About this role
Manage cybersecurity and Information Assurance activities as an Information System Security Manager (ISSM) supporting Boeing and classified customer environments. Lead Assessment and Authorization under RMF, coordinate Continuous Monitoring, and ensure compliance through audits, technical reporting, and risk mitigation.
Key Responsibilities
- Lead Assessment and Authorization (A&A) under Risk Managed Framework (RMF),Facilitate development of Memorandums of Understanding (MOU), Interconnection Security Agreements (ISA), Risk Acceptance Letters (RAL) and Continuous Monitoring (CONMON),Conduct risk assessments, investigations, and coordinate incident response,Lead and perform security compliance continuous monitoring and coordinate security assessments and audits,Prepare, review, and present technical reports and briefings and recommend corrective action
Technical Overview
This ISSM role focuses on enforcing information system security policies/standards for classified systems and executing RMF Assessment and Authorization (A&A). It includes Continuous Monitoring (CONMON), supporting MOU/ISA/RAL artifacts, performing security analysis and compliance assessments, and coordinating incident response activities.
Ideal Candidate
The ideal candidate is an ISSM technical leader with an Information Assurance (IA) background who can drive Assessment and Authorization (A&A) activities under the Risk Managed Framework (RMF) for classified information systems. They are comfortable running Continuous Monitoring (CONMON), supporting compliance audits, and coordinating risk mitigations and incident response in partnership with internal and government stakeholders.
Must-Have Skills
cybersecurity and Information Assurance (IA) backgroundLead and implement the Assessment and Authorization (A&A) processes under the Risk Managed Framework (RMF)
Nice-to-Have Skills
experience with Memorandums of Understanding (MOU)Interconnection Security Agreements (ISA)Risk Acceptance Letters (RAL)and Continuous Monitoring (CONMON)
Required Skills
cybersecurityInformation Assurance (IA)Assessment and Authorization (A&A)Risk Managed Framework (RMF)Memorandums of Understanding (MOU)Interconnection Security Agreements (ISA)Risk Acceptance Letters (RAL)Continuous Monitoring (CONMON)security analysisrisk assessmentsincident responsesecurity compliance continuous monitoringsecurity assessments and auditstechnical reports and briefings
Hard Skills
cybersecurityInformation Assurance (IA)information system security policiesinformation system security standardsinformation system security directivesclassified computing domainssecurity analysisthreatsvulnerabilitiesinternal interfacescompliance assessmentindustry and government standardsAssessment and Authorization (A&A) processesRisk Managed Framework (RMF)Memorandums of Understanding (MOU)Interconnection Security Agreements (ISA)Risk Acceptance Letters (RAL)Continuous Monitoring (CONMON)security posture integrityauditing systemsrisk assessmentsrisk investigationsrisk mitigationsincident responsehardware/software inventory assessmentstechnical reports and briefingssecurity assessmentssecurity auditsroot cause identificationcorrective actioninformation security best practicesinformation security policiesinformation security standardsguidelines and proceduresmentor and guidance to teams
Soft Skills
technical leadershipspokesperson communicationadvising management and customerscoordination with government customers and suppliersmentoringpresenting technical reports and briefingsteam leadershipinvestigative communication
Keywords for Your Resume
Cybersecurity - Information System Security Manager (ISSM)Information System Security ManagerISSMCybersecurityInformation Assurance (IA)technical leaderclassified computing domainsInformation System Security policiesInformation System Security standardsInformation System Security directivesAssessment and Authorization (A&A)Risk Managed Framework (RMF)Memorandums of Understanding (MOU)Interconnection Security Agreements (ISA)Risk Acceptance Letters (RAL)Continuous Monitoring (CONMON)security analysisthreatsvulnerabilitiesinternal interfacescompliance with accepted industry and government standardsrisk assessmentsrisk mitigationsincident responsehardware/software inventory assessmentssecurity compliance continuous monitoringsecurity assessments and auditstechnical reports and briefingsroot causescorrective actioninformation security best practices
Deal Breakers
Must have cybersecurity and Information Assurance (IA) background, Must be able to lead and implement Assessment and Authorization (A&A) processes under the Risk Managed Framework (RMF)
Get matched to jobs like this
Luna finds roles that fit your skills and career goals — no endless scrolling required.
Create a Free Profile