Information Systems Security Manager with Security Clearance Information Technology (IT) - Alexandria, VA at Geebo

Information Systems Security Manager with Security Clearance

Requisition Number:
15766 Required Travel:
0 - 10% Employment Type:
Full Time/Salaried/Exempt Hours Per Week:
40 Security Clearance:
TS/SCI Level of
Experience:
Senior Job Description Commonwealth Technology Innovation (CTI), a Huntingdon Ingalls Industries (HII) company, is seeking to hire a motivated and technically skilled Information Systems Security Manager (ISSM) in our Alexandria, VA locationThe ISSM is responsible for managing and maintaining the Information Assurance (IA) requirements for sensitive information systemsYou will be required to ensure IA compliance with internal and external standardsYour responsibilities will include securing the day-to-day operation and implementation of the systems, providing technical and administrative guidance in support of the systems, and developing and managing projects associated with Information SecurityPut your skills to the test with one of today's top defense companiesAs a Top Employer recognized by Forbes, HII is committed to creating an inclusive work atmosphere that values everyoneYou will have the opportunity to be a critical asset and essential part of the team that will define your career, now and in the futureAt CTI we develop customized mission-enabling solutions that seamlessly blend technology and tradecraftWe value collaboration, imagination, and hands-on creativity and our employees come from diverse backgrounds, bringing a broad spectrum of technical experience to our teamWe expect that you will apply your skills and shape this position based on your strengths and interestsBy joining CTI, your talents will build on the industry-leading reputation we've earned over more than five decadesBeyond competitive salary and benefits, you will earn a sense of accomplishment by making meaningful contributions to our nation's top security prioritiesCTI offers access to all the resources of our parent company HII while maintaining a small company feel across our operations concentrated in Northern Virginia with some of the most comprehensive secure rapid prototyping facilities in the mid-Atlantic region including a full in-house machine shop, composite fabrication, finishing, electronics assembly and testing capabilitiesElectronic solutions include communications, sensors, motion platforms, and antennas in unique packaging and form factorsSoftware solutions include motion and systems control, recognition and classification AI/ML, graphical user interfaces, data encryption, and communication protocolsThe results of your ideas, designs, and skills are realized as they quickly become finished products deployed worldwideEssential Job Responsibilities Designs and implements information assurance and security engineering systems with requirements of business continuity, operations security, cryptography, forensics, regulatory compliance, internal counter-espionage (insider threat detection and mitigation), and physical security analysis (including facilities analysis, and security management)Assesses and mitigates system security threats and risks throughout the program life cycleValidates system security requirements definition and analysisEstablishes system security designsImplements security designs in hardware, software, data, and proceduresVerifies security requirements; performs system certification and accreditation planning and testing and liaison activitiesSupports secure systems operations and maintenanceMinimum Qualifications 9 years relevant experience with Bachelors in related field; 7 years relevant experience with Masters in related field; 4 years relevant experience with PhD or Juris Doctorate in related field; or High School Diploma or equivalent and 13 years relevant experiencePossess and maintain an active TS/SCI clearance Knowledge of new and emerging IT and cybersecurity technologies Experience performing ISSO duties as outlined in DoDI 8500.
01 and DoDI 8510.
01 for assigned systems and applications Effective communication skills (written and verbal) ensuring clear and effective communication with technical peers Cisco CyberOps Professional certification SIPRNet experience Preferred Requirements Experience using E-Mass Possess COMSEC management experience CCNP Security certification This opportunity resides with Cyber& Electronic Warfare, a business group within HII's Mission Technologies divisionHII works within our nation's intelligence and cyber operations communities to defend our interests in cyberspaceOur deep expertise in network architecture, software and hardware development, cybersecurity and the electromagnetic environment uniquely enables us to support sensitive missions for federal agency partnersHII is a global engineering and defense technologies providerWith a 135-year history of trusted partnerships in advancing U.
Snational security, HII delivers critical capabilities ranging from the most powerful and survivable naval ships ever built, to unmanned systems, ISR and AI/ML analyticsHII leads the industry in mission-driven solutions that support and enable a networked, all-domain forceHeadquartered in Virginia, HII's skilled workforce is 44,000 strongFor more information, please visit:
hii.
comHII is committed to cultivating an inclusive company culture to promote collaboration and enhance creativity by hiring a diverse work forceHII is an Equal Opportunity/Vets and Disabled EmployerU.
SCitizenship may be required for certain positions.
Recommended Skills Management Operations Information Systems Information Technology Professional Services Analysis Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.