Information Security Manager

Overview

On Site
$85 - $93
Contract - W2
Contract - 6 Month(s)

Skills

CISSP
Information Security
Cyber Security
Information Security Management
DoD
CISM
Information Systems Manager
CISO
CxO
risk assessments
compliance audits
information systems
assessments
cybersecurity

Job Details

Job Title: Information Security Manager
Location: Groton CT (onsite)
Pay rate: $ 93.33 an hour
Benefits: Medical, Dental, and Vision Coverage
Contract Duration: 6 months
(possibility of being permanent/extension)
Work Hours: 8-5 M-F

Required: CISSP, CISM, DOD background and knowledge with vendors, and suppliers. Interfacing with CISO and CxO levels

Job Description:

Key Responsibilities:

  • Acts as the first-line manager for CISO's Office
  • Responsible for the identification, tracking, and management of enterprise risks. This includes performing risk assessments and measuring the success and effectiveness of mitigation efforts.
  • Identifies, evaluates, tests, and implements appropriate security products, tools, and systems to establish and ensure a secure infrastructure.
  • Articulates security policies, guidelines, and standards to customers and developers.
  • Evaluates, tests, recommends, develops, coordinates, monitors, and maintains information systems (IS) and cyber security policies, procedures, and systems, including access management for hardware, firmware, and software.
  • Ensures that IS and cyber security architecture/designs, plans, controls, processes, standards, policies, and procedures are aligned with IS standards and overall IS and cyber security.
  • Identifies security risks and exposures, determines the causes of security violations, and suggests procedures to halt future incidents and improve security.
  • Develops techniques and procedures for conducting IS and cyber security risk assessments and compliance audits, the evaluation and testing of hardware, firmware, and software for possible impact on system security, and the investigation and resolution of security incidents.
  • Implements IS and cyber security policies and takes measures against intrusion, fraud, attacks, or leaks.
  • Provides leadership to managers; may also provide leadership to supervisors and/or professional staff.
  • Has accountability for the performance and results of multiple related units.
  • Develop departmental plans, including business, production, operational, and/or organizational priorities.
  • Controls resources and policy formation in the area of responsibility.
  • Decisions are guided by resource availability and functional objectives.