Information Systems Security Manager (ISSM)

General Dynamics Information TechnologyMiami, FL
9hRemote

About The Position

Own your career as a Information Systems Security Manager at GDIT. Here, you’ll have the opportunity to build strong lines of cyber defense using cutting-edge technologies. Your work in cyber security at GDIT will have an impact on securing our clients’ missions and ensuring we anticipate the threats of tomorrow. GDIT is seeking a Information Systems Security Manager who preferably has an active secret clearance with ability to obtain a top secret clearance. The Cyber Security team is responsible to ensure the system remains in compliance within the Risk Management Framework (RMF) and associated policies, procedures and guidelines; provide technical expertise on system design, implementation, and accreditation, and provide oversight and coordination for multiple contractors supporting program objectives.

Requirements

  • Familiarity with DoW RMF Processes, DoDI 8510.01/NIST SP 800-53.
  • Years of Experience: 8+ years of cybersecurity-related experience or equivalent including 4+ years of ISSM experience.
  • Education: B.S., Computer Science, Information Systems, Information Security, Electrical Engineering, or related field (or equivalent).
  • ISC2 Certified Information Systems Security Professional (CISSP).
  • Active Secret Clearance with ability to obtain Top Secret.
  • Location: Miami, FL or Remote with up to 50% travel.

Nice To Haves

  • CEH, GICSP, CCNA-Security, or other IA related certifications.
  • Familiarity with the SAFe Scaled Agile Framework and Lean Agile operations

Responsibilities

  • Responsible for developing and maintaining Risk Management Framework (RMF) security, accreditation, and Authorization to Operate (ATO) approval.
  • Manages the security of information systems assets and the protection of systems from intentional or inadvertent access or destruction.
  • Recognizes potential, successful, and unsuccessful intrusion attempts and compromises thorough reviews and analyses of relevant event detail and summary information.
  • Perform preliminary forensic evaluations of internal systems.
  • Interfaces with client to understand their security needs and oversees the development and implementation of procedures to accommodate them.
  • Ensures that the user community understands and adheres to necessary procedures to maintain security.
  • Weighs business needs against security concerns and articulates issues to management and/or customers.
  • Maintains current knowledge of relevant technology as assigned.
  • Provides guidance in the creation and maintenance of Standard Operating Procedures and other similar documentation.
  • Maintains current knowledge of relevant technology as assigned.
  • Lead all security engineers within the program.
  • Develops and maintains System Security Plan, Security Assessment Plan and Procedures, Security Assessment Report, RMF System Diagrams, Incident Response Plan, Master Assessment Datasheet, RMF, and other deliverable artifacts.
  • Coordinates and conducts CCRI/ATO activities.
  • Ensure systems are compliant with DoD Security Standards.
  • Ensures the system achieves and maintains RMF ATO status.
  • Uses data collected from a variety of cyber defense tools (e.g., IDS alerts, firewalls, network traffic logs) to analyze events that occur within their environments for the purposes of mitigating threats.
  • Interprets, analyzes, and reports all events and anomalies in accordance with computer network directives, including initiating, responding, and reporting discovered events.
  • Evaluates, tests, recommends, coordinates, monitors and maintains cybersecurity policies, procedures and systems, including access management for hardware, firmware and software.
  • Develop and ensures that cybersecurity plans, controls, processes, standards, policies and procedures are aligned with cybersecurity standards.
  • Identifies security risks and exposures, determines the causes of security violations and suggests procedures to halt future incidents and improve security.
  • Develops techniques and procedures for conducting cybersecurity risk assessments and compliance audits, the evaluation and testing of hardware, firmware and software for possible impact on system security, and the investigation and resolution of security incidents such as intrusion, frauds, attacks or leaks.

Benefits

  • 401K with company match.
  • Comprehensive health and wellness packages.
  • Internal mobility team dedicated to helping you own your career.
  • Professional growth opportunities including paid education and certifications.
  • Cutting-edge technology you can learn from.
  • Rest and recharge with paid vacation and holidays.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service