Senior Information System Security Manager (ISSM) Information Technology (IT) - Sacramento, CA at Geebo

Senior Information System Security Manager (ISSM)

JOB TITLE:
Information System Security Manager (ISSM)LOCATION:
Sacramento, CASALARY:
$170,000 - $200,000 MUST BE US PERSONS We are a national staffing firm working with some of the top-tier aerospace companies in the world! And we are looking for first-class employees to work with our clients.
Qualifying Questions:
Are you a US persons as noted in the Job description? Do you meet the educational requirements for this job? Do you meet the experience requirements for this job? Are you able to commute to the job location or are you able to relocate for the role? Details:
Medical, Dental & Vision Insurance Coverage Life/ADD & Short/Long Term Disability Insurance 401(k) Savings Plan Employee Stock Purchase Plan (ESPP) Paid Time-Off (PTO) Holidays Education Reimbursement
Summary:
The Structures Company is seeking an Information System Security Manager (ISSM) wiith an Active TS/SCI Clearance in Sacramento, CA.
Essential Job Functions:
Responsible for managing Information Systems (IS) security principles and policies, including the Risk Management Framework (RMF), Security Technical Implementation Guides (STIGs), 32 CFR Part 117 National Industrial Security Program Operating Manual (NISPOM), Defense Counterintelligence and Security Agency (DCSA) Assessment and Authorization Process Manual (DAAPM), DoD 5200.
01 Information Security Program and Protection of Sensitive Compartmented Information (SCI), and DoD 5205.
07 Special Access Program (SAP) Security Manual.
Safeguards networks against unauthorized modification, destruction, or disclosure.
Researches, evaluates, designs, tests, recommends, communicates, and implements new security software or devices.
Implements, enforces, communicates, and may develop internet, network, or other information security policies or security plans for data, internet, software applications, and hardware, telecommunications, and computer installations.
Establish and maintain classified computer systems following DOD, NISPOM, and Joint Special Access Program Implementation Guide (JSIG), including but not limited to:
Responsible for network address assignment, routing protocols, and routing table configuration as well as configuration of authentication and authorization - directory services.
Performs maintenance of network servers:
file servers, VPN gateways, intrusion detection systems, etc.
Develops and maintains a formal information system (IS) security program.
Develop and maintain System Security Plans (SSP) and related documentation such as the Plan of Action & Milestones (POA&M), Risk Assessment Report, and Continuous Monitoring Strategy.
Implements and enforces IS security policies.
Maintains the hardware and software that comprises the network (data, voice, and video); including the deployment, maintenance and monitoring of active network gear; switches, routers, firewalls, and appliances.
Performs weekly audits, anti-virus definitions, and Windows updates.
Manages active directory, group policy, file shares, backups, and restores.
Ensure audit records are collected and analyzed in accordance with policies and procedures.
Responds to IS security incidents including investigation and report detail.
Maintain a working knowledge of system functions, security policies, technical security safeguards, and operational security measures to restrict unauthorized use of data systems and databases.
Ensures all users have the requisite security clearances, authorization, need-to-know, and are aware of their security responsibilities before granting access to the IS.
Assist with the development and implementation of an effective IS security education, training, and awareness program.
Conducts initial and annual required training of privileged and general users.
Installs new and existing hardware/software.
Manages disaster recovery functions for information systems.
Assume ISSO responsibilities as necessary and assist in other disciplines of Security as needed to support the program.
Serve as member of the configuration change board (CCB).
Coordinate any configuration changes of a system with the ISSM prior to the change.
Assess changes to the system/operational needs that could affect its accreditation.
Voting/veto member of the CCB for all systems.
Supervisory Responsibility:
YesRequired Skills:
Requires BS/BA degree in a related technical field and a minimum of 7 years directly related experience or equivalent work experience in lieu of degree.
Experience in designing, developing and integrating classified computer systems and networks in compliance with government regulations.
Must have DoD 8570 IAM Level II certification (i.
e.
, CASP CE, CISM or CISSP) Must have working knowledge of TCP/IP, network switching, routing and infrastructure cabling.
Must be able to configure switches by using work instructions.
Must have solid work experience with Windows 7/10/ Server 2008 R2, DISA STIGS, and SCAP Compliance.
Experience executing Security STIG/Hardening on Windows Operating Systems based on approved DISA STIGs and SRGs.
Must have the ability to provide internal and external customer support related to desktop troubleshooting.
Attention to detail with the ability to multi-task and follow through with task from start to completion.
Required to have and maintain a U.
S.
security clearance (TS/SCI) Requires US Citizenship Ability to maintain sensitive and confidential information as required by government standards.
Ability to interact effectively with peers and supervisors.
Ability to interact appropriately with the public when necessary.
Ability to adhere to workplace rules.
Ability to effectively communicate professionally in writing or verbally with all levels of personnel.
Desired Skills:
CISSP certification Physical Requirements:
Office and/or manufacturing environment.
Ability to stand and sit for long periods of time.
Ability to perform repetitive motion (keyboarding, 10-key, phones).
Ability to lift up to 50 pounds.
May work extended hours or weekends and have on-call schedule/duties.
Travel Requirements:
25-50% May be required between customer site and/or other Kratos Unmanned Division locations.
For immediate consideration please send resume to email protected The Structures Company LLC is an Affirmative Action/ Equal Opportunity Employer (or AA/ EOE) ITAR DefinitionUnder 120.
14 of the ITAR a U.
S.
person is defined as a person who is a lawful permanent resident of the United States.
A lawful permanent resident is further defined by 8 U.
S.
C.
1101(a)(20).
A U.
S.
Person is also a protected individual which is defined by 8 U.
S.
C.
1324b(a)(3).
The Structures Company is a national staffing firm specializing in contract, contract to hire, and direct hire placement opportunities.
Our clients rely on us to support their engineering, IT, Production, Maintenance & Repair, and support staff.
Our niche recruiting team is one of our biggest strengths and is why we are a top provider of talented professionals to the majority of our clients.
They will help you identify the opportunity that best fits your interests while also providing industry-leading customer service.
We support the majority of aerospace OEM's and tier 1 suppliers across the United States.
The Structures Company LLC is an Affirmative Action/ Equal Opportunity Employer (or AA/ EOE)Keywords:
aerospace, aviation, aircraft#jobad #national #vij #hotjobsSDL2017 Recommended Skills Active Directory Group Antivirus Softwares Attention To Detail Auditing Certified Information Security Manager Certified Information Systems Security Professional Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.