Hurlburt Field, FL, Florida
65 days ago
Information System Security Manager ISSM (Engineer Info Assurance 4) - 20617

​Requisition Number: 20617 

Required Travel: 0 - 10% 

Employment Type: Full Time/Salaried/Exempt

Anticipated Salary Range: $101,821.00 - $145,000.00 

Security Clearance: TS/SCI 

Level of Experience: Senior 

 

Meet HII’s Mission Technologies Division
Our team of more than 7,000 professionals worldwide delivers all-domain expertise and advanced technologies in service of mission partners across the globe. Mission Technologies is leading the next evolution of national defense – the data evolution - by accelerating a breadth of national security solutions for government and commercial customers. Our capabilities range from C5ISR, AI and Big Data, cyber operations and synthetic training environments to fleet sustainment, environmental remediation and the largest family of unmanned underwater vehicles in every class. Find the role that’s right for you. Apply today. We look forward to meeting you.

 

To learn more about Mission Technologies, click here for a short video: https://vimeo.com/732533072

 

Job Description

 

HII Mission Technologies has been selected as one of Military.com's "Top 25 Employers for Veterans in 2024" and we are a Forbes Best Large Employer for 2023!!!


Are you ready to take your career to the next level? We are seeking a talented and experienced ISSM join our team!
 

HII – Mission Technologies Corp. is looking for a Senior Information Systems Security Manager (ISSM) to support Special Projects at Mary Esther, FL. Candidate must have a TS/SCI clearance. Experience working with legacy IT, Cloud-based IaaS, SaaS, and Platform Integrated Technology (PIT) is desired. Individual will be responsible for conducting information system security engineering activities that captures and refines information security requirements and ensures the requirements are effectively integrated into information systems.

Come support our work with the AFSOC Program Office and join a world class team of groundbreaking scientists and engineers!


Details below!

What you will do Acquire and manage the necessary resources, including leadership support, financial resources and key security personnel to support information technology (IT) security goals and objectives and reduce overall organizational risk Advise senior management on risk levels and security posture. Advise appropriate senior leadership or Authorizing Official of changes affecting the organization's cybersecurity posture. Collect and maintain data needed to meet system cybersecurity reporting. Communicate the value of information technology (IT) security throughout all levels of the organization stakeholders. Ensure that security improvement actions are evaluated, validated, and implemented as required. Ensure that cybersecurity inspections, tests, and reviews are coordinated for the network environment. Ensure that cybersecurity requirements are integrated into the continuity planning for that system and/or organization(s). Evaluate and approve development efforts to ensure that baseline security safeguards are appropriately installed. Identify alternative information security strategies to address organizational security objective. Interpret patterns of noncompliance to determine their impact on levels of risk and/or overall effectiveness of the enterprise's cybersecurity program. Manage the monitoring of information security data sources to maintain organizational situational awareness. Oversee the information security training and awareness program. Participate in an information security risk assessment during the Security Assessment and Authorization process. Participate in the development or modification of the computer environment cybersecurity program plans and requirements. Prepare, distribute, and maintain plans, instructions, guidance, and standard operating procedures concerning the security of network system(s) operations. Provide system-related input on cybersecurity requirements to be included in statements of work and other appropriate procurement documents. Recognize a possible security violation and take appropriate action to report the incident, as required. Supervise or manage protective or corrective measures when a cybersecurity incident or vulnerability is discovered. Track audit findings and recommendations to ensure that appropriate mitigation actions are taken. Oversee policy standards and implementation strategies to ensure procedures and guidelines comply with cybersecurity policies. Identify security requirements specific to an information technology (IT) system in all phases of the system life cycle. Ensure that plans of actions and milestones or remediation plans are in place for vulnerabilities identified during risk assessments, audits, inspections, etc. Additional responsibilites

​​​​

Assure successful implementation and functionality of security requirements and appropriate information technology (IT) policies and procedures that are consistent with the organization's mission and goals. Advise the organization, stakeholders and teammates concerning the impact levels for confidentiality, integrity, and availability for the information systems. Evaluate threats and vulnerability to information systems to ascertain the need for additional safeguards. Author, Review and Approve information system security assessment plans, which is comprised of the SSP, the SCTM, and the security control assessment procedures. Ensure security assessments are completed for information systems. Develop and sustain Risk Management Framework Packages in EMASS, or Xacta or other mandated toolsets. Prepare the final Security Assessment Report (SAR) which includes assessment results and findings, at the conclusion of each security assessment activity. Initiate a POA&M with identified weakness and suspense dates for each information system based on findings and recommendations from the Sar. Assess proposed changes to information systems, their environment of operation, and mission needs that could affect system authorization. Provide purposeful security architecting, design, development, and configuration of information systems. Provide inputs to development teams responsible for designing and developing organizational information systems and upgrading legacy systems. Employ best practices when implementing security requirements for information systems including software engineering methodologies, system/security engineering principles, secure design, secure architecture, and secure coding techniques. What we are looking for 9 years relevant experience with Bachelors in related field; 7 years relevant experience with Masters in related field; 4 years relevant experience with PhD or Juris Doctorate in related field; or High School Diploma or equivalent and 13 years relevant experience. BAS in Cyber Security and 5 years of relevant cyber security experience IAM Level 3 Certification; CISSP Certification is highly desired. Minimum of 8 years of relevant DoD cyber security work experience No less than three (5) years’ experience in a DoD environment within the least five (5) years Must possess an active TS/SCI security clearance, current within five years, based upon a single scope background investigation (SSBI) or SSBI periodic review. Preferred Requirements Have extensive familiarity with the DoD, USAF and USSOCOM RMF processes. Candidates with experience supporting the Joint Operations Support Cloud Environment, Warfighter Worldwide Network (WWN), and Joint Personal Edge Compute Device (JPECD) are highly preferred. Keep abreast of current and new security technologies and threats. Research and review proposed new systems, networks, and software designs for potential security risks and impacts; recommend mitigation, countermeasures, or other options. Identify integration issues related to the implementation of new systems within the existing infrastructure; recommend mitigation and/or resolution options. Physical Requirements May require working in an office, industrial, shipboard, or laboratory environment. Adequate visual acuity and manual dexterity for meeting the requirements Software Engineer family.

HII is more than a job - it’s an opportunity to build a new future. We offer competitive benefits such as best-in-class medical, dental and vision plan choices; wellness resources; employee assistance programs; Savings Plan Options (401(k)); financial planning tools, life insurance; employee discounts; paid holidays and paid time off; tuition reimbursement; as well as early childhood and post-secondary education scholarships. Bonus/other non-recurrent compensation is occasionally offered for qualified positions, and if applicable to this role will be addressed by the recruiter at the screening phase of application.

 

The listed salary range for this role is intended as a good faith estimate based on the role's location, expectations, and responsibilities. When extending an offer, HII's Mission Technologies division takes a variety of factors into consideration which include, but are not limited to, the role's function and a candidate's education or training, work experience, and key skills.

 

Why HII
We build the world’s most powerful, survivable naval ships and defense technology solutions that safeguard our seas, sky, land, space and cyber. Our diverse workforce includes skilled tradespeople; artificial intelligence, machine learning (AI/ML) experts; engineers; technologists; scientists; logistics experts; and business administration professionals.

 

Recognized as one of America’s top large company employers, we are a values and ethics driven organization that puts people’s safety and well-being first. Regardless of your role or where you serve, at HII, you’ll find a supportive and welcoming environment, competitive benefits, and valuable educational and training programs for continual career growth at every stage of your career.

 

Together we are working to ensure a future where everyone can be free and thrive.
Today’s challenges are bigger than ever, and the nation needs the best of us. It’s why we’re focused on hiring, developing and nurturing our diversity. We believe that diversity among our workforce strengthens the organization, stimulates creativity, promotes the exchange of ideas and enriches the work lives of all our employees. 

 

All qualified applicants will receive consideration for employment without regard to race, color, religion, gender, gender identity or expression, sexual orientation, national origin, physical or mental disability, age, or veteran status or any other basis protected by federal, state, or local law.

 

Do You Need Assistance? 
If you need a reasonable accommodation for any part of the employment process, please send an e-mail to buildyourcareer@hii-co.com and let us know the nature of your request and your contact information. Reasonable accommodations are considered on a case-by-case basis. Please note that only those inquiries concerning a request for reasonable accommodation will be responded to from this email address. Additionally, you may also call 1-844-849-8463 for assistance. Press #3 for HII Mission Technologies. 

Confirm your E-mail: Send Email