About The Position

This Department of War enterprise data and analytics program delivers mission-critical capabilities that enable leaders across the Department to make faster, better-informed decisions using trusted data at scale. Leidos Digital Modernization sector is seeking an experienced ISSM SME to support the delivery, enhancement, and adoption of enterprise data and analytics products used across multiple DoD organizations. In this role, you will work alongside government partners, ART Product Teams, and other industry teammates to translate operational and strategic requirements into scalable, production-ready solutions. You will contribute directly to product planning, execution, and continuous improvement—helping ensure capabilities are delivered efficiently, aligned to mission priorities, and positioned for sustained success. This position offers the opportunity to work on a high-visibility, enterprise program at the intersection of data, analytics, and emerging AI technologies. Ideal candidates are motivated by mission impact, comfortable operating in complex stakeholder environments, and interested in building deep domain expertise while delivering capabilities with real-world national security outcomes.

Requirements

  • TS/SCI with CI Poly security clearance
  • Bachelor degree (Computer Science, Cyber Security, Information Technology, Software Engineering, Information Systems, Computer Engineering, Mathematics or Engineering) or higher from an accredited college or university OR Offerings listed in DoD 8140 Training Repository OR CISSP-ISSMP or GSLC
  • Demonstrated experience with:
  • 12+ years' experience in the Cybersecurity area
  • 10+ years' experience with technology.
  • 8+ years' experience with IA technology.
  • 5+ years' experience with Risk Management Framework experience.
  • 5+ years' of project management work experience.
  • Expert knowledge of NIST SP 800-37, CNSSI 1253, FIPS 199 and NIST SP 800-53
  • Knowledge of the DoD Risk Assessment Methodology (DRAM) and POAM tracking.
  • Expert in RMF and A&A accreditation processes.
  • Certifications in Cybersecurity like Security plus, DOD IA/IAT Level II certification

Nice To Haves

  • Certifications in Cybersecurity like DOD IA/IAT Level III certification

Responsibilities

  • Serves as the primary liaison between stakeholders and technical teams to ensure a unified understanding of security requirements and address questions or concerns proactively.
  • Interprets mission, warfighter, and user needs to ensure security solutions align with program objectives and system requirements.
  • Analyzes security-related Service Level Agreements (SLAs), Technical Performance Measures (TPMs), and Key Performance Indicators (KPIs) to support reporting, risk assessment, and service delivery.
  • Oversees and prioritizes remediation activities involving NIST Risk Management Framework (RMF) requirements and other security issues to ensure timely resolution.
  • Manages and executes security controls and compliance activities across development and operations, strengthening the organization’s overall security posture.
  • Lead the team responsible for the ISSMs.
  • Establish a centralized ISSM pool to coordinate, review, validate, and approve all activities, which contribute to the assessment and authorization of automated information systems.
  • Expected to be able to address anything from physical security matters to information assessments, security tests and evaluations, preparation of Contingency Plans, and administration of Life Cycle Management and Configuration Management documentation.
  • Assess the vulnerability of AISs.
  • Recommend and implement changes to IT systems in accordance with the DoD directives.
  • Function as a technical specialist and assess the risk management security and contingency planning programs.
  • Implement measures to protect data from physical destruction or theft.
  • The contractor ISSM shall ensure that back-up procedures are in place for recovery from loss, destruction of data and program files, or from physical damage.
  • Implement SOPs and periodically tests recovery procedures to make sure recovery procedures are operational.
  • Develop policy and guidance and establish implementation and oversight plans to ensure compliance with Risk Management requirements.
  • Coordinate the review and evaluation of cyber security programs and effectiveness of implementation; identify problem areas; updates and establishes new requirements in response to new technologies and threats; and make recommendations to achieve a fully compliant IT architecture.
  • Develop Systems Security Contingency Plans and Disaster Recovery Procedures.
  • Develop and implement training and awareness programs to ensure that Advana systems, network, and data users are aware of, understand, and adhere to systems security policies and procedures.

Benefits

  • Pay and benefits are fundamental to any career decision.
  • That's why we craft compensation packages that reflect the importance of the work we do for our customers.
  • Employment benefits include competitive compensation, Health and Wellness programs, Income Protection, Paid Leave and Retirement.
  • More details are available here.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service