drjobs Information Systems Security Manager

Information Systems Security Manager

Employer Active

1 Vacancy
drjobs

Job Alert

You will be updated with latest job alerts via email
Valid email field required
Send jobs
Send me jobs like this
drjobs

Job Alert

You will be updated with latest job alerts via email

Valid email field required
Send jobs
Job Location drjobs

Ogden, UT - USA

Monthly Salary drjobs

Not Disclosed

drjobs

Salary Not Disclosed

Vacancy

1 Vacancy

Job Description

Job Details

Hill AFB UT - Ogden UT
Full Time

Description

Position Overview:

System High Corporation delivers the most advanced protenction and secrecy solutions to secure and strengthen critical missions programs operations and intelligence activities. We are seeking an Industrial Security Professional to join our team to help contribute to our success and help us solve problems with innovation through intelligence.

The Information Systems Security Manager will provide direct support and assistance in day-to-day administration of the Information Systems Security program. The contractor shall provide certified professionals commensurate with their responsibilities in accordance with DoD Directive 8140.01 8140.02 and 8140.03 and perform ISSM (all Hurlburt units 605 TES Det 1 605 TES Det 3 705 CTS 805 CTS) duties as delineated in applicable policy directives. SCIF and/or SAPF systems consist of but are not limited to the Non- secure Internet Protocol Network (NIPRNet) Secure Internet Protocol Network (SIPRNet) Joint Worldwide Intelligence Communication System (JWICS) Combat Air Forces Network Version 2 (CV2) Information Operations (IO) Range and the Planning and Decision Aid System (PDAS) Distributed Experimental Environment (DE2) Cicada Jumper Room Enclave (JRE) Common Mission Control Center (CMCC). The ISSM will have the detailed knowledge and expertise required to manage the security aspects of an information system and in many organizations is assigned responsibility for the day-to-day security operations of a system. ISSMs will provide guidance and assistance to subordinate units involved in SAP and/or SCI activities as necessary provide assistance to Wing or subordinate unit Information System Security Managers (ISSMs) as applicable and provide technical review and recommend engineering solutions for all networks. In addition the contractor shall perform all ISSM responsibilities for the DMOC collateral Battlespace enclave unclassified development systems and for externally- managed systems that require a locale ISSM.

The Information Systems Security Manager shall also provide ISSM support for network interconnections to include releasable classified network connections. The contractor shall also provide Information Systems Security Manager (ISSM) support for the DMOC and 84 RADES responsibilities which include planning coordinating and assisting with security compliance and accreditation related to network and IT systems including system security plan management continuous monitoring and COMSEC. The ISSM shall serve as voting member of the Configuration Control Board for networks under their purview. The ISSM will provide cyber security policies and technical cyber security protection measures to continually evaluate the security posture of all networks and systems including making recommendations for implementing new security controls as new threats and vulnerabilities are discovered establish documents and monitorssecurity programs while overseeing the implementation plans and ensuring compliance with:

Duties and Responsibilities

  • Systems Accreditation: Establish and maintain enclave and network accreditation and special approval authorizations as required for all networked and stand-alone IS operating within the DMOC collateral Battlespace.
  • Hardware Software and Media: Maintain continuous positive control over all IS hardware software and magnetic media entered into and removed from DMOC and the DMOC collateral Battlespace.
  • Audits: Execute audits on all DMOC and DMOC collateral Battlespace computer / information systems IAW applicable policy directives.
  • Additional Cybersecurity Measures: Schedule and conduct scans on all 505th CCW-owned SAP and DMOC systems.
  • Training: Perform and document initial training for all personnel prior to granting access to any classified IS.
  • Configuration Management (CM): Serve as a key member on each units CM Board and ensure CM is maintained and documented.
  • RMF Continuous Monitoring Program: Participate in the development and / or modification of the computer environment cybersecurity program and requirements according to DoD and AF Directives Instructions or Manuals.
  • Special Access Program Risk Management Framework Support: The ISSMs shall comply with Department of Defense and Air Force SAP Risk Management Framework guidance.

Event Approvals: ISSMs shall ensure exercise/test networks are installed and operated in accordance with established directives and actively participate in the event coordination approval process.

Qualifications

Required Skills (Knowledge Skills Abilities)

  • Ability to work as a team member communicate perform office functions and use office tools customer focused and deliver exceptional performance
  • Ability to implement RMF and Distributed Mission Operations Network (DMON)
  • Ability to develop and implement information assurance guidance and execute ISS functions with little to no supervision
  • Skilled in development and maintenance of comprehensive SSP and Profile Sheets
  • Skilled in working classified programs in operational test and exercise environments
  • Knowledge of DoD Directive 8570.01 DoD 8570.01-M ICD 503 the JSIG RMF and the 33-series AF Instructions / Manuals
  • Knowledge of SAP / SCI Cybersecurity measures.

Clearance

  • Secret

Certifications

  • DoD 8570.1 IAT Level II certification is required

Years of Experience/Education Requirements

  • 7 Years relevant experience (2 specialized) with Bachelors degree or equivalent.

Additional Information

  • This job description is not designed to cover or contain all job duties required of the employee. There may be additional activities duties and/or responsibilities that are required for this position that are not listed in this job description.
  • In compliance with federal law all persons hired will be required to verify identity and eligibility to work in the United States and to complete the required employment eligibility verification document form upon hire.
  • System High is a Military friendly employer. Our extensive work on behalf of the U.S. government offers those who have served in uniform an opportunity to continue to serve their country in a new and exciting way while enjoying a successful civilian career.
  • System High values the power and strength of diverse backgrounds on the culture and performance of our company. We strive to maintain an inclusive culture to encourage each employee to bring their whole self to the mission.
  • System High Corporation is committed to equal employment opportunity regardless of race color ancestry religion sex national origin sexual orientation age citizenship marital status disability gender gender identity or expression veteran status or any other characteristic protected by law. We are proud to be an equal opportunity workplace.
  • If you require a reasonable accommodation to apply for a position with us please email .
  • Legal notices can be viewed on the following PDFs: Know Your Rights: Workplace Discrimination is Illegal; EPPA Notice; FMLA Notice

Warning: Beware of recruitment scams: System High will never request money or personal purchases during the hiring process. Verify all communications come from a or email address.


Required Experience:

Manager

Employment Type

Full-Time

Report This Job
Disclaimer: Drjobpro.com is only a platform that connects job seekers and employers. Applicants are advised to conduct their own independent research into the credentials of the prospective employer.We always make certain that our clients do not endorse any request for money payments, thus we advise against sharing any personal or bank-related information with any third party. If you suspect fraud or malpractice, please contact us via contact us page.