Information Systems Security Manager

Hill AFB, UT - Ogden, UT, 84056

Apply now Apply later

Job Details

Job Location Hill AFB, UT - Ogden, UTPosition Type Full Time

Description

Position Overview:

 

System High Corporation delivers the most advanced protenction and secrecy solutions to secure and strengthen critical missions, programs, operations, and intelligence activities. We are seeking an Industrial Security Professional to join our team to help contribute to our success and help us solve problems with innovation through intelligence.

 

The Information Systems Security Manager will provide direct support and assistance in day-to-day administration of the Information Systems Security program. The contractor shall provide certified professionals commensurate with their responsibilities in accordance with DoD Directive 8140.01, 8140.02, and 8140.03, and perform ISSM (all Hurlburt units, 605 TES Det 1, 605 TES Det 3, 705 CTS, 805 CTS) duties as delineated in applicable policy directives. SCIF and/or SAPF systems consist of but are not limited to the Non- secure Internet Protocol Network (NIPRNet), Secure Internet Protocol Network (SIPRNet), Joint Worldwide Intelligence Communication System (JWICS), Combat Air Forces Network Version 2 (CV2), Information Operations (IO) Range, and the Planning and Decision Aid System (PDAS), Distributed Experimental Environment (DE2), Cicada, Jumper Room Enclave (JRE), Common Mission Control Center (CMCC). The ISSM will have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is assigned responsibility for the day-to-day security operations of a system. ISSMs will provide guidance and assistance to subordinate units involved in SAP and/or SCI activities as necessary, provide assistance to Wing or subordinate unit Information System Security Managers (ISSMs) as applicable, and provide technical review and recommend engineering solutions for all networks. In addition, the contractor shall perform all ISSM responsibilities for the DMOC collateral Battlespace enclave, unclassified development systems, and for externally- managed systems that require a locale ISSM.

 

The Information Systems Security Manager shall also provide ISSM support for network interconnections to include releasable classified network connections. The contractor shall also provide Information Systems Security Manager (ISSM) support for the DMOC and 84 RADES, responsibilities which include planning, coordinating, and assisting with security compliance and accreditation related to network and IT systems, including system security plan management, continuous monitoring, and COMSEC. The ISSM shall serve as voting member of the Configuration Control Board for networks under their purview. The ISSM will provide cyber security policies and technical cyber security protection measures to continually evaluate the security posture of all networks and systems, including making recommendations for implementing new security controls as new threats and vulnerabilities are discovered, establish documents, and monitors security programs while overseeing the implementation plans and ensuring compliance with:

 

Duties and Responsibilities

  • Systems Accreditation: Establish and maintain enclave and network accreditation and special approval authorizations, as required, for all networked and stand-alone IS operating within the DMOC collateral Battlespace.
  • Hardware, Software and Media: Maintain continuous positive control over all IS hardware, software and magnetic media entered into, and removed from, DMOC, and the DMOC collateral Battlespace.
  • Audits: Execute audits on all DMOC, and DMOC collateral Battlespace computer / information systems IAW applicable policy directives.
  • Additional Cybersecurity Measures: Schedule and conduct scans on all 505th CCW-owned SAP and DMOC systems.
  • Training: Perform and document initial training for all personnel prior to granting access to any classified IS.
  • Configuration Management (CM): Serve as a key member on each unit's CM Board and ensure CM is maintained and documented.
  • RMF – Continuous Monitoring Program: Participate in the development and / or modification of the computer environment cybersecurity program and requirements according to DoD and AF Directives, Instructions, or Manuals.
  • Special Access Program Risk Management Framework Support: The ISSMs shall comply with Department of Defense and Air Force SAP Risk Management Framework guidance.

Event Approvals: ISSMs shall ensure exercise/test networks are installed and operated in accordance with established directives and actively participate in the event coordination approval process.

Qualifications

Required Skills (Knowledge, Skills, Abilities)

  • Ability to work as a team member, communicate, perform office functions and use office tools, customer focused and deliver exceptional performance
  • Ability to implement RMF and Distributed Mission Operations Network (DMON)
  • Ability to develop and implement information assurance guidance and execute ISS functions with little to no supervision
  • Skilled in development and maintenance of comprehensive SSP and Profile Sheets
  • Skilled in working classified programs in operational, test, and exercise environments
  • Knowledge of DoD Directive 8570.01, DoD 8570.01-M, ICD 503, the JSIG, RMF and the 33-series AF Instructions / Manuals
  • Knowledge of SAP / SCI Cybersecurity measures.

 

 

 

Clearance

  • Secret

Certifications

  • DoD 8570.1 IAT Level II certification is required

Years of Experience/Education Requirements

  • 7 Years relevant experience (2 specialized) with Bachelors degree or equivalent.

 

 

Additional Information 

  • This job description is not designed to cover or contain all job duties required of the employee. There may be additional activities, duties and/or responsibilities that are required for this position that are not listed in this job description. 
  • In compliance with federal law, all persons hired will be required to verify identity and eligibility to work in the United States and to complete the required employment eligibility verification document form upon hire.  
  • System High is a Military friendly employer. Our extensive work on behalf of the U.S. government offers those who have served in uniform an opportunity to continue to serve their country in a new and exciting way while enjoying a successful civilian career. 
  • System High values the power and strength of diverse backgrounds on the culture and performance of our company. We strive to maintain an inclusive culture to encourage each employee to bring their whole self to the mission.
  • System High Corporation is committed to equal employment opportunity regardless of race, color, ancestry, religion, sex, national origin, sexual orientation, age, citizenship, marital status, disability, gender, gender identity or expression, veteran status, or any other characteristic protected by law. We are proud to be an equal opportunity workplace.
  • If you require a reasonable accommodation to apply for a position with us, please email recruiting@systemhigh.com.
  • Legal notices can be viewed on the following PDFs: Know Your Rights: Workplace Discrimination is Illegal; EPPA Notice; FMLA Notice

 

 

Warning: Beware of recruitment scams: System High will never request money or personal purchases during the hiring process. Verify all communications come from a systemhigh.com or msg.paycomonline.com email address.

 

Apply now Apply later

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  3  0  0
Category: Leadership Jobs

Tags: Audits Clearance Compliance DoD DoDD 8140 DoDD 8570 ICD 503 Industrial Monitoring Risk management RMF SAP System Security Plan Vulnerabilities

Perks/benefits: Career development

Region: North America
Country: United States

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.