Lead, Cyber Intelligence (ISSM)
Company: L3 Technologies
Location: Plano
Posted on: March 19, 2023
Job Description:
Description:
Job Title: Lead, Cyber Intelligence (Information System Security
Manager, ISSM)
Job ID: IMS20222911-94023
Job Location: Plano, TX
Job Description:
The Information System Security Manager (ISSM) is part of an
Information Security team supporting a wide variety of existing and
developing computer network and communications systems and
projects. The ISSM implements goals established by leadership. The
ISSM is responsible for the development and implementation of
security controls required IAW Information System (IS)
categorization and overlay application.
The Advanced Systems & Technologies (AS&T) division is a part
of L3Harris' Agile Development Group and specializes in developing
disruptive, next-generation technologies for advanced Unmanned Air
Systems (UAS / UAV), advanced radar systems, next-generation weapon
systems, and other RF sensor technologies using small company
agility and big company experience.
Essential Functions:
- Manage, develop, and conduct risk assessment procedures for
verification of RMF/Assessment and Authorization (A&A)
safeguards to meet various regulatory requirements based upon
NISPOM/DAAPM, RMF, JSIG, and NIST 800 series (800-53, 800-171 etc.)
guidelines.
- Author, provide oversight, and timely delivery of various
artifacts supporting RMF package artifacts to include the System
Security Plan (SSP), Security Control Traceability Matrix (SCTM),
Plan of Actions & Milestones (POA&M), Continuous Monitoring
(ConMon) Plan, CONOPS, and other RMF BoE artifacts.
- Manages inputs into Risk Management Framework process
activities and related documentation (e.g., system life-cycle
support plans, concept of operations, operational procedures, and
maintenance training materials).
- Performs security reviews, identify gaps in security
architecture, and develop a security risk management plan.
- Performs risk analysis (e.g., threat, vulnerability, and
probability of occurrence) whenever an application or system
undergoes a major change.
- Coordinates with internal/external partners to establish system
security designs and validates compliance requirements.
- Responsible for analyzing and/or administering security
controls for information systems.
- Establish acceptable limits for the software application,
network, or system.
- Monitor IA Program compliance by performing periodic
self-inspections, and tests and reviews of the IS to ensure that
systems are operating as authorized/accredited and that conditions
have not changed.
- Maintain operating systems and software in compliance with DISA
STIGs .
- Configuration change management processes (including
hardware/software changes, account management, media control
procedures, disposition, Assured File Transfers (AFT) and related
documentation) in accordance to policies and procedures.
- Verify that application software/network/system security
postures are implemented as stated, document deviations, and
recommend required actions to correct those deviations.
- Review audit data of the IS and IS components (technical &
physical) for anomalous or unauthorized activities.
- Conduct Cybersecurity training, briefings, presentations for
multiple levels of business.
- Provide leadership and oversight in absence of management.
- Participates in interdepartmental projects and provides council
on Cybersecurity policy and procedures.
- Ensure that all acquisitions, procurements, and outsourcing
efforts address information security requirements consistent with
organization goals.
- Train and mentor ISSOs and SAs.
- Perform other IS-related duties as assigned by leadership on
"as required" basis.
- Must obtain 8570 IAM Level III Certification (CISSP, CISM etc.)
within six (6) months of hire.
- Ability to obtain and maintain DoD Top Secret clearance
- Ability to obtain and maintain any additional clearances as
required
- Ability to lift up to 20 lbs.
- Up to 10% travel may be required.
- Other duties as assigned Qualifications:
- U.S. citizen
- Active DoD Secret clearance with current 5 year update
- Bachelor's degree in STEM or a related field and/or equivalent
experience
- Minimum 9 years prior relevant experience with various
operating systems (Windows, Linux, UNIX, Solaris, Cisco), Windows
server systems, thin client architecture, system virtualization,
and other related peripherals.
- Experience using Microsoft Office products Preferred Additional
Skills:
- Master's degree in STEM or a related field and/or equivalent
experience desired
- 8570 IAM Level III Certification (CISSP, CISM etc.)
- Experience with SPLUNK, Nessus, eMASS, RMFKS, Xacta, and other
software/systems
- Demonstrate basic organizational, decision-making, and
problem-solving skills
- Ability to act and complete tasks independently as well as with
team support
- Experience with technical configuration standards relating to
information system security
- Experience with applying, searching, leveraging SCAP and
STIGs
- Experience with configuration/certification and
auditing/analysis of Windows, Linux, UNIX systems to include
stand-alone IS, peer-to-peer networks, LANs/WANs and
interconnections
- Ability to work in a team environment and adapt workload to
accommodate changing project priorities
- Well versed in risk management, mitigation, and customer
service
- Excellent people skills, with ability to collaborate in a
multi-disciplinary, diverse, and dynamic team environment
- Outstanding work ethic and commitment to organizational
success
- Excellent written and verbal presentation skills to communicate
well with team members, customers and leadership
- Demonstrate excellent organizational, decision-making, and
problem-solving skills
- Ability to act and complete tasks independently with
minimal/reasonable amount of support from team members
- Experience in Special Access Program environments
Keywords: L3 Technologies, Plano , Lead, Cyber Intelligence (ISSM), Other , Plano, Texas
Didn't find what you're looking for? Search again!
Loading more jobs...