Job was saved successfully.
Job was removed from Saved Jobs.

Job Details

Information Systems Security Manager

Law Enforcement and Security

Information Security


Hampton, Virginia, United States


Job Description:

Are you ready to join Leidos all-star team? Through training, teamwork, and exposure to challenging technical work, let Leidos show how to accelerate your career path.

The Leidos Defense Group is seeking IA and ISSM's for upcoming and future positions located at Joint Base Langley Eustis (JBLE) VA. These positions are part of a large Military Intelligence Program supporting the USAF Air Combat Command’s (ACC) ISR mission. This is an exciting opportunity to use your experience to help the 363rd ISRW and Air Combat Command ISRW Major Command.

The ISSM will ensure implementation of security features for the detection of malevolent code, viruses, and adversaries. Develops risk assessment reports and remediation recommendations to other IT support personnel and Military Leadership. The ISSM will also ensure the unit’s information systems follow USAF and DoD guidance. The ISSM may also support the supplier risk management lifecycle throughout all phases, and insider threat/risk programs. The ISSM supports and upholds the Information Assurance program for Information Systems within Network Environments. The ISSM constructs and implements system information security standards and procedures, ensuring functionality and security of units Information Systems.

Primary Responsibilities

  • Oversees Information Assurance and Risk Management Framework processes and performs duties as ISSM for the 363 ISRW
  • Ensure other IT support personnel monitor all available resources that provide warnings of system vulnerabilities or ongoing attacks
  • Communicates with internal and client project team members. Works to implement solution designs and/or processes in hardware, software, data and procedures.
  • Coordinates with personnel on system security compliance and Information System Authority to Operate.
  • Ensure Configuration management policies and procedures for authorizing the use of hardware/software on an IS are followed
  • Coordinate Information Security Reviews , Security Inspections, and Tests
  • Assesses system security threats/risks.
  • Validates system security requirements definitions and analysis.
  • Assists with assessment and authorization process as needed.
  • Tracks and validates security incidents and may be required to investigate, document, report, and provide future protective and corrective measures in response to such incidents.
  • Ensure proper measures are taken when a incident or vulnerability is discovered
  • Leads Leadership Briefings on system security compliance and Information System Authority to Operate (ATO) compliance, expiration and actions.
  • Implements the Risk Management Framework (RMF) methodology to successfully implement an information technology process which shall effectively protect the element's information assets and its ability to perform its mission.
  • Populates and maintains RFM databases (XACTA, eMass) with bodies of evidence to support system accreditation actions.
  • Collaborates with the Program Managers, AF Intelligence Community Information Assurance Program Managers, ISSOs and configuration managers to maintain an effective risk assessment process.
  • Ensures data stewardship (confidentiality, integrity, and availability) is established for each IS, and specific requirements are enforced

Note: This is a contingent job posting for vacancies as they arise within the program.

Basic Qualifications

  • Bachelor Degree and 6+ years of experience in Information Security OR a AAS and 10 years of experience in Information Security .Additional experience may be considered in lieu of a degree.
  • 10 + years of experience within the information technology job field.
  • Must possess a current DoD Top Secret/SCI clearance single-scope background investigation. TS with current SCI eligibility accepted.
  • DoD 8570 IAM Level II certified.
  • Experience supporting Air Force ISR operations
  • Knowledge of RMF process, eMass and XACTA workflow tools
  • Experience using relevant USAF systems and databases
  • Knowledge of USAF policies and procedures relating to information technology
  • Experience working with cloud computing and infrastructure (AWS, Azure, etc.)
  • Maintains currency of required Air Force myLearning and/or INSCOM trainings

Preferred Education/Qualifications:

  • Bachelor degree in a STEM discipline (Computer Science, Engineering, Mathematics, etc.)
  • AWS Security Engineering Course
  • ISC2 Certified Information Systems Security Professional Course
  • ISC2 Certified Cloud Security Professional Course
  • Experience working with Jira and Confluence
  • Experience with Air Force ISR units

Pay Range:Pay Range - -

The Leidos pay range for this job level is a general guideline only and not a guarantee of compensation or salary. Additional factors considered in extending an offer include (but are not limited to) responsibilities of the job, education, experience, knowledge, skills, and abilities, as well as internal equity, alignment with market data, applicable bargaining agreement (if any), or other law.