Targeted Solutions Inc
Information System Security Manager (ISSM) III Hanscom AFB, MA (REQ-24-J-1026)
Targeted Solutions Inc, Boston, Massachusetts, us, 02298
Information System Security Manager (ISSM) III
The Information System Security Engineer (ISSE) is primarily responsible for conducting informationsystem security engineering activities with a focus on lifecycle of current systems and future requirementscoping. The position will collect and process the captured information security requirements and ensuresthat the requirements are effectively integrated into information systems through purposeful securityarchitecting, design, development, and configuration. The position is an integral part of the developmentteam designing and developing organizational information systems or upgrading legacy systems. The ISSEemploys best practices when implementing security requirements within an information system includingsoftware engineering methodologies, system/security engineering principles, secure design, securearchitecture, and secure coding techniques. This position's main function is working within Special AccessPrograms (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of theSecretary of Defense (OSD) and Military Compartments efforts. The position will provide "day-to-day"support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP)activities.
Perform oversight of the development, implementation and evaluation of information system securityprogram policy; special emphasis placed upon integration of existing SAP network infrastructures-Perform analysis of network security, based upon the Risk Management Framework (RMF) withemphasize on Joint Special Access Program Implementation Guide (JSIG) authorization processProvides expert support, research and analysis of exceptionally complex problems, and processesrelating to themProvides expert level consultation and technical services on all aspects of Information SecurityServes as technical expert to the Cybersecurity Assessment Program providing technical direction,interpretation and alternatives to complex problemsBuilds IA into systems deployed to operational environmentsAssists architects and systems developers in the identification and implementation of appropriateinformation security functionality to ensure uniform application of DoD and other agencies securitypolicy and enterprise solutionsEnforce the design and implementation of trusted relations among external systems and architectures.Assesses and mitigates system security threats/risks throughout the program life cycleContributes to the security planning, assessment, risk analysis, risk management, certification andawareness activities for system and networking operationsThinks independently and demonstrates exceptional written and oral communications skills. Appliesadvanced technical principles, theories, and conceptsContributes to the development of new principles, concepts, and methodologiesWorks on unusually complex technical problems and provides highly innovative and ingenioussolutionsLead a team of System Security Engineers and Certification and Accreditation Analysts responsiblefor ensuring the customers national and international security interests are protected as supportequipment are designed and testedRecommends cybersecurity software tools and assists in the development of software toolrequirements and selection criteria to include the development of product specific STIGs fromapplicable DISA SRGsReview ISSE related designs and provides security compliance recommendationsLeads technical teams in implementation of predetermined long-range goals and objectivesSupports customer and SAP community IA working groups, participate in SSE IPT reviewsProvides expert level consultation and technical services on all aspects of Information SecurityReview ISSE related designs and provides security compliance recommendationsDevelop and provide IA risk management recommendations to the customerProvide ISSE support for Mission and Training systems design and developmentAssist with development and maintenance of the Program Protection PlanAssist with site activation activities and design reviewsRepresent the customer in various ISSE related working groups, advisory groups, and advisorycouncil meetingsChair and or Co-Chair customer and SAP community IA working groups, participate in ISSE IPTreviewsRepresent the customer in various SSE related working groups, advisory groups, and advisorycouncil meetingsStrong background in Patch/Configuration management, DevOps, and tier 3 supportAssist team to design, integrate, and implement JSIG/RMF Continuous Monitoring tools andprocessesIntegrate COTS & GOTS products to collect, display and remediate a variety of automated systemsecurity and system operations/performance functions and metricsPerform security assessments of servers/network devices/security appliancesDevelop improvements to security assessments with regard to accuracy and efficiencyIntegrate ancillary monitoring tools/capabilities with the enterprise security information and eventmanagement (SIEM) and create/tailor complex event alarms/rules and summary reportsWrite and execute cybersecurity test procedures for validation of control complianceMonitor/analyze output of cybersecurity related tools for reportable security incidents and residualriskAnalyze technical risk of emerging cybersecurity tools and processesWork as part of a security incident response team as neededBuild operational Operations and Maintenance (O&M) checklists to maintain the service (daily,weekly, monthly, yearly O&M checklists); build Tactics, Techniques and Processes (TTPs) andStandard Operating Processes (SOPs) associated with service checklistsIntegrate/Develop new techniques to improve Confidentiality, Integrity, and Availability fornetworks/systems operating at various classification levelsAdvanced technical competency in one or more of the following supported platforms: MicrosoftWindows Server, Active Directory, Red Hat Enterprise Linux servers, MS Hyper-V/VMWare/ESx/Xen Hypervisors, Enterprise networking/firewalls/intrusion detection/preventionsystems, forensic analysis/vulnerability assessment, Group Policy management and configuration,Scripting, BMC Footprints, WSUS, , Lumension, Bitlocker, SQL Server 2012, TomCat, IIS,Windows Server 2012r2/2016, Win 10, Red Hat 6.5, Microsoft OfficeToolkits, SEIMs, LogRhythm, ACAS/Nessus/SCAP, mandatory/role-based access control concepts (e.g. SE Linux extensions to RHEL, PitBull, App Armor, and Sentris), video teleconferencing/VOIP,Oracle/MS SQL database security, and Apache/IIS Web server security
EDUCATION:
Bachelor's Degree
CLEARANCE:
Top Secret w/SCI Eligibility
MANDATORY:
15+ years experience; Prior performance in roles such as ISSO, ISSM, SCA, or SAP IT Technical Director; SAP experience; TRAINING: DoD 8570.01-M IAAE Level II (in lieu of IAAE Level I)
BENEFITS:
We offer a competitive compensation package including a generous PTO and Flexible holiday package, tax-free healthcare cost reimbursement, and an immediate vesting 401K with 4% matching.
COMPENSATION:
Up to $83.72 hourly
The Information System Security Engineer (ISSE) is primarily responsible for conducting informationsystem security engineering activities with a focus on lifecycle of current systems and future requirementscoping. The position will collect and process the captured information security requirements and ensuresthat the requirements are effectively integrated into information systems through purposeful securityarchitecting, design, development, and configuration. The position is an integral part of the developmentteam designing and developing organizational information systems or upgrading legacy systems. The ISSEemploys best practices when implementing security requirements within an information system includingsoftware engineering methodologies, system/security engineering principles, secure design, securearchitecture, and secure coding techniques. This position's main function is working within Special AccessPrograms (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of theSecretary of Defense (OSD) and Military Compartments efforts. The position will provide "day-to-day"support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP)activities.
Perform oversight of the development, implementation and evaluation of information system securityprogram policy; special emphasis placed upon integration of existing SAP network infrastructures-Perform analysis of network security, based upon the Risk Management Framework (RMF) withemphasize on Joint Special Access Program Implementation Guide (JSIG) authorization processProvides expert support, research and analysis of exceptionally complex problems, and processesrelating to themProvides expert level consultation and technical services on all aspects of Information SecurityServes as technical expert to the Cybersecurity Assessment Program providing technical direction,interpretation and alternatives to complex problemsBuilds IA into systems deployed to operational environmentsAssists architects and systems developers in the identification and implementation of appropriateinformation security functionality to ensure uniform application of DoD and other agencies securitypolicy and enterprise solutionsEnforce the design and implementation of trusted relations among external systems and architectures.Assesses and mitigates system security threats/risks throughout the program life cycleContributes to the security planning, assessment, risk analysis, risk management, certification andawareness activities for system and networking operationsThinks independently and demonstrates exceptional written and oral communications skills. Appliesadvanced technical principles, theories, and conceptsContributes to the development of new principles, concepts, and methodologiesWorks on unusually complex technical problems and provides highly innovative and ingenioussolutionsLead a team of System Security Engineers and Certification and Accreditation Analysts responsiblefor ensuring the customers national and international security interests are protected as supportequipment are designed and testedRecommends cybersecurity software tools and assists in the development of software toolrequirements and selection criteria to include the development of product specific STIGs fromapplicable DISA SRGsReview ISSE related designs and provides security compliance recommendationsLeads technical teams in implementation of predetermined long-range goals and objectivesSupports customer and SAP community IA working groups, participate in SSE IPT reviewsProvides expert level consultation and technical services on all aspects of Information SecurityReview ISSE related designs and provides security compliance recommendationsDevelop and provide IA risk management recommendations to the customerProvide ISSE support for Mission and Training systems design and developmentAssist with development and maintenance of the Program Protection PlanAssist with site activation activities and design reviewsRepresent the customer in various ISSE related working groups, advisory groups, and advisorycouncil meetingsChair and or Co-Chair customer and SAP community IA working groups, participate in ISSE IPTreviewsRepresent the customer in various SSE related working groups, advisory groups, and advisorycouncil meetingsStrong background in Patch/Configuration management, DevOps, and tier 3 supportAssist team to design, integrate, and implement JSIG/RMF Continuous Monitoring tools andprocessesIntegrate COTS & GOTS products to collect, display and remediate a variety of automated systemsecurity and system operations/performance functions and metricsPerform security assessments of servers/network devices/security appliancesDevelop improvements to security assessments with regard to accuracy and efficiencyIntegrate ancillary monitoring tools/capabilities with the enterprise security information and eventmanagement (SIEM) and create/tailor complex event alarms/rules and summary reportsWrite and execute cybersecurity test procedures for validation of control complianceMonitor/analyze output of cybersecurity related tools for reportable security incidents and residualriskAnalyze technical risk of emerging cybersecurity tools and processesWork as part of a security incident response team as neededBuild operational Operations and Maintenance (O&M) checklists to maintain the service (daily,weekly, monthly, yearly O&M checklists); build Tactics, Techniques and Processes (TTPs) andStandard Operating Processes (SOPs) associated with service checklistsIntegrate/Develop new techniques to improve Confidentiality, Integrity, and Availability fornetworks/systems operating at various classification levelsAdvanced technical competency in one or more of the following supported platforms: MicrosoftWindows Server, Active Directory, Red Hat Enterprise Linux servers, MS Hyper-V/VMWare/ESx/Xen Hypervisors, Enterprise networking/firewalls/intrusion detection/preventionsystems, forensic analysis/vulnerability assessment, Group Policy management and configuration,Scripting, BMC Footprints, WSUS, , Lumension, Bitlocker, SQL Server 2012, TomCat, IIS,Windows Server 2012r2/2016, Win 10, Red Hat 6.5, Microsoft OfficeToolkits, SEIMs, LogRhythm, ACAS/Nessus/SCAP, mandatory/role-based access control concepts (e.g. SE Linux extensions to RHEL, PitBull, App Armor, and Sentris), video teleconferencing/VOIP,Oracle/MS SQL database security, and Apache/IIS Web server security
EDUCATION:
Bachelor's Degree
CLEARANCE:
Top Secret w/SCI Eligibility
MANDATORY:
15+ years experience; Prior performance in roles such as ISSO, ISSM, SCA, or SAP IT Technical Director; SAP experience; TRAINING: DoD 8570.01-M IAAE Level II (in lieu of IAAE Level I)
BENEFITS:
We offer a competitive compensation package including a generous PTO and Flexible holiday package, tax-free healthcare cost reimbursement, and an immediate vesting 401K with 4% matching.
COMPENSATION:
Up to $83.72 hourly