Overview
On Site
Full Time
Skills
Information Systems
ISSM
Regulatory Compliance
Collaboration
Testing
Computer Hardware
IT Security
Cyber Security
Information Security
Information Assurance
Network
Software Design
Documentation
Risk Management
Auditing
Project Management
Leadership
Risk Assessment
CISSP
Customer Engagement
CISM
Security Clearance
Job Details
This specialty covers cyber security, information assurance, and compliance design, integration, implementation, modification, and coordination of the installation, testing, operation, and disposition of hardware and software systems. Functions will include coordinating with industry partners on their digital infrastructure. Be the liaison between industry and the Program Security Office and the Approving Official. Reviewing specifications, documentation, monitoring the availability, serviceability, and recoverability of installed technology security systems, reviewing cyber security procedures and tools, reviewing systems configuration, the installation and integration of system patches updates, and enhancements, and ensuring the rigorous application of information security/information assurance policies, principles, and practices.
Evaluate risk assessments and provide recommendations for system, network, and application design, implementation, and operation of enterprise-wide systems
Evaluate vulnerability assessments of enterprise-wide or complex systems and networks to identify deviations from acceptable configurations or policies
Monitor the corrective actions of enterprise-wide system audits
Review companies Plan of Action and Milestones (POAM)
Meet with stakeholders regularly to assess needs and requirements
Support certification and accreditation through the coordinating documentation
Evaluate the establishment of program control processes to ensure risk mitigation
Review periodic audits of systems
Evaluate implementation of required policies, procedures, and configurations
Apply project management principles and methods to the leadership of security tasks or projects
Coordinate communications regarding policies, procedures, and best practices for vulnerability and risk assessments
Preferred/Desired Experience:
Senior: 8+ years related experience
SME: 12+ years related experience
Education Requirements:
Senior: Bachelor's Degree or higher
SME: Bachelor's Degree required; master's degree preferred
Or an equivalent combination of education and experience
Certification Requirements:
IAM level 2- CISSP, CASP CE+, CGRC, or CISM
Clearance Requirements:
Active Top SECRET clearance with SCI Eligibility.
U.S. Citizenship is required for this position.
#LI-MS1
#MTSI
#Dragon
#Buckeye
Evaluate risk assessments and provide recommendations for system, network, and application design, implementation, and operation of enterprise-wide systems
Evaluate vulnerability assessments of enterprise-wide or complex systems and networks to identify deviations from acceptable configurations or policies
Monitor the corrective actions of enterprise-wide system audits
Review companies Plan of Action and Milestones (POAM)
Meet with stakeholders regularly to assess needs and requirements
Support certification and accreditation through the coordinating documentation
Evaluate the establishment of program control processes to ensure risk mitigation
Review periodic audits of systems
Evaluate implementation of required policies, procedures, and configurations
Apply project management principles and methods to the leadership of security tasks or projects
Coordinate communications regarding policies, procedures, and best practices for vulnerability and risk assessments
Preferred/Desired Experience:
Senior: 8+ years related experience
SME: 12+ years related experience
Education Requirements:
Senior: Bachelor's Degree or higher
SME: Bachelor's Degree required; master's degree preferred
Or an equivalent combination of education and experience
Certification Requirements:
IAM level 2- CISSP, CASP CE+, CGRC, or CISM
Clearance Requirements:
Active Top SECRET clearance with SCI Eligibility.
U.S. Citizenship is required for this position.
#LI-MS1
#MTSI
#Dragon
#Buckeye
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.