Information System Security Manager (ISSM)
Arlington, Virginia
Full Time Senior-level / Expert Clearance required USD 107K - 218K
Two Six Technologies
Advancing safety and trust on matters of global importance.At Two Six Technologies, we build, deploy, and implement innovative products that solve the world’s most complex challenges today. Through unrivaled collaboration and unwavering trust, we push the boundaries of what’s possible to empower our team and support our customers in building a safer global future.
Overview of Opportunity
Two Six Technologies is growing, and we are seeking an Information System Security Manager (ISSM) to support our Corporate team. This role oversees information system security across our Arlington, VA, and Herndon sites, ensuring compliance with all applicable security regulations and frameworks. The ISSM will lead the development and execution of a comprehensive Risk Management program that meets both internal and external customer expectations while minimizing security risks.
This position will be based in our Arlington, VA, office and requires regular travel between company facilities to ensure consistent security oversight and compliance.
What You Will Do:
- Develop, implement, and maintain security policies, procedures, and technical controls to protect information systems at both locations.
- Lead the design, establishment, and maintenance of classified networks, working closely with the Security team and subcontractors to secure Approvals to Operate (ATOs).
- Monitor and respond to security incidents, ensuring timely reporting to the Security Director and execution of corrective actions.
- Develop and maintain an Information System Security Audit and Accountability Program, ensuring system activity is appropriately logged, monitored, and reviewed.
- Serve as the primary security liaison between internal teams and government customers, ensuring compliance and the secure operation of information systems.
- Perform oversight of the development, implementation and evaluation of information system security program policy; special emphasis placed upon integration of existing SAP/SCI network infrastructures
- Advise customer on Risk Management Framework (RMF) assessment and authorization issues
- Ensure that all IAOs, network administrators, and other cyber security personnel receive the necessary technical and security training to carry out their duties
- Develop, review, endorse, and recommend action by the AO or DAO of system assessment documentation
- Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media
- Review AIS assessment plans
- Ensure proper protection or corrective measures have been taken when an incident or vulnerability has been discovered within a system
- Provide expert research and analysis in support of expanding programs and area of responsibility as it pertains to cyber security and information technology activities
- Ensure that a valid Authorization determination has been given for all authorization boundaries under your purview
What You Will Need (Basic Qualifications):
- Bachelor's degree in a related field or applicable industry certifications.
- 6+ years of experience managing information system security across multiple locations, including administration and compliance oversight.
- IAM Level II certification per DOD 8570.01M.
- Proven experience implementing, supporting, and leading security assessments aligned with CMMC, NIST SP 800-171/53, ISO, and other regulatory frameworks.
- Direct experience with self-assessments, certified audits, and external compliance reviews to maintain security certifications and approvals.
- In-depth understanding of DOD 5220.22M, NISPOM (32 CFR), ICD 503, RMF processes, and security directives relevant to classified environments.
- Strong ability to communicate complex security concepts to technical and non-technical stakeholders, fostering collaboration across teams.
- Experience overseeing security operations across multiple company locations, ensuring consistent policy implementation and compliance.
- Institute and implement a Configuration Control Board (CCB) charter
- Conduct the duties of the Information System Security Officer (ISSO) if one is not present and/or available
Nice if you have (Preferred):
- Active TS/SCI with Poly.
- Experience leading distributed security teams and managing security programs across multiple corporate facilities.
- Expertise in managing security tools and processes, including STIGs, eMASS, and XACTA workflow tools.
Security Clearance:
- Active Top Secret/SCI clearance with the ability to obtain a poly.
#LI-ZS1
#LI-ONSITE
Two Six Technologies is committed to providing competitive and comprehensive compensation packages that reflect the value we place on our employees and their contributions. We believe in rewarding skills, experience, and performance. Our offerings include but are not limited to, medical, dental, and vision insurance, life and disability insurance, retirement benefits, paid leave, tuition assistance and professional development.
The projected salary range listed for this position is annualized. This is a general guideline and not a guarantee of salary. Salary is one component of our total compensation package and the specific salary offered is determined by various factors, including, but not limited to education, experience, knowledge, skills, geographic location, as well as contract specific affordability and organizational requirements.
Salary Range$107,900—$218,700 USDLooking for other great opportunities? Check out Two Six Technologies Opportunities for all our Company’s current openings!
Ready to make the first move towards growing your career? If so, check out the Two Six Technologies Candidate Journey! This will give you step-by-step directions on applying, what to expect during the application process, information about our rich benefits and perks along with our most frequently asked questions. If you are undecided and would like to learn more about us and how we are contributing to essential missions, check out our Two Six Technologies News page! We share information about the tech world around us and how we are making an impact! Still have questions, no worries! You can reach us at Contact Two Six Technologies. We are happy to connect and cover the information needed to assist you in reaching your next career milestone.
Two Six Technologies is an Equal Opportunity Employer and does not discriminate in employment opportunities or practices based on race (including traits historically associated with race, such as hair texture, hair type and protective hair styles (e.g., braids, twists, locs and twists)), color, religion, national origin, sex (including pregnancy, childbirth or related medical conditions and lactation), sexual orientation, gender identity or expression, age (40 and over), marital status, disability, genetic information, and protected veteran status or any other characteristic protected by applicable federal, state, or local law.
If you are an individual with a disability and would like to request reasonable workplace accommodation for any part of our employment process, please send an email to accommodations@twosixtech.com. Information provided will be kept confidential and used only to the extent required to provide needed reasonable accommodations.
Additionally, please be advised that this business uses E-Verify in its hiring practices.
By submitting the following application, I hereby certify that to the best of my knowledge, the information provided is true and accurate.
Tags: Audits Clearance CMMC Compliance DoD DoDD 8570 eMASS IAM ICD 503 NISPOM NIST Risk management RMF SAP Security assessment Security Clearance STIGs Top Secret TS/SCI
Perks/benefits: Career development Competitive pay Health care Insurance Medical leave Team events
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.