PROCESSING APPLICATION
Hold tight! We’re comparing your resume to the job requirements…

ARE YOU SURE YOU WANT TO APPLY TO THIS JOB?
Based on your Resume, it doesn't look like you meet the requirements from the employer. You can still apply if you think you’re a fit.
Job Requirements of Information System Security Manager 3 with Security Clearance:
-
Employment Type:
Full-Time
-
Location:
Baltimore, MD (Onsite)
Do you meet the requirements for this job?
Information System Security Manager 3 with Security Clearance
Your effort and expertise are crucial to the success and execution of this impactful mission that is critical in ensuring mission success through Security Engineering, Vulnerability Testing, Penetration Testing, Risk Management and Assessment, Insider Threat Analysis, and IT Policies and Procedures by improving, protecting, and defending our Nation's Security. Job Description:
Provide management support for a program, organization, system, or enclave's Information Assurance program. Provide management support for proposing, coordinating, implementing, and enforcing Information System Security policies, standards, and methodologies. Manage operational security posture for an Information System or program to ensure Information System Security policies, standards, and procedures are established and followed. Provide management of security aspects of the Information System and perform day-to-day security operations of the system. Assist ISSEs and ISSOs with evaluating security solutions to ensure they meet security requirements for processing classified information. Manage the performance of vulnerability/risk assessment analysis to support security authorization. Provide management support to configuration management (CM) for information system security SW, HW, and FW. Manage changes to systems and assess the security impact of those changes. Manage the process and preparation of documentation reviews to include SSPs, Risk Assessment Reports, C&A packages, and System Requirements Traceability Matrices (SRTMs). Support security authorization activities in compliance with DoD RMF process and DIACAP.
The Level 3 Information System Security Manager shall possess the following capabilities: * Perform requirements gathering and analysis of said requirements
* Perform functional analysis to identify required tasks and their interrelationships
* Identify and map current security infrastructure as a foundation to define future programs
* Collaborate with engineers on systems integration efforts
* Plan and coordinate implementation of IT security programs and policies
* Analyze user needs to determine functional and cross-functional requirements
* Gather and organize technical information about an organization's mission goals and needs, existing security products, and ongoing programs in the multi-level security arena
* Perform functional allocation and identify resources required for each task
* Perform risk analysis that also includes risk assessment
* Enable Government planning, coordination, and oversight of organizational implementation of information security services
* Enable design and implementation of future IT systems and related security
* Assist Program Managers with administrative and technical oversight with specific program's within the portfolio
* Facilitate issue resolution through integrated product teams and Technical Exchange Meetings (TEM)
* Provide support for a program, organization, system, or enclave's information assurance program
* Provide daily oversight and direction to contractor ISSOs
* Oversee efforts of engineering staff to design, develop, engineer and implement solutions to security requirements
* Interact with customers, IT staff, and high-level corporate officers to define and achieve required Cybersecurity objectives
* Serve as the Program's ISSM
* Enable the Government with the development and implementation of DoD IT security services
* Collaborate with engineers on systems integration and life cycle requirements
* Advise Program Managers on administrative and technical oversight matters in regards to portfolio programs
* Enable Program Managers with administrative and technical oversight assistance with specific program's within the portfolio
* Enable design and implementation of future IT systems and related security.Qualifications: * 12 years of work-related experience in the field of security authorization is required. Experience in the following areas is required: knowledge of current security tools, HW/SW security implementation; communication protocols; or encryption tools and techniques.
* Familiarity with commercial security products, security authorization techniques, security incident management, and PKI and authorization services.
* Bachelor's degree in Computer Science or a related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Systems Engineering, Mathematics, Computer Forensics, Cybersecurity, Information Technology, Information Assurance, Information Security, and Information Systems) is required.
* In lieu of a Bachelor's degree, an additional 4 years of work-related experience may be substituted.Certifications Required: * DoD 8570 compliance with IAM III is required.Position requires active Security Clearance with appropriate Polygraph
Recommended Skills
- Administration
- Classified Information
- Coaching And Mentoring
- Computer Engineering
- Configuration Management
- Cryptography
Help us improve Sologig by providing feedback about this job: Report this job
Job ID: 8340_8137894
Sologig TIP
For your privacy and protection, when applying to a job online, never give your social security number to a prospective employer, provide credit card or bank account information, or perform any sort of monetary transaction. Learn more.
By applying to a job using Sologig you are agreeing to comply with and be subject to the Sologig Terms and Conditions for use of our website. To use our website, you must agree with the Terms and Conditions and both meet and comply with their provisions.