Information Systems Security Manager (Corp196)
Research Innovations
- San Antonio, TX
- Permanent
- Full-time
- Communicates within and outside of organization to explain and influence changes to policies, practices, or approaches.
- Makes significant improvements in processes, systems, or products. Establishes short-term operational plans with measurable contribution to function or business area results.
- Work consists of making significant improvements of processes, systems, solutions, or products to enhance performance of job area. May develop new concepts or standards. Opportunities for problem solving and innovation are undefined, where information is difficult to obtain.
- Conducts extensive investigation to understand the root cause of problems. Problems span a wide range of difficult and unique issues across the function and/or business area.
- Responsible for analyzing and/or administering security controls for information systems
- Safeguards the network against unauthorized infiltration, modification, destruction or disclosure
- Implements, enforces, communicates and develops security policies or plans for data, software applications, hardware, and telecommunications
- Provide details for developing Information System Security (ISS) Risk Management Framework (RMF) documentation (SSP, SAR, SAP, SCTM, POA&M, etc.) to support the Assessment & Authorization (A&A) of assigned systems
- Performs ISS controls assessments as part of the systems' Continuous Monitoring Plan
- Identifies system security controls shortcomings and annotates POA&M entries for deficient items, playing a vital role with remediating control deficiencies
- Assists with documenting annual ISS Self Assessments
- Minimum 5 years of hands-on experience with Information Assurance/Cybersecurity architecture, requirements, determination, development, and implementation
- Candidate must have and be able to maintain an active U.S. Government security clearance at the Top Secret level with a background investigation date within 6 years, and be able to meet the special access eligibility requirements of DoDM
- Experience with network and system security administration, including operating system security configuration and account management best practices for MS Windows and Linux
- Experience with Information Assurance (IA) related testing and assessment tools, e.g., Security Content Automation Protocol (SCAP), Security Technical Implementation Guide (STIG) Viewer, etc
- Experience with information security tool sets such as anti-virus, security information and event management (SIEM), and/or HIDS/ NIDS
- Self-starter requiring limited direction and supervision
- Hands on experience with eMASS, ACAS or NESSUS, Splunk, SCAP, POA&Ms, system security audits, and RMF security package development
- Experience implementing DoD and Federal Risk Management Framework, IA Certification and Accreditation Processes, IA controls and developing and maintaining associated certification and accreditation documentation
- Familiarization with one or more of the following: Defense Counterintelligence and Security Agency (DCSA) National Industrial Security Program Operations Manual (NISPOM), DoD Joint Special Access Program Implementation Guide for Risk Management Framework (JSIG RMF), Intelligence Community Directive 503 (ICD-503), or similar guidance