×
Register Here to Apply for Jobs or Post Jobs. X

Information Systems Security Manager; ISSM Journeyman

Job in Pineville, Bell County, Kentucky, 40977, USA
Listing for: Peraton
Full Time position
Listed on 2026-02-19
Job specializations:
  • IT/Tech
    Cybersecurity, Information Security
Salary/Wage Range or Industry Benchmark: 100000 - 125000 USD Yearly USD 100000.00 125000.00 YEAR
Job Description & How to Apply Below
Position: Information Systems Security Manager (ISSM) Journeyman
Location: Pineville

Responsibilities

Join Peraton'smission-critical team supporting secure, real-time data delivery across complex operational environments in direct support of our nation's warfighters. If you are driven by national security and energized bycutting-edgeC2

ISR capabilities, sensor integration, and resilient data transport solutions, we invite you to join our team.

We areseekinghighly cleared professionals who excel at the intersection of advanced communications infrastructure, distributed systems, and mission assurance where reliability, security, and performance are paramount.

Specifically, we are looking for a TS/SCI cleared

Information Systems Security Manager(ISSM)-Journeymantosupport this missionat

Pope Army Airfield, North Carolina.

Responsibilities

Asan Information Systems Security Manager(ISSM)-Journeyman you will provide technical and management leadership for all equipment and information support functions across the Task Order. Your responsibilities include:

  • Provides mid-level management and technical leadership to a team of security administrators.
  • Coordinates the RMF authorization efforts for specific C2

    ISR information systems and networks, ensuring alignment with overall security authorization strategies.
  • Manages the development and maintenance of RMF documentation for designated C2

    ISR systems, including System Security Plans (SSPs), Security Assessment Reports (SARs), and Plans of Action and Milestones (POA&Ms).
  • Oversees security control assessments, ensuring proactive alignment with technological system requirements and operational objectives.
  • Facilitates the systematic integration of RMF processes into acquisition and systems engineering life cycles by managing relevant documentation and evidence.
  • Contributes to obtaining IATTs, ATOs, and ATCs by ensuring authorization packages are complete,accurate, and submitted on time.
  • Collaborates effectively with ISSOs, ISSEs, system owners, and authorizing officials to interpret RMF requirements and manage authorization timelines.
  • Provides RMF implementation insights and guidance to project teams, contributing to continuous infrastructure security validation.
  • Operates with appreciable latitude in defining and implementing RMF-related management processes and controls for multiple systems.
  • Ensures and champions adherence to established RMF policies, security best practices, and documentation standards for all assigned projects.
  • Safeguard sensitive and critical information systems
  • Proactively research and mitigate new and evolving technological threats
  • Research and stay current on newly released threat prevention strategies from vendors and research orgs (CISA, NIST, MITRE, SANS, ISACA)
  • Support andassistofficial Cyber Operational Readiness Assessment (CORA), IG, and other official audits, inspections, and investigations
  • Implement and enforce Supply Chain Risk Management (800-161) with acquisition processes
  • Assist with the development and maintenance of program manuals, procedure documents, operational security, and information disclosure reporting guides
  • Develop the capability for automatic assimilation of scans, STIGs, and security control matrices with AI and machine learning for analysis, remediation, andc

    ATOcapability readiness
  • Utilize the following

    Role Specific Tools:
    Risk Management Framework (RMF) compliance platforms (Xacta,eMASS, Archer GRC); security control assessment dashboards (NIST SP 800-53, CNSSI 1253); vulnerability scanning and remediation tools (Elastic Stack, ACAS,, Nessus, Qualys); SIEM platforms (Splunk, Arc Sight, Elastic Security) for log aggregation and anomaly detection;
    Zero Trust architecture enforcement tools; cross domain solution monitoring systems (Everfox High Speed Guard, Radiant Mercury); encryption and key management systems (Type 1 TACLANE, HAIPE IS); configuration management databases (CMDB) for security artifacts; SOP/QRC libraries for standardized cybersecurity processes; lessons learned repositories for ISSM practices; stakeholder communication dashboards for security posture visibility; compliance audit checklists for DoD cybersecurity standards and Raise the Bar requirements.
Qualifications
  • Previous experience asan Information…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary