Current Statistics
1,279,304 Total Jobs 207,708 Jobs Today 14,796 Cities 222,738 Job Seekers 146,874 Resumes |
|
|
 |
|
 |
 |
Information Systems Security Manager - Alexandria Virginia
Company: Gray Tier Technologies Location: Alexandria, Virginia
Posted On: 05/04/2025
Gray Tier Technologies has an exciting opportunity as an Information Systems Security Manager (ISSM) on our GSM-O II IDIQ contract's Joint Service Provider (JSP) Cyber Security Task Order in Alexandria, VA. JSP provides a full range of IT products, services, and solutions and customer services to the Office of the Secretary of Defense (OSD), Chairman of the Joint Chiefs of Staff (CJCS) and the Joint Staff (JS), Director of Administration (DA), Pentagon Force Protection Agency (PFPA), Washington Headquarters Services (WHS), and other OSD offices for them to meet mission and business requirements. Through the JSP Cyber Security program, JSP performs a wide variety of services and functions required to secure the information security posture for DoD services.Primary Responsibilities - Member of an ISSM team that coordinates, reviews, validates, and approves all activities, which contribute to the Assessment and Authorization (A&A) of automated information systems.
- Address physical security matters to information assessments, security tests and evaluations, preparation of Contingency Plans, and administration of Life Cycle Management and Configuration Management documentation.
- Assess the vulnerability of Automated Information Systems (AIS).
- Recommend and implement changes to IT systems in accordance with DoD directives.
- Function as a technical specialist and assess the risk management security and contingency planning programs.
- Implement measures to protect data from physical destruction or theft. Ensure that back-up procedures are in place for recovery from loss, destruction of data and program files, or from physical damage.
- Implement SOPs and periodically test recovery procedures to ensure recovery procedures are operational.
- Develop policy and guidance and establish implementation and oversight plans to ensure compliance with Risk Management requirements.
- Coordinate the review and evaluation of cyber security programs and effectiveness of implementation; identify problem areas; update and establish new requirements in response to new technologies and threats; and make recommendations to achieve a fully compliant IT architecture.
- Develop Systems Security Contingency Plans and Disaster Recovery Procedures.
- Develop and implement training and awareness programs to ensure that systems, network, and data users are aware of, understand, and adhere to systems security policies and procedures.Qualifications:
|
 |
 |
 |
 |
|
|