InformationSystem Security Manager (ISSM) 2's primary function serves as a principal advisor on all matters, technical and otherwise, involving the security of informationsystems under their purview. Primary support will be working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of … for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. Performance shall include : Perform oversight of the development, implementation and evaluation of informationsystem security program policy; special emphasis placed upon integration of existing SAP network infrastructures Develop and oversee operational informationsystems security implementation policy and guidelines of network security … and other cyber security personnel receive the necessary technical and security training to carry out their duties Develop, review, endorse, and recommend action by the AO or DAO of system assessment documentation Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media Develop and execute security assessment plans that include verification that More ❯
InformationSystem Security Manager (ISSM) 2's primary function serves as a principal advisor on all matters, technical and otherwise, involving the security of informationsystems under their purview. Primary support will be working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of … for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. Performance shall include : Perform oversight of the development, implementation and evaluation of informationsystem security program policy; special emphasis placed upon integration of existing SAP network infrastructures Develop and oversee operational informationsystems security implementation policy and guidelines of network security … and other cyber security personnel receive the necessary technical and security training to carry out their duties Develop, review, endorse, and recommend action by the AO or DAO of system assessment documentation Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media Develop and execute security assessment plans that include verification that More ❯
InformationSystem Security Manager (ISSM) 1's primary function serves as a principal advisor on all matters, technical and otherwise, involving the security of informationsystems under their purview. Primary support will be working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of … for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. Performance shall include : Perform oversight of the development, implementation and evaluation of informationsystem security program policy; special emphasis placed upon integration of existing SAP network infrastructures Develop and oversee operational informationsystems security implementation policy and guidelines of network security … and other cyber security personnel receive the necessary technical and security training to carry out their duties Develop, review, endorse, and recommend action by the AO or DAO of system assessment documentation Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media Develop and execute security assessment plans that include verification that More ❯
Mission User Group meetings, works closely UX engineers, reviews requirements and wireframes for implementation. Manages agile process. Requires good communication skills, leadership experience. Knowledgeable in user interface design methodologies. System Engineering responsible for engineering the TMOD ITOS architecture implementing all requirements identified through requirements management, ensuring traceability of requirements through system design, developing, testing, verification, and … validation Analyzes user's requirements, concept of operations documents, and high level system architectures to develop system requirements specifications. Analyzes system requirements and leads design and development activities. Guides users in formulating requirements, advises alternative approaches, and conducts feasibility studies. Provides technical leadership for the integration of requirements, design, and technology. Incorporates new plans, designs and systems … into ongoing operations. Develops technical documentation. Develops system Architecture and system design documentation. Guides system development and implementation planning through assessment or preparation of system engineering management plans and system integration and test plans. Interacts with the Government regarding Systems Engineering technical considerations and for associated problems, issues or conflicts. Ultimate responsibility for More ❯
Laurel, Maryland, United States Hybrid / WFH Options
TEKsystems c/o Allegis Group
Global Solutions Management - Operations II (GSM-O II) contract at DISA. This contract includes the Operations, Sustainment, Maintenance, Repair, and Defense of the Defense InformationSystem Network (DISN) within the DOD Information Network (DODIN) in support of the Defense InformationSystems Agency (DISA). It also includes support to other key … clearance and Security + are required upon start. Primary Responsibilities: • Excellent written and verbal communication skills a must. • Interact with members of the technical team to understand the current system, subsystems, and component specifications. • Responsible for understanding entire projects or processes spanning multiple technical areas. • Support risk assessment, risk management, security control assessment, continuous monitoring, service design … program support functions. • Support and assist in documentation production using various software tools and applying consistent formatting and style throughout documentation. • Participate in the development, facilitation, and coordination of system documentation such as: System Engineering Plans; Initial Capabilities Documents; Requirements Specifications; and Interface Control Documentation; Assessment and authorization documentation (Body of Evidence) for management and continuous More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
TalkTalk Telecom Group PLC
experts in their field who embody our values every day: we care; we challenge; we commit. About the Role You will be part of an efficacious Security Risk Management and Governance team that exists in a strong and mature Security function within PXC's Technology and Security Business Unit. … Reporting directly into the Head of Security Risk Management and Governance, you will be responsible for management of Information Security ManagementSystem and maintain compliance with the respective security standards. Key Responsibilities Working cross-functionally, this role is pivotal to the successful management and maintenance of PXC's several … facilitate our response to our external auditors. Responsibilities will include: Maintain and continually improve PXC's external compliance, including mergers & acquisition's, Information Security ManagementSystem (ISMS) and compliance regime for security certifications (TSA, ISO27001, PCI, Cyber Essentials, External Audit IT General Controls). Oversee and manage the process for responding to incoming customer security More ❯
Description Provides support for implementation, troubleshooting and maintenance of information Technology (IT) systems. Manages IT system infrastructure and any processes related to these systems. Provides support to IT systems including day-to-day operations, monitoring and problem resolution for all of the client/server/storage/network devices, mobile devices, etc. Provides Tier 1 (Help … problem identification, diagnosis and resolution of problems. Provides support for the escalation and communication of status to agency management and internal customers. Provides support for the dispatch system and hardware problems and remains involved in the resolution process. Configures and manages UNIX, Linux and Windows operating systems and installs/loads operating system software, troubleshoots, maintains … and resolution of problems Perform account management, e.g. establishing, activating, modifying, disabling, and removing accounts. Provide configuration management, implementation, and sustainment of compliance with applicable system security controls. Perform periodic vulnerability scans of systems Provide support to IT systems including day-to-day operations, monitoring and problem resolution for all of the client/server More ❯
About the Role: Hot Job - Immediate Opening! The Senior Acquisition Program Management Specialist will work closely with government Assistant Program Managers (APMs) in support of specific programs and support large Acquisition Category (ACAT) Level III projects which include regimented, acquisition-specific actions requiring command-level oversight. What You'll Do in Your New Role: Develop program support documentation … e.g., Simple Acquisition Management Plans (SAMPs), Acquisition Program Baselines (APBs), Analyses of Alternatives (AoAs), etc.) in order to support the acquisition strategy/plan, acquiring appropriate approvals specified by the APMs, Program Executive Officer (PEO) and the Acquisition Executive. Assist Government personnel in facilitating procurement and acquisition planning sessions with user departments' representatives to ensure understanding of the … and associated timeframes, and establishing respective roles and responsibilities. Advise Government personnel in the preparation of new requirements documentation. In addition, assist Government personnel in preparing new equipment and system SOOs and SOWs to satisfy validated unit requirements. Track the status of procurement actions. Prepare and submit logistics data to the receiving supply support activity. Perform market research to More ❯
logical models in order to understand data requirements. Have familiarity with the major varieties of JSON (JSON-LD, GeoJSON, JSON-B, etc.). Have familiarity with Simple Knowledge Organization System (SKOS). Desired: Able to develop, describe & apply complex concepts & processes. Perform multiple tasks at specialist level in a leadership role. Lead and manage multiple Junior/Mid-level … Framework (RDF) and Web Ontology Language (OWL). Have familiarity with the major varieties of JSON (JSON-LD, GeoJSON, JSON-B, etc.). Have familiarity with Simple Knowledge Organization System (SKOS) UML (class diagrams): OCL A plus GML, XML or XSD JSON, JSON-Schema or similar (JSON-LD, GeoJSON) OWL, SKOS, and/or RDF Experienced using data and … system modeling tools such as Sparx Enterprise Architect MySQL MS Access Microsoft Visual Basic (VBA) programming SQL Logical data modeling and/or data architecture experience; experience with ontologies, taxonomies, vocabularies, thesauri a plus Java experience is a plus but not required. Attention to detail & organized. Eager to learn new technologies and skills. Good verbal and written communication Familiar More ❯
Currently seeking an InformationSystems Security Engineers (ISSE) to support an Intel Community (IC) customer in the Herndon, Virginia area. ISSE responsibilities for conducting informationsystem security engineering activities for new or existing system(s) may include: Defines information security requirements and their integration into informationsystems and its technology … assessments to verify compliance with required configuration guidance and support A&A testing and validation of security designs. Conducting risk analysis reviewing ACAS, CVEs, plugins, CWEs, research, collaborating with System Administrators to mitigate identified vulnerabilities and/or author Plans of Actions and Milestones (POA&M) as needed. Execution of continuous monitoring efforts responds to data calls, scan requests … technical input. Support government activities and report to appropriate IC and DoD authorities (i.e., USCYBERCOM, IC-SCC) Support security authorization activities in compliance with the customer InformationSystem Certification and Accreditation Process following the NIST Risk Management Framework (RMF), CNSSI No 1243 and other prescribed business processes for security engineering. Assist architects and systems developers More ❯
Purpose : The Junior Information Security Officer (JISO) will assist the Information Security team in implementing and maintaining the information security managementsystem with the objective of managing risks to information assets to an acceptable level. The JISO will develop a good understanding of the information security policies … is imperative that the JISO develops a strong understanding of the organisation's technology landscape to help identify potential threats and vulnerabilities. Key Responsibilities: Assist in maintaining the information security standards, procedures and guidelines. Participate in the information security risk management process to identify, assess, treat and monitor risks. Manage information security … incidents and events to protect information assets. Help develop and implement incident response plans and procedures to ensure that information services are recovered in a timely manner in the event of a security breach. Track vendor and media disclosure of threats and vulnerabilities and advise on the appropriate courses of action. Audit security controls and report More ❯
Are you interested in using your skills to help shape the Cyber, Security, & Intel space? If so, look no further. Amentum is seeking a Senior InformationSystem Security Engineer to join our team of passionate individuals in Warrenton, VA. In this role you will support challenging, mission-critical projects that make a direct impact on the Nation … provide imaginative solutions that enable the adoption of innovation and emerging technologies that create opportunities for transformative change. Responsibilities: The duties and responsibilities of the Senior InformationSystem Security Engineer (ISSE) include, but are not limited to, the following: Experience creating custom dashboards, writing queries, building, and generating reports, and setting up alerts and notifications using all … future products/systems thus ensuring these systems can be accredited based on compliance with the Joint Special Access Program Implementation Guide (JSIG). Recommend the components to implement system security requirements using intimate knowledge of security design best practices for information systems. throughout the system development life cycle to support the generation of the security More ❯
Description Summary: The IT Architect II is responsible for design of IT systems including system infrastructure, system security, application architecture, software and data life cycle management. Provides enterprise architectural framework for the design, development, and deployment of information/business systems. Proactively drives the prioritization of key technology enablers for achieving enterprise level system objectives … solutions that exceed expectations. This role requires excellent collaboration and communication skills to translate complex requirements into functional architecture. Responsibilities: • Assists in the development of the informationsystem vision and strategy of the organization; assists in the development, implementation, communication, and promotion of strategic and tactical plans • Researches and participates in beta testing of new systems and … technologies in order to better evaluate their suitability to the CHRISTUS environment • Evaluates proposed system acquisitions and provides critical input to the decision-making process relative to compatibility, cost, resource requirements, operations, and maintenance; develops plans and recommendations to improve the performance and efficiency of assigned systems; addresses all aspects of assigned systems, including hardware, software, outside services, etc. More ❯
ll interact with the Government regarding Systems Engineering technical considerations and for associated problems, issues or conflicts. Responsibilities: Analyzes user's requirements, concept of operations documents, and high-level system architectures to develop system requirements specifications. Analyzes system requirements and leads design and development activities. Guides users in formulating requirements, advises alternative approaches, and conducts feasibility studies. … Provides technical leadership for the integration of requirements, design, and technology. Incorporates new plans, designs and systems into ongoing operations. Develops technical documentation. Develops system Architecture and system design documentation. Guides system development and implementation planning through assessment or preparation of system engineering management plans and system integration and test plans. Ultimate responsibility … Fourteen (14) years' experience as a systems engineering in programs and contracts of similar scope, type and complexity is required for a Systems Engineer II. Bachelor's degree in system engineering, Computer Science, InformationSystems, Engineering Science, Engineering Management, or related discipline from an accredited college or university is preferred. Five (5) years of additional More ❯
Description Summary: Manages controls and coordinates contract process standardization across the organization for IM. Responsible for establishing system standards with regards to contract database management in accordance with legal, accounting and risk requirements. Manages system wide contract database and responsible for user administration functions across the enterprise. Leads and manages the contract administrator resource group with … request for proposals (RFPs) for InformationManagement Department. Coordinates with purchasing department to insure adherence to GPO (group purchasing organization) requirements as appropriate. Responsibilities: • Provide system leadership for contracts administration processes, compliance and database functions. • Establish and maintain system standards for contract processing • Maintain centralized contract database • Perform user administration functions. • Develop and leads … system level resource group to align practices among business unit contract administrators. • Organize, maintain and electronically track all contracts and related documents within the InformationManagement department. Assists and trains business units in standard contract processes and procedures. • Audit of business unit contract processes to assure compliance with system standards. • Assist in contract development More ❯
Information Assurance, Nessus, RMF, Windows, Linux, WireShark, System Security Plans, Authorization to Operate, Verification and Validation, NIST, PKI, Scripting Due to federal contract requirements, United States citizenship and an active TS/SCI security clearance and polygraph are required for the position. Required: Must be a US Citizen. Must have TS/SCI clearance w/active … last five (05) years). At least fourteen (14) years of direct/relevant experience Bachelor's degree in Computer Science, Information Assurance, Information Security, System Engineering or related discipline from an accredited college or university is required. Four (04) years of additional relevant experience on projects with similar processes may be substituted for a … bachelor's degree. Certified InformationSystem Security Professional Certification (CISSP) or Security X (previously known as the CASP+) Certification required Must have a solid understanding of security practices and policies and hands-on vulnerability testing experience using Customer tools. Must have experience applying Risk Management Framework. Must have experience formulating and assessing IT security policy. More ❯
An exciting opportunity for a passionate SOC Analyst to join a unique, multi-national InformationManagement function. Ideal candidates should be committed to protecting our critical systems and ensuring the integrity and security of our network infrastructure. Salary : Circa £60,000 depending on experience plus Shift Premium Location: Stevenage, On Prem Shift pattern: consisting of days … treatments Facilities : Fantastic site facilities including subsidised meals, free car parking and much more... The opportunity: An opportunity has arisen in the cyber security operations centre (SOC) within InformationManagement (IM) for a SOC Threat Detection Analyst. Supporting the Senior SOC analysts in assisting IM meet the challenges and demands of countering the Cyber Threat. The … a proactive ethos in an ever-changing cyber security environment and provide robust threat detection and analysis within the 24x7 SOC. To support the SOC Manager in assisting InformationManagement UK meet the challenges and demands of countering the Cyber Threat. Support for the operational functions of the UK SOC. To work with other UK SOC More ❯
the ISSM in support of various information assurance programs such as security authorization activities in compliance with Risk Management Framework (RMF) policies and procedures including System Security Plans (SSPs), Risk Assessment Reports, A&A packages, and Security Controls Traceability Matrix (SCTM) Maintains operational security posture to ensure informationsystems (IS), security policies, standards … and procedures are established and followed Performs vulnerability/risk assessment analysis to support Assessment & Authorization (A&A) Review and analyze system audit logs to identify anomalous activity and potential threats to network resources Conducting vulnerability scans and recognizing vulnerabilities in security systems Ensure that cybersecurity-enabled products or other compensating security control technologies reduce identified risk to acceptable … identify security gaps in security architecture resulting in recommendations for inclusion in the risk Work with government customers to support computer security incidents and vulnerability compliance Input and maintain system documentation into government record-keeping systems Xacta Provide Configuration Management for security-relevant informationsystem software, hardware, and firmware; Perform risk analysis whenever an More ❯
challenging, mission-critical projects that make a direct impact on the Nation's security and intelligence mission. Responsibilities: Analyzes user's requirements, concept of operations documents, and high-level system architectures to develop system requirements specifications. Analyzes system requirements and leads design and development activities. Guides users in formulating requirements, advises alternative approaches, and conducts feasibility studies. … Provides technical leadership for the integration of requirements, design, and technology. Incorporates new plans, designs and systems into ongoing operations. Develops technical documentation. Develops system Architecture and system design documentation. Guides system development and implementation planning through assessment or preparation of system engineering management plans and system integration and test plans. Interacts with … with the Systems Engineering area of responsibility. Communicates with other program personnel, government overseers, and senior executives. Contribute to the development of sections of systems engineering documentation such as System Engineering Plans, Initial Capabilities Documents, Requirements specifications, and Interface Control Documents Manage system requirements and derived requirements to ensure the delivery of production systems that are compatible with More ❯
with more than 5,800 professionals who engineer and deploy automated, secure and resilient power and technology systems; and deliver the management platforms essential for long-term system sustainability. Together, we transform the way complex, large-scale systems are designed, delivered, and sustained-enhancing client outcomes, improving lives, and changing the world for the better. We are … seamless integration, and continued performance of these systems across multiple project sites. You will be responsible for analyzing user requirements, reviewing concept of operations documents, and assessing high-level system architectures to develop detailed system requirements specifications and designs. The role also involves incorporating new plans, designs, and technologies into ongoing operations, ensuring their alignment with current system … Access Control and Intrusion Detection drawing packages Design reviews for new building installation and renovation work to Access Control, Intrusion Detection and VMS devices. Assists with the development of system requirements, functional requirements, and allocation of the same to individual hardware, software, facility, and personnel components Participates in an Integrated Product Team to design new capabilities based upon evaluation More ❯
Management Offices with conducting End of the Year activities and the completion of the Actual data calls. Enter requisitions in the customer's financial managementsystem that include all necessary information and documentation (PSC#, PAR, SPAT, BER#, Acq Sec# etc.). Use customer financial managementsystems to prepare non-complex Military … associated requisitions. Process incoming MIPRs and EAOs using standard BM&A process to ensure Agency acceptance. Create and maintain spend plans in the Agency's financial managementsystem to document Government-specified requirements. Modify requisitions and associated documentation to comply with Contracting's guidance to assist in the obligation of funds. Assist Government Program Managers (GPMs) in … creation of budget or financial planning for an organization, organizational unit, program, or expenditure/cost center to identify potential variances. In the customer's financial managementsystem, prepare complex Military Interdepartmental Purchase Requests (MIPR) and Economy Act Orders (EAO) and their associated requisitions. Provide assistance in analyzing and developing improved policies, plans, methods, procedures, and systemsMore ❯
Job Number: 59 Job Category: GovTech Job Title: SENIOR INFORMATIONSYSTEM SECURITY MANAGER - VIRGINIA - URGENT Job Type: Full-time Clearance Level: Top secret/SCI Work Arrangement: Remote Job Location: Arlington VA Salary: 250k - 300k Background Utilize expert knowledge and experience regarding risk management strategies in support of a major DoD program Collaborate between the … assessments and identify potential vulnerabilities and threats to informationsystems Develop and implement risk mitigation strategies and controls to minimize the impact of security incidents Collaborate with system administrators, network administrators, and other stakeholders to plan and implement security measures for information systems. This includes establishing security controls and standards for informationsystems … including Continuous monitoring Develop and implement incident response procedures to reconstitute system operations to address security incidents and breaches Ensure compliance with relevant security standards, regulations, and frameworks Conduct periodic security audits and assessments to evaluate the effectiveness of security controls and identify areas for improvement Maintain accurate and up-to-date security documentation, including security plans, risk assessments More ❯
InformationSystem Security Officer (ISSO) L Garde is a full-service design, development, manufacturing, and qual-test supplier to Tier 1 primes and government agencies. We provide systems engineering and skilled technicians to make your Skunk Works-type project a reality. With over 50 years of aerospace and defense expertise, our deployable systems test the limits of … what's possible in the harshest of environments - in space, on the moon, and even on other planets. We are seeking a diligent and resourceful InformationSystem Security Officer (ISSO) to join our team. If you are a proactive cybersecurity professional with a passion for protecting critical systems and making an impact in national security, this role … a success. Key Responsibilities: Cybersecurity & Compliance •Support implementation, monitoring, and continuous improvement of cybersecurity controls in accordance with the Risk Management Framework (RMF). •Maintain and update System Security Plans (SSPs), POA&Ms, risk assessments, and continuous monitoring documentation. •Perform vulnerability assessments, penetration testing, and security audits using tools such as Nessus, SCAP/STIG, or PowerShell. More ❯
Financial Information Resource Management Specialist - 12 Month Fixed Term Contract page is loaded Financial Information Resource Management Specialist - 12 Month Fixed Term Contract Apply locations London time type Full time posted on Posted Yesterday job requisition id R257925 Keen to become part of a truly global, collaborative team of professionals? Your journey … begins here. Job Title Financial Information Resource Management Specialist - 12 Month Fixed Term Contract Department Finance Office Location London Reports To Manager, Financial Information Resource Management Working Hours 35 hours per week, 9:30am to 5:30pm but additional hours may be required. We are happy to consider agile and flexible working … and special agreed billing rate arrangements. This is an extremely busy office, carrying out a wide variety of tasks and ensuring that the credibility of the data in the system is of the highest standard. Role Overview This role will review, analyse and report on client maintenance data as needed. The position will focus on the team applying quality More ❯
perform, or review, technical security assessments of computing environments to identify points of vulnerability, non-compliance with established Cybersecurity standards and regulations, and recommend mitigation strategies. Validate and verifies system security requirements definitions and analysis and establishes system security designs. Design, develop, implement and/or integrate Cybersecurity and security systems and system components including those for … of Agency security policy and enterprise solutions. Support the building of security architectures. Enforce the design and implementation of trusted relations among external systems and architectures. Assess and mitigate system security threats/risks throughout the system development life cycle. Contribute to the security planning, assessment, risk analysis, risk management, certification and awareness activities for system … Review certification and accreditation (C&A) documentation, provide feedback on completeness and compliance of its content. Support security authorization activities in compliance with NSA/CSS InformationSystem Certification and Accreditation Process (NISCAP) and DoD Risk Management Framework (RMF), the NIST Risk Management Framework (RMF) process, and prescribed NSA/CSS business processes More ❯