Business Forms

Information Systems Security Manager (ISSM) – Job Order 3118

Information Systems Security Manager (ISSM) – Job Order 3118

Basking Ridge, NJ or Red Bank, NJ
Compensation up to $140k+
No remote/telework allowed
No clearance required
Must currently be workinging similar position

They are more than a research lab; they are an innovation hub. They have an entreprenurial spirit molding technology of the future. They are involved in cybersecurity, data analytics, advanced networking, wireless and mobility, display technologies, optical and quantum, power grid and IoT security, and electronic warfare. The industries they work in include smart cities and smart phones, intelligent battlefields and autonomous systems, telecommunications, energy, finance, government, life sciences and defense. They have 225 scientists, engineers and analysts on staff, 260+ issued, licensed and pending patents. They have more than 125 PhD’s on staff, 40+ collaborations with universities, research organizations and vendors. Additionally they have 100+ on-going customer-funded research and technology programs.

The office of the chief of staff is responsible for oversight and guidance for all projects at this company. The chief of staff organizes and prioritizes critical issues and required information for the CEO and executive team to facilitate efficient decision making, and acts as a liaison between top management and other stakeholders. The office also manages congressional engagement, as well as provides oversight of the quality excellence and security organizations.


A dynamic, well organized and highly motivated individual with prior relevant experience to serve as the Information System Security Manager (ISSM) to ensure full-scope program support and compliance in the Basking Ridge, NJ area. The ISSM establishes, documents, and monitors the company’s cyber security program implementation plan, and ensures compliance with DoD policies. Candidates must possess a working knowledge of cyber security policies and technical cyber security protection measures. Specific responsibilities include, but are not limited to:



Develop and maintain a formal IS security program and policies for their assigned area of responsibility;
Provide technical and procedural Information System (IS) Security advice to engineering team and senior management regarding the Risk Management Framework (RMF) process.
Establish and maintain computer systems and networks for classified processing; responsible for administration, maintenance, and security auditing.
Develop and oversee operational information systems security implementation policy and guidelines;
Oversee ISSOs to ensure they follow established IS policies and procedures;
Assume ISSO responsibilities in the absence of the ISSO; maintain required IA certifications;
Ensure System Administrators (SA) monitor credible threat intelligent sources that provide warnings of system vulnerabilities or ongoing attacks
Ensure all ISSOs receive the necessary technical and security training (e.g., operating system, networking, security management) to carry out their duties;
Ensure approved procedures are used for sanitizing and releasing system components and media;
Maintain a repository using eMASS with all security authorizations for IS under their purview;
Coordinate IS security inspections, tests, and reviews;
Ensure proper measures are taken when an IS incident or vulnerability is discovered;
Ensure data ownership and responsibilities are established for each IS, and specific requirements (to include accountability, access and special handling requirements) are enforced;
Ensure development and implementation of an effective IS security education, training, and awareness program;
Ensure Configuration Management policies and procedures for authorizing the use of hardware/software on an IS are followed. Any additions, changes or modifications to hardware, software, or firmware must be coordinated with the appropriate AO prior to the addition, change or modification;
Maintain a working knowledge of system functions, security policies, technical security safeguards, and operational security measures;
Manage, maintain, and execute the information security continuous monitoring plan;
Ensure a record is maintained of all security-related vulnerabilities and ensure serious or unresolved violations are reported to the AO/DAO; and Assess changes to the system, its environment, and operational needs that could affect the security authorization


Requires 8 to 10 years with BS/BA or 6 to 8 years with MS/MA or 3 to 5 years with PhD.
Must have experience with DOD security processes and procedures or an equivalent regulatory environment and/or military training.
Must have a complete understanding of NISPOM, DAAPM, JSIG, and COMSEC.
Must possess the ability to identify issues and develop solutions to a variety of problems.
Strong communication, computer, analytical, and interpersonal skills.
The ability to initiate and plan projects, and analyze and interpret data.
The ability to produce appropriate clear, concise and detailed documentation.
Must be able to work independently and in a team.
Proficiency with eMASS
Possess CISSP or Security+ certifications.
Ability to obtain/maintain a TS//SCI clearance.

To apply for this job email your details to

This entry was posted in . Bookmark the permalink.