What are the responsibilities and job description for the (ISSM) Senior Cybersecurity Information Systems Security Manager position at Logistics Management Institute?
Overview
LMI is seeking a Senior Cybersecurity Information Systems Security Manager (ISSM) with a minimum of a Top Secret clearance to provide cybersecurity Risk Management Framework (RMF) Authority to Operate (ATO) support to LMI.
LMI has been named a 2022 and 2024 #TopWorkplace in the United States by Top Workplaces! We are honored to be recognized as a company that values a people-centered culture, and we are grateful to our employees for making this possible!
Responsibilities
- Serve as the primary point of contact for all cybersecurity and information assurance matters related to classified secure environments.
- Oversee the entire RMF cycle, including initiation, categorization, selection, implementation, assessment, authorization, and continuous monitoring.
- Maintain and update Security Plans (SSP), POA&M and other related documentation.
- Conduct risk assessments and vulnerability assessments to identify and mitigate security risks.
- Ensure compliance with all relevant security policies, standards, and guidelines, including NIST SP 800 series.
- Work closely with cybersecurity personnel to document controls, support authorization, seeking any Interim Authorization to Test (IATT) and Authority to Operate (ATO) documentation and approvals and provide metrics to comply with audits.
- Responsible for escalating issues, problems, risks, and constraints to the appropriate levels for clarification and resolution.
- Perform unsupervised, hands-on work within environments and eMASS.
- Manage multiple and competing customer priorities with little supervision.
- Review security controls and configuration requirements including secure network design, database access, security testing, authentication methods, implementation of encryption, privilege management, logging, input validation, secure storage design, and secure data transfer.
- Participate in Requests for Change (RFC), Change Management Processes.
- Monitors and educates teammates on IAVM tracking and CISA alerts.
- Understand all security tools within environment including SIEM, EDR and networking for classified networks
- Conduct risk assessments, system audits, and vulnerability analysis to identify and mitigate security risks.
Qualifications