Manager, Cyber Intelligence

L3Harris

Not Interested
Bookmark
Report This Job

profile Job Location:

Greenville, NC - USA

profile Monthly Salary: Not Disclosed
Posted on: 11 hours ago
Vacancies: 1 Vacancy

Job Summary

Job Title:Manager Cyber Intelligence-ISSM

Job ID: 32734

Job Location: Greenville TX; On-site

Job Schedule: 9/80 Off every other Friday; 1st shift

Job Description:

L3Harris Greenville Texas is seeking an Information System Security Manager (ISSM) in support of Defense Counterintelligence and Security Agency (DCSA) programs. Duties for successful candidates include but are not limited to reviewing and developing information system accreditation/certification support documentation; interacting with customers when changes occur that may affect the information system accreditation/certification; performing system and network self-inspections; identifying information system vulnerabilities and implementing countermeasures;

Responsibility for program policy creation/update; maintaining information system security records. The ISSM will provide assistance on IT and information system security issues that may affect the mission of the customer. This ISSM reports to the Director of Cyber Intelligence for the site.

  • Develop and conduct risk assessment procedures for verification of RMF/Assessment and Authorization (A&A) safeguards to meet various regulatory requirements based upon government regulations and NIST 800 series (800-53 etc.) guidelines.
  • Author and provide oversight of various artifacts supporting RMF package artifacts to include the System Security Plan (SSP) Security Control Traceability Matrix (SCTM) Plan of Actions & Milestones (POA&M) Continuous Monitoring (ConMon) Plan CONOPS and other RMF BoE artifacts.
  • Coordinate with internal/external partners to establish system security designs and validate compliance requirements.
  • Responsible for analyzing and/or administering security controls for information systems.
  • The selected candidate will act as a member of a diverse security team and participate in Engineering and Configuration Review Boards and Working Groups to develop secure system solutions.
  • Monitor IA Program compliance by performing periodic self-inspections tests and reviews of the IS to ensure that systems are operating as authorized/accredited and that conditions have not changed.
  • Configuration of change management processes (hardware/software account Management Disposition Assured File Transfers (AFT) and related documentation in accordance to policies and procedures.
  • Review audit data of the IS and IS components (technical & physical) for anomalous or unauthorized activities.
  • Participate in documenting and publishing security related workflows and procedures to mitigate vulnerabilities and recommend changes to system or system components.
  • Conduct Cybersecurity training briefings and presentations for multiple levels of business.
  • Provide leadership and oversight to ISSOs.
  • Participate in interdepartmental projects and provides council on Cybersecurity policies and procedures.

Essential Functions:

  • Develop and conduct risk assessment procedures for verification of RMF/Assessment and Authorization (A&A) safeguards to meet various regulatory requirements based upon government regulations and NIST 800 series (800-53 etc.) guidelines.
  • Author and provide oversight of various artifacts supporting RMF package artifacts to include the System Security Plan (SSP) Security Control Traceability Matrix (SCTM) Plan of Actions & Milestones (POA&M) Continuous Monitoring (ConMon) Plan CONOPS and other RMF BoE artifacts.
  • Coordinate with internal/external partners to establish system security designs and validate compliance requirements.
  • Responsible for analyzing and/or administering security controls for information systems.
  • The selected candidate will act as a member of a diverse security team and participate in Engineering and Configuration Review Boards and Working Groups to develop secure system solutions.
  • Monitor IA Program compliance by performing periodic self-inspections tests and reviews of the IS to ensure that systems are operating as authorized/accredited and that conditions have not changed.
  • Configuration of change management processes (hardware/software account Management Disposition Assured File Transfers (AFT) and related documentation in accordance to policies and procedures.
  • Review audit data of the IS and IS components (technical & physical) for anomalous or unauthorized activities.
  • Participate in documenting and publishing security related workflows and procedures to mitigate vulnerabilities and recommend changes to system or system components.
  • Conduct Cybersecurity training briefings and presentations for multiple levels of business.
  • Provide leadership and oversight to ISSOs.
  • Participate in interdepartmental projects and provides council on Cybersecurity policies and procedures.
  • Train and mentor teammates in coordination with the Cybersecurity Director.
  • Ability to obtain and maintain any additional clearances as required.
  • Up to 5% travel may be required.

Qualifications:

  • Bachelors Degree and minimum 9 years of prior relevant experience. Graduate Degree and a minimum of 7 years of prior related lieu of a degree minimum of 13 years of prior related experience.
  • Must have an Active DoD Secret clearance with SCI eligibility
  • Relevant experience with various operating systems (e.g. Windows Linux UNIX Solaris Cisco) Windows server systems system virtualization and other related peripherals.
  • Experience using Microsoft Office products.
  • IAM Level III Certification (CISSP CISM etc.)
  • Experience with RMF/Assessment and Authorization (A&A) safeguards to meet various regulatory requirements based upon government regulations and NIST 800 series (800-53 etc.)
  • Experience with DCSA Information system assessments approvals and monitoring
  • Experience with SPLUNK Security Center/Nessus and other software/systems

Preferred Skills:

  • Experience with configuration/certification and auditing/analysis of Windows Linux UNIX systems to include stand-alone IS peer-to-peer networks LANs/WANs and interconnections.
  • Experience with applying searching leveraging SCAP and STIGs
  • Demonstrate excellent organizational decision-making and problem-solving skills.
  • Experience with technical configuration standards relating to information system security.
  • Well versed in risk management mitigation and customer service.
  • Excellent team leadership skills with experience leading and collaborating in a multi-disciplinary diverse and dynamic team environment.
  • Excellent communication skills (written verbal & presentation)

#LI-TD4


Required Experience:

Manager

Job Title:Manager Cyber Intelligence-ISSMJob ID: 32734Job Location: Greenville TX; On-siteJob Schedule: 9/80 Off every other Friday; 1st shiftJob Description:L3Harris Greenville Texas is seeking an Information System Security Manager (ISSM) in support of Defense Counterintelligence and Security Agen...
View more view more

Key Skills

  • All-Source Intelligence
  • Military Intelligence
  • GIS
  • ICD Coding
  • Intelligence Experience
  • Military Experience
  • Analysis Skills
  • Microsoft Powerpoint
  • Joint Operations
  • Intelligence Analysis
  • Leadership Experience
  • Writing Skills

About Company

Company Logo

At L3Harris, we anticipate and mitigate risk with agile end-to-end solutions that meet our customers' mission-critical needs across all domains.

View Profile View Profile