Overview

Information Systems Security Management, TS/SCI w/Polygraph Jobs in McLean, Virginia, USA at General Dynamics Information Technology

Title: Information Systems Security Management, TS/SCI w/Polygraph

Company: General Dynamics Information Technology

Location: McLean, Virginia, USA

Type: Full Time

Category: IT/Tech, Security

Type of Requisition:

Regular

Clearance Level Must Currently Possess:

Top Secret SCI + Polygraph

Clearance Level Must Be Able to Obtain:

Top Secret SCI + Polygraph

Public Trust/Other

Required:

None

Job Family:

Information Security

Job Qualifications:

Skills:

RMF, System Security Plans, Xacta (Platform)

Certifications:

None

Experience:

8 + years of related experience

US Citizenship

Required:

Yes

Job Description:

Seize your opportunity to make a personal impact as an Information Systems Security Management supporting customer activities. GDIT is your place to make meaningful contributions tochallenging projectsand grow a rewarding career.

At GDIT, people are our differentiator. As an Information Systems Security Management (ISSM)?, you will help ensure today is safe and tomorrow is smarter. Our work depends on an ISSM joining our highly skilled team to be a premier provider of cyber security services to the customer. We provide consummate cyber security risk management as a service platform across multiple fabrics and centers.

We have responsibility to ensure operational IT capabilities provide the client with necessary timeliness, accuracy and security of information demanded from all our highly professional roles. Be the change, lead our change – join us!

HOW AN ISSM WILL MAKE AN IMPACT

Manage Analysts engaged in ensuring the safety of information systems assets and protection of systems from intentional or inadvertent access or destruction.

Provide support for a program, organization, systems or enclaves. Support the Agency RMF Workflow and Processes by proposing, coordinating, implementing and enforcing information system security policies, instructions, standards, and methodologies.

Coordinate with the Data Custodian, Project Owner, and ISSM to identify the types of information processed, assign the appropriate security categorizations to the information systems, determine the information security and privacy impacts, and manage information security and privacy risk. Document the controls in the information security and privacy plan (or equivalent document) to ensure implemented controls meet or exceed the minimal controls defined by CISO guidance.

Maintain current system information in XACTA (eg, POCs, artifacts) to support organizational requirements and processes (eg,communication, contingency planning, training, data calls)

Evaluate the impact of network and system changes using RMF processes.

Ensure anomalies identified under the Sponsor’s Information Security Continuous Monitoring activities are addressed and remediated in a manner that commensurate with the risks posed to the system from the anomalies.

Submit recommendations to the stakeholders for system configuration deviations from the required baseline.

Develop and maintain a system security plan (SSP)

Conduct periodic reviews to ensure compliance with SSP.

Ensure configuration management for security-relevant IS software, hardware and firmware is maintained and documented.

Ensure system recovery processes are monitored to ensure security features and procedures are properly restored

Ensure all IS security-related documentation is current and accessible to properly authorized individuals

Formally notify the appropriate individuals when changes occur that might affect authorization

Participate in governance and project reviews identified by the Sponsor

WHAT…

 

Upload your CV/resume or any other relevant file. Max. file size: 800 MB.