Information Systems Security Manager

- Develop, maintain, and update security documentation to include SSP, SCTM, Continuous Monitoring, POAMs, RAR, SAR, etc. - Auditing of the IS, ISSO and program engineers - Constant upkeep, monitoring, analysis, and response to network and security events. - Documents compliance actions within the approved automated compliance tracking system or develops a plan of actions and milestones (POAM) maintained, and disposed of in accordance with internal security policies and practices outlined in the security plan. - Ensures configuration management (CM) for security-relevant IS software, hardware, and firmware is maintained and documented in accordance with baseline. - Ensures all information system security-related documentation is current and accessible to properly authorized individuals. - Ensures records are maintained for workstations, software, servers, routers, firewalls, network switches, telephony equipment, etc. throughout the information system's life cycle. - Evaluates proposed changes or additions to the information system, and advises the ISSM of their security relevance. - Assist and conduct security IS education. - Participates in internal/external security audits/inspections; performs risk assessments - Leads investigations of computer security violations and incidents, reporting as necessary to both the FSO and Senior Program Managers. - Ensure proper protection and / or corrective measures have been taken when an incident or vulnerability has been discovered - Develops, implements and manages a formal Information Security / Information Systems Security Program together with ISSM and FSO - Develop, implement and enforce Information Security Policies and Procedures together with CPSO/FSO - Review and oversee Information Systems Security Plans / SSP (Certification/Accreditation) together with CPSO/FSO

o Knowledgeable of information technology security technical principles, Information Assurance methodologies and concepts o IS auditing experience ยท Working knowledge of Security Technical Implementation Guides (STIG) o Knowledgeable of Operating System security requirements o Understanding of configuration management principles o Must be a team player, self-motivated, and a quick learner o Hands on experience with IA tools 

Accredited Bachelor's degree and 9-15 years or Master's degree 7-13 years

More Information / Apply Now launch

Application Deadline


Corporate / management

Layton, UT. US

Layton , United States


United States



Corporate / management

Application Deadline: