Logo
JASINT Consulting and Technologies, LLC

Information System Security Manager Level 2

JASINT Consulting and Technologies, LLC, Baltimore, Maryland, United States,


Information System Security Manager Level 2

Job Title:

Information System Security Manager Level 2Location(s):

Annapolis Junction, MD

Hours:

Regular Full-TimeClearance Requirements:This position requires a current and active TS/SCI with FS Poly at the time of application.What you will be doing:Provide management support for a program, organization, system, or enclave’s Information Assurance program. Provide management support for proposing, coordinating, implementing, and enforcing Information System Security policies, standards, and methodologies. Manage operational security posture for an Information System or program to ensure Information System Security policies, standards, and procedures are established and followed. Provide management of security aspects of the Information System and perform day-to-day security operations of the system. Assist ISSEs and ISSOs with evaluating security solutions to ensure they meet security requirements for processing classified information. Manage the performance of vulnerability/risk assessment analysis to support security authorization. Provide management support to configuration management (CM) for information system security software, hardware, and firmware. Manage changes to systems and assess the security impact of those changes. Manage the process and preparation of documentation reviews to include System Security Plans (SSPs), Risk Assessment Reports, Certification and Accreditation (C&A) packages, and System Requirements Traceability Matrices (SRTMs). Support security authorization activities in compliance with MPO/CSS Risk Management Framework (RMF) process and DoD Information Assurance Certification and Accreditation Process (DIACAP).Perform requirements gathering and analysis of said requirementsPerform functional analysis to identify required tasks and their interrelationshipsIdentify and map current security infrastructure as a foundation to define future programsCollaborate with engineers on systems integration effortsPlan and coordinate implementation of IT security programs and policiesAnalyze user needs to determine functional and cross-functional requirementsGather and organize technical information about an organization’s mission goals and needs, existing security products, and ongoing programs in the multi-level security arenaPerform functional allocation and identify resources required for each taskPerform risk analysis that also includes risk assessmentEnable Government planning, coordination, and oversight of organizational implementation of information security servicesEnable design and implementation of future IT systems and related securityAssist Program Managers with administrative and technical oversight with specific programs within the portfolioFacilitate issue resolution through integrated product teams and Technical Exchange Meetings (TEM)Provide support for a program, organization, system, or enclave’s information assurance programProvide daily oversight and direction to contractor ISSOsOversee efforts of engineering staff to design, develop, engineer and implement solutions to security requirementsInteract with customers, IT staff, and high-level corporate officers to define and achieve required Cybersecurity objectivesServe as the Program's ISSMEnable the Government with the development and implementation of NSA IT security servicesCollaborate with engineers on systems integration and life cycle requirementsAdvise Program Managers on administrative and technical oversight matters in regards to portfolio programsPosition RequirementsExperience:Ten (10) years of work-related experience in the field of security authorization is required.Experience in the following areas is required: knowledge of current security tools, hardware/software security implementation; communication protocols; or encryption tools and techniques.Familiarity with commercial security products, security authorization techniques, security incident management, and PKI and authorization servicesEducation:A Bachelor's degree in Computer Science, Cyber Security or IT Engineering is required.

In lieu of a Bachelor’s degree, an additional four (4) years of work-related experience may be substituted.

Knowledge/Skills:Required Certifications:

DoD 8570 compliance with IAM II is required

Why JASINT?At

JASINT , we are proud to boast a “together we can” attitude. Our goal is to answer the call to provide top mission and Warfighter support at all levels, and that’s why we are seeking you!We understand and respect the dedication and sacrifice that is required to serve our nation’s greatest efforts, and our commitment in turn is to support YOU!JASINT cares about your work-life balance and offers competitive benefits to help you at every stage of your personal and professional life: Retirement/401k,

100% Employer paid health, dental, vision for employees , flexible spending accounts (HSA/FSA), STD/LTD, professional development, tuition reimbursement, spot award recognition, PTO, Holidays…even 2 (two) additional floating holidays to use at your discretion!*** JASINT offers both internal and external referral bonuses for all cleared exceptional talent we hire! Friends of yours are friends of JASINT! ***JASINT

provides equal employment opportunities to all employees and applicants for employment without regard to race, color, ancestry, national origin, gender, sexual orientation, marital status, religion, age, disability, gender identity, results of genetic testing, or service in the military. Equal employment opportunity applies to all terms and conditions of employment, including hiring, placement, promotion, termination, layoff, recall, transfer, leave of absence, compensation, and training.JASINT participates in E-Verify and will provide the federal government with I-9 information to confirm that all new hires are authorized to work in the U.S. To learn more about E-Verify please visit dhs.gov/e-verify

#J-18808-Ljbffr