user avatar

Information System Security Manager (ISSM)

Cyber Bat Inc

Posted today
Top Secret/SCI
Unspecified
Polygraph
IT - Security
Annapolis Junction, MD (On-Site/Office)

• Perform requirements gathering and analysis of said requirements • Perform functional analysis to identify required tasks and their interrelationships • Identify and map current security infrastructure as a foundation to define future programs • Collaborate with engineers on systems integration efforts • Plan and coordinate implementation of IT security programs and policies • Analyze user needs to determine functional and cross-functional requirements • Gather and organize technical information about an organization's mission goals and needs, existing security products, and ongoing programs in the multi-level security arena • Perform functional allocation and identify resources required for each task • Perform risk analysis that also includes risk assessment • Enable Government planning, coordination, and oversight of organizational implementation of information security services • Enable design and implementation of future IT systems and related security • Assist Program Managers with administrative and technical oversight with specific program's within the portfolio • Facilitate issue resolution through integrated product teams and Technical Exchange Meetings (TEM) • Provide support for a program, organization, system, or enclave's information assurance program • Provide daily oversight and direction to contractor ISSOs • Oversee efforts of engineering staff to design, develop, engineer and implement solutions to security requirements • Interact with customers, IT staff, and high-level corporate officers to define and achieve required Cybersecurity objectives • Serve as the Program's ISSM • Collaborate with engineers on systems integration and life cycle requirements • Advise Program Managers on administrative and technical oversight matters in regards to portfolio programs • Enable Program Managers with administrative and technical oversight assistance with specific program's within the portfolio • Enable design and implementation of future IT systems and related security.

Qualifications

Qualifications: Twelve (12) years of work-related experience in the field of security authorization is required. Experience in the following areas is required: knowledge of current security tools, hardware/software security implementation; communication protocols; or encryption tools and techniques. Familiarity with commercial security products, security authorization techniques, security incident management, and PKI and authorization services. Bachelor's degree in Computer Science, Cyber Security or IT Engineering is required. In lieu of a Bachelor's degree, an additional four (4) years of work-related experience may be substituted. DoD 8570 compliance with IAM III is required.
group id: 91127831
N
Name Hidden

Match Score

Powered by IntelliSearchâ„¢
image match score
Create an account or Login to see how closely you match to this job!