Today
Top Secret/SCI
$147,000 - $204,000
Full Scope Polygraph
IT - Security
Fort Meade, MD (On-Site/Office)
Job Description
SALARY RANGE $147,000 - $204,000/year
DUTIES As a successful candidate for the ISSM II role, you will provide management support for a program, organization, system, or enclave's Information Assurance program. Provide management support for proposing, coordinating, implementing, and enforcing Information System Security policies, standards, and methodologies. Manage operational security posture for an Information System or program to ensure Information System Security policies, standards, and procedures are established and followed. Provide management of security aspects of the Information System and perform day-to-day security operations of the system. Assist ISSEs and ISSOs with evaluating security solutions to ensure they meet security requirements for processing classified information. Manage the performance of vulnerability/risk assessment analysis to support security authorization. Provide management support to configuration management (CM) for information system security software, hardware, and firmware. Manage changes to systems and assess the security impact of those changes. Manage the process and preparation of documentation reviews to include System Security Plans (SSPs), Risk Assessment Reports, Certification and Accreditation (C&A) packages, and System Requirements Traceability Matrices (SRTMs). Support security authorization activities in compliance with NSA/CSS Risk Management Framework (RMF) process and DoD Information Assurance Certification and Accreditation Process (DIACAP).
Required Skills
SKILLS
• Perform requirements gathering and analysis of said requirements
• Perform functional analysis to identify required tasks and their interrelationships
• Identify and map the current security infrastructure as a foundation to define future programs
• Collaborate with engineers on systems integration efforts
• Plan and coordinate the implementation of IT security programs and policies
• Analyze user needs to determine functional and cross-functional requirements
• Gather and organize technical information about an organization's mission goals and needs, existing security products, and ongoing programs in the multi-level security arena
• Perform functional allocation and identify resources required for each task
• Perform risk analysis that also includes risk assessment
• Enable Government planning, coordination, and oversight of organizational implementation of information security services
• Enable the design and implementation of future IT systems and related security
• Assist Program Managers with administrative and technical oversight of specific programs within the portfolio
• Facilitate issue resolution through integrated product teams and Technical Exchange Meetings (TEM)
• Provide support for a program, organization, system, or enclave's information assurance program
• Provide daily oversight and direction to contractor ISSOs
• Oversee efforts of engineering staff to design, develop, engineer, and implement solutions to security requirements
• Interact with customers, IT staff, and high-level corporate officers to define and achieve required Cybersecurity objectives
• Serve as the Program's ISSM
• Enable the Government with the development and implementation of NSA IT security services
• Collaborate with engineers on systems integration and life cycle requirements
• Advise Program Managers on administrative and technical oversight matters in regard to portfolio programs
QUALIFICATIONS Ten (10) years of work-related experience in the field of security authorization is required.
Experience in the following areas is required: knowledge of current security tools, hardware/software
security implementation, communication protocols, or encryption tools and techniques. Familiarity with
commercial security products, security authorization techniques, security incident management, and PKI
and authorization services. A bachelor's degree in Computer Science, Cyber Security, or IT Engineering is
required. In lieu of a Bachelor's degree, an additional four (4) years of work-related experience may be
substituted
CERTIFICATIONS AND TECHNICAL PROFICIENCIES DoD 8570 compliance with IAM II is required.
SALARY RANGE $147,000 - $204,000/year
DUTIES As a successful candidate for the ISSM II role, you will provide management support for a program, organization, system, or enclave's Information Assurance program. Provide management support for proposing, coordinating, implementing, and enforcing Information System Security policies, standards, and methodologies. Manage operational security posture for an Information System or program to ensure Information System Security policies, standards, and procedures are established and followed. Provide management of security aspects of the Information System and perform day-to-day security operations of the system. Assist ISSEs and ISSOs with evaluating security solutions to ensure they meet security requirements for processing classified information. Manage the performance of vulnerability/risk assessment analysis to support security authorization. Provide management support to configuration management (CM) for information system security software, hardware, and firmware. Manage changes to systems and assess the security impact of those changes. Manage the process and preparation of documentation reviews to include System Security Plans (SSPs), Risk Assessment Reports, Certification and Accreditation (C&A) packages, and System Requirements Traceability Matrices (SRTMs). Support security authorization activities in compliance with NSA/CSS Risk Management Framework (RMF) process and DoD Information Assurance Certification and Accreditation Process (DIACAP).
Required Skills
SKILLS
• Perform requirements gathering and analysis of said requirements
• Perform functional analysis to identify required tasks and their interrelationships
• Identify and map the current security infrastructure as a foundation to define future programs
• Collaborate with engineers on systems integration efforts
• Plan and coordinate the implementation of IT security programs and policies
• Analyze user needs to determine functional and cross-functional requirements
• Gather and organize technical information about an organization's mission goals and needs, existing security products, and ongoing programs in the multi-level security arena
• Perform functional allocation and identify resources required for each task
• Perform risk analysis that also includes risk assessment
• Enable Government planning, coordination, and oversight of organizational implementation of information security services
• Enable the design and implementation of future IT systems and related security
• Assist Program Managers with administrative and technical oversight of specific programs within the portfolio
• Facilitate issue resolution through integrated product teams and Technical Exchange Meetings (TEM)
• Provide support for a program, organization, system, or enclave's information assurance program
• Provide daily oversight and direction to contractor ISSOs
• Oversee efforts of engineering staff to design, develop, engineer, and implement solutions to security requirements
• Interact with customers, IT staff, and high-level corporate officers to define and achieve required Cybersecurity objectives
• Serve as the Program's ISSM
• Enable the Government with the development and implementation of NSA IT security services
• Collaborate with engineers on systems integration and life cycle requirements
• Advise Program Managers on administrative and technical oversight matters in regard to portfolio programs
QUALIFICATIONS Ten (10) years of work-related experience in the field of security authorization is required.
Experience in the following areas is required: knowledge of current security tools, hardware/software
security implementation, communication protocols, or encryption tools and techniques. Familiarity with
commercial security products, security authorization techniques, security incident management, and PKI
and authorization services. A bachelor's degree in Computer Science, Cyber Security, or IT Engineering is
required. In lieu of a Bachelor's degree, an additional four (4) years of work-related experience may be
substituted
CERTIFICATIONS AND TECHNICAL PROFICIENCIES DoD 8570 compliance with IAM II is required.
group id: 91130336