Information Systems Security Manager

Company logo
Gtangible Corporation
Service‑disabled, veteran‑owned small business delivering national security, program, and mission support to U.S. government.
Lead SAP information system security, RMF compliance, and risk management for the Air Force.
20 days ago ago
Expert & Leadership (13+ years)
Full Time
Hampton, VA
Onsite
Company Size
46 Employees
Service Specialisms
Program Protection (Security)
Information Assurance
Interoperability
DIACAP
Program Security Managers
CIP & Automated Security Systems
Construction Management and Engineering Technicians
Human Capital Development
Sector Specialisms
Information Systems Security
Information Assurance
Computer Network Defense
Network Engineering
Systems Administration
IT Customer Support
Communications Security
Physical Security
Role
What you would be doing
security assessments
risk management
configuration management
incident response
security training
authorization review

The Air Force (AF) Special Access Program (SAP) Security Support Services (SSS) assists the AF cognizant security authority in oversight of enhanced National Security Objectives supporting AF SAP interests through active and integrated security operations, processes, mechanisms, and management. This support provides multi-disciplinary security support, including specialized analytical/program protection support, while being responsive and flexible to dynamic SAP security situations.

  • Periodically review system security to accommodate changes to policy or technology.
  • Develop, review, endorse, and recommend action by the AO or DAO of system assessment documentation.
  • Coordinate all technical security issues outside of area of expertise or responsibility with ISSE.
  • Review AIS assessment plans.
  • Perform risk assessments and make recommendations to DoD agency customers.
  • Provide expert research and analysis in support of expanding programs and area of responsibility as it pertains to cyber security and information technology activities.
  • Develop and execute security assessment plans that include verification that the features and assurances required for each protection level functioning.
  • Conduct periodic assessments of the security posture of the authorization boundaries.
  • Ensure proper protection or corrective measures have been taken when an incident or vulnerability has been discovered within a system.
  • Perform oversight of the development, implementation and evaluation of information system security program policy; special emphasis placed upon integration of existing SAP network infrastructures.
  • Coordinate with PSO or cognizant security official on approval of external information systems (e.g., guest systems, interconnected system with another organization).
  • Ensure configuration management (CM) for security-relevant changes to software, hardware, and firmware and that they are properly documented.
  • Develop Assured File Transfers (AFT) on accordance with the JSIG.
  • Ensure that data ownership and responsibilities are established for each authorization boundary, to include accountability, access rights, and special handling requirements.
  • Maintain a and/or applicable repository for all system authorization documentation and modifications.
  • Develop policies and procedures for responding to security incidents, to include investigating and reporting security violations and incidents.
  • Provide leadership, mentoring, and quality assurance for Cyber Security and Information Technology team members.
  • Ensure that all IAOs, network administrators, and other cyber security personnel receive the necessary technical and security training to carry out their duties.
  • Institute and implement a Configuration Control Board (CCB) charter.
  • Advise government program managers on security testing methodologies and processes.
  • Develop and maintain a formal Information Systems Security Program.
  • Ensure that system security requirements are addressed during all phases of the system life cycle.
  • Assess changes in the system, its environment, and operational needs that could affect the authorization.
  • Participate in self-inspections.
  • Develop and oversee operational information systems security implementation policy and guidelines of network security, based upon the Risk Management Framework (RMF) with emphasize on Joint Special Access Program Implementation Guide (JSIG) authorization process.
  • Evaluate authorization documentation and provide written recommendations for authorization to government PM’s.
  • Ensure periodic testing is conducted to evaluate the security posture of IS by employing various intrusion/attack detection and monitoring tools (shared responsibility with ISSOs).
  • Ensure that system recovery and reconstitution processes developed and monitored to ensure that the authorization boundary can be recovered based on its availability level determination.
  • Ensure development and implementation of an information security education, training, and awareness program, to include attending, monitoring, and presenting local cyber security training.
  • Evaluate threats and vulnerabilities to ascertain whether additional safeguards are needed.
  • Ensure all authorization documentation is current and accessible to properly authorized individuals.
  • Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media.
  • Advise customer on Risk Management Framework (RMF) assessment and authorization issues.
  • Ensure that authorization is accomplished a valid Authorization determination has been given for all authorization boundaries under your purview.
What you bring
sap
dod 8570
isso
issm
7-9 yrs
bachelor
  • Prior active duty in the U.S. Air Force a plus.
  • SAP experience required.
  • Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level 2 or Information Assurance Manager Level 2 within 6 months of the date of hire.
  • Prior performance in roles such as ISSO or ISSM.
  • Must have working knowledge of DoD, National and applicable service and agency security policy, manuals and standards.
  • 7 - 9 years related experience.
  • Bachelor’s degree in related discipline OR Associate’s degree in a related area + 2 years’ experience OR equivalent experience (4 years).
  • Must be able to regularly lift up to 50 lbs.
Benefits
  • National Security Programs
Training + Development
Information not given or found
Company
Overview
$6.3M contract
DHS FLETC support award
Secured a five-year federal contract to support training and leadership programs for the Department of Homeland Security.
  • Founded in 2009, began as a veteran-led firm combining military insight with agile support services.
  • Registered as a service-disabled veteran-owned small business with Delaware incorporation and CAGE code for government contracting.
  • Delivers national security programs, administrative/program management, and mission/warfighter support across CONUS and OCONUS.
  • Over the past decade, secured multi-million-dollar contracts.
  • Typical projects include information assurance, network defense, logistics, training development, and theater security cooperation.
  • Expanded into international program support and energy-focused organizational development.
  • Maintains small-business agility with big-agency impact.
Culture + Values
  • Customer-First Mindset
  • Commitment to Excellence
  • Continuous Learning & Growth
  • Innovation & Creativity
  • Collaboration & Teamwork
  • Integrity & Transparency
Environment + Sustainability
2030 Target
Net Zero Commitment
The company aims to achieve zero net greenhouse gas emissions by 2030, marking a significant step toward climate action.
  • Prioritizing energy-efficient technologies and practices
  • Reducing carbon footprint through renewable energy usage
  • Implementing sustainable supply chain practices
  • Focused on waste reduction and recycling initiatives
  • Tracking and reporting progress annually
Inclusion & Diversity
45% Female Representation
Gender Parity in Leadership Roles
The leadership team includes 45% female representation, ensuring balanced perspectives and diverse decision-making.
  • Workforce diversity initiatives focused on creating an inclusive environment
  • Regular diversity training and awareness programs
  • Tracking progress and setting annual diversity targets
  • Gender-neutral hiring practices
Big Kablio Logo
Kablio AIIf you're someone who helps build and power the world (or dreams to), Kablio AI is your pocket-sized recruiter that gets you hired.
Copyright © 2025 Kablio
Information Systems Security Manager at Gtangible Corporation in Hampton, VA