Torch Technologies, Inc. · 3 hours ago
Information System Security Manager, Principal
Torch Technologies is a 100% employee-owned company providing superior research, development, and engineering services to the Federal Government and Department of Defense. They are seeking an Information System Security Manager, Principal to maintain the overall security posture of IT systems and serve as the primary cybersecurity technical advisor.
AerospaceAutomotiveComputerElectronicsInformation TechnologyNational SecurityRoboticsSoftware
Responsibilities
Serve as the primary cybersecurity technical advisor to the Authorizing Official (AO), Program Manager (PM) and Information System Owner (ISO)
Maintain the overall security posture of the IT systems, Conventional, PIT or otherwise within the respective organization, and be accountable for the implementation of DoDI 8510.01, Risk Management Framework (RMF) for DoD Information Technology (IT), (29 Dec 2020)
Perform the provisions and duties outlined in AFI 17-130, Cybersecurity Program Management, (13 Feb 2020) para 2.10
Perform ISSM responsibilities as outlined in AFMAN 17-1303, Air Force Cybersecurity Workforce Improvement Program, (12 May 2020) para 2.16 (Attachment 2), as well as, AFI 17-101 (6 Feb 2020)
Ensure IT professionals within the organization meet requirements outlined in AFMAN 17-1303
Develop the organization’s cybersecurity program for individual systems and IT programs overall to include cybersecurity architecture, requirements, objectives and policies, cybersecurity personnel, and cybersecurity processes and procedures
Control the continuous monitoring of systems within their purview to ensure compliance with cybersecurity policies
Perform the ISSM duties as outlined in DoDI 8510.01, DoDI 8500.01, AFI 17-101, AFI 17-130, and AFMAN 17-1303 for assigned systems/applications
Support implementation of the RMF
Assist in the development and maintenance a formal ISs security program and policies for their assigned area of responsibility
Assist in supporting the system/application A&A effort, to include assessing and guiding the quality and completeness of A&A activities, tasks, and resulting artifacts mandated by governing DoD and Air Force policies (i.e., RMF)
Ensure proper measures are taken when an IS incident or vulnerability is discovered IAW the respective systems authorized security program and policies
Maintain and report IS and PIT system assessment and authorization status and issues IAW DoD and USAF guidance
Provide direction to the ISSO IAW DoDI 8500.01, AFMAN 17-1303, As well as AFI 17-101 (6 Feb 2020)
Ensure that ISSOs are appointed in writing and provide oversight to certify they are following established cybersecurity policies and procedures
Coordinate with the organization's security manager to ensure issues affecting the organization's overall security are addressed appropriately
Ensure that ISOs and stewards associated with DoD information received, processed, stored, displayed, or transmitted on each DoD IS and PIT system are identified to establish accountability, access approvals, and special handling requirements
Maintain a repository for all organizational or system-level cybersecurity-related documentation
Monitor compliance with cybersecurity policy, as appropriate, and review the results of such monitoring
Ensure that cybersecurity inspections, tests, and reviews are synchronized and coordinated with affected parties and organizations
Ensure implementation of IS security measures and procedures including reporting incidents to the AO and appropriate reporting chains and coordinating system-level responses to unauthorized disclosures in accordance with DoD Manual 5200.01, Volume 3 for classified information or DoD Manual 5200.01, Volume 4 for Controlled Unclassified Information (CUI), respectively
Ensure handling of possible or actual data spills of classified information resident in ISs is conducted in accordance with DoD 5200.01, Volume 3
Act as the primary cybersecurity technical advisor to the AO for DoD IS and PIT systems under their purview or as assigned by USG
Ensure that cybersecurity-related events or configuration changes that may impact DoD IS and PIT systems authorization or security posture are formally reported to the AO and other affected parties, such as IOs, stewards, and AOs of interconnected DoD ISs
Ensure the secure configuration and approval of IT below the system level (i.e., products and IT services) in accordance with applicable guidance prior to acceptance into or connection to a DoD IS or PIT system
Obtain an ITIPS and EMASS account and ensure that ISSOs author, monitor, and record system information in applicable databases
Prepare and record system, security status, and portfolio management information into the Enterprise Mission Assurance Support Service (eMASS) for Federal Information Security Management Act (FISMA); ITIPS for general system information as required; Clinger Cohen Act; and other statutory compliance etc
Author, review, certify, and/or maintain information awareness (IA) and security management plans to include RMF Implementation Plans, System Security Management Plans, Information Support Plans, Program Protection Plans (PPPs), Security Risk Analyses, Security Vulnerability and Countermeasure Analyses, Security Concepts of Operations, Operational Security (OPSEC) Plans, and other system/network security related documents
Qualification
Required
U.S. Citizenship
15 years plus IAM Level III
OR Bachelor's degree with individual research development plus 7 years plus IAM Level III
OR Master's degree with individual research development plus 5 years plus IAM Level III
Ability to obtain and maintain a DoD Top Secret Clearance
In addition to the requirements in 3.10, the Cybersecurity ISSM is the primary cybersecurity technical advisor to the Authorizing Official (AO), Program Manager (PM) and Information System Owner (ISO)
The ISSM is appointed by the USG ISO or Information System (IS) PM, IAW AFI 17-130 para 2.9.2
ISSO are aligned under the ISSM and are overseen by the ISSM and therefore are a separate function
DoDM 8140 Information Assurance Management Level requirements: IAM Level I (Baseline), IAM Level II (Mid-Level), IAM Level III (Advanced)
Benefits
ESOP participation
401(k) match and safe-harbor contribution
Medical
Dental
Vision
Life insurance
Short-term disability
Long-term disability
Flexible spending accounts
Health Saving Accounts and Health Reimbursement Accounts
EAP
Education assistance
Paid time off
Holidays
Company
Torch Technologies, Inc.
Founded in October 2002, Torch is a 100% employee-owned business headquartered in Huntsville, Alabama.
Funding
Current Stage
Late StageTotal Funding
$15.16M2012-02-09Seed· $3.01M
2011-12-31Debt Financing· $12.15M
Leadership Team
Recent News
2025-12-02
Birmingham Business Journal
2025-01-08
Company data provided by crunchbase