Information System Security Manager (ISSM) Skill Level 3

Posted 16 Days Ago
Be an Early Applicant
Annapolis Junction, MD
In-Office
203K-228K Annually
Expert/Leader
Information Technology • Database • Analytics • Cybersecurity
The Role
The Information System Security Manager oversees security assurance for information systems, manages operational security, evaluates security solutions, and collaborates on IT security programs and policies.
Summary Generated by Built In
Prime Time Consulting, a GRVTY Company, provides clients with expert intelligence analysis services. Our clients include defense contractors, industrial and service corporations, and departments and agencies of the U.S. Federal Government. 
We are actively searching for Information System Security Manager (ISSM) Skill Level 3, located in Maryland, to support our team. We have varying levels of this position, depending on years of experience and education.

Essential Job Duties

  • Provide management support for a program, organization, system, or enclave’s Information Assurance program. Provide management support for proposing, coordinating, implementing, and enforcing Information System Security policies, standards, and methodologies. Manage operational security posture for an Information System or program to ensure Information System Security policies, standards, and procedures are established and followed. Provide management of security aspects of the Information System and perform day-to-day security operations of the system. Assist ISSEs and ISSOs with evaluating security solutions to ensure they meet security requirements for processing classified information. Manage the performance of vulnerability/risk assessment analysis to support security authorization. Provide management support to configuration management (CM) for information system security SW, HW, and FW. Manage changes to systems and assess the security impact of those changes. Manage the process and preparation of documentation reviews to include SSPs, Risk Assessment Reports, C&A packages, and System Requirements Traceability Matrices (SRTMs). Support security authorization activities in compliance with DoD RMF process and DIACAP.

The Level 3 Information System Security Manager shall possess the following capabilities

  • Perform requirements gathering and analysis of said requirements
  • Perform functional analysis to identify required tasks and their interrelationships
  • Identify and map current security infrastructure as a foundation to define future programs
  • Collaborate with engineers on systems integration efforts
  • Plan and coordinate implementation of IT security programs and policies
  • Analyze user needs to determine functional and cross-functional requirements
  • Gather and organize technical information about an organization’s mission goals and needs, existing security products, and ongoing programs in the multi-level security arena
  • Perform functional allocation and identify resources required for each task
  • Perform risk analysis that also includes risk assessment
  • Enable Government planning, coordination, and oversight of organizational implementation of information security services
  • Enable design and implementation of future IT systems and related security
  • Assist Program Managers with administrative and technical oversight with specific program’s within the portfolio
  • Facilitate issue resolution through integrated product teams and Technical Exchange Meetings (TEM)
  • Provide support for a program, organization, system, or enclave’s information assurance program
  • Provide daily oversight and direction to contractor ISSOs
  • Oversee efforts of engineering staff to design, develop, engineer and implement solutions to security requirements
  • Interact with customers, IT staff, and high-level corporate officers to define and achieve required Cybersecurity objectives
  • Serve as the Program’s ISSM
  • Enable the Government with the development and implementation of DoD IT security services
  • Collaborate with engineers on systems integration and life cycle requirements
  • Advise Program Managers on administrative and technical oversight matters in regards to portfolio programs
  • Enable Program Managers with administrative and technical oversight assistance with specific program’s within the portfolio
  • Enable design and implementation of future IT systems and related security.

Required Qualifications

  • 12 years of work-related experience in the field of security authorization is required. Experience in the following areas is required: knowledge of current security tools, HW/SW security implementation; communication protocols; or encryption tools and techniques.
  • Familiarity with commercial security products, security authorization techniques, security incident management, and PKI and authorization services.
  • Bachelor’s degree in Computer Science or a related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Systems Engineering, Mathematics, Computer Forensics, Cybersecurity, Information Technology, Information Assurance, Information Security, and Information Systems) is required.
  • In lieu of a Bachelor’s degree, an additional 4 years of work-related experience may be substituted.

Certifications Required

  • DoD 8570 compliance with IAM III is required.

Company Perks

  • At PTC, a GRVTY Company, we believe that when our employees thrive, our company thrives. That’s why we offer a comprehensive and competitive benefits package designed to support your well-being, growth, and work-life balance.
  • Robust health plan including medical, dental, and vision
  • Health Savings Account with company contribution
  • Annual Paid Time Off and Paid Holidays
  • Paid Parental Leave
  • 401k with generous company match
  • Training and Development Opportunities
  • Award Programs
  • Variety of Company Sponsored Events

Prime Time Consulting, a GRVTY Company, is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran and will not be discriminated against on the basis of disability.
 
Anyone requiring reasonable accommodations should email [email protected] with requested details. A member of the HR team will respond to your request within 2 business days. Please review our current job openings and apply for the positions you believe may be a fit. If you are not an immediate fit, we will also keep your resume in our database for future opportunities.

Top Skills

Communication Protocols
Dod 8570 Compliance
Encryption Tools
Hw/Sw Security Implementation
Iam Iii
Security Tools
Am I A Good Fit?
beta
Get Personalized Job Insights.
Our AI-powered fit analysis compares your resume with a job listing so you know if your skills & experience align.

The Company
HQ: Hanover, Maryland
42 Employees
Year Founded: 2019

What We Do

Prime Time Consulting, founded in 2019 by Ben Safford and Justin Basagic, is a Service-Disabled Veteran Owned Small Business. We prioritize employee well-being and have grown into a leading consulting firm for the Government sector and Intelligence Community. Our mission is to deliver top-tier services while fostering a supportive and empowering workplace. Join us in our commitment to excellence and integrity.

Similar Jobs

SES Satellites Logo SES Satellites

Engineer, Station Support 1 (Woodbine, MD, US)

Aerospace • Digital Media • Information Technology • Internet of Things • Mobile • Software
Hybrid
Woodbine, MD, USA
2100 Employees

Ahold Delhaize USA Logo Ahold Delhaize USA

Manager Product Sustain

AdTech • eCommerce • Food • Marketing Tech • Retail
In-Office
Hyattsville, MD, USA
10000 Employees
109K-188K Annually

EchoStar Logo EchoStar

Aviation Quality Engineer

Aerospace • Cloud • Digital Media • Information Technology • Mobile • News + Entertainment • Generative AI
In-Office
Germantown, MD, USA
14500 Employees
98K-130K Annually
Hybrid
Frederick, MD, USA
213000 Employees
26-34 Hourly

Similar Companies Hiring

Scrunch AI Thumbnail
Software • SEO • Marketing Tech • Information Technology • Artificial Intelligence
Salt Lake City, Utah
Standard Template Labs Thumbnail
Software • Information Technology • Artificial Intelligence
New York, NY
10 Employees
Scotch Thumbnail
Software • Retail • Payments • Fintech • eCommerce • Artificial Intelligence • Analytics
US
25 Employees

Sign up now Access later

Create Free Account

Please log in or sign up to report this job.

Create Free Account