Lead, Cyber Intelligence (ISSO) at L3HHCM20
Plano, Texas, United States -
Full Time


Start Date

Immediate

Expiry Date

20 Dec, 25

Salary

0.0

Posted On

21 Sep, 25

Experience

10 year(s) or above

Remote Job

Yes

Telecommute

Yes

Sponsor Visa

No

Skills

Cybersecurity, Risk Management, Leadership, Compliance, Security Audits, Configuration Management, Communication, Problem Solving, Microsoft Office Suite, SPLUNK, NIST Standards, Security Certifications, Strategic Planning, Stakeholder Coordination, Policy Development, Training

Industry

Defense and Space Manufacturing

Description
Job Title: Lead, Information System Security Officer (ISSO)Job Code: 28608Job Location: Plano, TXJob Schedule: 9/80 REG Job Description: The Cyber Intelligence Information System Security Manager (ISSM) plays a key role on the Information Security team, supporting a dynamic range of current and emerging computer networks, communication systems, and cutting-edge projects. This position collaborates closely with senior leadership to drive strategic initiatives and turn vision into action.   Essential Functions: •    Supports and mentors cybersecurity teams; provides leadership coverage in the absence of management.•    Partners with Cybersecurity Managers on strategic planning, funding allocation, and solution implementation.•    Conducts and manages risk assessments in compliance with NISPOM/DAAPM, RMF, JSIG, and NIST 800-series (e.g., 800-53, 800-171) standards.•    Leads development, review, and timely delivery of security artifacts supporting Authority to Operate (ATO).•    Contributes to Risk Management Framework (RMF) activities and related system lifecycle documentation (e.g., CONOPS, SOPs, training materials).•    Leads and participates in working groups to enhance policies, procedures, security solutions, and automation initiatives.•    Performs security reviews and audits; identifies gaps in architecture and develops mitigation strategies.•    Coordinates with internal and external stakeholders on secure system design and implementation.•    Oversees cyber compliance efforts through self-inspections, customer audits, and system tests to ensure authorized operation.•    Manages configuration change processes, including hardware/software updates, account management, media control, and documentation.•    Performs ISSO responsibilities as needed.•    Ensures security requirements are addressed in acquisitions, procurements, and outsourcing efforts.•    Ability to obtain and maintain a Top Secret clearance and additional clearances as required.•    Ability to lift up to 20 lbs.•    Willingness to travel up to 15%.•    Performs additional duties as assigned by senior leadership. Qualifications: •    Active DoD Secret clearance with current 6-year update; eligible to obtain Top Secret clearance.•    Bachelor’s Degree and minimum 9 years of prior relevant experience. Graduate Degree and a minimum of 7 years of prior related experience. In lieu of a degree, minimum of 13 years of prior related experience.•    Must obtain 8140 Certification (e.g., CISSP, CISM) within six (6) months of hire. Preferred Additional Skills:•    Bachelor’s or Master’s degree in a STEM or related field preferred; equivalent experience will be considered.•    Experience working in Special Access Programs (SAPs) and/or Collateral environments.•    Proficient in tools and technologies such as SPLUNK, Security Center, Trellix Suite (including DLP), DISA STIGs, eMASS, and Group Policy.•    Skilled in Microsoft Office Suite.•    Holds a current 8140 Certification (e.g., Security+, CISSP, CISM).•    Strong organizational, decision-making, and problem-solving abilities.•    Solid understanding of risk management, mitigation strategies, and customer service best practices.•    Excellent written and verbal communication and presentation skills.   #LI-FS1  
Responsibilities
The Lead, Cyber Intelligence (ISSO) manages cybersecurity teams and conducts risk assessments while ensuring compliance with various security standards. This role also involves overseeing security audits and coordinating with stakeholders on secure system design.
Loading...