Information Systems Security Manager (ISSM) I

Company logo
Gtangible Corporation
Service‑disabled, veteran‑owned small business delivering national security, program, and mission support to U.S. government.
Oversee and manage DoD SAP information system security using RMF/JSIG guidelines.
22 days ago ago
Expert & Leadership (13+ years)
Full Time
Hanscom Air Force Base, MA
Onsite
Company Size
46 Employees
Service Specialisms
Program Protection (Security)
Information Assurance
Interoperability
DIACAP
Program Security Managers
CIP & Automated Security Systems
Construction Management and Engineering Technicians
Human Capital Development
Sector Specialisms
Information Systems Security
Information Assurance
Computer Network Defense
Network Engineering
Systems Administration
IT Customer Support
Communications Security
Physical Security
Role
What you would be doing
risk assessment
security testing
configuration management
incident response
rmf implementation
security training
  • Develop, review, endorse, and recommend action by the AO or DAO of system assessment documentation.
  • Conduct the duties of the Information System Security Officer (ISSO) if one is not present and/or available.
  • Review AIS assessment plans.
  • Perform risk assessments and make recommendations to DoD agency customers.
  • Develop and execute security assessment plans that include verification that the features and assurances required for each protection level functioning.
  • Conduct periodic assessments of the security posture of the authorization boundaries.
  • Ensure proper protection or corrective measures have been taken when an incident or vulnerability has been discovered within a system.
  • Perform oversight of the development, implementation and evaluation of information system security program policy; special emphasis placed upon integration of existing SAP network infrastructures.
  • Coordinate with PSO or cognizant security official on approval of external information systems (e.g., guest systems, interconnected system with another organization).
  • Ensure configuration management (CM) for security-relevant changes to software, hardware, and firmware and that they are properly documented.
  • Develop Assured File Transfers (AFT) on accordance with the JSIG.
  • Ensure that data ownership and responsibilities are established for each authorization boundary, to include accountability, access rights, and special handling requirements.
  • Maintain a and/or applicable repository for all system authorization documentation and modifications.
  • Develop policies and procedures for responding to security incidents, to include investigating and reporting security violations and incidents.
  • Ensure that all IAOs, network administrators, and other cyber security personnel receive the necessary technical and security training to carry out their duties.
  • Institute and implement a Configuration Control Board (CCB) charter.
  • Advise government program managers on security testing methodologies and processes.
  • Develop and maintain a formal Information Systems Security Program.
  • Ensure that system security requirements are addressed during all phases of the system life cycle.
  • Assess changes in the system, its environment, and operational needs that could affect the authorization.
  • Participate in self-inspections.
  • Develop and oversee operational information systems security implementation policy and guidelines of network security, based upon the Risk Management Framework (RMF) with emphasize on Joint Special Access Program Implementation Guide (JSIG) authorization process.
  • Ensure periodic testing is conducted to evaluate the security posture of IS by employing various intrusion/attack detection and monitoring tools (shared responsibility with ISSOs).
  • Ensure that system recovery and reconstitution processes developed and monitored to ensure that the authorization boundary can be recovered based on its availability level determination.
  • Ensure development and implementation of an information security education, training, and awareness program, to include attending, monitoring, and presenting local cyber security training.
  • Evaluate threats and vulnerabilities to ascertain whether additional safeguards are needed.
  • Ensure all authorization documentation is current and accessible to properly authorized individuals.
  • Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media.
  • Advise customer on Risk Management Framework (RMF) assessment and authorization issues.
  • Evaluate authorization documentation and provide written recommendations for authorization to government PMs.
  • Ensure that authorization is accomplished a valid Authorization determination has been given for all authorization boundaries under your purview.
What you bring
sap
lift 50lb
bachelor's
isso
dod 8570
security policy
  • SAP experience desired.
  • Must be able to regularly lift up-to 50 lbs.
  • Bachelor's degree in a related area and 5-7 years of related experience or 9-11 years of related experience without a degree.
  • Prior performance in roles such as ISSO or ISSM.
  • Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level II or Information Assurance Manager Level I within 6 months of the date of hire.
  • Must having working knowledge of DoD, National and applicable service and agency security policy, manuals and standards.
Benefits
  • National Security Programs
Training + Development
Information not given or found
Interview process
Information not given or found
Visa Sponsorship
Information not given or found
Security clearance
  • must obtain top secret/sci clearance with sap eligibility.
  • requires consent for a counterintelligence polygraph.
Company
Overview
$6.3M contract
DHS FLETC support award
Secured a five-year federal contract to support training and leadership programs for the Department of Homeland Security.
  • Founded in 2009, began as a veteran-led firm combining military insight with agile support services.
  • Registered as a service-disabled veteran-owned small business with Delaware incorporation and CAGE code for government contracting.
  • Delivers national security programs, administrative/program management, and mission/warfighter support across CONUS and OCONUS.
  • Over the past decade, secured multi-million-dollar contracts.
  • Typical projects include information assurance, network defense, logistics, training development, and theater security cooperation.
  • Expanded into international program support and energy-focused organizational development.
  • Maintains small-business agility with big-agency impact.
Culture + Values
  • Customer-First Mindset
  • Commitment to Excellence
  • Continuous Learning & Growth
  • Innovation & Creativity
  • Collaboration & Teamwork
  • Integrity & Transparency
Environment + Sustainability
2030 Target
Net Zero Commitment
The company aims to achieve zero net greenhouse gas emissions by 2030, marking a significant step toward climate action.
  • Prioritizing energy-efficient technologies and practices
  • Reducing carbon footprint through renewable energy usage
  • Implementing sustainable supply chain practices
  • Focused on waste reduction and recycling initiatives
  • Tracking and reporting progress annually
Inclusion & Diversity
45% Female Representation
Gender Parity in Leadership Roles
The leadership team includes 45% female representation, ensuring balanced perspectives and diverse decision-making.
  • Workforce diversity initiatives focused on creating an inclusive environment
  • Regular diversity training and awareness programs
  • Tracking progress and setting annual diversity targets
  • Gender-neutral hiring practices
Big Kablio Logo
Kablio AIIf you're someone who helps build and power the world (or dreams to), Kablio AI is your pocket-sized recruiter that gets you hired.
Copyright Âİ 2025 Kablio