Responsibilities include, but are not limited to:
Ensure that assigned ISs are operated, maintained, and disposed of in accordance with approved security policies and practices
Ensure a process for managing changes in user access to ISs (as required access and need-to-know change) and for terminating user access when it is no longer required or authorized, according to established policy requirements.
Ensure general users and privileged users are trained in the specific knowledge needed for them to safely operate and maintain the ISs to which they have access, including general security awareness and specialized privileged user training
Disseminate, control, and manage the issuance of user identifications and passwords for assigned ISs, and provide authorized lists to appropriate system administrators.
Develop, implement, and enforce information systems security policies.
Ensure that system security requirements are addressed during all phases of the IS lifecycle
Ensure implementation of a Configuration Management Plan (CMP) for software, hardware, and firmware is documented and maintained, and serve as a member of the Configuration Management Board, with Information System Security Manager (ISSM) and System Owner concurrence.
Manage the review and release of media and/or memory components.
Develop and maintain System Security Plans (SSPs) and all other system security documentation, reviewing and updating them at least annually for all assigned systems.
Author or coordinate the development of other required system plans: Configuration Management Plan (CMP), Contingency Plan (CP), Continuity of Operations (COOP) and Disaster Recovery Plan (DRP) (as required) , and Incident Response Plan (IRP).
Support risk assessment and evaluation activities throughout the Security Authorization or site accreditation process.
Implement a strategy for continuous monitoring for assigned systems including: Establishing system audit trails and ensuring their review, reporting all identified security findings and initiating the periodic review of security controls
Ensure compliance with annual Federal Information Security Management Act (FISMA) deliverables and reporting, if required for assigned ISs
Ensure security awareness and precautionary measures are exercised to prevent
Introduction and/or proliferation of malicious code or other adverse IS conditions. This includes exercise of continuity and/or disaster recovery plans, as required
Initiate, with ISSM or CSO approval, protective and corrective measures when a security incident or vulnerability is discovered. Monitor IS recovery processes and ensure proper restoration of IS security features
Oversee IS recovery processes for all unplanned outages, including Disaster Recovery and initiation of the CP, whether actual or exercise
Advises the System Owners regarding security considerations in the various applications ·
Serves as a resource for users concerning all security questions regarding assigned systems and applications
Works closely with the System Administration to maintain the various system and application security authorization status
Ensure that all users have the requisite security clearances, authorization, and need-to know before granting access to the IS, and administer/witness signing of user agreements and or Rules of Behavior
Research and maintains knowledge of Information Assurance (IA) policies and practices, seeking clarification from the ISSM or higher authority when needed, and disseminates these to users
Perform leadership responsibilities to mentor and provide direction to more junior-level ISSO team members, as requested
B.S. degree required (B.S. degree may be substituted for 4 years of work experience, preferably in IT) plus 5 years of IT Security related experience (with min. 2 years of FISMA experience).
CISSP is required. Candidates that do not current have a CISSP must be able to qualify and pass the certification within 6-9 months of hire start date.
Apply now to have the opportunity to be considered for similar jobs at leading companies in the Seen network for FREE.
ManTech provides innovative technologies and solutions for mission-critical national security programs for the intelligence community.
Employee stock ownership program; tuition assistance; retail discount program (Barnes & Noble, Dell, Apple, Walt Disney World, Costco).
Phone screen with recruiter; phone screen with team lead; onsite interview; security clearance check. Average interview period: 2 weeks.
Zero stress and one profile that can connect you directly to 1000s of companies.
We’ll take it from there. After you tell us what you’re looking for, we’ll show you off to matches.
Boost your interview skills, map your tech career and seal the deal with 1:1 career coaching.
Join now and Be Seen.