Leidos Chief Information Security Office, reporting through our Digital Modernization sector, has an opening for an Information Systems Security Manager (ISSM) i n our St. Petersburg, FL office. The ISSM will support our Defense Systems business, overseeing several DCSA-approved Collateral Information Systems and maintaining accreditation throughout the system lifecycle. In this role, you will serve as the Subject Matter Expert (SME) within the Information Assurance (IA) technical domain, supporting enclaves across the enterprise. You will oversee day-to-day information system security operations and may manage junior Information System Security Officers (ISSOs), resolve complex problems, and develop innovative solutions to meet changing security requirements. To be successful in this role, you must be able to work independently with a team of analysts, information technology management and staff, and site management. Location: Fully onsite, St Petersburg, FL office Clearance: Active Secret Clearance with ability to obtain Top Secret. Primary Responsibilities This role may include a combination of duties to protect information and maintain security controls for an entire system, site, or program to reduce risk. Develop and lead Information Security projects from conceptualization to full deployment and user acceptance. Create comprehensive training programs on information assurance, data security, cybersecurity best practices, and relevant policies and procedures. Design training materials, including manuals, operating procedures, and presentations, and assign online courses and other resources. Coordinate technical training on security tools, software, and technologies used within the organization to enhance the skills of IT staff and other relevant personnel. Develop and lead training on responding to security incidents, including reporting procedures, containment, eradication, recovery, and post-incident analysis. Implement and manage the Risk Management Framework (RMF) Continuous Monitoring process by utilizing an automated ticketing system, ensuring accurate tracking, monitoring, and reporting of security controls, vulnerabilities, and remediation efforts within the organization's information systems. Perform continuous monitoring, analysis, and response to Information System network and security events. Document compliance activities in accordance with the governing authority-approved authorization package. Support the maintenance of system accreditation packages, including SSPs, CONOPS, security control evidence, POA&Ms, and continuous monitoring documentation. Develop procedures and documentation to ensure compliance with Configuration Management (CM) for security-relevant Information System (IS) software, hardware, and firmware. Facilitate CCB meetings; assess security impacts of proposed changes; document change requests, approvals, and implementation evidence. Ensure systems are operated, maintained, and disposed of in accordance with the governing authority-approved authorization package and customer directives. Evaluate proposed changes or additions to the information system and advise senior site leadership of the security relevance. Develop and conduct cybersecurity education and training, mentor other information assurance professionals in cybersecurity and secure software development practices. Participate in internal/external security audits/assessments/inspections coordinating corrective actions as necessary; participate in the risk management process; perform risk assessments and Continuous Monitoring Lead investigations of computer security violations and incidents, report as necessary to the Facility Security and Senior Program Managers. Ensure proper protection and/or corrective measures have been taken when an incident or vulnerability has been discovered. Work with the Facility Security Officer (FSO), developing, implementing, and managing a formal Information Security/Information Systems Security Program. Develop, implement, and enforce information security policies and procedures. Author, review, and update IS Authorization documentation (Body of Evidence) to support IS Assessment and Authorization activities