×
Register Here to Apply for Jobs or Post Jobs. X

Part-Time Information Systems Security Manager; ISSM - Ann Arbor, MI

Job in Ann Arbor, Washtenaw County, Michigan, 48113, USA
Listing for: Resonant Sciences LLC
Part Time position
Listed on 2025-11-13
Job specializations:
  • IT/Tech
    Cybersecurity, Information Security
Salary/Wage Range or Industry Benchmark: 125000 - 150000 USD Yearly USD 125000.00 150000.00 YEAR
Job Description & How to Apply Below
Position: Part-Time Information Systems Security Manager (ISSM) - Ann Arbor, MI

Part‑Time Information Systems Security Manager (ISSM) - Ann Arbor, MI

Apply for the Part‑Time Information Systems Security Manager (ISSM) - Ann Arbor, MI role at Resonant Sciences LLC
. Posted 5 days ago. Be among the first 25 applicants.

Resonant Sciences is recruiting a highly motivated, well‑organized individual with prior experience administering US government security policies and procedures to serve as a Part‑Time ISSM.

Duties & Responsibilities

Certification & Accreditation of computer networks using government standards, and data contamination management, including coordinating cleanup efforts, reporting requirements, and ensuring auditing requirements are completed.

This position is responsible for media control, virus scanning, hardware and software control, and computer security briefings. Must advocate for all disciplines within the security program while ensuring business needs are met. Candidate will handle the acquisition, installation, operations, maintenance, and usage of multi‑user computer networks in various classified environments. Installs and maintains workstation hardware, software, and peripheral components, and must have knowledge of operating systems including Windows and Windows Server.

Interprets and adheres to various federal requirements including JSIG, ICD 503, ICD 705, and NISPOM.

This position works closely with the Facility Security Officer and the Customer Program Security Officer to ensure all systems security procedures are being followed. Requires the ability to make sound decisions, take independent action, analyze problems, and provide focused solutions with the ability to effectively communicate information to various audiences both verbally and through written communications. Will interact with internal and external customers or Government security officials to perform security duties;

address routine information security matters with employees regarding issues; prepare reports, provide system security access briefings, and perform other duties as required.

Additional Duties
  • Prepare, update, and maintain RMF documentation such as Authorization to Operate (ATO) packages, System Security Plans (SSP), Risk Assessment Reports (RAR), Security Control Traceability Matrixes (SCTM), and Plan of Actions and Milestones (POA&Ms) for all networks and systems.
  • Provide Configuration Management (CM) for IS security software, hardware, firmware, and coordinate changes and modifications with the ISSM, SCA, and Authorizing Official (AO).
  • Identify points of vulnerability, non‑compliance with established Information Assurance (IA) standards and regulations, and recommend mitigation strategies.
  • Continually evaluate the security posture of all networks and systems, including making recommendations for implementing new security controls as new threats and vulnerabilities are discovered.
  • Work closely with Security Control Assessors (SCA) to determine effectiveness of current security controls and develop a path forward to implement future controls where potential weaknesses might exist.
  • Establish, document, and monitor security programs while overseeing implementation plans, ensuring compliance with federal security requirements and mandates (e.g., RMF, Federal Information Processing Standards (FIPS), NIST).
  • Possess a working knowledge of cyber security policies and technical cyber security protection measures.
  • Serve as the authorizing officer for all cyber security issues.
  • Conduct periodic scans to verify networks and systems are appropriately baselined with tested and approved system and application patches, hotfixes, and updates.
  • Create, log, and control all customer requests and transactions for data transfers between systems (e.g., CD and other high‑capacity media, scanning documents).
  • Ensure activities such as data backups and account management (deactivate unused accounts, validate user access rights) are completed on a periodic basis.
  • Evaluate all new software and hardware products for potential security flaws and risks.
  • Periodically review and analyze audit logs for system deficiencies and anomalies using audit reduction tools.
  • Perform other duties as assigned.
Qualifications
  • Security…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary