**Req ID:** RQ195060
**Type of Requisition:** Regular
**Clearance Level Must Be Able to Obtain:** Top Secret SCI + Polygraph
**Public Trust/Other Required:** None
**Job Family:** Information Security
**Skills:**
- Cybersecurity
- Information Security
- Information System Security
- Security Evaluations
**Experience:**
5+ years of related experience
**US Citizenship Required:** Yes
Job Description:
INFORMATION SYSTEM SECURITY MANAGER - I
Location: TUCSON, AZ
TS/SCI clearance is required (must be active/in scope).
The ISSM’s primary role is to serve as an advisor on all matters, technical and otherwise, involving the security of information systems under their purview. The position involves supporting Department of Defense agencies, such as HQ Air Force, Office of the Secretary of Defense, and Military Compartments, within Special Access Programs (SAPs). It provides day-to-day support for Collateral, SCI, and SAP activities.
Responsibilities include:
- Overseeing development, implementation, and evaluation of information system security policies, with emphasis on integrating existing SAP network infrastructures.
- Developing and managing operational security policies and guidelines based on the Risk Management Framework (RMF), with a focus on joint operations.
- Implementing the JSIG authorization process for SAPs.
- Advising on RMF assessment and authorization issues.
- Performing risk assessments and providing recommendations to DoD agency clients.
- Advising government program managers on security testing methodologies.
- Evaluating authorization documentation and providing recommendations for system authorization.
- Maintaining a formal Information Systems Security Program.
- Ensuring cybersecurity training for IAO, network administrators, and other personnel.
- Developing and reviewing system assessment documentation.
- Managing procedures for hardware/media sanitization and destruction.
- Developing security assessment plans and verifying protection features.
- Maintaining authorization documentation repositories.
- Establishing a Configuration Control Board (CCB) charter.
- Creating policies for incident response and investigating security violations.
- Implementing corrective measures for vulnerabilities or incidents.
- Defining data ownership, access rights, and handling requirements.
- Developing security education, training, and awareness programs.
- Assessing threats and vulnerabilities for additional safeguards.
- Evaluating system changes and their impact on authorization.
- Ensuring valid authorization for all system boundaries.
- Reviewing AIS assessment plans.
- Coordinating with security officials on external system approvals.
- Conducting periodic security posture assessments.
- Managing configuration management for security-relevant changes.
- Performing security testing using intrusion detection and monitoring tools.
- Developing system recovery and reconstitution plans.
- Ensuring authorization documentation is current and accessible.
- Addressing security requirements throughout the system life cycle.
- Developing Assured File Transfers (AFT) per JSIG guidelines.
- Participating in self-inspections.
- Performing ISSO duties if necessary.
Experience & Education:
- 5+ years related experience, including roles like ISSO or ISSM.
- Desired SAP experience.
- Bachelor’s degree or equivalent (4 years).
Certifications & Clearance:
- IAT Level II (or willing to obtain within 6 months).
- TS/SCI clearance, with willingness to obtain CI polygraph.
Additional Requirements:
- Knowledge of DoD, national, and agency security policies.
- Ability to lift up to 50 lbs.
The salary range is approximately $93,500 - $126,500, dependent on experience and location. Benefits include comprehensive health plans, 401(k), flexible work arrangements, and more.