About the job
About Our Team:
The Security team at Systems Technology Research (STR) is composed of highly skilled experts dedicated to ensuring compliance with government regulations and directives. Our Classified Cybersecurity (CCS) team is a collaborative group of Information Systems Security Managers (ISSMs), Information Systems Security Officers (ISSOs), and Information Systems Security Engineers (ISSEs) who are passionate about national security. We take immense pride in safeguarding the Confidentiality, Integrity, and Availability of our Information Systems while enabling the execution of STR's diverse portfolio of programs across a wide range of clients.
Role Overview:
STR is excited to invite an accomplished cybersecurity professional to join our Cybersecurity/Risk Management Framework (RMF) program as a crucial contributor to classified projects. As the Information Systems Security Manager (ISSM), you will oversee compliance, conduct assessments, and manage the operations of systems within your jurisdiction. This dynamic role requires close collaboration with fellow cybersecurity professionals (ISSOs, ISSEs), security personnel (CSSOs, FSOs), and system administrators to ensure overall compliance and effective configuration change management.
Please note: This position requires onsite presence and is not a remote role.
Key Responsibilities:
- Lead the Cybersecurity program in accordance with US Government standards, including Joint Special Access Implementation Guide (JSIG), Intelligence Community Directive (ICD) 503, DCSA Assessment and Authorization Guide (DAAG), and National Industrial Security Operating Manual (NISPOM).
- Conduct Assessment and Authorization (A&A) activities, including testing security controls and preparing/maintaining documentation such as Standard Operating Procedures (SOP), System Security Plan (SSP), Risk Assessment Report (RAR), Security Controls Traceability Matrix (SCTM), and Plan of Action and Milestones (POA&M) reports.
- Maintain a comprehensive understanding of NIST SP800-53 controls, identify applicable controls for applications, and document control implementations in the SCTM.
- Oversee Continuous Monitoring (ConMon) of assigned networks by performing regular self-inspections, tests, and technical reviews to ensure workstations and servers operate within authorized and accredited parameters.
- Collaborate with program and project stakeholders, including cybersecurity personnel (ISSMs, ISSOs, ISSEs), Facility Security Officer (FSO), Contractor Special Security Officer (CSSO), and other security and IT team members to develop, implement, and uphold an effective information systems security posture.

