Information Systems Security Manager - Cross-Domain Solutions (C

General Dynamics Information Technology

Today
Top Secret
Unspecified
Unspecified
IT - Security
Ramstein Air Base, Germany (On-Site/Office)

Transform technology into opportunity as an Information Systems Security Manager. A career in enterprise IT means connecting and enhancing the systems that matter most. At GDIT you'll be at the forefront of innovation and play a meaningful part in improving how agencies operate.

At GDIT, people are our differentiator. As an Information Security Systems Security Manager, you will help ensure today is safe and tomorrow is smarter. Our work depends on the Information Security Analyst Advisor joining our team to perform all procedures necessary to ensure the safety of information systems assets and to protect systems from intentional or inadvertent access or destruction. Monitor, evaluate, and maintain systems and procedures to safeguard internal information systems, networks, databases, and Web-based security.

Job Description
  • Serve as the primary cyber security point of contact for Cross Domain Solution (CDS) systems, ensuring compliance with security policies, procedures, and regulations, and providing timely dissemination of threats, risk, and authorization status to stakeholders.
  • Perform all necessary procedures to ensure the safety of information systems assets, including overseeing the accreditation and certification of CDS systems in accordance with DoD, Intelligence Community, and agency-specific requirements.
  • Stays up to date on the capabilities of Cross Domain (CD) services offered by the enterprise, including the CDS baseline list and the CD technologies portfolio, and informs the UCDSMO of any gaps or deficiencies in these capabilities
  • Prepare and submit System Security Plans (SSPs), Plan of Action and Milestones (POA&Ms), and risk assessment documents, and collaborate with Authorizing Officials (AOs) to achieve and maintain Authorization to Operate (ATO) status.
  • Conduct regular reviews of DISA STIGs, ACAS vulnerability scans, and provide remediation feedback to ensure compliance and implement RMF continuous monitoring efforts.
  • Develop and recommend policies and procedures to ensure information systems reliability, accessibility, and security, and conduct systems security evaluations, audits, and reviews to identify vulnerabilities and risks.
  • Develop RMF Control Family plans and procedures and ensure overall adherence to these plans and procedures.
  • Recommend and implement programs to educate systems, network, and data users on systems security policies and procedures, and participate in network and systems design to ensure implementation of appropriate security policies.
  • Ensure the rigorous application of information security/cybersecurity policies, principles, and practices in the delivery of all IT services. Perform ISSM duties as outlined in AFMAN 17-01 and DoDI 8510.01 for assigned systems/applications.
  • Maintain familiarity with relevant DOD/NIST RMF publications, including NIST 800-53, 800-60, 800-37, DODI 8540.01 CDS Policy, and DOD Directive 5144.02.


WHAT YOU'LL NEED TO SUCCEED:

Education:

A Bachelor's degree in computer science/systems, information systems/ technology, engineering/engineering technology, software engineering/programming, management, natural sciences, social sciences, mathematics, or business/finance is required.

Required Experience:

This position requires a minimum of five years' specialized experience in defining computer security requirements for high level applications, evaluation of approved security product capabilities and resolution of computer security problems.
  • Extensive knowledge and proficiency with the Risk Management Framework (RMF) and eMASS or XACTA experience.
  • Extensive knowledge and proficiency with the Assured Compliance Assessment Solution (ACAS) Vulnerability Scanner
  • Extensive knowledge and proficiency with the Security Technical Implementation Guide (STIG) implementation and automation tools such as SCAP, STIG Viewer, eMASSter which are often leveraged for automation.
  • A strong technical background, ideal candidates must have familiarity in virtualization technologies, basic networking and industry best practices.
  • Expert knowledge and proficiency with Cybersecurity best practices.
  • Expert knowledge and understanding of Federal and DoD Cybersecurity regulations and policies.


Certifications & Training:
  • DoD 8570/8140 IAM Level III Certification (e.g., CISSP, CISM, or GSLC).
  • eMASS Training (can be obtained after hire)


Clearance: Top Secret

#DefenseOCONUS

GDIT IS YOUR PLACE:

• 401K with company match
• Comprehensive health and wellness packages
• Internal mobility team dedicated to helping you own your career
• Professional growth opportunities including paid education and certifications
• Cutting-edge technology you can learn from
• Rest and recharge with paid vacation and holidays

Work Requirements
group id: 90979310

Explore the Art of the Possible | GDIT

Find General Dynamics Information Technology on Social Media
Network Employers (84)
J
Recruiter
V
Senior Talent Acquisition Advisor
M
Recruiter
L
Senior Recruiter
C
Talent Acquisition Specialist
About Us
We are GDIT. The people supporting and securing some of the most complex government, defense, and intelligence projects across the country. We ensure today is safe and tomorrow is smarter. Our work has meaning and impact on the world around us, but also on us, and that’s important.

GDIT is your place. You make it your own by embracing autonomy, seizing opportunity, and being trusted to deliver your best every day

GDIT
Opportunity Owned

General Dynamics Information Technology Jobs


Job Category
IT - Security
Clearance Level
Top Secret