Global Resource Solutions, Inc. (GRS) is seeking an enthusiastic, motivated, detail orientated, and talented individual for the position of Information System Security Manager II.
Job Description:
Summary: The ISSM II's primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide "day-to-day" support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
Essential Duties & Responsibilities:
Perform oversight of the development, implementation and evaluation of information system security program policy; special emphasis placed upon integration of existing SAP network infrastructures
Perform analysis of network security, based upon the RMF or JAFAN authorization process; advise customer on IT assessment and authorization issues
Perform risk assessments and make recommendations to customers
Advise government program managers on security testing methodologies and processes
Evaluate assessment documentation and provide written recommendations for authorization to government PM's
Periodically review system security to accommodate changes to policy or technology
Develop and maintain a formal Information Systems Security Program
Ensure that all IAOs, network administrators, and other AIS personnel receive the necessary technical and security training to carry out their duties
Develop, review, endorse, and recommend action by the AO or DAO of system assessment documentation
Ensure approved procedures are in place for clearing, purging, declassifying, and releasing system memory, media, and output
Conduct assessment tests that include verification that the features and assurances required for each protection level are functional
Maintain a repository for all system authorization documentation and modifications
Coordinate AIS security inspections, tests, and reviews
Develop policies and procedures for responding to security incidents, and for investigating and reporting security violations and incidents
Ensure proper protection or corrective measures have been taken when an incident or vulnerability has been discovered within a system
Ensure that data ownership and responsibilities are established for each AIS, to include accountability, access rights, and special handling requirements
Ensure development and implementation of an information security education, training, and awareness program, to include attending, monitoring, and presenting local AIS security training.
Ensure that security assessments are completed and documented
Evaluate threats and vulnerabilities to ascertain whether additional safeguards are needed
Assess changes in the system, its environment, and operational needs that could affect the authorization
Ensure that authorization is accomplished on each AIS
Review AIS assessment plans
Conduct periodic assessments of the security posture of the AIS
Ensure configuration management (CM) for security-relevant AIS software, hardware, and firmware are properly documented.
Ensure that system recovery processes are monitored to ensure that security features and procedures are properly restored
Ensure all AIS authorization documentation is current and accessible to properly authorized individuals
Ensure that system security requirements are addressed during all phases of the system life cycle
Participate in self-inspections; identify security discrepancies and report security incidents
Coordinate all technical security issues outside of area of expertise or responsibility with SSE
Provide expert research and analysis in support of expanding programs and area of responsibility
Perform file transfers between local systems to storage devices
Provide leadership, mentoring, and quality assurance for Team Members
Requirement:
Seven (7) to Nine (9) years related experience
Bachelor's Degree in a related area or equivalent experience (Four (4) years)
Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level 3 within 6 months of the date of hire.
Security Requirements:
Current Top Secret Clearance with SCI Eligibility
Eligibility for access to Special Access Programs
Willingness to submit to a Counterintelligence Polygraph
Skills:
Ability to work in a dynamic environment and effectively interact with numerous DOD, military/civilian personnel and industry partners
Working knowledge of Microsoft Office (Word, PowerPoint, and Excel)
Possess a high degree of originality, creativity, initiative requiring minimal supervision
Must be familiar with security policy/manuals and the appropriate DCIDs/JAFANs and other guiding policy documents
Requires travel within the organizational geographic Area of Responsibility (AOR) (note - could be extensive, and will include both air and ground transportation)
Must be able to lift up to 50lbs
Physical Requirements: This position requires employees to be willing and able to: sit, bend, reach, stoop, squat, stand, and walk.
Communication: Excellent customer service via phone and face to face conversation, excellent written and oral command of English.
An exciting and rewarding career awaits you with Global Resource Solutions, Inc. (GRS). GRS is a management consulting company to government and business that offers great career opportunities and a comprehensive slate of employee benefits to our employees including medical, dental, vision, short/long term disability, life insurance and a retirement plan. GRS is an Equal Opportunity / Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or protected veteran status.
This employer participates in E-Verify and will provide the federal government with your Form I-9 information to confirm that you are authorized to work in the U.S. for more information please see the flyer: https://e-verify.uscis.gov/web/media/resourcescontents/e-verify participation poster_ES.pdf
S:SKCYB-CYBER-THREAT SKCYB