Information Systems Security Manager (ISSM) II

Company logo
Gtangible Corporation
Service‑disabled, veteran‑owned small business delivering national security, program, and mission support to U.S. government.
Oversee and manage security for DoD SAP information systems using RMF.
16 days ago ago
Expert & Leadership (13+ years)
Full Time
Hampton, VA
Onsite
Company Size
46 Employees
Service Specialisms
Program Protection (Security)
Information Assurance
Interoperability
DIACAP
Program Security Managers
CIP & Automated Security Systems
Construction Management and Engineering Technicians
Human Capital Development
Sector Specialisms
Information Systems Security
Information Assurance
Computer Network Defense
Network Engineering
Systems Administration
IT Customer Support
Communications Security
Physical Security
Role
What you would be doing
risk assessment
security testing
configuration management
incident response
training mentoring
policy development
  • Periodically review system security to accommodate changes to policy or technology.
  • Develop, review, endorse, and recommend action by the AO or DAO of system assessment documentation.
  • Coordinate all technical security issues outside of area of expertise or responsibility with ISSE.
  • Review AIS assessment plans.
  • Perform risk assessments and make recommendations to DoD agency customers.
  • Develop and execute security assessment plans that include verification that the features and assurances required for each protection level functioning.
  • Conduct periodic assessments of the security posture of the authorization boundaries.
  • Ensure proper protection or corrective measures have been taken when an incident or vulnerability has been discovered within a system.
  • Perform oversight of the development, implementation and evaluation of information system security program policy; special emphasis placed upon integration of existing SAP network infrastructures.
  • Coordinate with PSO or cognizant security official on approval of external information systems (e.g., guest systems, interconnected system with another organization).
  • Ensure configuration management (CM) for security-relevant changes to software, hardware, and firmware and that they are properly documented.
  • Develop Assured File Transfers (AFT) on accordance with the JSIG.
  • Ensure that data ownership and responsibilities are established for each authorization boundary, to include accountability, access rights, and special handling requirements.
  • Maintain a and/or applicable repository for all system authorization documentation and modifications.
  • Develop policies and procedures for responding to security incidents, to include investigating and reporting security violations and incidents.
  • Provide leadership, mentoring, and quality assurance for Cyber Security and Information Technology team members.
  • Evaluate authorization documentation and provide written recommendations for authorization to government PM's.
  • Ensure that all IAOs, network administrators, and other cyber security personnel receive the necessary technical and security training to carry out their duties.
  • Institute and implement a Configuration Control Board (CCB) charter.
  • Advise government program managers on security testing methodologies and processes.
  • Develop and maintain a formal Information Systems Security Program.
  • Provide expert research and analysis in support of expanding programs and area of responsibility as it pertains to cyber security and information technologies activities.
  • Ensure that system security requirements are addressed during all phases of the system life cycle.
  • Assess changes in the system, its environment, and operational needs that could affect the authorization.
  • Participate in self-inspections.
  • Develop and oversee operational information systems security implementation policy and guidelines of network security, based upon the Risk Management Framework (RMF) with emphasize on Joint Special Access Program Implementation Guide (JSIG) authorization process.
  • Ensure periodic testing is conducted to evaluate the security posture of IS by employing various intrusion/attack detection and monitoring tools (shared responsibility with ISSOs).
  • Ensure that system recovery and reconstitution processes developed and monitored to ensure that the authorization boundary can be recovered based on its availability level determination.
  • Ensure development and implementation of an information security education, training, and awareness program, to include attending, monitoring, and presenting local cyber security training.
  • Evaluate threats and vulnerabilities to ascertain whether additional safeguards are needed.
  • Ensure all authorization documentation is current and accessible to properly authorized individuals.
  • Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media.
  • Advise customer on Risk Management Framework (RMF) assessment and authorization issues.
  • Ensure that authorization is accomplished a valid Authorization determination has been given for all authorization boundaries under your purview.
What you bring
sap
dod 8570
7‑9 yrs
isso
bachelor's
air force
  • Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level 2 or Information Assurance Manager Level 2 within 6 months of the date of hire.
  • Must have SAP experience.
  • Must have working knowledge of DoD, National and applicable service and agency security policy, manuals and standards.
  • 7 - 9 years related experience and prior performance in roles as ISSO or ISSM.
  • Bachelor's degree in related discipline OR Associate's degree in a related area + 2 years' experience OR equivalent experience (4 years)
  • Prior active duty in the U.S. Air Force a plus
  • Must be able to regularly lift up to 50 lbs.
Benefits
  • National Security Programs
Training + Development
Information not given or found
Company
Overview
$6.3M contract
DHS FLETC support award
Secured a five-year federal contract to support training and leadership programs for the Department of Homeland Security.
  • Founded in 2009, began as a veteran-led firm combining military insight with agile support services.
  • Registered as a service-disabled veteran-owned small business with Delaware incorporation and CAGE code for government contracting.
  • Delivers national security programs, administrative/program management, and mission/warfighter support across CONUS and OCONUS.
  • Over the past decade, secured multi-million-dollar contracts.
  • Typical projects include information assurance, network defense, logistics, training development, and theater security cooperation.
  • Expanded into international program support and energy-focused organizational development.
  • Maintains small-business agility with big-agency impact.
Culture + Values
  • Customer-First Mindset
  • Commitment to Excellence
  • Continuous Learning & Growth
  • Innovation & Creativity
  • Collaboration & Teamwork
  • Integrity & Transparency
Environment + Sustainability
2030 Target
Net Zero Commitment
The company aims to achieve zero net greenhouse gas emissions by 2030, marking a significant step toward climate action.
  • Prioritizing energy-efficient technologies and practices
  • Reducing carbon footprint through renewable energy usage
  • Implementing sustainable supply chain practices
  • Focused on waste reduction and recycling initiatives
  • Tracking and reporting progress annually
Inclusion & Diversity
45% Female Representation
Gender Parity in Leadership Roles
The leadership team includes 45% female representation, ensuring balanced perspectives and diverse decision-making.
  • Workforce diversity initiatives focused on creating an inclusive environment
  • Regular diversity training and awareness programs
  • Tracking progress and setting annual diversity targets
  • Gender-neutral hiring practices
Big Kablio Logo
Kablio AIIf you're someone who helps build and power the world (or dreams to), Kablio AI is your pocket-sized recruiter that gets you hired.
Copyright © 2025 Kablio