IT Project Manager (Intermediate)

Crest Security Assurance

Apr 22
Unspecified
Mid Level Career (5+ yrs experience)
$135,000
IT - Security

IT Project Manager (Intermediate)
KEY FUNCTIONS
i. Directly manages information technology projects to provide a unique service or product.
REQUIREMENTS:
i. Must be a US Citizen
ii. 4 to 6 years of experience and the equivalent of a BS/BA in a cyber-related field. Direct experience or certifications may substitute for the academic credentials.
iii. Demonstrated expertise with managing projects using processes governed by the NIST Risk Management Framework as described in the current published version of NIST SP 800-37 Rev. 2.
iv. Demonstrated expertise managing projects implementing Security and Privacy Controls contained in the current published version of NIST SP 800-53 Rev. 5: Security and Privacy Controls for Federal Information Systems and Organizations.
v. Demonstrated expertise overseeing the successful simultaneous execution of multiple projects in a Federal agency IT and Security environment to meet schedule, cost and performance plans.
SELECTED RESPONSIBILITIES
i. Act as a primary stakeholder in the underlying information technology (IT) operational processes and functions that support the service, provide direction and monitor all significant activities so the service is delivered successfully.
ii. Coordinate and manage the overall service provided to a customer end-to-end.
iii. Develop system, network, performance, and cybersecurity requirements.
iv. Ensure that appropriate Service-Level Agreements (SLAs) and underpinning contracts have been defined that clearly set out for the customer a description of the service and the measures for monitoring the service.
v. Ensure that system, network, performance, and cybersecurity requirements are included in contract language and delivered.
vi. Gather feedback on customer satisfaction and internal service performance to foster continual improvement.
vii. Identify and address cyber workforce planning and management issues (e.g. recruitment, retention, and training).
viii. Lead and oversee budget, staffing, and contractual performance of project work
ix. Manage the internal relationship with information technology (IT) process owners supporting the project, assisting with the definition and agreement of Operating Level Agreements (OLAs).
x. Participate in the acquisition process as necessary.
xi. Perform needs analysis to determine opportunities for new and improved business process solutions.
xii. Provide advice on project costs, design concepts, or design changes.
xiii. Work with other service managers and product owners to balance and prioritize services to meet overall customer requirements, constraints, and objectives.
xiv. Conduct import/export reviews for acquiring systems and software.
xv. Develop methods to monitor and measure risk, compliance, and assurance efforts related to specific projects.
xvi. Ensure that all acquisitions, procurements, and outsourcing efforts address information security requirements consistent with organization goals.
xvii. Provide ongoing optimization and problem-solving support.
xviii. Provide recommendations for possible improvements and upgrades to specific projects.
xix. Review or conduct audits of information technology (IT) projects.
xx. Review service performance reports identifying any significant issues and variances, initiating, where necessary, corrective actions and ensuring that all outstanding issues are followed up.
xxi. Evaluate the effectiveness of procurement function in addressing information security requirements through procurement activities and recommend improvements.
SKILLS
i. Skill in identifying measures or indicators of system performance and the actions needed to improve or correct performance, relative to the goals of the system.
ii. Skill to translate, track, and prioritize information needs and intelligence collection requirements related to the specific project.
REQUIRED ABILITIES
i. Ability to ensure security practices are followed throughout the project acquisition process.
ii. Ability to evaluate/ensure the trustworthiness of the project supplier and/or required products.
iii. Ability to oversee the development and update of the project life cycle cost estimate.
REQUIRED KNOWLEDGE
i. Knowledge of capabilities and requirements analysis.
ii. Knowledge of Cloud-based knowledge management technologies and concepts related to security, governance, procurement, and administration.
iii. Knowledge of functionality, quality, and security requirements and how these will apply to specific items of supply (i.e., elements and processes).
iv. Knowledge of how information needs and collection requirements are translated, tracked, and prioritized across the extended enterprise.
v. Knowledge of how to leverage research and development centers, think tanks, academic research, and industry systems.
vi. Knowledge of import/export control regulations and responsible agencies for the purposes of reducing supply chain risk.
vii. Knowledge of Import/Export Regulations related to cryptography and other security technologies.
viii. Knowledge of information technology (IT) acquisition/procurement requirements.
ix. Knowledge of information technology (IT) architectural concepts and frameworks.
x. Knowledge of new and emerging information technology (IT) and cybersecurity technologies.
xi. Knowledge of organizational process improvement concepts and process maturity models (e.g., Capability Maturity Model Integration (CMMI) for Development, CMMI for Services, and CMMI for Acquisitions).
xii. Knowledge of risk/threat assessment.
xiii. Knowledge of service management concepts for networks and related standards (e.g., Information Technology Infrastructure Library, current version [ITIL]).
xiv. Knowledge of the acquisition/procurement life cycle process.
xv. Knowledge of the organization’s enterprise information technology (IT) goals and objectives.
xvi. Knowledge of the organization's core business/mission processes.
xvii. Knowledge of industry-standard and organizationally accepted analysis principles and methods.
xviii. Knowledge of resource management principles and techniques.
xix. Knowledge of Risk Management Framework (RMF) requirements.
xx. Knowledge of system life cycle management principles, including software security and usability.
xxi. Knowledge of computer networking concepts and protocols, and network security methodologies.
xxii. Knowledge of cyber threats and vulnerabilities.
xxiii. Knowledge of cybersecurity and privacy principles.
xxiv. Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy.
xxv. Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).
xxvi. Knowledge of specific operational impacts of cybersecurity lapses.
group id: 90982409
N
Name HiddenProposal Manager

Match Score

Powered by IntelliSearch™
Create an account or Login to see how closely you match to this job!

Similar Jobs


Job Category
IT - Security
Clearance Level
Unspecified