Information Security Manager - TS/SCI with Polygraph

General Dynamics Information TechnologyChantilly, VA
1d$164,382 - $218,500Onsite

About The Position

Responsible for providing contract Security Oversight and Management Monitor and analyze Intrusion Detection Systems (IDS) to identify security issues for remediation. Recognizes potential, successful, and unsuccessful intrusion attempts and compromises thorough reviews and analyses of relevant event detail and summary information. Evaluate firewall change requests and assess organizational risk. Communicates alerts to agencies regarding intrusions and compromises to their network infrastructure, applications and operating systems. Design, integrate, and implement information systems security infrastructure Analyzes the information systems to ensure that appropriate security functions have been included in the systems design and architecture. Recommend and implement changes to enhance systems security and prevent unauthorized access. Research security trends new methods, and techniques used in unauthorized access of data to preemptively eliminate the possibility of system breach. Provide guidance and direction on best practices for the protection of information. Safeguards the network against unauthorized infiltration, modification, destruction or disclosure. Develops, tests, and operates firewalls, intrusion detection systems, enterprise anti-virus systems and software deployment tools. Implements, enforces, communicates and develops security policies or plans for data, software applications, hardware, and telecommunications. Develop policies and procedures to prevent unauthorized access. Provides recommendations to clients on information assurance engineering standards, implementation dependencies, and changing information assurance related technologies. Performs periodic and on-demand system audits and vulnerability assessments, including user accounts, application access, file system and external Web integrity scans to determine compliance. Provides information to management regarding the negative impact on the business caused by theft, destruction, alteration or denial of access to information. Provides expert guidance and leadership to less-experienced team members. May serve as a task or project leader. (Not a people manager) Provides information assurance project management, technical security staff oversight, and development of mission-critical technical documents. Develops and improves processes and direction for projects. Performs preliminary forensic evaluations of internal systems. Leads the development and implementation of the information systems security programs Provides guidance in the creation and maintenance of Standard Operating Procedures and other similar documentation Ensure compliance with regulations and privacy laws. Recognized as an industry leader in information security. Active TS/SCI with Polygraph required

Requirements

  • Cloud Security
  • Information System Security
  • Intrusion Detection System (IDS)
  • 5 + years of related experience
  • US Citizenship Required
  • Active TS/SCI with Polygraph required
  • The successful candidate will have at least eight plus (8+) years’ experience and five plus (5+) years of cybersecurity experience with demonstrated success with largescale and complex IT services, cybersecurity, program security, cloud security, risk management to include governance, assessment, mitigation, and compliance, NIST frameworks, and team, stakeholder, vendor management.

Nice To Haves

  • Bachelor’s Degree in a Related Technical Field/ Certified Information Systems Security Professional (CISSP), Information Systems Security Officer (ISSO)

Responsibilities

  • Provide contract Security Oversight and Management
  • Monitor and analyze Intrusion Detection Systems (IDS) to identify security issues for remediation.
  • Recognizes potential, successful, and unsuccessful intrusion attempts and compromises thorough reviews and analyses of relevant event detail and summary information.
  • Evaluate firewall change requests and assess organizational risk.
  • Communicates alerts to agencies regarding intrusions and compromises to their network infrastructure, applications and operating systems.
  • Design, integrate, and implement information systems security infrastructure
  • Analyzes the information systems to ensure that appropriate security functions have been included in the systems design and architecture.
  • Recommend and implement changes to enhance systems security and prevent unauthorized access.
  • Research security trends new methods, and techniques used in unauthorized access of data to preemptively eliminate the possibility of system breach.
  • Provide guidance and direction on best practices for the protection of information.
  • Safeguards the network against unauthorized infiltration, modification, destruction or disclosure.
  • Develops, tests, and operates firewalls, intrusion detection systems, enterprise anti-virus systems and software deployment tools.
  • Implements, enforces, communicates and develops security policies or plans for data, software applications, hardware, and telecommunications.
  • Develop policies and procedures to prevent unauthorized access.
  • Provides recommendations to clients on information assurance engineering standards, implementation dependencies, and changing information assurance related technologies.
  • Performs periodic and on-demand system audits and vulnerability assessments, including user accounts, application access, file system and external Web integrity scans to determine compliance.
  • Provides information to management regarding the negative impact on the business caused by theft, destruction, alteration or denial of access to information.
  • Provides expert guidance and leadership to less-experienced team members.
  • May serve as a task or project leader.
  • Provides information assurance project management, technical security staff oversight, and development of mission-critical technical documents.
  • Develops and improves processes and direction for projects.
  • Performs preliminary forensic evaluations of internal systems.
  • Leads the development and implementation of the information systems security programs
  • Provides guidance in the creation and maintenance of Standard Operating Procedures and other similar documentation
  • Ensure compliance with regulations and privacy laws.

Benefits

  • Comprehensive benefits and wellness packages
  • 401K with company match
  • Competitive pay and paid time off
  • Full flex work weeks where possible
  • Vacation, sick and personal time, holidays, paid parental, military, bereavement and jury duty leave
  • Short and long-term disability benefits
  • Life, accidental death and dismemberment, personal accident, critical illness and business travel and accident insurance

Stand Out From the Crowd

Upload your resume and get instant feedback on how well it matches this job.

Upload and Match Resume

What This Job Offers

Job Type

Full-time

Career Level

Mid Level

Number of Employees

5,001-10,000 employees

© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service