Information System Security Manager Level 2 at WOOD Consulting Services
Fort Meade, Maryland, USA -
Full Time


Start Date

Immediate

Expiry Date

11 Nov, 25

Salary

0.0

Posted On

11 Aug, 25

Experience

0 year(s) or above

Remote Job

Yes

Telecommute

Yes

Sponsor Visa

No

Skills

Cyber Security, Risk Analysis, Engineers, Security Implementation, Requirements Gathering, Functional Analysis, Security Tools, Risk Assessment, Oversight, Computer Science, Functional Requirements

Industry

Information Technology/IT

Description

SECURITY CLEARANCE REQUIREMENTS:

This position requires all candidates to be U.S. Citizens and possess an active TS/SCI Security Clearance with a Polygraph.

Responsibilities:

  • Perform requirements gathering and analysis of said requirements
  • Perform functional analysis to identify required tasks and their interrelationships
  • Identify and map current security infrastructure as a foundation to define future programs
  • Collaborate with engineers on systems integration efforts
  • Plan and coordinate implementation of IT security programs and policies
  • Analyze user needs to determine functional and cross-functional requirements
  • Gather and organize technical information about an organization’s mission goals and needs, existing security products, and ongoing programs in the multi-level security arena
  • Perform functional allocation and identify resources required for each task
  • Perform risk analysis that also includes risk assessment
  • Enable Government planning, coordination, and oversight of organizational implementation of information security services
  • Enable design and implementation of future IT systems and related security
  • Assist Program Managers with administrative and technical oversight with specific program’s within the portfolio
  • Facilitate issue resolution through integrated product teams and Technical Exchange Meetings (TEM)
  • Provide support for a program, organization, system, or enclave’s information assurance program
  • Provide daily oversight and direction to contractor ISSOs
  • Oversee efforts of engineering staff to design, develop, engineer and implement solutions to security requirements
  • Interact with customers, IT staff, and high-level corporate officers to define and achieve required Cybersecurity objectives
  • Serve as the Program’s ISSM
  • Enable the Government with the development and implementation of IT security services
  • Collaborate with engineers on systems integration and life cycle requirements
  • Advise Program Managers on administrative and technical oversight matters in regards to portfolio programs

Qualifications:

Required Education & Years of Experience:

  • Ten (10) years of work-related experience in the field of security authorization is required.
  • Bachelor’s degree in Computer Science, Cyber Security or IT Engineering is required.
  • In lieu of a Bachelor’s degree, an additional four (4) years of work-related experience may be substituted.

Required Skills

  • Experience in the following areas: current security tools, hardware/software security implementation; different communication protocol’ and encryption techniques/tools. Knowledge of commercial security products, security authorization techniques, security incident management, and PKI and authorization services.

Required Certifications (Must Possess One of the Following)

How To Apply:

Incase you would like to apply to this job directly from the source, please click here

Responsibilities
  • Perform requirements gathering and analysis of said requirements
  • Perform functional analysis to identify required tasks and their interrelationships
  • Identify and map current security infrastructure as a foundation to define future programs
  • Collaborate with engineers on systems integration efforts
  • Plan and coordinate implementation of IT security programs and policies
  • Analyze user needs to determine functional and cross-functional requirements
  • Gather and organize technical information about an organization’s mission goals and needs, existing security products, and ongoing programs in the multi-level security arena
  • Perform functional allocation and identify resources required for each task
  • Perform risk analysis that also includes risk assessment
  • Enable Government planning, coordination, and oversight of organizational implementation of information security services
  • Enable design and implementation of future IT systems and related security
  • Assist Program Managers with administrative and technical oversight with specific program’s within the portfolio
  • Facilitate issue resolution through integrated product teams and Technical Exchange Meetings (TEM)
  • Provide support for a program, organization, system, or enclave’s information assurance program
  • Provide daily oversight and direction to contractor ISSOs
  • Oversee efforts of engineering staff to design, develop, engineer and implement solutions to security requirements
  • Interact with customers, IT staff, and high-level corporate officers to define and achieve required Cybersecurity objectives
  • Serve as the Program’s ISSM
  • Enable the Government with the development and implementation of IT security services
  • Collaborate with engineers on systems integration and life cycle requirements
  • Advise Program Managers on administrative and technical oversight matters in regards to portfolio program
Loading...