Information System Security Manager (Skill Level 2-3)

About Strategic Analytix

Strategic Analytix (SA) is an IT engineering and management consulting firm focuses on mission critical services and solutions to the Federal Government including the Department of Defense (DOD), the Intelligence Community (IC) and Civilian Healthcare agencies. With a reputation for innovation and development, Strategic Analytix is a trusted partner adopting unique skills and experiences. We are dedicated to our clients to deliver unparallel services and work diligently to serve our customers' missions.

Our talented team of industry experts provide full life cycle development and mission support with a focus in areas such as cybersecurity, systems engineering, programmatic and acquisition support. Our specialists hold numerous credentials including Top Secret/SCI security clearances, post graduate degrees, and professionals certifications that provides value added solutions. Strategic Analytix is a privately held minority owned, small-business headquarter in Fulton, MD just outside of Baltimore and Washington D.C.

About the role

Job Description
Strategic Analytix is looking for a skilled and experienced Information Systems Security Manager (ISSM). This employee will perform a wide range of duties regarding program organization management and system security. The ISSM will perform management support within the operational security posture for programs to ensure policies are followed. Manage the security aspects of the information systems and perform day-to-day security operations. Responsible for managing all vulnerability and risk assessments, configuration management, system changes and various other processes. The ISSM will have familiarity in the NSA/CSS Risk Management Framework (RMF) process and DoD Information Assurance Certification and Accreditation Process (DIACAP).  

What you'll do

Information Systems Security Manager (ISSM) Requirements
  • Perform requirements gathering and analysis of said requirements.
  • Perform functional analysis to identify required tasks and their interrelationships.
  • Identify and map current security infrastructure as a foundation to define future programs.
  • Collaborate with engineers on systems integration efforts.
  • Plan and coordinate implementation of IT security programs and policies.
  • Analyze user needs to determine functional and cross-functional requirements.
  • Gather and organize technical information about an organization’s mission goals and needs, existing security products, and ongoing programs in the multi-level security arena.
  • Perform functional allocation and identify resources required for each task.
  • Perform risk analysis that also includes risk assessment.
  • Enable Government planning, coordination, and oversight of organizational implementation of information security services.
  • Enable design and implementation of future IT systems and related security.
  • Assist Program Managers with administrative and technical oversight with specific program's within the portfolio.
  • Facilitate issue resolution through integrated product teams and Technical Exchange Meetings (TEM).
  • Provide support for a program, organization, system, or enclave’s information assurance program.
  • Provide daily oversight and direction to contractor ISSOs.
  • Oversee efforts of engineering staff to design, develop, engineer and implement solutions to security requirements.
  • Interact with customers, IT staff, and high-level corporate officers to define and achieve required Cybersecurity objectives.
  • Serve as the Program's ISSM.
  • Enable the Government with the development and implementation of NSA IT security services.
  • Collaborate with engineers on systems integration and life cycle requirements.
  • Advise Program Managers on administrative and technical oversight matters in regard to portfolio programs.
  • Enable Program Managers with administrative and technical oversight assistance with specific program's within the portfolio.
  • Enable design and implementation of future IT systems and related security.

Qualifications

  • Clearance Level    
    • TS/SCI level clearance with a Full Scope Polygraph.
Skill Level 2
 
Experience: Ten (10) years of work-related experience in the field of security authorization is required. Experience in the following areas is required: knowledge of current security tools, hardware/software security implementation; communication protocols; or encryption tools and techniques. Familiarity with commercial security products, security authorization techniques, security incident management, and PKI and authorization services. 
 
Education: Bachelor's degree in Computer Science, Cyber Security or IT Engineering is required. In lieu of a Bachelor’s degree, an additional four (4) years of work-related experience may be substituted. Compliance with DoD 8570.01-M with a minimum certification of IAM Level II is required.
 
Skill Level 3
 
Experience: Twelve (12) years of work-related experience in the field of security authorization is required. Experience in the following areas is required: knowledge of current security tools, hardware/software security implementation; communication protocols; or encryption tools and techniques. Familiarity with commercial security products, security authorization techniques, security incident management, and PKI and authorization services. 
 
Education: Bachelor's degree in Computer Science, Cyber Security or IT Engineering is
required. In lieu of a Bachelor’s degree, an additional four (4) years of work-related experience may be substituted. Compliance with DoD 8570.01-M with a minimum certification of IAM Level II is required.

Contracts

Fort Meade, MD

Share on:

Terms of servicePrivacyCookiesPowered by Rippling