At Independent Software we are committed to building secure mission-driven technology that protects what matters most. As an Information System Security Manager you will provide expert-level oversight of security operations across complex systems and programs. You will help design implement and enforce information security policies that align with organizational goals and regulatory requirements. Your leadership will ensure systems remain secure throughout their lifecyclefrom concept through retirementwhile collaborating closely with engineers program managers and cybersecurity personnel.
This role offers the opportunity to shape enterprise cybersecurity practices lead high-impact security initiatives and mentor the next generation of security professionals. You will be a key contributor to programs that support critical national priorities
Key Responsibilities:
Provide management support for the development coordination and enforcement of enterprise information assurance programs
Oversee the operational security posture for assigned information systems or programs
Lead the development and enforcement of system security policies standards and procedures
Perform risk and vulnerability assessments to support security authorization decisions
Provide day-to-day security operations support and oversight for ISSEs and ISSOs
Manage and assess the security impact of changes to hardware software and firmware
Review and manage documentation including System Security Plans (SSPs) Risk Assessment Reports Certification and Accreditation packages and System Requirements Traceability Matrices (SRTMs)
Analyze user needs to determine functional and cross-functional security requirements
Gather and organize technical information relevant to organizational goals and security posture
Facilitate issue resolution through Technical Exchange Meetings and integrated product teams
Collaborate with engineering staff to ensure secure systems integration throughout the development lifecycle
Serve as the programs designated ISSM and provide daily oversight to ISSOs
Advise and support Program Managers on cybersecurity strategy and program execution
Enable the design and implementation of secure IT systems for future enterprise environments
Required Skills and Qualifications:
Twelve years of professional experience in the field of security authorization
Demonstrated experience with current security tools hardware and software security implementation communication protocols and encryption technologies
Knowledge of commercial security products risk management practices security incident management and PKI and authorization services
Experience developing and managing system security documentation and artifacts
Proven ability to manage security across multi-system environments including secure collaboration with engineering operations and leadership teams
Strong communication and leadership skills to interact with both technical teams and executive stakeholders
Education and Experience:
Bachelors degree in Computer Science Cybersecurity IT Engineering or a related field from an accredited college or university
In lieu of a degree four additional years of relevant work experience may be substituted
Certifications:
Compliance with DoD 8570.01-M
Minimum certification required: IAM Level II (e.g. CISSP CAP CISM)
Clearance Requirement:
Must possess an active TS/SCI with appropriatePolygraph tobe considered for this role
**This position is contingent on contract award**
Were an equal opportunity employer. All applicants will be considered for employment without attention to race color religion sex sexual orientation gender identity national origin veteran or disability status.
Disclaimer: Drjobpro.com is only a platform that connects job seekers and employers. Applicants are advised to conduct their own independent research into the credentials of the prospective employer.We always make certain that our clients do not endorse any request for money payments, thus we advise against sharing any personal or bank-related information with any third party. If you suspect fraud or malpractice, please contact us via contact us page.