Information Technology Team Manager

LeidosAurora, CO
Onsite

About The Position

Leidos' Corporate Information Security Office, reporting through the Digital Modernization sector, is seeking an Information Technology Team Manager. This is a primarily hands-on technical role responsible for supporting and enhancing the enterprise IT environment across both Windows and Linux platforms with a focus on system reliability, performance, and security. The role includes leadership responsibilities involving team coordination, mentorship, and serving as the primary Information Technology (IT) decision maker. In this role, you will be accountable for the management and technical administration of the Information System (IS) in accordance with internal and external security requirements, overseeing day-to-day testing, implementation, deployment, maintenance, and administration of cyber systems or networks and their infrastructure hardware and software. To be successful, you need to be adaptable to diverse office situations, procedures, and demands, and maintain a proactive, solutions-oriented mindset. All work will be performed on-site at our Aurora, CO office. You must currently hold an active TS/SCI with Polygraph to qualify.

Requirements

  • Currently hold Active TOP SECRET / SCI clearance with Polygraph.
  • Bachelor's degree and 12 – 15 years related experience in Information Systems, Computer Science or related field or a master’s with 6 – 10 years of related experience. Additional relevant experience, training, and / or certifications may be considered in lieu of degree.
  • Current hold DoDM 8140 IAT Level II certification.
  • Hands on experience with Microsoft Windows operating systems (workstation & server), Linux, and system virtualization (multiple hypervisors) in a secure network environment.
  • Detailed understanding of the Risk Management Framework (RMF), NIST, ICD, and CNSS standards.
  • Experience with compliance scanning tools (e.g. SCAP) and vulnerability scanning tools (e.g. ACAS).
  • Familiarity with network technologies (LAN & WAN) and best practices within a classified environment to include crypto and key management.
  • Hands on experience with DISA Security Technical Implementation Guide (STIG) implementation and management.
  • Good writing and verbal presentation skills.
  • Must be able to work in a constantly changing regulatory environment with short-, mid-, and long-term timelines for remediating any non-compliance.
  • Must be able to work well within a team environment and able to adapt quickly to change.

Nice To Haves

  • Additional desired certifications include: CISSP, CCNA, CCSP, MCSE, and/or SANS GIAC, Linux RHCSA, CompTIA Linux, LCFS/LCFE, OS Certification (MCSE Win7 or other).
  • DoD Information Systems (IS) knowledge and experience.
  • Experience developing and delivering modern software, including micro services, containers, and hybrid cloud architectures.
  • Experience ServiceNow RMF Workflow Management Tool.
  • Familiarity with administering Microsoft SharePoint, including site collection configuration, permissions management, and document library/list administration.
  • Knowledge automated test tools such as Jenkins, SonarQube, JUnit, Cucumber, Selenium, JMeter.
  • Knowledge of agile development processes and DevOps tools such as Jira, Bitbucket, Confluence.
  • Knowledge of software development lifecycle concepts: Scaled Agile Framework (SAFe), DevOps, Continuous Integration (CI), and Continuous Deployment (CD).
  • Security hardening scripting/automation experience.
  • Strong knowledge of secure coding practices and vulnerability/quality scanning tools (e.g., Fortify, SonarQube).
  • Understanding of Sensitive Compartmented Information Facility (SCIF) standards.

Responsibilities

  • Administer and maintain Windows and Linux systems in a secure, stable, and scalable manner
  • Automate routine tasks using scripting (PowerShell, Bash, etc.)
  • Collaborate with IA, engineering, and operations teams to deliver IT services
  • Continuous upkeep, monitoring, analysis, and response to Information System, network and security events.
  • Develop procedures and documentation to ensure compliance with Configuration Management (CM) for security relevant IS software, hardware, and firmware.
  • Develop, implement and enforce Information Security Policies and Procedures.
  • Documents compliance activities in accordance with the governing authority approved authorization package.
  • Ensure proper protection and / or corrective measures have been taken when an incident or vulnerability has been discovered.
  • Ensures records are maintained for workstations, servers, software, routers, firewalls, network switches, and other relevant hardware/equipment throughout the information system's life cycle.
  • Ensures systems are operated, maintained, and disposed of in accordance with the governing authority approved authorization package and customer directives.
  • Evaluates proposed changes or additions to the information system and advises senior site leadership of the security relevance.
  • Help prioritize work, coordinate tasks, and drive accountability within the team
  • Lead / conduct security IS education and training.
  • Mentor other engineers in the art of cybersecurity and secure software development practices.
  • Monitor system health, respond to incidents, and implement long-term fixes
  • Participate and remain active within the Change Control Board (CCB) process.
  • Participate and remain active within local Scrum Boards.
  • Participates in internal/external security audits/inspections; performs risk assessments and Continuous Monitoring.
  • Personnel management for their team.
  • Provide technical guidance and mentorship to junior administrators (≈20% leadership)
  • Support compliance and security requirements (patching, STIGs, audits, etc.)
  • Training/Mentoring, education, PTO planning/development/submittal, remote work requests, end of day report requirements, quarterly check-ins, yearly reviews, and timesheet verifications/approvals.
  • Working with ISSM and FSO investigations of computer security violations and incidents, reporting as necessary to both the Facility Security and Senior Program Managers.
  • Working with the ISSM and FSO, author, review and update IS Authorization documentation (Body of Evidence) to support IS Assessment and Authorization activities.

Benefits

  • Competitive compensation
  • Health and Wellness programs
  • Income Protection
  • Paid Leave
  • Retirement
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service