This job is closed

We regret to inform you that the job you were interested in has been closed. Although this specific position is no longer available, we encourage you to continue exploring other opportunities on our job board.

System High Corporation - Hill Air Force Base, UT

posted 2 months ago

Full-time - Mid Level
Hill Air Force Base, UT
Professional, Scientific, and Technical Services

About the position

The Information Systems Security Manager II (ISSM II) at System High Corporation is responsible for overseeing the security of information systems, particularly within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies. This role serves as a principal advisor on technical and security matters, ensuring compliance with security policies and frameworks, and providing guidance on risk management and security assessments. The ISSM II will lead the development and implementation of security programs, conduct risk assessments, and ensure that all personnel receive necessary training to maintain a secure information environment.

Responsibilities

  • Perform oversight of the development, implementation, and evaluation of information system security program policy.
  • Develop and oversee operational information systems security implementation policy and guidelines based on the Risk Management Framework (RMF).
  • Advise customers on RMF assessment and authorization issues.
  • Perform risk assessments and make recommendations to DoD agency customers.
  • Advise government program managers on security testing methodologies and processes.
  • Evaluate authorization documentation and provide written recommendations for authorization to government PMs.
  • Develop and maintain a formal Information Systems Security Program.
  • Ensure that all IAOs, network administrators, and other cybersecurity personnel receive necessary technical and security training.
  • Develop, review, endorse, and recommend action by the AO or DAO of system assessment documentation.
  • Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media.
  • Develop and execute security assessment plans that include verification of required features and assurances.
  • Maintain a repository for all system authorization documentation and modifications.
  • Develop policies and procedures for responding to security incidents, including investigating and reporting security violations.
  • Ensure proper protection or corrective measures are taken when an incident or vulnerability is discovered.
  • Establish data ownership and responsibilities for each authorization boundary.
  • Develop and implement an information security education, training, and awareness program.
  • Evaluate threats and vulnerabilities to ascertain additional safeguards needed.
  • Assess changes in the system and operational needs that could affect authorization.
  • Review AIS assessment plans and coordinate with PSO on approval of external information systems.
  • Conduct periodic assessments of the security posture of authorization boundaries.
  • Institute and implement a Configuration Control Board (CCB) charter.
  • Ensure configuration management for security-relevant changes to software, hardware, and firmware.
  • Conduct periodic testing to evaluate the security posture of IS.
  • Ensure system recovery and reconstitution processes are developed and monitored.
  • Ensure all authorization documentation is current and accessible to authorized individuals.
  • Participate in self-inspections and periodically review system security to accommodate changes to policy or technology.
  • Coordinate technical security issues outside of area of expertise with ISSE.
  • Provide expert research and analysis in support of expanding programs and responsibilities.
  • Develop Assured File Transfers (AFT) in accordance with the JSIG.
  • Provide leadership, mentoring, and quality assurance for Cyber Security and IT team members.

Requirements

  • 7 years of experience in information security analysis and management.
  • Bachelor's degree or equivalent experience (4 years).
  • Current Top Secret Clearance with SCI Eligibility.
  • Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level 2 or Information Assurance Manager Level 2 within 6 months of hire.
  • Prior performance in roles such as ISSO or ISSM.
  • Ability to regularly lift up to 50 lbs.

Nice-to-haves

  • Experience with Special Access Programs (SAPs).
  • Familiarity with Joint Special Access Program Implementation Guide (JSIG).
  • Knowledge of security testing methodologies and processes.

Benefits

  • Competitive salary range of $113K - $143K per year.
  • Military friendly employer with opportunities for veterans.
  • Inclusive culture that values diverse backgrounds.
Job Description Matching

Match and compare your resume to any job description

Start Matching
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service