Part-Time Information Systems Security Manager; ISSM - Ann Arbor, MI
Listed on 2025-11-13
-
IT/Tech
Cybersecurity, Information Security
Part‑Time Information Systems Security Manager (ISSM) - Ann Arbor, MI
Apply for the Part‑Time Information Systems Security Manager (ISSM) - Ann Arbor, MI role at Resonant Sciences LLC
. Posted 5 days ago. Be among the first 25 applicants.
Resonant Sciences is recruiting a highly motivated, well‑organized individual with prior experience administering US government security policies and procedures to serve as a Part‑Time ISSM.
Duties & ResponsibilitiesCertification & Accreditation of computer networks using government standards, and data contamination management, including coordinating cleanup efforts, reporting requirements, and ensuring auditing requirements are completed.
This position is responsible for media control, virus scanning, hardware and software control, and computer security briefings. Must advocate for all disciplines within the security program while ensuring business needs are met. Candidate will handle the acquisition, installation, operations, maintenance, and usage of multi‑user computer networks in various classified environments. Installs and maintains workstation hardware, software, and peripheral components, and must have knowledge of operating systems including Windows and Windows Server.
Interprets and adheres to various federal requirements including JSIG, ICD 503, ICD 705, and NISPOM.
This position works closely with the Facility Security Officer and the Customer Program Security Officer to ensure all systems security procedures are being followed. Requires the ability to make sound decisions, take independent action, analyze problems, and provide focused solutions with the ability to effectively communicate information to various audiences both verbally and through written communications. Will interact with internal and external customers or Government security officials to perform security duties;
address routine information security matters with employees regarding issues; prepare reports, provide system security access briefings, and perform other duties as required.
- Prepare, update, and maintain RMF documentation such as Authorization to Operate (ATO) packages, System Security Plans (SSP), Risk Assessment Reports (RAR), Security Control Traceability Matrixes (SCTM), and Plan of Actions and Milestones (POA&Ms) for all networks and systems.
- Provide Configuration Management (CM) for IS security software, hardware, firmware, and coordinate changes and modifications with the ISSM, SCA, and Authorizing Official (AO).
- Identify points of vulnerability, non‑compliance with established Information Assurance (IA) standards and regulations, and recommend mitigation strategies.
- Continually evaluate the security posture of all networks and systems, including making recommendations for implementing new security controls as new threats and vulnerabilities are discovered.
- Work closely with Security Control Assessors (SCA) to determine effectiveness of current security controls and develop a path forward to implement future controls where potential weaknesses might exist.
- Establish, document, and monitor security programs while overseeing implementation plans, ensuring compliance with federal security requirements and mandates (e.g., RMF, Federal Information Processing Standards (FIPS), NIST).
- Possess a working knowledge of cyber security policies and technical cyber security protection measures.
- Serve as the authorizing officer for all cyber security issues.
- Conduct periodic scans to verify networks and systems are appropriately baselined with tested and approved system and application patches, hotfixes, and updates.
- Create, log, and control all customer requests and transactions for data transfers between systems (e.g., CD and other high‑capacity media, scanning documents).
- Ensure activities such as data backups and account management (deactivate unused accounts, validate user access rights) are completed on a periodic basis.
- Evaluate all new software and hardware products for potential security flaws and risks.
- Periodically review and analyze audit logs for system deficiencies and anomalies using audit reduction tools.
- Perform other duties as assigned.
- Security…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).