Information System Security Manager Information Technology (IT) - Philadelphia, PA at Geebo

Information System Security Manager

EOE Statement We are an equal employment opportunity employer.
All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability status, protected veteran status or any other characteristic protected by law.
Description GENERAL
Summary:
Seeking candidates with Risk Management Framework (RMF) ISSM experience.
Primary responsibility is to perform tasks related to Assessment & Authorization (A&A) and cybersecurity to obtain and maintain Authorizations to Operate for US Navy afloat and ashore systems.
LOCATION:
Philadelphia, PA.
PRINCIPAL DUTIES/
Responsibilities:
Lifecycle cybersecurity support of US Navy systems, which includes, but is not limited to:
Lead the RMF process for assigned programs, organizations, systems, or enclaves Maintain and report systems A&A status and events Manage the SP for assigned systems throughout their lifecycle Review components of packages and other artifacts to ensure accuracy and completeness in alignment with NAVSEA 03 Standard Operating Procedures for Step 2, Step 4 and Step 5 of the RMF Process Perform annual security reviews, annual testing of security controls, and annual testing of the contingency plan, in line with FISMA requirements Participate in the review and reaction of afloat captured data packages; this includes working with department ISEAs to investigate findings Manage POA&M entries and ensuring vulnerabilities are properly tracked, mitigated, and resolved Assist with identification of the security control baseline set and any applicable overlays Supervise the validation of security controls with the PM/ISO, SCA Liaison, PSO, and AO CSA Assemble the Security Authorization Package and submit for adjudication Register and maintain the system in eMASS Assess the quality of security control implementation against all requirements in accordance with the approved SLCM strategy Plan and perform cybersecurity testing to assess security controls and recording security control compliance status during sustainment Report changes in the security posture of systems to the AO Utilize the Collaboration Board in eMASS workflow for all formal coordination during the RMF process.
Detailed findings will be posted in the Artifacts tab (if necessary).
Position Requirements EDUCATION AND EXPERIENCE REQUIREMENTS:
Possess a BS degree in Computer Science, Information Technology, Cyber Security, Systems Engineering, Mathematics, or a comparable field or equivalent years of experience.
5
years' experience in DoD Assessment and Authorization (A&A) 3
years' experience working with the Risk Management Framework (RMF) Possess a current DoD 8570 certification (Security
CE or CISSP) SPECIAL REQUIREMENTS:
Successful applicants must either have an active government security clearance or the ability to receive approval upon position acceptance.
Must have a valid US passport or the ability to obtain one upon position acceptance.
DoD 8570-compliant (CompTIA Security
CE) CISSP preferred Ability to obtain OS certification or complete approved related training within 180 days of hire SKILLS AND ABILITIES:
Essential Skills:
Demonstrated expert-level experience with Risk Management Framework (experience under DoD a plus) Experience using the Enterprise Mission Assurance Support Service (eMASS) Experience with Assured Compliance Assessment Solution (ACAS) Demonstrated efficiency and experience in the following areas:
RMF package development and management, including POA&Ms (mitigation statements), Security Plans, Risk Assessments, architecture diagrams, and hardware/software inventories NIST 800-53 control validation DISA STIG/SRG validation RMF policy development and strategy implementation System/site documentation development to include policies, processes, and SOPs Proficiency in the use of Microsoft Office suite of applications Proficient in basic computer/laptop use including advanced operations Basic Technical writing ability Self-motivated able to work in a team environment Experience leading a team through a technical project Additional Preferred Skills:
Knowledge of the fundamental concepts, practices, and procedures associated with industrial control systems Additional Information:
This position requires the candidate to travel at least 10% of the time.
Full-Time/Part-Time Full-Time Position Information System Security Manager Close DateExempt/Non-Exempt Exempt Req Number INF-22-00011 Location Philadelphia Cyber Operations About the Organization Founded in 1994 as a small, diversified professional services company, Delphinus today employs more than 650 professional and technical personnel supporting a customer base that spans the Defense and Federal markets.
As a successful graduate of the Small Business Administration's 8(a) program, we have evolved into a leading provider of expert services in our core competencies of Cyber Operations and Security, Marine Engineering and Design, Marine Services, and Business Management.
Headquartered in Eddystone, Pennsylvania, we have primary offices in Norfolk, Virginia; San Diego, California; and Bremerton, Washington, with liaison facilities in Philadelphia, Pennsylvania, and Pearl Harbor, HI.
Delphinus' business model is based on the values established by our leadership and shared by all Delphinus employees:
oFocusing on Our Customers and Promoting PartnershipoTreating People with Respect and DignityoEnsuring Integrity in Our Business PracticesoEngaging Our Industry PartnersoHonoring CommitmentsoAchieving ExcellenceThis position is currently accepting applications.
Recommended Skills Architecture Assembly And Installation Certified Information Systems Security Professional Comp Tia Security
Computer Security Euclidean Geometry Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.