Information Systems Security Manager; ISSM Journeyman
Listed on 2026-02-19
-
IT/Tech
Cybersecurity, Information Security
Location: Pineville
Responsibilities
Join Peraton'smission-critical team supporting secure, real-time data delivery across complex operational environments in direct support of our nation's warfighters. If you are driven by national security and energized bycutting-edgeC2
ISR capabilities, sensor integration, and resilient data transport solutions, we invite you to join our team.
We areseekinghighly cleared professionals who excel at the intersection of advanced communications infrastructure, distributed systems, and mission assurancewhere reliability, security, and performance are paramount.
Specifically, we are looking for a TS/SCI cleared
Information Systems Security Manager(ISSM)-Journeymantosupport this missionat
Pope Army Airfield, North Carolina.
Asan Information Systems Security Manager(ISSM)-Journeymanyou will provide technical and management leadership for all equipment and information support functions across the Task Order. Your responsibilities include:
- Provides mid-level management and technical leadership to a team of security administrators.
- Coordinates the RMF authorization efforts for specific C2
ISR information systems and networks, ensuring alignment with overall security authorization strategies. - Manages the development and maintenance of RMF documentation for designated C2
ISR systems, including System Security Plans (SSPs), Security Assessment Reports (SARs), and Plans of Action and Milestones (POA&Ms). - Overseessecurity control assessments, ensuring proactive alignment with technological system requirements and operational objectives.
- Facilitates the systematic integration of RMF processes into acquisition and systems engineering life cycles by managing relevant documentation and evidence.
- Contributes to obtaining IATTs, ATOs, and ATCs by ensuring authorization packages are complete,accurate, and submitted on time.
- Collaborates effectively with ISSOs, ISSEs, system owners, and authorizing officials to interpret RMF requirements and manage authorization timelines.
- Provides RMF implementation insights and guidance to project teams, contributing to continuous infrastructure security validation.
- Operates with appreciable latitude in defining and implementing RMF-related management processes and controls for multiple systems.
- Ensures and champions adherence to established RMF policies, security best practices, and documentation standards for all assigned projects.
- Safeguard sensitive and critical information systems
- Proactively research and mitigate new and evolving technological threats
- Research and stay current on newly released threat prevention strategies from vendors and research orgs (CISA, NIST, MITRE, SANS, ISACA)
- Support andassistofficial Cyber Operational Readiness Assessment (CORA), IG, and other official audits, inspections, and investigations
- Implement and enforce Supply Chain Risk Management (800-161) with acquisition processes
- Assist with the development and maintenance of program manuals, procedure documents, operational security, and information disclosure reporting guides
- Develop the capability for automatic assimilation of scans, STIGs, and security control matrices with AI and machine learning for analysis, remediation, andc
ATOcapability readiness - Utilize the following
Role Specific Tools:
Risk Management Framework (RMF) compliance platforms (Xacta,eMASS, Archer GRC); security control assessment dashboards (NIST SP 800-53, CNSSI 1253); vulnerability scanning and remediation tools (Elastic Stack, ACAS,, Nessus, Qualys); SIEM platforms (Splunk, Arc Sight, Elastic Security) for log aggregation and anomaly detection;
Zero Trust architecture enforcement tools; cross domain solution monitoring systems (Everfox High Speed Guard, Radiant Mercury); encryption and key management systems (Type 1 TACLANE, HAIPE IS); configuration management databases (CMDB) for security artifacts; SOP/QRC libraries for standardized cybersecurity processes; lessons learned repositories for ISSM practices; stakeholder communication dashboards for security posture visibility; compliance audit checklists for DoD cybersecurity standards and Raise the Bar requirements.
- Previous experience asan Information…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).