L3Harris Greenville, Texas, is seeking an Information System Security Manager (ISSM) in support of Defense Counterintelligence and Security Agency (DCSA) programs. Duties for successful candidates include, but are not limited to reviewing and developing information system accreditation/certification support documentation; interacting with customers when changes occur that may affect the information system accreditation/certification; performing system and network self-inspections; identifying information system vulnerabilities and implementing countermeasures; Responsibility for program policy creation/update; maintaining information system security records. The ISSM will provide assistance on IT and information system security issues that may affect the mission of the customer. This ISSM reports to the Director of Cyber Intelligence for the site. Develop and conduct risk assessment procedures for verification of RMF/Assessment and Authorization (A&A) safeguards to meet various regulatory requirements based upon government regulations and NIST 800 series (800-53, etc.) guidelines. Author and provide oversight of various artifacts supporting RMF package artifacts to include the System Security Plan (SSP), Security Control Traceability Matrix (SCTM), Plan of Actions & Milestones (POA&M), Continuous Monitoring (ConMon) Plan, CONOPS, and other RMF BoE artifacts. Coordinate with internal/external partners to establish system security designs and validate compliance requirements. Responsible for analyzing and/or administering security controls for information systems. The selected candidate will act as a member of a diverse security team and participate in Engineering and Configuration Review Boards and Working Groups to develop secure system solutions. Monitor IA Program compliance by performing periodic self-inspections, tests and reviews of the IS to ensure that systems are operating as authorized/accredited and that conditions have not changed. Configuration of change management processes (hardware/software, account Management, Disposition, Assured File Transfers (AFT) and related documentation in accordance to policies and procedures. Review audit data of the IS and IS components (technical & physical) for anomalous or unauthorized activities. Participate in documenting and publishing security related workflows and procedures to mitigate vulnerabilities and recommend changes to system or system components. Conduct Cybersecurity training, briefings, and presentations for multiple levels of business. Provide leadership and oversight to ISSOs. Participate in interdepartmental projects and provides council on Cybersecurity policies and procedures.
Stand Out From the Crowd
Upload your resume and get instant feedback on how well it matches this job.
Job Type
Full-time
Career Level
Manager
Number of Employees
5,001-10,000 employees