving the security of information systems. In this role, primary support will be working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies and will provide "day-to-day" support for Special Access Program (SAP) activities.
Requirements
Key Responsibilities:
- Perform oversight of the development, implementation, and evaluation of information system security program policy.
- Develop and oversee operational information systems security implementation policy and guidelines of network security, based upon the Risk Management Framework (RMF) with emphasize on Joint Special Access Program Implementation Guide (JSIG) authorization process.
- Advise on Risk Management Framework (RMF) assessment and authorization issues.
- Perform risk assessments and make recommendations.
- Advise on security testing methodologies and processes.
- Evaluate authorization documentation and provide written recommendations for authorization.
- Develop, review, endorse, and recommend action by the AO of system assessment documentation.
- Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media.
- Develop and execute security assessment plans that include verification that the features and assurances required for each protection level functioning.
- Maintain a and/or applicable repository for all system authorization documentation and modifications.
- Ensure proper protection or corrective measures have been taken when an incident or vulnerability has been discovered within a system.
- Ensure that data ownership and responsibilities are established for each authorization boundary, to include accountability, access rights, and special handling requirements.
- Ensure development and implementation of an information security education, training, and awareness program, to include attending, monitoring, and presenting local cyber security training.
- Evaluate threats and vulnerabilities to ascertain whether additional safeguards are needed.
- Assess changes in the system, its environment, and operational needs that could affect the authorization.
- Ensure that authorization is accomplished a valid Authorization determination has been given for all authorization boundaries under your purview.
- Coordinate with FSO or cognizant security official on approval of external information systems (e.g., guest systems, interconnected system with another organization).
- Conduct periodic assessments of the security posture of the authorization boundaries.
- Ensure configuration management (CM) for security-relevant changes to software, hardware, and firmware and that they are properly documented.
- Ensure periodic testing is conducted to evaluate the security posture of IS by employing various intrusion/attack detection and monitoring tools.
- Ensure that system recovery and reconstitution processes developed and monitored to ensure that the authorization boundary can be recovered based on its availability level determination.
- Ensure all authorization documentation is current and accessible to properly authorized individuals.
- Ensure that system security requirements are addressed during all phases of the system life cycle.
- Develop Assured File Transfers (AFT).
Required Skills/Abilities:
- US Citizenship.
- Security Clearance eligibility.
- A working knowledge of network and communication equipment, protocols, and troubleshooting tools.
- Excellent verbal and written communication skills.
- Excellent interpersonal, negotiation, and conflict resolution skills.
- Excellent organizational skills and attention to detail.
- Excellent time management skills with a proven ability to meet deadlines.
- Strong analytical and problem-solving skills.
- Ability to prioritize tasks and to delegate them when appropriate.
- Ability to act with integrity, professionalism, and confidentiality.
- Proficient with Microsoft Office Suite or related software.
- Must have expert knowledge of DoD, National and applicable service and agency security policy, manuals and standards.
- Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level II or Information Assurance Manager Level I.
Education/Training/Experience:
- Bachelor's degree in Computer Science or IT Engineering, or related field, preferred.
- CISSP certification or equivalent, preferred.
- Previous ISSO, ISSM, ISSE, SCA experience; 10+ years, preferred.
- Experience creating and submitting security documentation, preferred.
Vadum offers a comprehensive benefit program, including:
- Medical, Dental, Vision and Life Insurance
- Flexible Spending Account
- 401(k) with up to 4% company match
- Paid Time Off (Sick, Vacation)
- 13 Paid Holidays
- Tuition Reimbursement
- Voluntary Benefit Offerings (STD, Critical Illness and Hospital Indemnity Insurance, Legal Plan)
- Work/life balance
Vadum, Inc. is an equal opportunity/affirmative action employer and all qualified applicants will receive consideration for employment without regard to race, color, religion, sex, gender identity, age, genetic trait, sexual orientation, national origin, disability status, or any other characteristic protected by law.
Vadum, Inc. is committed to providing reasonable accommodations for qualified individuals with disabilities and disabled veterans in our job application procedures. If you need assistance or an accommodation due to a disability, you may contact the Human Resources Department at (919) 341-8241.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: CISSP Clearance Computer Science DoD DoDD 8570 ISSE Monitoring Network security Risk assessment Risk management RMF SAP Security assessment Security Clearance Vulnerabilities
Perks/benefits: 401(k) matching Flex hours Flexible spending account Flex vacation Health care Insurance
More jobs like this
Explore more InfoSec / Cybersecurity career opportunities
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
- Open Cloud Security Architect jobs
- Open Product Security Engineer jobs
- Open Principal Security Engineer jobs
- Open Senior Cyber Security Engineer jobs
- Open Information Security Officer jobs
- Open Information Security Specialist jobs
- Open Cybersecurity Analyst jobs
- Open Senior Product Security Engineer jobs
- Open Cyber Security Architect jobs
- Open Chief Information Security Officer jobs
- Open Cyber Security Specialist jobs
- Open Staff Security Engineer jobs
- Open Security Specialist jobs
- Open Senior Penetration Tester jobs
- Open IT Security Engineer jobs
- Open Ethical hacker / Pentester H/F jobs
- Open Senior Information Security Analyst jobs
- Open Cybersecurity Consultant jobs
- Open Manager Pentest H/F jobs
- Open Security Operations Analyst jobs
- Open IT Security Analyst jobs
- Open Consultant infrastructure sécurité H/F jobs
- Open Security Consultant jobs
- Open Senior Network Security Engineer jobs
- Open Senior Security Architect jobs
- Open Windows-related jobs
- Open Risk assessment-related jobs
- Open CISM-related jobs
- Open Agile-related jobs
- Open GCP-related jobs
- Open ISO 27001-related jobs
- Open IAM-related jobs
- Open Application security-related jobs
- Open Pentesting-related jobs
- Open Analytics-related jobs
- Open CISA-related jobs
- Open Vulnerability management-related jobs
- Open Threat intelligence-related jobs
- Open Security assessment-related jobs
- Open Security Clearance-related jobs
- Open Malware-related jobs
- Open DoD-related jobs
- Open EDR-related jobs
- Open CEH-related jobs
- Open DevOps-related jobs
- Open Splunk-related jobs
- Open IDS-related jobs
- Open APIs-related jobs
- Open IPS-related jobs
- Open Kubernetes-related jobs