Senior Information Systems Security Manager; ISSM
Listed on 2026-03-06
-
IT/Tech
Cybersecurity, Information Security
Senior Information Systems Security Manager (ISSM)
K ’s National Security Solutions team provides high-end engineering and advanced technology solutions to our customers in the intelligence and national security communities. In this position, your work will have a profound impact on the country’s most critical role – protecting our national security.
Belong. Connect. Grow. with K !
Why Join Us?- Innovative Projects: K ’s work is at the forefront of engineering, logistics, operations, science, program management, mission IT and cybersecurity solutions.
- Collaborative Environment:
Be part of a dynamic team that thrives on collaboration and innovation, fostering a supportive and intellectually stimulating workplace. - Impactful Work:
Your contributions will be pivotal in designing and optimizing defense systems that ensure national security and shape the future of space defense.
K is seeking an Information Systems Security Manager to join the C3BM (Command, Control, Communications, and Battle Management) team in Beavercreek, OH. The Information System Security Manager will provide system authorization support, risk management and business continuity expertise, threat detection and prevention methods, incident response and management methods, auditing, vulnerability management support, and system security documentation.
Key Responsibilities- Coordinating, executing, and managing cybersecurity assessment & authorization (A&A) related activities supporting IT hardware, software, and connectivity capabilities in support of intelligence data management and analysis requirements.
- Provide advice and assistance on all things cyber security for customer‑acquired development and systems maintenance projects, driving and monitoring system authorization status of segment components, authoring and coordinating related documentation.
- Facilitate, perform, and manage actions necessary to maintain system and capability accreditation status consistent with DoDI 8510.01 (Risk Management Framework (RMF) for DoD Information Technology (IT)), including scanning, auditing, and authoring/coordinating security accreditation-related documentation.
- Review and advise on security aspects of contracted maintenance deliverables and proposals.
- Perform requirements analysis, design, and integration for complex software applications and collaboration infrastructures.
- Participate in the change management process, including reviewing Change Requests and assisting in the assessment of security impact of proposed changes.
- Write implementation and design documents describing how security features are implemented.
- Create and maintain information system security documentation, Standard Operating Procedures (SOP), and provide guidance on active Plans of Action and Milestones (POA&M).
- Present system maintenance, authorization status, and potential issues to various intelligence and acquisition community audiences.
- Keep leadership aware of any roadblocks, issues, or concerns with system authorization status.
- Location:
Beavercreek, OH - Travel Requirements: 40%
- Working Hours:
Standard
- BS degree in information systems or related technical field.
- 10+ years information security experience with extensive RMF knowledge.
- Expert knowledge of NIST 800-53, RMF process, DoDI 8510.01, eMASS system, classified network operations.
- DoD 8140 IAT/IAM Level I/II certification.
- Understanding of common operating systems (Windows, Linux/Unix, Cisco IOS/NX-OS).
- Maintain authorization packages within eMASS.
- Good writing and verbal presentation skills. Customer focused, excellent communicator.
- Collaborate with ISSOs, SCAs, PMs, and other stakeholders.
- Experience leading security projects and initiatives.
- Expert hands‑on experience interpreting compliance and vulnerability scanning tool reports from XACTA, STIGS, ACAS, Trellix (HBSS), and other vulnerability scanners.
- Knowledge of client, server, data storage, and networking technologies.
- Manage multiple information systems requiring continuous authorization to operate.
- Understanding of Cloud security and familiarity with Dev Sec Ops principles and SSDLC.
- Ability to troubleshoot, assess root…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).