Information Systems Security Manager (ISSM) I

Company logo
Gtangible Corporation
Service‑disabled, veteran‑owned small business delivering national security, program, and mission support to U.S. government.
Advises and manages info system security for DoD SAPs, RMF, risk assessments.
22 days ago ago
Expert & Leadership (13+ years)
Full Time
Hanscom Air Force Base, MA
Onsite
Company Size
46 Employees
Service Specialisms
Program Protection (Security)
Information Assurance
Interoperability
DIACAP
Program Security Managers
CIP & Automated Security Systems
Construction Management and Engineering Technicians
Human Capital Development
Sector Specialisms
Information Systems Security
Information Assurance
Computer Network Defense
Network Engineering
Systems Administration
IT Customer Support
Communications Security
Physical Security
Role
What you would be doing
authorization
risk assessment
security policy
configuration management
incident response
security training
  • Ensure that authorization is accomplished a valid Authorization determination has been given for all authorization boundaries under your purview.
  • Ensure that system security requirements are addressed during all phases of the system life cycle.
  • Develop Assured File Transfers (AFT) on accordance with the JSIG.
  • Develop and maintain a formal Information Systems Security Program.
  • Advise government program managers on security testing methodologies and processes.
  • Evaluate authorization documentation and provide written recommendations for authorization to government PMs.
  • Coordinate with PSO or cognizant security official on approval of external information systems (e.g., guest systems, interconnected system with another organization).
  • Ensure that data ownership and responsibilities are established for each authorization boundary, to include accountability, access rights, and special handling requirements.
  • Ensure that system recovery and reconstitution processes developed and monitored to ensure that the authorization boundary can be recovered based on its availability level determination.
  • Perform risk assessments and make recommendations to DoD agency customers.
  • Participate in self-inspections.
  • Institute and implement a Configuration Control Board (CCB) charter.
  • Develop and oversee operational information systems security implementation policy and guidelines of network security, based upon the Risk Management Framework (RMF) with emphasize on Joint Special Access Program Implementation Guide (JSIG) authorization process.
  • Perform oversight of the development, implementation and evaluation of information system security program policy; special emphasis placed upon integration of existing SAP network infrastructures.
  • Ensure configuration management (CM) for security-relevant changes to software, hardware, and firmware and that they are properly documented.
  • Develop policies and procedures for responding to security incidents, to include investigating and reporting security violations and incidents.
  • Ensure all authorization documentation is current and accessible to properly authorized individuals.
  • Ensure proper protection or corrective measures have been taken when an incident or vulnerability has been discovered within a system.
  • Ensure that all IAOs, network administrators, and other cyber security personnel receive the necessary technical and security training to carry out their duties.
  • Develop, review, endorse, and recommend action by the AO or DAO of system assessment documentation.
  • Advise customer on Risk Management Framework (RMF) assessment and authorization issues.
  • Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media.
  • Conduct periodic assessments of the security posture of the authorization boundaries.
  • Assess changes in the system, its environment, and operational needs that could affect the authorization.
  • Develop and execute security assessment plans that include verification that the features and assurances required for each protection level functioning.
  • Conduct the duties of the Information System Security Officer (ISSO) if one is not present and/or available.
  • Ensure development and implementation of an information security education, training, and awareness program, to include attending, monitoring, and presenting local cyber security training.
  • Evaluate threats and vulnerabilities to ascertain whether additional safeguards are needed.
  • Review AIS assessment plans.
  • Ensure periodic testing is conducted to evaluate the security posture of IS by employing various intrusion/attack detection and monitoring tools (shared responsibility with ISSOs).
  • Maintain a and/or applicable repository for all system authorization documentation and modifications.
What you bring
isso
bachelor's
heavy lifting
dod 8570
security policy
sap
  • Prior performance in roles such as ISSO or ISSM.
  • Bachelor's degree in a related area and 5-7 years of related experience or 9-11 years of related experience without a degree.
  • Must be able to regularly lift up-to 50 lbs.
  • Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level II or Information Assurance Manager Level I within 6 months of the date of hire.
  • Must having working knowledge of DoD, National and applicable service and agency security policy, manuals and standards.
  • SAP experience desired.
Benefits
  • National Security Programs
Training + Development
Information not given or found
Interview process
Information not given or found
Visa Sponsorship
Information not given or found
Security clearance
  • must have top secret/sci clearance and sap eligibility.
  • requires consent for counterintelligence polygraph.
Company
Overview
$6.3M contract
DHS FLETC support award
Secured a five-year federal contract to support training and leadership programs for the Department of Homeland Security.
  • Founded in 2009, began as a veteran-led firm combining military insight with agile support services.
  • Registered as a service-disabled veteran-owned small business with Delaware incorporation and CAGE code for government contracting.
  • Delivers national security programs, administrative/program management, and mission/warfighter support across CONUS and OCONUS.
  • Over the past decade, secured multi-million-dollar contracts.
  • Typical projects include information assurance, network defense, logistics, training development, and theater security cooperation.
  • Expanded into international program support and energy-focused organizational development.
  • Maintains small-business agility with big-agency impact.
Culture + Values
  • Customer-First Mindset
  • Commitment to Excellence
  • Continuous Learning & Growth
  • Innovation & Creativity
  • Collaboration & Teamwork
  • Integrity & Transparency
Environment + Sustainability
2030 Target
Net Zero Commitment
The company aims to achieve zero net greenhouse gas emissions by 2030, marking a significant step toward climate action.
  • Prioritizing energy-efficient technologies and practices
  • Reducing carbon footprint through renewable energy usage
  • Implementing sustainable supply chain practices
  • Focused on waste reduction and recycling initiatives
  • Tracking and reporting progress annually
Inclusion & Diversity
45% Female Representation
Gender Parity in Leadership Roles
The leadership team includes 45% female representation, ensuring balanced perspectives and diverse decision-making.
  • Workforce diversity initiatives focused on creating an inclusive environment
  • Regular diversity training and awareness programs
  • Tracking progress and setting annual diversity targets
  • Gender-neutral hiring practices
Big Kablio Logo
Kablio AIIf you're someone who helps build and power the world (or dreams to), Kablio AI is your pocket-sized recruiter that gets you hired.
Copyright © 2025 Kablio
Information Systems Security Manager (ISSM) I at Gtangible Corporation in Hanscom Air Force Base, MA