Description
Leidos Chief Information Security Office, reporting through our Digital Modernization sector, has an opening for an Information Systems Security Manager (ISSM) in our St. Petersburg, FL office. The ISSM will support our Defense Systems business, overseeing several DCSA-approved Collateral Information Systems and maintaining accreditation throughout the system lifecycle. In this role, you will serve as the Subject Matter Expert (SME) within the Information Assurance (IA) technical domain, supporting enclaves across the enterprise. You will oversee day-to-day information system security operations and may manage junior Information System Security Officers (ISSOs), resolve complex problems, and develop innovative solutions to meet changing security requirements. To be successful in this role, you must be able to work independently with a team of analysts, information technology management and staff, and site management.
Location: Fully onsite, St Petersburg, FL office
Clearance: Active Secret Clearance with ability to obtain Top Secret.
Primary Responsibilities
This role may include a combination of duties to protect information and maintain security controls for an entire system, site, or program to reduce risk.
• Develop and lead Information Security projects from conceptualization to full deployment and user acceptance.
• Create comprehensive training programs on information assurance, data security, cybersecurity best practices, and relevant policies and procedures.
• Design training materials, including manuals, operating procedures, and presentations, and assign online courses and other resources.
• Coordinate technical training on security tools, software, and technologies used within the organization to enhance the skills of IT staff and other relevant personnel.
• Develop and lead training on responding to security incidents, including reporting procedures, containment, eradication, recovery, and post-incident analysis.
• Implement and manage the Risk Management Framework (RMF) Continuous Monitoring process by utilizing an automated ticketing system, ensuring accurate tracking, monitoring, and reporting of security controls, vulnerabilities, and remediation efforts within the organization's information systems.
• Perform continuous monitoring, analysis, and response to Information System network and security events.
• Document compliance activities in accordance with the governing authority-approved authorization package.
• Support the maintenance of system accreditation packages, including SSPs, CONOPS, security control evidence, POA&Ms, and continuous monitoring documentation.
• Develop procedures and documentation to ensure compliance with Configuration Management (CM) for security-relevant Information System (IS) software, hardware, and firmware.
• Facilitate CCB meetings; assess security impacts of proposed changes; document change requests, approvals, and implementation evidence.
• Ensure systems are operated, maintained, and disposed of in accordance with the governing authority-approved authorization package and customer directives.
• Evaluate proposed changes or additions to the information system and advise senior site leadership of the security relevance.
• Develop and conduct cybersecurity education and training, mentor other information assurance professionals in cybersecurity and secure software development practices.
• Participate in internal/external security audits/assessments/inspections coordinating corrective actions as necessary; participate in the risk management process; perform risk assessments and Continuous Monitoring
• Lead investigations of computer security violations and incidents, report as necessary to the Facility Security and Senior Program Managers.
• Ensure proper protection and/or corrective measures have been taken when an incident or vulnerability has been discovered.
• Work with the Facility Security Officer (FSO), developing, implementing, and managing a formal Information Security/Information Systems Security Program.
• Develop, implement, and enforce information security policies and procedures.
• Author, review, and update IS Authorization documentation (Body of Evidence) to support IS Assessment and Authorization activities
Basic Qualifications
• An active DoD Secret clearance is required for consideration.
• Bachelor’s degree in an IT-related subject matter area from an accredited college or university and 8+ years of experience in being in an operational cyber security-specific role (e.g., information system security manager, information system security officer, cyber security specialist) or have 12+ years of experience in an IT related position with at least 10 of those years in an operational cyber security specific role.
• At least 5 years of IA Cyber management experience.
• Current DoD 8570 IAM Level II certified.
• Past or current ISSM/ISSO experience.
• Detailed understanding of the Risk Management Framework (RMF), National Institute of Standards and Technology (NIST), and Committee on National Security Systems (CNSS) cyber security requirements and guidance, cybersecurity-related risk management techniques.
• Working knowledge in maintaining compliance with National Industrial Security Program Operating Manual (NISPOM) and DCSA Assessment and Authorization Process Manual (DAAPM) / DCSA Assessment and Authorization Guide (DAAG) security requirements for classified information systems.
• Familiarity with network technologies (LAN & WAN) and best practices within a classified environment, including crypto and key management.
• Working knowledge of Microsoft Windows (workstation & server) and Linux operating systems in a secure network environment.
• Experience with compliance and vulnerability scanning tools (e.g., Tenable, Splunk, ACAS, STIG Viewer).
• Experience with workflow, documentation, and configuration/change management tools (e.g., JIRA, Confluence, eMASS).
• Must be able to work in a constantly changing regulatory environment with short-, mid-and long-term timelines for remediating any non-compliance.
• Must work well within a team environment and adapt quickly to change.
• Excellent verbal and written communication skills.
Preferred Qualifications
• Current DoD Top Secret clearance
• CISSP
• Proficient in using Microsoft Windows and Linux operating systems and cloud computing.
• Experience with developing policies, procedures, and guidance, including providing artifacts for the RMF
Come break things (in a good way). Then build them smarter.
We're the tech company everyone calls when things get weird. We don’t wear capes (they’re a safety hazard), but we do solve high-stakes problems with code, caffeine, and a healthy disregard for “how it’s always been done.”
Original Posting:
December 18, 2025
For U.S. Positions: While subject to change based on business needs, Leidos reasonably anticipates that this job requisition will remain open for at least 3 days with an anticipated close date of no earlier than 3 days after the original posting date as listed above.
Pay Range:
Pay Range $107,900.00 - $195,050.00
The Leidos pay range for this job level is a general guideline only and not a guarantee of compensation or salary. Additional factors considered in extending an offer include (but are not limited to) responsibilities of the job, education, experience, knowledge, skills, and abilities, as well as internal equity, alignment with market data, applicable bargaining agreement (if any), or other law.
About Leidos
Leidos is an industry and technology leader serving government and commercial customers with smarter, more efficient digital and mission innovations. Headquartered in Reston, Virginia, with 47,000 global employees, Leidos reported annual revenues of approximately $16.7 billion for the fiscal year ended January 3, 2025. For more information, visit www.Leidos.com.
Pay and Benefits
Pay and benefits are fundamental to any career decision. That's why we craft compensation packages that reflect the importance of the work we do for our customers. Employment benefits include competitive compensation, Health and Wellness programs, Income Protection, Paid Leave and Retirement. More details are available at www.leidos.com/careers/pay-benefits.
Securing Your Data
Beware of fake employment opportunities using Leidos’ name. Leidos will never ask you to provide payment-related information during any part of the employment application process (i.e., ask you for money), nor will Leidos ever advance money as part of the hiring process (i.e., send you a check or money order before doing any work). Further, Leidos will only communicate with you through emails that are generated by the Leidos.com automated system – never from free commercial services (e.g., Gmail, Yahoo, Hotmail) or via WhatsApp, Telegram, etc. If you received an email purporting to be from Leidos that asks for payment-related information or any other personal information (e.g., about you or your previous employer), and you are concerned about its legitimacy, please make us aware immediately by emailing us at LeidosCareersFraud@leidos.com.
If you believe you are the victim of a scam, contact your local law enforcement and report the incident to the U.S. Federal Trade Commission.
Commitment to Non-Discrimination
All qualified applicants will receive consideration for employment without regard to sex, race, ethnicity, age, national origin, citizenship, religion, physical or mental disability, medical condition, genetic information, pregnancy, family structure, marital status, ancestry, domestic partner status, sexual orientation, gender identity or expression, veteran or military status, or any other basis prohibited by law. Leidos will also consider for employment qualified applicants with criminal histories consistent with relevant laws.