- Senior
- Escritório em Manchester
Job Description
If you are looking to learn, influence, and help develop top cyber technologies, applications, and processes that protect and service our customers wherever they may be air, land, and sea come join our award-winning security family here at Electronic Systems (ES). This position involves a great mix of people leading, training and mentoring cybesecurity personnel , portofolio and customer facing, while being hands-on technical supporting some of our largest SAP programs.
In this Cyber Security, Information Systems Security Manager (ISSM) opportunity you will make impacts in the following ways;
- Support adherence to all aspects of a rigorous Risk Management Framework (RMF) compliance program as stipulated by NISPOM/DAAPM, JSIG, ICD 503, STIGs and associated NIST publications.
- Obtain and maintain Authority to Operate (ATO) approvals for various systems by adhering to the Risk Management Framework (RMF).
- Support cybersecurity efforts throughout the RMF process for one or more assigned programs(s) to include the development and management of System Security documentation, Plans of Action and Milestones (POA&Ms), assessing and auditing systems security controls, and continuous monitoring of controls.
- Provide oversight for all classified systems compliance and ensure the execution of our strong self-inspection program.
- Ensure all security certification and accreditation documents in relation to all classified systems are up-to-date.
- Ensure continuous monitoring (e.g. weekly, monthly, etc.) in accordance with cognizant security authority requirements are being implemented and met.
- Coordinate security-related activities with information security architects, senior information security officers, information system owners, common control providers, and information system security officers
- Run and maintain the entire information assurance program for more complex efforts or area
- Translate operational requirements into technical requirements and architectures needed to meet program objectives
- Employ best practices when implementing security controls within an information system including; software engineering methodologies, system/security engineering principles, secure design, secure architecture, and secure coding techniques
Because of the need for consistent, in-person collaboration and/or the requirement to perform all work onsite due to the nature of this particular role, it will be performed full-time on site. This means work will be conducted on location at a BAE Systems facility 100% of the time
State/Province
Salary Max Point
About BAE Systems Electronic Systems
This position will be posted for at least 5 calendar days. The posting will remain active until the position is filled, or a qualified pool of candidates is identified.
Clearance Level – Must be able to obtain for position
Shift
Union Job
Business Area
City
Job Posting Title
Required Skills and Education
- Must be able to obtain IAM Level II certification commensurate with DoD 8570.1M requirements within 6 months from date of hire
- An active Secret Clearance required
- 7 or more years of ISSM or relevant cybersecurity experience
- Education: minimum of high school diploma
- High level of personal motivation and initiative to learn and acquire new skills, and adapt seamlessly to an ever-changing security environment
- Customer focused, excellent communicator and ability to work with limited supervision.
- Strong organizational skills
- Able to interface with other IA team members, other security disciplines (industrial security, physical security, special programs security, etc.), program personnel and government security representatives.
- Experience with the development of core documentation including System Security Plans, Standard Operating Procedures, Plan of Actions and Milestones, Remediation Plans, and Configuration Management Plans.
- Experience with the review and creation of mitigation reports from compliance and vulnerability scanning tools (Nessus, SCAP, ACAS, SCC).
- Experience with auditing and certifying compliance of various systems (Windows, Linux, Network Devices and peripherals).
- Experience with development and delivery of IA-related briefings and training material.
- Experience with compliance and vulnerability scanning tools (Nessus, SCAP, ACAS, SCC).
- Experience with the review and creation of mitigation reports from compliance and vulnerability scanning tools (Nessus, SCAP, ACAS, SCC).
- Working knowledge of system functions, security policies, technical security safeguards, and operational security measures.
- Experience with conducting all aspects of a self-inspection
- Experience with periodic and on-demand system audits and vulnerability assessments, including user accounts, application access, file system and integrity scans to determine compliance
- Knowledge of new and emerging information technology (IT) and cybersecurity technologies.
Company
Postal Code
Regular or Temporary
Posting Requirements
Department
Country
Job Family
Preferred Skills and Education
- Bachelors Degree in a related field
- Run and maintain the entire information assurance program for more complex efforts or area
- Working knowledge of system functions, security policies, technical security safeguards, and operational security measures.
- Translate operational requirements into technical requirements and architectures needed to meet program objectives
- Experience with conducting all aspects of a self-inspection
- Experience with periodic and on-demand system audits and vulnerability assessments, including user accounts, application access, file system and integrity scans to determine compliance
- Prepared incident reports of analysis methodology and results
- Knowledge of new and emerging information technology (IT) and cybersecurity technologies.
- Employ best practices when implementing security controls within an information system including; software engineering methodologies, system/security engineering principles, secure design, secure architecture, and secure coding techniques
- Ability to function as an integral part of the development team to include designing and developing organizational information systems or upgrading legacy systems