Platzhalter Bild

Hybrid Information Systems Security Manager at Textron Systems

Textron Systems · Slidell, United States Of America · Hybrid

Apply Now
%3Cp style=%22font-family: Arial;%22%3E%3Cw:sdt contentlocked=%22t%22 sdtgroup=%22t%22 docpart=%225080185BFDB64835B2744D02B5AC1A30%22 id=%221299419321%22%3E%3C/w:sdt%3E%3C/p%3E%0A%3Cp class=%22MsoNoSpacing%22%3E%3Co:p%3E%26nbsp;%3C/o:p%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3E%3Cspan style=%22font-size: 14px;%22%3E%3Cb style=%22mso-bidi-font-weight: normal;%22%3E%3Ci style=%22mso-bidi-font-style: normal;%22%3E%3Cu%3EAbout This Role%3Co:p%3E%3C/o:p%3E%3C/u%3E%3C/i%3E%3C/b%3E%3C/span%3E%3C/span%3E%3C/p%3E%0A%3Cp class=%22MsoNormal%22 style=%22mso-margin-top-alt: auto; mso-margin-bottom-alt: auto; line-height: normal;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3E%3Cspan style=%22font-size: 14px;%22%3E%3Cspan style=%22color: black;%22%3EProvide information systems security support from a managerial and technical standpoint for DoD and Non-DoD classified systems and networks.%26nbsp; Standing up and maintaining accreditations for classified systems and networks.%3Cspan style=%22mso-spacerun: yes;%22%3E%26nbsp; %3C/span%3EClassified Systems %26amp; Networks range in complexity and size to include multi-platform computing (Linux, Windows, Solaris, VMWare), virtual environments, and mobile systems. Extensive experience with eMASS, JSIG DCSA DAAPM, DISA STIGs. Assemble and maintain security plan accreditation packages per Risk Management Framework (RMF).%3C/span%3E%3Cspan style=%22color: black;%22%3E%26nbsp;%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/p%3E%0A%3Cp class=%22MsoNoSpacing%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3E%3Cspan style=%22font-size: 14px;%22%3E%3Cspan style=%22color: red;%22%3E%3Co:p%3E%26nbsp;%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/p%3E%0A%3Cp class=%22MsoNoSpacing%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3E%3Cspan style=%22font-size: 14px;%22%3E%3Cb style=%22mso-bidi-font-weight: normal;%22%3E%3Ci style=%22mso-bidi-font-style: normal;%22%3E%3Cu%3EResponsibilities%3Co:p%3E%3C/o:p%3E%3C/u%3E%3C/i%3E%3C/b%3E%3C/span%3E%3C/span%3E%3C/p%3E%0A%3Cul%3E%0A%3Cli class=%22MsoListParagraphCxSpFirst%22 style=%22text-indent: -0.25in;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3E%3Cspan style=%22font-size: 14px;%22%3E%3Cspan style=%22line-height: 115%; color: black;%22%3E%3Cspan style=%22mso-list: Ignore;%22%3E%3Cspan style=%22font-style: normal; font-variant: normal; font-size-adjust: none; font-kerning: auto; font-optical-sizing: auto; font-feature-settings: normal; font-variation-settings: normal; font-weight: normal; font-stretch: normal; line-height: normal;%22%3E%26nbsp; %26nbsp; %26nbsp; %3C/span%3E%3C/span%3E%3C/span%3E%3C!--[endif]--%3E%3Cspan style=%22line-height: 115%; color: black;%22%3EDevelop and maintain a formal IS security program and policies for their assigned area of responsibility under the authority/guidance of the Chief Information Security Manager, and Director of Classified Systems and Networks.%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A%3Cli class=%22MsoListParagraphCxSpMiddle%22 style=%22text-indent: -0.25in; line-height: normal;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3E%3Cspan style=%22font-size: 14px;%22%3E%3Cspan style=%22color: black;%22%3E%3Cspan style=%22mso-list: Ignore;%22%3E%3Cspan style=%22font-style: normal; font-variant: normal; font-size-adjust: none; font-kerning: auto; font-optical-sizing: auto; font-feature-settings: normal; font-variation-settings: normal; font-weight: normal; font-stretch: normal; line-height: normal;%22%3E%26nbsp; %26nbsp; %26nbsp; %3C/span%3E%3C/span%3E%3C/span%3E%3C!--[endif]--%3E%3Cspan style=%22color: black;%22%3EEnsure established IS policies are enforced for Classified Information Systems.%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A%3Cli class=%22MsoListParagraphCxSpMiddle%22 style=%22text-indent: -0.25in;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3E%3Cspan style=%22font-size: 14px;%22%3E%3Cspan style=%22line-height: 115%; color: black;%22%3E%3Cspan style=%22mso-list: Ignore;%22%3E%3Cspan style=%22font-style: normal; font-variant: normal; font-size-adjust: none; font-kerning: auto; font-optical-sizing: auto; font-feature-settings: normal; font-variation-settings: normal; font-weight: normal; font-stretch: normal; line-height: normal;%22%3E%26nbsp; %26nbsp; %26nbsp; %3C/span%3E%3C/span%3E%3C/span%3E%3C!--[endif]--%3E%3Cspan style=%22line-height: 115%; color: black;%22%3EMaintain a working knowledge of Textron Systems security policies and procedures.%3Cspan style=%22mso-spacerun: yes;%22%3E%26nbsp; %3C/span%3EBe knowledgeable of and enforce policies in the area of information systems security, including Textron Systems and Government policies related to Classified Systems Security.%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A%3Cli class=%22MsoListParagraphCxSpMiddle%22 style=%22text-indent: -0.25in; line-height: normal;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3E%3Cspan style=%22font-size: 14px;%22%3E%3Cspan style=%22color: black;%22%3E%3Cspan style=%22mso-list: Ignore;%22%3E%3Cspan style=%22font-style: normal; font-variant: normal; font-size-adjust: none; font-kerning: auto; font-optical-sizing: auto; font-feature-settings: normal; font-variation-settings: normal; font-weight: normal; font-stretch: normal; line-height: normal;%22%3E%26nbsp; %26nbsp; %26nbsp;%3C/span%3E%3C/span%3E%3C/span%3E%3C!--[endif]--%3E%3Cspan style=%22color: black;%22%3EProvide hands-on technical assistance to the Classified IS team and procedural Information System (IS) Security advice to government and industrial teams.%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A%3Cli class=%22MsoListParagraphCxSpMiddle%22 style=%22text-indent: -0.25in; line-height: normal;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3E%3Cspan style=%22font-size: 14px;%22%3E%3Cspan style=%22color: black;%22%3E%3Cspan style=%22mso-list: Ignore;%22%3E%3Cspan style=%22font-style: normal; font-variant: normal; font-size-adjust: none; font-kerning: auto; font-optical-sizing: auto; font-feature-settings: normal; font-variation-settings: normal; font-weight: normal; font-stretch: normal; line-height: normal;%22%3E%26nbsp; %26nbsp; %26nbsp; %3C/span%3E%3C/span%3E%3C/span%3E%3C!--[endif]--%3E%3Cspan style=%22color: black;%22%3EAssist Classified IS team members at other locations, if required, either remotely or short travel (3 days).%3Cspan style=%22mso-spacerun: yes;%22%3E%26nbsp; %3C/span%3E%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A%3Cli class=%22MsoListParagraphCxSpMiddle%22 style=%22text-indent: -0.25in; line-height: normal;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3E%3Cspan style=%22font-size: 14px;%22%3E%3Cspan style=%22color: black;%22%3E%3Cspan style=%22mso-list: Ignore;%22%3E%3Cspan style=%22font-style: normal; font-variant: normal; font-size-adjust: none; font-kerning: auto; font-optical-sizing: auto; font-feature-settings: normal; font-variation-settings: normal; font-weight: normal; font-stretch: normal; line-height: normal;%22%3E%26nbsp; %26nbsp; %26nbsp; %3C/span%3E%3C/span%3E%3C/span%3E%3C!--[endif]--%3E%3Cspan style=%22color: black;%22%3EDevelop and oversee operational information systems security implementation policy and guidelines.%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A%3Cli class=%22MsoListParagraphCxSpMiddle%22 style=%22text-indent: -0.25in; line-height: normal;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3E%3Cspan style=%22font-size: 14px;%22%3E%3Cspan style=%22color: black;%22%3E%3Cspan style=%22mso-list: Ignore;%22%3E%3Cspan style=%22font-style: normal; font-variant: normal; font-size-adjust: none; font-kerning: auto; font-optical-sizing: auto; font-feature-settings: normal; font-variation-settings: normal; font-weight: normal; font-stretch: normal; line-height: normal;%22%3E%26nbsp; %26nbsp; %26nbsp; %3C/span%3E%3C/span%3E%3C/span%3E%3C!--[endif]--%3E%3Cspan style=%22color: black;%22%3EMaintain required DoD Cybersecurity certifications commensurate with your roles and responsibilities.%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A%3Cli class=%22MsoListParagraphCxSpMiddle%22 style=%22text-indent: -0.25in; line-height: normal;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3E%3Cspan style=%22font-size: 14px;%22%3E%3Cspan style=%22color: black;%22%3E%3Cspan style=%22mso-list: Ignore;%22%3E%3Cspan style=%22font-style: normal; font-variant: normal; font-size-adjust: none; font-kerning: auto; font-optical-sizing: auto; font-feature-settings: normal; font-variation-settings: normal; font-weight: normal; font-stretch: normal; line-height: normal;%22%3E%26nbsp; %26nbsp; %26nbsp; %3C/span%3E%3C/span%3E%3C/span%3E%3C!--[endif]--%3E%3Cspan style=%22color: black;%22%3EUnderstand, implement, and enforce the security policies and processes that are required by: the NISPOM, DCSA DAAPM, System Security Plans (SSPs), NIST Security Controls.%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A%3Cli class=%22MsoListParagraphCxSpMiddle%22 style=%22text-indent: -0.25in; line-height: normal;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3E%3Cspan style=%22font-size: 14px;%22%3E%3Cspan style=%22color: black;%22%3E%3Cspan style=%22mso-list: Ignore;%22%3E%3Cspan style=%22font-style: normal; font-variant: normal; font-size-adjust: none; font-kerning: auto; font-optical-sizing: auto; font-feature-settings: normal; font-variation-settings: normal; font-weight: normal; font-stretch: normal; line-height: normal;%22%3E%26nbsp; %26nbsp; %26nbsp; %3C/span%3E%3C/span%3E%3C/span%3E%3C!--[endif]--%3E%3Cspan style=%22color: black;%22%3EOversee ISSOs under their purview (if applicable) to ensure they follow established IS policies and procedures.%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A%3Cli class=%22MsoListParagraphCxSpMiddle%22 style=%22text-indent: -0.25in; line-height: normal;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3E%3Cspan style=%22font-size: 14px;%22%3E%3Cspan style=%22color: black;%22%3E%3Cspan style=%22mso-list: Ignore;%22%3E%3Cspan style=%22font-style: normal; font-variant: normal; font-size-adjust: none; font-kerning: auto; font-optical-sizing: auto; font-feature-settings: normal; font-variation-settings: normal; font-weight: normal; font-stretch: normal; line-height: normal;%22%3E%26nbsp; %26nbsp; %26nbsp; %3C/span%3E%3C/span%3E%3C/span%3E%3C!--[endif]--%3E%3Cspan style=%22color: black;%22%3EAssume ISSO responsibilities when/if required.%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A%3Cli class=%22MsoListParagraphCxSpMiddle%22 style=%22text-indent: -0.25in; line-height: normal;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3E%3Cspan style=%22font-size: 14px;%22%3E%3Cspan style=%22color: black;%22%3E%3Cspan style=%22mso-list: Ignore;%22%3E%3Cspan style=%22font-style: normal; font-variant: normal; font-size-adjust: none; font-kerning: auto; font-optical-sizing: auto; font-feature-settings: normal; font-variation-settings: normal; font-weight: normal; font-stretch: normal; line-height: normal;%22%3E%26nbsp; %26nbsp; %26nbsp; %3C/span%3E%3C/span%3E%3C/span%3E%3C!--[endif]--%3E%3Cspan style=%22color: black;%22%3EOversee System Administrators under their purview (if applicable) to ensure they follow established IS policies and procedures. %3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A%3Cli class=%22MsoListParagraphCxSpMiddle%22 style=%22text-indent: -0.25in; line-height: normal;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3E%3Cspan style=%22font-size: 14px;%22%3E%3Cspan style=%22color: black;%22%3E%3Cspan style=%22mso-list: Ignore;%22%3E%3Cspan style=%22font-style: normal; font-variant: normal; font-size-adjust: none; font-kerning: auto; font-optical-sizing: auto; font-feature-settings: normal; font-variation-settings: normal; font-weight: normal; font-stretch: normal; line-height: normal;%22%3E%26nbsp; %26nbsp; %26nbsp; %3C/span%3E%3C/span%3E%3C/span%3E%3C!--[endif]--%3E%3Cspan style=%22color: black;%22%3EAssist System Administrators as required with hands-on, technical, or procedural assistance.%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A%3Cli class=%22MsoListParagraphCxSpMiddle%22 style=%22text-indent: -0.25in; line-height: normal;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3E%3Cspan style=%22font-size: 14px;%22%3E%3Cspan style=%22color: black;%22%3E%3Cspan style=%22mso-list: Ignore;%22%3E%3Cspan style=%22font-style: normal; font-variant: normal; font-size-adjust: none; font-kerning: auto; font-optical-sizing: auto; font-feature-settings: normal; font-variation-settings: normal; font-weight: normal; font-stretch: normal; line-height: normal;%22%3E%26nbsp; %26nbsp; %26nbsp; %3C/span%3E%3C/span%3E%3C/span%3E%3C!--[endif]--%3E%3Cspan style=%22color: black;%22%3EUnderstand, implement, and enforce security policies and processes to maintain the with respect to:%3Cspan style=%22mso-spacerun: yes;%22%3E%26nbsp; %3C/span%3ERemovable Media Creation, Trusted Download, Safeguarding Classified Information, Classified Markings, Wireless Devices, and relevant System Security Plans (SSPs).%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A%3Cli class=%22MsoListParagraphCxSpMiddle%22 style=%22text-indent: -0.25in; line-height: normal;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3E%3Cspan style=%22font-size: 14px;%22%3E%3Cspan style=%22color: black;%22%3E%3Cspan style=%22mso-list: Ignore;%22%3E%3Cspan style=%22font-style: normal; font-variant: normal; font-size-adjust: none; font-kerning: auto; font-optical-sizing: auto; font-feature-settings: normal; font-variation-settings: normal; font-weight: normal; font-stretch: normal; line-height: normal;%22%3E%26nbsp; %26nbsp; %26nbsp; %3C/span%3E%3C/span%3E%3C/span%3E%3C!--[endif]--%3E%3Cspan style=%22color: black;%22%3EPerform Systems Administration for Linux/Windows operating systems, either in the absence of System Administrators or to assist as required.%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A%3Cli class=%22MsoListParagraphCxSpMiddle%22 style=%22text-indent: -0.25in; line-height: normal;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3E%3Cspan style=%22font-size: 14px;%22%3E%3Cspan style=%22color: black;%22%3E%3Cspan style=%22mso-list: Ignore;%22%3E%3Cspan style=%22font-style: normal; font-variant: normal; font-size-adjust: none; font-kerning: auto; font-optical-sizing: auto; font-feature-settings: normal; font-variation-settings: normal; font-weight: normal; font-stretch: normal; line-height: normal;%22%3E%26nbsp; %26nbsp; %26nbsp; %3C/span%3E%3C/span%3E%3C/span%3E%3C!--[endif]--%3E%3Cspan style=%22color: black;%22%3EUtilize a variety of accredited security software tools to conduct vulnerability assessments, continuous monitoring scans, and those employed to maintain OS configurations.%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A%3Cli class=%22MsoListParagraphCxSpMiddle%22 style=%22text-indent: -0.25in; line-height: normal;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3E%3Cspan style=%22font-size: 14px;%22%3E%3Cspan style=%22color: black;%22%3E%3Cspan style=%22mso-list: Ignore;%22%3E%3Cspan style=%22font-style: normal; font-variant: normal; font-size-adjust: none; font-kerning: auto; font-optical-sizing: auto; font-feature-settings: normal; font-variation-settings: normal; font-weight: normal; font-stretch: normal; line-height: normal;%22%3E%26nbsp; %26nbsp; %26nbsp; %3C/span%3E%3C/span%3E%3C/span%3E%3C!--[endif]--%3E%3Cspan style=%22color: black;%22%3ECoordinate IS security inspections, tests, and reviews (DCSA, DoD, Customers).%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A%3Cli class=%22MsoListParagraphCxSpMiddle%22 style=%22text-indent: -0.25in; line-height: normal;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3E%3Cspan style=%22font-size: 14px;%22%3E%3Cspan style=%22color: black;%22%3E%3Cspan style=%22mso-list: Ignore;%22%3E%3Cspan style=%22font-style: normal; font-variant: normal; font-size-adjust: none; font-kerning: auto; font-optical-sizing: auto; font-feature-settings: normal; font-variation-settings: normal; font-weight: normal; font-stretch: normal; line-height: normal;%22%3E%26nbsp; %26nbsp; %26nbsp; %3C/span%3E%3C/span%3E%3C/span%3E%3C!--[endif]--%3E%3Cspan style=%22color: black;%22%3EEnsure development and implementation of an effective IS security education, training, and awareness program.%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A%3Cli class=%22MsoListParagraphCxSpMiddle%22 style=%22text-indent: -0.25in; line-height: normal;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3E%3Cspan style=%22font-size: 14px;%22%3E%3Cspan style=%22color: black;%22%3E%3Cspan style=%22mso-list: Ignore;%22%3E%3Cspan style=%22font-style: normal; font-variant: normal; font-size-adjust: none; font-kerning: auto; font-optical-sizing: auto; font-feature-settings: normal; font-variation-settings: normal; font-weight: normal; font-stretch: normal; line-height: normal;%22%3E%26nbsp; %26nbsp; %26nbsp; %3C/span%3E%3C/span%3E%3C/span%3E%3C!--[endif]--%3E%3Cspan style=%22color: black;%22%3EMaintain a working knowledge of system functions, security policies, technical security safeguards, and operational security measures.%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A%3Cli class=%22MsoListParagraphCxSpMiddle%22 style=%22text-indent: -0.25in; line-height: normal;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3E%3Cspan style=%22font-size: 14px;%22%3E%3Cspan style=%22color: black;%22%3E%3Cspan style=%22mso-list: Ignore;%22%3E%3Cspan style=%22font-style: normal; font-variant: normal; font-size-adjust: none; font-kerning: auto; font-optical-sizing: auto; font-feature-settings: normal; font-variation-settings: normal; font-weight: normal; font-stretch: normal; line-height: normal;%22%3E%26nbsp; %26nbsp; %26nbsp; %3C/span%3E%3C/span%3E%3C/span%3E%3C!--[endif]--%3E%3Cspan style=%22color: black;%22%3EWorking experience with High Assurance Internet Protocol Encryptors/TACLANE%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A%3Cli class=%22MsoListParagraphCxSpMiddle%22 style=%22text-indent: -0.25in; line-height: normal;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3E%3Cspan style=%22font-size: 14px;%22%3E%3Cspan style=%22color: black;%22%3E%3Cspan style=%22mso-list: Ignore;%22%3E%3Cspan style=%22font-style: normal; font-variant: normal; font-size-adjust: none; font-kerning: auto; font-optical-sizing: auto; font-feature-settings: normal; font-variation-settings: normal; font-weight: normal; font-stretch: normal; line-height: normal;%22%3E%26nbsp; %26nbsp; %26nbsp; %3C/span%3E%3C/span%3E%3C/span%3E%3C!--[endif]--%3E%3Cspan style=%22color: black;%22%3EAnalyze security audits for non-standard events and media write control logs. Assist in investigations involving anomalies.%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A%3Cli class=%22MsoListParagraphCxSpMiddle%22 style=%22text-indent: -0.25in;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3E%3Cspan style=%22font-size: 14px;%22%3E%3Cspan style=%22line-height: 115%; color: black;%22%3E%3Cspan style=%22mso-list: Ignore;%22%3E%3Cspan style=%22font-style: normal; font-variant: normal; font-size-adjust: none; font-kerning: auto; font-optical-sizing: auto; font-feature-settings: normal; font-variation-settings: normal; font-weight: normal; font-stretch: normal; line-height: normal;%22%3E%26nbsp; %26nbsp; %26nbsp; %3C/span%3E%3C/span%3E%3C/span%3E%3C!--[endif]--%3E%3Cspan style=%22line-height: 115%; color: black;%22%3EAssist Chief Information Security Manager, and Director of Classified Systems and Networks with Data Spill Investigation, Remediation, and Cleanup.%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A%3Cli class=%22MsoListParagraphCxSpMiddle%22 style=%22text-indent: -0.25in; line-height: normal;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3E%3Cspan style=%22font-size: 14px;%22%3E%3Cspan style=%22color: black;%22%3E%3Cspan style=%22mso-list: Ignore;%22%3E%3Cspan style=%22font-style: normal; font-variant: normal; font-size-adjust: none; font-kerning: auto; font-optical-sizing: auto; font-feature-settings: normal; font-variation-settings: normal; font-weight: normal; font-stretch: normal; line-height: normal;%22%3E%26nbsp; %26nbsp; %26nbsp; %3C/span%3E%3C/span%3E%3C/span%3E%3C!--[endif]--%3E%3Cspan style=%22color: black;%22%3EValidate systems %26amp; networks are patched in accordance with IAVM guidelines for patching and executing Continuous Monitoring activities.%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A%3Cli class=%22MsoListParagraphCxSpMiddle%22 style=%22text-indent: -0.25in; line-height: normal;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3E%3Cspan style=%22font-size: 14px;%22%3E%3Cspan style=%22color: black;%22%3E%3Cspan style=%22mso-list: Ignore;%22%3E%3Cspan style=%22font-style: normal; font-variant: normal; font-size-adjust: none; font-kerning: auto; font-optical-sizing: auto; font-feature-settings: normal; font-variation-settings: normal; font-weight: normal; font-stretch: normal; line-height: normal;%22%3E%26nbsp; %26nbsp; %26nbsp; %3C/span%3E%3C/span%3E%3C/span%3E%3C!--[endif]--%3E%3Cspan style=%22color: black;%22%3EMaintain a working knowledge of Textron Systems security policies and procedures and the requirements of the National Industrial Security Program Operating Manual (NISPOM). Be knowledgeable of and enforce policies in the area of information systems security, including Textron Systems and Government policies related to IT security.%3C/span%3E%3Cspan style=%22color: black;%22%3E%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A%3Cli class=%22MsoListParagraphCxSpMiddle%22 style=%22text-indent: -0.25in; line-height: normal;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3E%3Cspan style=%22font-size: 14px;%22%3E%3Cspan style=%22color: black;%22%3E%3Cspan style=%22mso-list: Ignore;%22%3E%3Cspan style=%22font-style: normal; font-variant: normal; font-size-adjust: none; font-kerning: auto; font-optical-sizing: auto; font-feature-settings: normal; font-variation-settings: normal; font-weight: normal; font-stretch: normal; line-height: normal;%22%3E%26nbsp; %26nbsp; %26nbsp; %3C/span%3E%3C/span%3E%3C/span%3E%3C!--[endif]--%3E%3Cspan style=%22color: black;%22%3EMaintain and modify accreditation packages. Prior experience with eMASS, XACTA. %3C/span%3E%3Cspan style=%22color: black;%22%3E%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A%3Cli class=%22MsoListParagraphCxSpMiddle%22 style=%22text-indent: -0.25in; line-height: normal;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3E%3Cspan style=%22font-size: 14px;%22%3E%3Cspan style=%22color: black;%22%3E%3Cspan style=%22mso-list: Ignore;%22%3E%3Cspan style=%22font-style: normal; font-variant: normal; font-size-adjust: none; font-kerning: auto; font-optical-sizing: auto; font-feature-settings: normal; font-variation-settings: normal; font-weight: normal; font-stretch: normal; line-height: normal;%22%3E%26nbsp; %26nbsp; %26nbsp; %3C/span%3E%3C/span%3E%3C/span%3E%3C!--[endif]--%3E%3Cspan style=%22color: black;%22%3EISSM would be required to obtain Classified IS accounts (General User, Privileged User) on systems under their purview, and actively review ISSO/SA taskings on classified IS%3C/span%3E%3Cspan style=%22color: black;%22%3E%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A%3Cli class=%22MsoListParagraphCxSpLast%22 style=%22text-indent: -0.25in; line-height: normal;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3E%3Cspan style=%22font-size: 14px;%22%3E%3Cspan style=%22color: black;%22%3E%3Cspan style=%22mso-list: Ignore;%22%3E%3Cspan style=%22font-style: normal; font-variant: normal; font-size-adjust: none; font-kerning: auto; font-optical-sizing: auto; font-feature-settings: normal; font-variation-settings: normal; font-weight: normal; font-stretch: normal; line-height: normal;%22%3E%26nbsp; %26nbsp; %26nbsp; %3C/span%3E%3C/span%3E%3C/span%3E%3C!--[endif]--%3E%3Cspan style=%22color: black;%22%3EAssist with administrative processes related to User Accounts, Data Transfer Agents (DTA), Media Control, and Trusted Downloads (TD)/Assured File Transfers as required. %3C/span%3E%3Cspan style=%22color: black;%22%3E%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/span%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3E%3Cspan style=%22font-size: 14px;%22%3E%3Cspan style=%22color: red;%22%3E%3Co:p%3E%26nbsp;%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A%3C/ul%3E

Qualifications 

  •        BS Degree in Computer Science, Management Information Systems, Computer Information Systems, Information Assurance, or comparable field with equivalent working experience. 
  •       Current working knowledge and a minimum of (5) year relevant experience based on the duties described above in accordance with the DoD and/or Non-DoD security directives.
  •       Demonstrated ability to maintain a high level of security awareness among IS users.
  •       Strong technical, organizational, and multi-tasking skills, ability to work in a team environment or independently. 
  •       Strong interpersonal, reporting, and documentation skills are essential.
  •       Must possess the ability to collaborate effectively with team members at all levels (ISSM, ISSO, System Administrators, and other roles) offering hands-on support and guidance to ensure collective success. 

Security Clearance:

Active TOP SECRET Clearance or a SECRET (Minimum) Clearance, OR

Ability to obtain a TOP SECRET Clearance or a SECRET (Minimum) Clearance.

 

DoD 8570/8140 Certifications:

          CISSP, or CISM, or CASP (IAM Level II or III Cert.)

Ability to obtain CISSP, CISM, or CASP within 90 Days (IAM Level II or III Cert.) of hire.

Minimum Security+ or higher at time of hire

Special Working Conditions:
Working in Closed Areas, SCIF’s, and work on-site (Not Remote or Hybrid).  Potential minimal travel to other Textron Systems’ sites to provide support for self-inspections, security assessments, etc. as required.

Security: Applicant selected will be subject to a government security clearance investigation and must meet the requirements for access to classified information. Eligibility requirements include U.S. citizenship.

How We Care
At Textron Systems, our talented people make us successful. We promote an inclusive environment where we value individuality, differences, and unique perspectives.

Our Company is committed to offering employees opportunities to grow and develop. Our benefits and compensation packages are designed to help our talented employees excel and achieve their goals, so they can make a difference every day in and outside of the workplace. Below are just a few examples!

- Flexible Work Schedules
- Education Assistance
- Career Development & Training Opportunities
- Wellness Program (including Fitness Reimbursement)
- Medical, Dental, Vision & 401(K) with Company Funding
- Paid Parental Leave

Are you a Military Veteran?
Textron's products and services are trusted everyday by those who protect our country. We are dedicated to hiring these Veterans and aim to translate their skills to make an impact on our Company.

 

 

 

 

Apply Now

Other home office and work from home jobs