×
Register Here to Apply for Jobs or Post Jobs. X

Information Systems Security Manager; ISSM

Job in Miami, Miami-Dade County, Florida, 33222, USA
Listing for: General Dynamics Information Technology
Full Time position
Listed on 2026-03-01
Job specializations:
  • IT/Tech
    Cybersecurity, Information Security, IT Consultant
Salary/Wage Range or Industry Benchmark: 100000 - 125000 USD Yearly USD 100000.00 125000.00 YEAR
Job Description & How to Apply Below
Position: Information Systems Security Manager (ISSM)

Job Qualifications

Agile Framework, Cybersecurity, Information Security, RMF, Security Standards

Job Description

Type of Requisition:
Regular

Clearance Level Must Currently Possess:
Secret

Clearance Level Must Be Able To Obtain:
Top Secret

Public Trust/Other

Required:

None

Job Family:
Cyber and IT Risk Management

Skills:

Agile Framework, Cybersecurity, Information Security, RMF, Security Standards

Certifications:

None

Experience:

8 + years of related experience

US Citizenship

Required:

Yes

Own your career as a Information Systems Security Manager e, you’ll have the opportunity to build strong lines of cyber defense using cutting‑edge technologies. Your work in cyber security at GDIT will have an impact on securing our clients’ missions and ensuring we anticipate the threats of tomorrow.

GDIT is seeking a Information Systems Security Manager who preferably has an active secret clearance with ability to obtain a top secret clearance. The Cyber Security team is responsible to ensure the system remains in compliance within the Risk Management Framework (RMF) and associated policies, procedures and guidelines; provide technical expertise on system design, implementation, and accreditation, and provide oversight and coordination for multiple contractors supporting program objectives.

How

an ISSM Will Make an Impact
  • Responsible for developing and maintaining Risk Management Framework (RMF) security, accreditation, and Authorization to Operate (ATO) approval.
  • Manages the security of information systems assets and the protection of systems from intentional or inadvertent access or destruction.
  • Recognizes potential, successful, and unsuccessful intrusion attempts and compromises through reviews and analyses of relevant event detail and summary information.
  • Perform preliminary forensic evaluations of internal systems.
  • Interfaces with client to understand their security needs and oversees the development and implementation of procedures to accommodate them.
  • Ensures that the user community understands and adheres to necessary procedures to maintain security.
  • Weighs business needs against security concerns and articulates issues to management and/or customers.
  • Maintains current knowledge of relevant technology as assigned.
  • Provides guidance in the creation and maintenance of Standard Operating Procedures and other similar documentation.
  • Lead all security engineers within the program.
  • Develops and maintains System Security Plan, Security Assessment Plan and Procedures, Security Assessment Report, RMF System Diagrams, Incident Response Plan, Master Assessment Datasheet, RMF, and other deliverable artifacts.
  • Coordinates and conducts CCRI/ATO activities.
  • Ensure systems are compliant with DoD Security Standards.
  • Ensures the system achieves and maintains RMF ATO status.
  • Uses data collected from a variety of cyber defense tools (e.g., IDS alerts, firewalls, network traffic logs) to analyze events that occur within their environments for the purposes of mitigating threats.
  • Interprets, analyzes, and reports all events and anomalies in accordance with computer network directives, including initiating, responding, and reporting discovered events.
  • Evaluates, tests, recommends, coordinates, monitors and maintains cybersecurity policies, procedures and systems, including access management for hardware, firmware and software.
  • Develop and ensures that cybersecurity plans, controls, processes, standards, policies and procedures are aligned with cybersecurity standards.
  • Identifies security risks and exposures, determines the causes of security violations and suggests procedures to halt future incidents and improve security.
  • Develops techniques and procedures for conducting cybersecurity risk assessments and compliance audits, the evaluation and testing of hardware, firmware and software for possible impact on system security, and the investigation and resolution of security incidents such as intrusion, frauds, attacks or leaks.
What You’ll Need to Succeed
  • Familiarity with DoW RMF Processes, DoDI 8510.01/NIST SP 800-53.
  • Years of

    Experience:

    8+ years of cybersecurity-related experience or equivalent including 4+ years of ISSM experience.
  • Education:

    B.S., Computer…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary