3 days old

Information Systems Security Manager (ISSM)

Basking Ridge, NJ 07920
Apply Now
Apply on the Company Site
Business Group Highlights

Corporate Governance & Security

The office of the chief of staff is responsible for oversight and guidance for all projects at Perspecta. The chief of staff organizes and prioritizes critical issues and required information for the CEO and executive team to facilitate efficient decision making, and acts as a liaison between top management and other stakeholders. The office also manages congressional engagement, as well as provides oversight of the quality excellence and security organizations.


A dynamic, well organized and highly motivated individual with prior relevant experience to serve as the Information System Security Manager (ISSM) to ensure full-scope program support and compliance in the Basking Ridge, NJ area. The ISSM establishes, documents, and monitors the companys cyber security program implementation plan, and ensures compliance withDoD policies.Candidates must possess aworking knowledge of cyber security policies and technical cyber security protection measures. Specific responsibilities include, but are not limited to:

  • Develop and maintain a formal IS security program and policies for their assigned area of responsibility;
  • Provide technical and procedural Information System (IS) Security advice to engineering team and senior management regarding the Risk Management Framework (RMF) process.
  • Establish and maintain computer systems and networks for classified processing; responsible for administration, maintenance, and security auditing.
  • Develop and oversee operational information systems security implementation policy and guidelines;
  • Oversee ISSOs to ensure they follow established IS policies and procedures;
  • Assume ISSO responsibilities in the absence of the ISSO; maintain required IA certifications;
  • Ensure System Administrators (SA) monitor credible threat intelligent sources that provide warnings of system vulnerabilities or ongoing attacks
  • Ensure all ISSOs receive the necessary technical and security training (e.g., operating system, networking, security management) to carry out their duties;
  • Ensure approved procedures are used for sanitizing and releasing system components and media;
  • Maintain a repository using eMASS with all security authorizations for IS under their purview;
  • Coordinate IS security inspections, tests, and reviews;
  • Ensure proper measures are taken when an IS incident or vulnerability is discovered;
  • Ensure data ownership and responsibilities are established for each IS, and specific requirements (to include accountability, access and special handling requirements) are enforced;
  • Ensure development and implementation of an effective IS security education, training, and awareness program;
  • Ensure Configuration Management policies and procedures for authorizing the use of hardware/software on an IS are followed. Any additions, changes or modifications to hardware, software, or firmware must be coordinated with the appropriate AO prior to the addition, change or modification;
  • Maintain a working knowledge of system functions, security policies, technical security safeguards, and operational security measures;
  • Manage, maintain, and execute the information security continuous monitoring plan;
  • Ensure a record is maintained of all security-related vulnerabilities and ensure serious or unresolved violations are reported to the AO/DAO; and Assess changes to the system, its environment, and operational needs that could affect the security authorization


  • Requires 8 to 10 years with BS/BA or 6 to 8 years with MS/MA or 3 to 5 years with PhD.
  • Must have experience with DOD security processes and procedures or an equivalent regulatory environment and/or military training.
  • Must have a complete understanding of NISPOM, DAAPM, JSIG, and COMSEC.
  • Must possess the ability to identify issues and develop solutions to a variety of problems.
  • Strong communication, computer, analytical, and interpersonal skills.
  • The ability to initiate and plan projects, and analyze and interpret data.
  • The ability to produce appropriate clear, concise and detailed documentation.
  • Must be able to work independently and in a team.
  • Proficiency with eMASS
  • Possess CISSP or Security+ certifications.
  • Ability to obtain/maintain a TS//SCI clearance.

About Perspecta

What matters to our nation, is what matters to us. At Perspecta, everything we do, from conducting innovative research to cultivating strong relationships, supports one imperative: ensuring that your work succeeds. Our company was formed to bring a broad array of capabilities to all parts of the public sectorfrom investigative services and IT strategy to systems work and next-generation engineering.

Our promise is simple: never stop solving our nations most complex challenges. And with a workforce of approximately 14,000, more than 48 percent of which is cleared, we have been trusted to do just that, as a partner of choice across the entire sector.

Perspecta is anAA/EEOEmployer - All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or protected veteran status.

As a government contractor, Perspecta abides by the following provision

Pay Transparency Nondiscrimination Provision

The contractor will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. However, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of the other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by the employer, or (c) consistent with the contractors legal duty to furnish information. 41 CFR 60-1.35(c).


  • Information Technology
Posted: 2021-04-07 Expires: 2021-05-07

With offerings in mission services, digital transformation and enterprise operations, our team of 14,000 engineers, analysts, investigators and architects work tirelessly to create innovative solutions. We have the expertise and experience not only to devise solutions, but to execute on them successfully.

Featured Job

Featured Employer

Before you go...

Our free job seeker tools include alerts for new jobs, saving your favorites, optimized job matching, and more! Just enter your email below.

Share this job:

Information Systems Security Manager (ISSM)

Basking Ridge, NJ 07920

Join us to start saving your Favorite Jobs!

Sign In Create Account
Powered ByCareerCast