Security engineer jobs in Pensacola, FL - 108 jobs
All
Security Engineer
Information Systems Security Manager
Systems Engineer
Information Systems Security Officer
Information Systems Engineer
Information Assurance Analyst
Network Security Administrator
Network Engineer
Cyber Security Engineer
Network Security Consultant
Securities Analyst
Cyber Security Analyst
Information Assurance Engineer
Cyber Security Analyst
Ascension Federal Services
Security engineer job in Pensacola, FL
Cyber Security Analyst Location: Pensacola, FL, 32520 CLEARANCE: TS/SCI W/CI POLYGRAPH Job Description:
We are seeking a talented Cyber Security Analyst to join our team in Pensacola, FL. The ideal candidate will be responsible for protecting our organization's computer systems and networks from cyber threats. This includes monitoring security systems, analyzing data to identify potential vulnerabilities, and implementing security measures to protect against cyber attacks.
Responsibilities:
Monitor security systems to detect and respond to cyber threats
Analyze data to identify potential vulnerabilities and recommend security measures
Implement and maintain security controls to protect against cyber attacks
Conduct security assessments and audits to ensure compliance with security policies
Investigate security incidents and provide incident response support
Requirements:
Bachelor's degree in Computer Science, Information Technology, or related field
2+ years of experience in cyber security or related field
Strong knowledge of security tools and technologies
Excellent analytical and problem-solving skills
Ability to work well under pressure and handle multiple tasks simultaneously
Must be open being trained with the ability to instruct and train others.
$72k-98k yearly est. 55d ago
Looking for a job?
Let Zippia find it for you.
Cyber Security Engineer
Nightwing Intelligence Solutions
Security engineer job in Pensacola, FL
Nightwing provides technically advanced full-spectrum cyber, data operations, systems integration and intelligence mission support services to meet our customers' most demanding challenges. Our capabilities include cyber space operations, cyber defense and resiliency, vulnerability research, ubiquitous technical surveillance, data intelligence, lifecycle mission enablement, and software modernization. Nightwing brings disruptive technologies, agility, and competitive offerings to customers in the intelligence community, defense, civil, and commercial markets.
Nightwing is supporting a U.S. Government customer on a large mission critical development and sustainment program to design, build, deliver, and operate a network operations environment, including introducing new cyber capabilities to address emerging threats. Nightwing is seeking a Cyber Engineer to support the design, development, and deployment of advanced cybersecurity capabilities.
The Cyber Engineer designs, develops, documents, analyzes, tests, integrates, debugs, conducts research and/or discovers and analyzes security flaws or vulnerabilities in software, networks, systems, and applications. The Cyber Engineer ensures system security needs are established and maintained for various objects/matters.
Responsibilities:
Analyze output from various security devices and malware and incident reports to improve detection of and to minimize future incidents
Assess and analyze system security to identify and mitigate risks and vulnerabilities
Recommend countermeasures to mitigate risks and vulnerabilities
Prepare/Update documentation, including incident reports, security recommendations, etc.
Assist in identifying, prioritizing, and coordinating the protection of critical cybersecurity infrastructure and key resources
Perform basic system design functions, including interpretive analyses, chart preparation and associated diagrams/enhancement plans
Test existing and new technologies
Review/analyze requested changes for equipment, technology and/or other factors/trends, which are planned for deployment in the customer space
Support the configuration and administration of cyber security tools and systems.
Required Skills:
U.S. Citizenship
Must be able to obtain a Secret clearance within 1 year of hire.
Must be able to obtain DHS Suitability
Knowledge of commercial cyber tools and technologies
Knowledge of standard security principles, policies, standards and industry best practices
Knowledge of networking (TCP/IP, topology, sockets and security) and web technologies (Internet security)
Knowledge of intrusion detection and prevention systems (IDS/IPS), log analysis, malware analysis, network traffic flow and packet analysis
Understanding and ideally experience with Windows or Linux/Unix operating systems
Possesses or quickly develops an understanding of Government Information Security policies, regulations, and guidelines
Desired Skills:
Experience and/or familiarity with development languages such as: Java, Swing, JUnit, Perl, Python, HTML
Demonstrated familiarity with VMware and virtual machines
Ability to write custom tools and modify existing intrusion detection tools
Knowledge of automated testing tools
Knowledge of one or more of the following:
Security COTS integration
Security Incident Event Management
Insider Threat Monitoring
Operating System Hardening
Vulnerability Assessment testing
Identification and Authentication schemes
Public Key Infrastructure and Identity Management
Cross Domain Solutions
Computer Network Exploitation (CNE)
Computer Network Operations (CNO)
Malware Analysis
Reverse Software EngineeringSecurityengineering
Required Education:
Bachelor's degree in Cyber Security, Information Security, Software Engineering or a related discipline is required. [Four (4) years of experience (for a total of six (6) or more years) may be substituted for a degree.]
Desired Certifications:DoD 8570.1-M Compliance at IAT Level I Syndeo # - 3490
At Nightwing, we value collaboration and teamwork. You'll have the opportunity to work alongside talented individuals who are passionate about what they do. Together, we'll leverage our collective expertise to drive innovation, solve complex problems, and deliver exceptional results for our clients.
Thank you for considering joining us as we embark on this new journey and shape the future of cybersecurity and intelligence together as part of the Nightwing team.
Nightwing is An Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or veteran status, age or any other federally protected class.
$71k-98k yearly est. Auto-Apply 60d+ ago
Cyber Security Engineer
Nightwing
Security engineer job in Pensacola, FL
Nightwing provides technically advanced full-spectrum cyber, data operations, systems integration and intelligence mission support services to meet our customers' most demanding challenges. Our capabilities include cyber space operations, cyber defense and resiliency, vulnerability research, ubiquitous technical surveillance, data intelligence, lifecycle mission enablement, and software modernization. Nightwing brings disruptive technologies, agility, and competitive offerings to customers in the intelligence community, defense, civil, and commercial markets.
Nightwing is supporting a U.S. Government customer on a large mission critical development and sustainment program to design, build, deliver, and operate a network operations environment, including introducing new cyber capabilities to address emerging threats. Nightwing is seeking a Cyber Engineer to support the design, development, and deployment of advanced cybersecurity capabilities.
The Cyber Engineer designs, develops, documents, analyzes, tests, integrates, debugs, conducts research and/or discovers and analyzes security flaws or vulnerabilities in software, networks, systems, and applications. The Cyber Engineer ensures system security needs are established and maintained for various objects/matters.
**Responsibilities** **:**
+ Analyze output from various security devices and malware and incident reports to improve detection of and to minimize future incidents
+ Assess and analyze system security to identify and mitigate risks and vulnerabilities
+ Recommend countermeasures to mitigate risks and vulnerabilities
+ Prepare/Update documentation, including incident reports, security recommendations, etc.
+ Assist in identifying, prioritizing, and coordinating the protection of critical cybersecurity infrastructure and key resources
+ Perform basic system design functions, including interpretive analyses, chart preparation and associated diagrams/enhancement plans
+ Test existing and new technologies
+ Review/analyze requested changes for equipment, technology and/or other factors/trends, which are planned for deployment in the customer space
+ Support the configuration and administration of cyber security tools and systems.
**Required** **Skills:**
+ U.S. Citizenship
+ Must be able to obtain a Secret clearance within 1 year of hire.
+ Must be able to obtain DHS Suitability
+ Knowledge of commercial cyber tools and technologies
+ Knowledge of standard security principles, policies, standards and industry best practices
+ Knowledge of networking (TCP/IP, topology, sockets and security) and web technologies (Internet security)
+ Knowledge of intrusion detection and prevention systems (IDS/IPS), log analysis, malware analysis, network traffic flow and packet analysis
+ Understanding and ideally experience with Windows or Linux/Unix operating systems
+ Possesses or quickly develops an understanding of Government Information Security policies, regulations, and guidelines
**Desired** **Skills:**
+ Experience and/or familiarity with development languages such as: Java, Swing, JUnit, Perl, Python, HTML
+ Demonstrated familiarity with VMware and virtual machines
+ Ability to write custom tools and modify existing intrusion detection tools
+ Knowledge of automated testing tools
+ Knowledge of one or more of the following:
+ Security COTS integration
+ Security Incident Event Management
+ Insider Threat Monitoring
+ Operating System Hardening
+ Vulnerability Assessment testing
+ Identification and Authentication schemes
+ Public Key Infrastructure and Identity Management
+ Cross Domain Solutions
+ Computer Network Exploitation (CNE)
+ Computer Network Operations (CNO)
+ Malware Analysis
+ Reverse Software Engineering
+ Securityengineering
**Required Education:**
+ Bachelor's degree in Cyber Security, Information Security, Software Engineering or a related discipline is required. [Four (4) years of experience (for a total of six (6) or more years) may be substituted for a degree.]
**Desired** **Certifications:**
**DoD 8570.1-M Compliance at IAT Level I**
**Syndeo # - 3490**
_At Nightwing, we value collaboration and teamwork. You'll have the opportunity to work alongside talented individuals who are passionate about what they do. Together, we'll leverage our collective expertise to drive innovation, solve complex problems, and deliver exceptional results for our clients._
_Thank you for considering joining us as we embark on this new journey and shape the future of cybersecurity and intelligence together as part of the Nightwing team._
_Nightwing is An Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or veteran status, age or any other federally protected class._
$71k-98k yearly est. 60d+ ago
Cyber Information Assurance Analyst III / Information Security
Global Business Solutions 3.8
Security engineer job in Pensacola, FL
Global Business Solutions, Inc., established in 1995, offers customers a distinctive blend of information technology capabilities, education and training services, and information assurance solutions. Managed by a team of executive leaders experienced in the field of information technology and training services within the industry and government, GBSI prides itself on exceeding expectations. Our award-winning solutions give clients the support tools needed to successfully deliver in evolving environments with confidence.
Job Description
Role and Responsibilities
This position does not represent a current opening and is posted for the purpose of collecting multiple resumes across various skill levels for a pending contract. GBSI may consider candidates who express an interest in this position for future job openings.
This Position is located in Pensacola, FL - Currently, there is no relocation assistance.
The Cyber Information Assurance Analyst III designs and conducts regular audits on computer systems to determine that they are operating securely and that data is protected from both internal and external threats. Makes assessments of assigned systems to determine the system security status and ensure compliance to security policies, procedures and standards.
Primary Objectives of the Cyber Information Assurance Analyst III - InfoSec
Designs and recommends security policies and procedures;
Prepares training materials and instructs computer security education and awareness training programs;
Monitors, evaluates, and maintains complex security systems according to industry best practices and safeguards internal information systems and databases;
Reviews system configurations to ensure compliance with security requirements and complies with established standards;
Investigates security violations and breaches and recommends solutions;
Compiles reports on intrusions as necessary and provides analysis summaries to management;
Reviews organization wide firewall logs;
Provides reports to internal and external customers in response to queries and requests for computer security information;
Consults on tasks, provides leadership and guidance for junior personnel
Gives recommendations for product upgrades, patches and general security measures to secure and/or mitigate threats for various clients.
Qualifications
Qualifications and Education Requirements
Ability to pass a Government background check;
Bachelor's degree in Computer Science, Management Information Systems, or data security experience;
Four (4) or more years of experience in computer science, information systems management or data security may be substituted in lieu of a degree;
Experience working with system/network security tools;
Must possess an active CompTIA Security+ or CISSP certification or be able to obtain either certification within thirty (30) days of employment.
Preferred Qualifications
CompTIA Security+ Certification;
CISSP Certification.
Additional InformationGBSI is committed to hiring and retaining a diverse workforce. We are proud to be an Equal Opportunity/Affirmative Action-Employer, making decisions without regard to race, color, religion, creed, sex, sexual orientation, gender identity, marital status, national origin, age, veteran status, disability, or any other protected class. For our complete EEO/AA statement, please visit ********************************************************** You may also view the "EEO is the Law" poster directly at *****************************************************************
No part of this Position Description or of any other shall be construed as an employment contract. Employment with GBSI is at will and constrained by both the laws of the State of Florida and those of the state wherein the employee performs services for the company.
$49k-74k yearly est. 60d+ ago
Information System Security Officer / Iwakuni, Japan / Mid Career
Lockheed Martin 4.8
Security engineer job in Eglin Air Force Base, FL
What We're Doing: Lockheed Martin's, Rotary & Mission Systems (LM RMS), F-35 Cyber Security invites you to step up to one of today's most daunting challenges: the protection of exquisite government capabilities leading to warfighter supremacy against our peer and near peer adversaries. As a cybersecurity professional at Lockheed Martin, you'll safeguard the sensitive information and warfighting capabilities that our citizens and the world depend upon to protect U.S. and ally interests. Here, you'll work alongside other cybersecurity experts, related departments, and military members to support the military operational objectives by providing them with a safe and secure operating environment. In this fast-paced, real-world environment, you'll draw on all your education and experience as well as the resources of Lockheed Martin to keep these exquisite capabilities protected.
The Work:
This Information System Security Officer (ISSO) position will support the Information System Security Manager (ISSM) in developing, maintaining and overseeing the cybersecurity of assigned classified and/or unclassified F-35 systems at Site Name. Typical ISSO responsibilities include but are not limited to:
Ensuring required cybersecurity controls are implemented and validated, to include continuous monitoring actions for assigned systems.
Supporting the development and maintenance of cybersecurity related plans and procedures.
Monitoring for non-compliance, anomalous activity (i.e., threats), and effectively reporting such activity and associated risks.
Ensuring POA&Ms or remediation plans are in place for vulnerabilities identified during monitoring activity, audits, inspections, etc. and implementing, or overseeing, corrective actions.
Creating, collecting and retaining data to meet reporting requirements.
Monitoring and correlating data (i.e., events) from a variety of sources (e.g., Splunk, ELA, ePO, ACAS, etc.) to identify and mitigate threats, vulnerabilities and non-compliance.
Investigating, analyzing and responding to cyber events, incidents and non-compliance, including trend analysis, creating detailed written reports and briefing the appropriate parties.
Identifying, implementing and enforcing requirements for the proper handling and storage of Government data and electronic media.
Conducting self-inspections and preparing for customer inspections.
Interacting professionally during the enforcement of security policy and procedures.
Assigned systems may vary in classification, capabilities and complexity. Mission requirements may require other than first-shift work and additional responsibilities as assigned.
Who we are:
Lockheed Martin is a Cyber Security pioneer, partner, innovator and builder. In support of our many customers, the amazing members of our team are responsible for providing all aspects of cybersecurity support in a complex environment. In a rapidly growing enterprise, this role offers the opportunity to grow and hone the unique skills and experiences required as a cybersecurity expert to create, design and build solutions to some of the world's hardest engineering problems.
Why Join Us:
Your Health, Your Wealth, Your Life
With our employees as our top priority, we provide diverse career opportunities designed to propel development and boost agility. Our flexible schedules, competitive pay and comprehensive benefits enable our employees to live a healthy, fulfilling life at and outside of work. At Lockheed Martin, we place an emphasis on empowering our employees by fostering innovation. We believe that by applying the highest standards of business ethics and visionary thinking, everything is within our reach - and yours as a Lockheed Martin employee. Lockheed Martin values your skills, training and education. Come and experience your future!
#OneLMHot jobs
#rmshotmiljobs
Final Transferable Secret security clearance; last Periodic Reinvestigation must be within the last five (5) years or enrollment in Continuous Vetting program.
Ability to obtain and maintain Special Access Program (SAP) access.
Possess a valid certification that meets or exceeds DoD 8570.01-M IAT II requirements.
Meets: CCNA-Security, CySA+, GICSP, GSEC, Security+ CE, CND, SSCP
Exceeds: CASP+ CE, CCNP Security, CISA, CISSP (or Assc), GCED, GCIH, CCSP
Prior experience in a cyber workforce role, as categorized by the NICE or DoD workforce frameworks.
Prior experience as an ISSO, ISSM or related DoD Cyber Workforce Role on one or more F-35 information systems.
Prior experience ensuring compliance with applicable laws, regulations, guidance and policies as they relate to DoD cybersecurity and SAPs (e.g., DoDI 8510.01, JSIG, DoDM 5205.07, NIST SP 800 series).
Prior experience with the system authorization process, associated artifacts and their requirements (e.g., SSP, SCTM, Security CONOPs, SOPs).
Lockheed Martin is an equal opportunity employer. Qualified candidates will be considered without regard to legally protected characteristics.
The application window will close in 90 days; applicants are encouraged to apply within 5 - 30 days of the requisition posting date in order to receive optimal consideration.
*
Join us at Lockheed Martin, where your mission is ours. Our customers tackle the hardest missions. Those that demand extraordinary amounts of courage, resilience and precision. They're dangerous. Critical. Sometimes they even provide an opportunity to change the world and save lives. Those are the missions we care about.
As a leading technology innovation company, Lockheed Martin's vast team works with partners around the world to bring proven performance to our customers' toughest challenges. Lockheed Martin has employees based in many states throughout the U.S., and Internationally, with business locations in many nations and territories.
Other Important Information
By applying to this job, you are expressing interest in this position and could be considered for other career opportunities where similar skills and requirements have been identified as a match. Should this match be identified you may be contacted for this and future openings.
Ability to work remotely
Onsite Full-time: The work associated with this position will be performed onsite at a designated Lockheed Martin facility.
Work Schedule Information
Lockheed Martin supports a variety of alternate work schedules that provide additional flexibility to our employees. Schedules range from standard 40 hours over a five day work week while others may be condensed. These condensed schedules provide employees with additional time away from the office and are in addition to our Paid Time off benefits.
Security Clearance Information
This position requires a government security clearance, you must be a US Citizen for consideration.
Pay Rate: The annual base salary range for this position in California, Massachusetts, and New York (excluding most major metropolitan areas), Colorado, Hawaii, Illinois, Maryland, Minnesota, New Jersey, Vermont, Washington or Washington DC is $93,200 - $164,450. For states not referenced above, the salary range for this position will reflect the candidate's final work location. Please note that the salary information is a general guideline only. Lockheed Martin considers factors such as (but not limited to) scope and responsibilities of the position, candidate's work experience, education/ training, key skills as well as market and business considerations when extending an offer.
Benefits offered: Medical, Dental, Vision, Life Insurance, Short-Term Disability, Long-Term Disability, 401(k) match, Flexible Spending Accounts, EAP, Education Assistance, Parental Leave, Paid time off, and Holidays.
(Washington state applicants only) Non-represented full-time employees: accrue at least 10 hours per month of Paid Time Off (PTO) to be used for incidental absences and other reasons; receive at least 90 hours for holidays. Represented full time employees accrue 6.67 hours of Vacation per month; accrue up to 52 hours of sick leave annually; receive at least 96 hours for holidays. PTO, Vacation, sick leave, and holiday hours are prorated based on start date during the calendar year.
This position is incentive plan eligible.
Pay Rate: The annual base salary range for this position in most major metropolitan areas in California, Massachusetts, and New York is $107,300 - $185,840. For states not referenced above, the salary range for this position will reflect the candidate's final work location. Please note that the salary information is a general guideline only. Lockheed Martin considers factors such as (but not limited to) scope and responsibilities of the position, candidate's work experience, education/ training, key skills as well as market and business considerations when extending an offer.
Benefits offered: Medical, Dental, Vision, Life Insurance, Short-Term Disability, Long-Term Disability, 401(k) match, Flexible Spending Accounts, EAP, Education Assistance, Parental Leave, Paid time off, and Holidays.
This position is incentive plan eligible.
$63k-83k yearly est. 60d+ ago
Technology Security Analyst (API)
FIS 4.4
Security engineer job in Jay, FL
We are FIS. Our technology powers the world's economy and our teams bring innovation to life. We champion diversity to deliver the best products and solutions for our colleagues, clients and communities. If you're ready to start learning, growing and making an impact with a career in fintech, we'd like to know: Are you FIS?
NOTE:
1. Candidates located in FIS office locations in Jacksonville (FL), Milwaukee (WI), Atlanta (GA), and New York City (NY) will be required to work in a hybrid model (3 days in office per week).
2. Current and future sponsorship are not available for this position.
About the role:
As an IT Security Analyst with FIS, your skills will be put to the test on the front lines of cyber-crime. Information security is at the heart of fintech and you'll help protect and secure highly-sensitive financial data for customers around the world.
About the Team:
The Appsec Architecture and Engineering is responsible for developing and maintaining policies and standards for the FIS API Security Program and collaborate with internal development teams to implement security controls in APIs, conducting secure design reviews and automates workflows to track and remediate API vulnerabilities.
The team identifies and addresses gaps in incumbent security tools (SAST, SCA, Container security), collaborates with vendors to address/enhance scanning coverage and define/refine the internal processes to ensure the efficiency and strengthen overall security program.
What you will be doing:
Develop and maintain policy and standards for FIS API security program.
Collaborate with internal development teams to build/advocate security controls in Application Programming Interface (API), and performing the secure design review of the APIs.
Assist in the security standards, and processes of SDLC to protect Application, APIs, and CI/CD.
Primarily responsible for API and Application security but with a good working knowledge of other security domains (Cryptography, Identity and Access Management, Threat and Vulnerability Management)
Manage the API runtime monitoring tool and work with vendor to tune/configure to provide the maximum but accurate coverage to FIS software.
Identify the gaps in SAST/SCA/Container/IAC and other tool's rule/configuration and work with vendor to engineer them to provide the maximum scanning coverage to FIS software.
Crate software/automated workflows and collaborate with other stakeholders to integrate security tooling to track the API findings and work with development team to remediate them.
Collaborate with WAF team to define/modify the rules to protect the APIs.
What you bring:
Total 5+ years of hands-on professional software development and security experience, with a strong foundation in security practices and expertise in languages such as Java or C#.
Proven experience in API Security and Application security, including secure design reviews.
Collaborated closely with development teams to integrate security control and remediate vulnerabilities.
Collaborated with development team and DevOps team to integrate security tools and workflows into automated development environments.
Good understanding of SAST, SCA, IaC, and container security tools (e.g., Checkmarx One) working and tuning of such tools to maximize coverage and reduce false positives.
Strong knowledge of OWASP Top 10 and OWASP API Top 10, with the ability to identify, assess, and guide remediation of vulnerabilities through both manual and automated methods.
Excellent communication skills, with the ability to convey complex security concepts to both technical and non-technical stakeholders.
Strong organizational and time management skills, with a track record of driving security initiatives across cross-functional teams in a remote or hybrid environment.
Added Bonus if you have:
Knowledge of FIS products and services a plus but not required
Knowledge of Financial Industry preferred.
What we offer you:
At FIS, you can learn, grow and make an impact in your career. Our benefits include:
Flexible and creative work environment
Diverse and collaborative atmosphere
Professional and personal development resources
Opportunities to volunteer and support charities
Competitive salary and benefits
NOTE:
1. Candidates located in FIS office locations in Jacksonville (FL), Milwaukee (WI), Atlanta (GA), and New York City (NY) will be required to work in a hybrid model (3 days in office per week).
2. Current and future sponsorship are not available for this position.
FIS is committed to providing its employees with an exciting career opportunity and competitive compensation. The pay range for this full-time position is $86,120.00 - $144,670.00 and reflects the minimum and maximum target for new hire salaries for this position based on the posted role, level, and location. Within the range, actual individual starting pay is determined by additional factors, including job-related skills, experience, and relevant education or training. Any changes in work location will also impact actual individual starting pay. Please consult with your recruiter about the specific salary range for your preferred location during the hiring process.
Privacy Statement
FIS is committed to protecting the privacy and security of all personal information that we process in order to provide services to our clients. For specific information on how FIS protects personal information online, please see the Online Privacy Notice.
EEOC Statement
FIS is an equal opportunity employer. We evaluate qualified applicants without regard to race, color, religion, sex, sexual orientation, gender identity, marital status, genetic information, national origin, disability, veteran status, and other protected characteristics. The EEO is the Law poster is available here supplement document available here
For positions located in the US, the following conditions apply. If you are made a conditional offer of employment, you will be required to undergo a drug test. ADA Disclaimer: In developing this job description care was taken to include all competencies needed to successfully perform in this position. However, for Americans with Disabilities Act (ADA) purposes, the essential functions of the job may or may not have been described for purposes of ADA reasonable accommodation. All reasonable accommodation requests will be reviewed and evaluated on a case-by-case basis.
Sourcing Model
Recruitment at FIS works primarily on a direct sourcing model; a relatively small portion of our hiring is through recruitment agencies. FIS does not accept resumes from recruitment agencies which are not on the preferred supplier list and is not responsible for any related fees for resumes submitted to job postings, our employees, or any other part of our company.
#pridepass
$86.1k-144.7k yearly Auto-Apply 60d+ ago
Information System Security Manager
Booz Allen Hamilton 4.9
Security engineer job in Eglin Air Force Base, FL
Key Role:
Support day-to-day remote technical aspects of product operational data to identify diagnostic issues in enough detail to determine if the root cause is hardware or software related. Apply specific functional knowledge and working or general industry knowledge. Develop or contribute to solutions to a variety of problems of moderate scope and complexity. Work independently with some guidance. May review or guide the activities of more junior employees.
Basic Qualifications:
2+ years of experience with cybersecurity projects and integrated systems
2+ years of experience with NIST 800-53 and RMF practices, including Security Technical Implementation Guides (STIGs), computer networking, and operating systems administration
2+ years of experience with STIGs, NESSUS, vulnerability, or application scanners for IA use
Knowledge of NISPOM, JSIG, ICD, and eMASS
Ability to generate RMF security documentation to support Interim Authorities to Test (IATTs), Authorizations to Operate (ATOs), Interconnection Security Agreements (ISAs), and Authorities to Connect (ATCs)
TS/SCI clearance
HS diploma or GED
Additional Qualifications:
Experience managing the authorization status of DoD RMF from step 1 through step 6
Knowledge of continuous monitoring, cybersecurity risk management, disaster recovery, FISMA compliance, information security architecture, information security auditing, security control assessment, threat modeling, threat management, vulnerability analysis, and vulnerability assessments
Bachelor's degree
DoD 8570 Security+ Certification
Clearance:
Applicants selected will be subject to a security investigation and may need to meet eligibility requirements for access to classified information; TS/SCI clearance is required.
Compensation
At Booz Allen, we celebrate your contributions, provide you with opportunities and choices, and support your total well-being. Our offerings include health, life, disability, financial, and retirement benefits, as well as paid leave, professional development, tuition assistance, work-life programs, and dependent care. Our recognition awards program acknowledges employees for exceptional performance and superior demonstration of our values. Full-time and part-time employees working at least 20 hours a week on a regular basis are eligible to participate in Booz Allen's benefit programs. Individuals that do not meet the threshold are only eligible for select offerings, not inclusive of health benefits. We encourage you to learn more about our total benefits by visiting the Resource page on our Careers site and reviewing Our Employee Benefits page.
Salary at Booz Allen is determined by various factors, including but not limited to location, the individual's particular combination of education, knowledge, skills, competencies, and experience, as well as contract-specific affordability and organizational requirements. The projected compensation range for this position is $77,500.00 to $176,000.00 (annualized USD). The estimate displayed represents the typical salary range for this position and is just one component of Booz Allen's total compensation package for employees. This posting will close within 90 days from the Posting Date.
Identity Statement
As part of the application process, you are expected to be on camera during interviews and assessments. We reserve the right to take your picture to verify your identity and prevent fraud.
Work Model
Our people-first culture prioritizes the benefits of flexibility and collaboration, whether that happens in person or remotely.
If this position is listed as remote or hybrid, you'll periodically work from a Booz Allen or client site facility.
If this position is listed as onsite, you'll work with colleagues and clients in person, as needed for the specific role.
Commitment to Non-Discrimination
All qualified applicants will receive consideration for employment without regard to disability, status as a protected veteran or any other status protected by applicable federal, state, local, or international law.
$77.5k-176k yearly Auto-Apply 46d ago
Information Systems Security Manager (ISSM) II
Amatriot Group, LLC
Security engineer job in Eglin Air Force Base, FL
Job Description
Security Clearance: Active TS/SCI (Must be willing to obtain a CI Poly)
Job Type: Full-Time
Target Salary Range*: $134,000 - $140,500.
*This represents the potential salary range for this position depending on education level, years of experience and/or certifications in addition to other position specific requirements which may impact salary
Position Overview:
Special Access Program (SAP)
Key Responsibilities:
The ISSM's primary function serves as a principal advisor on all matters, technical and otherwise, involving the security of information systems under their purview.
Primary support will be working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense, and Military Compartment efforts.
The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
Performance shall include:
Perform oversight of the development, implementation and evaluation of information system security program policy; special emphasis placed upon integration of existing SAP network infrastructures
Develop and oversee operational information systems security implementation policy and guidelines of network security, based upon the Risk Management Framework (RMF) with emphasize on Joint
Special Access Program Implementation Guide (JSIG) authorization process
Advise customer on Risk Management Framework (RMF) assessment and authorization issues
Perform risk assessments and make recommendations to DoD agency customers
Advise government program managers on security testing methodologies and processes
Evaluate authorization documentation and provide written recommendations for authorization to government PMs
Develop and maintain a formal Information Systems Security Program
Ensure that all IAOs, network administrators, and other cyber security personnel receive the necessary technical and security training to carry out their duties
Develop, review, endorse, and recommend action by the AO or DAO of system assessment documentation
Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media
Develop and execute security assessment plans that include verification that the features and assurances required for each protection level functioning
Maintain a and/or applicable repository for all system authorization documentation and modifications
Institute and implement a Configuration Control Board (CCB) charter
Develop policies and procedures for responding to security incidents, to include investigating and reporting security violations and incidents
Ensure proper protection or corrective measures have been taken when an incident or vulnerability has been discovered within a system
Ensure that data ownership and responsibilities are established for each authorization boundary, to include accountability, access rights, and special handling requirements
Ensure development and implementation of an information security education, training, and awareness program, to include attending, monitoring, and presenting local cyber security training.
Evaluate threats and vulnerabilities to ascertain whether additional safeguards are needed
Assess changes in the system, its environment, and operational needs that could affect the authorization
Ensure that authorization is accomplished a valid Authorization determination has been given for all authorization boundaries under your purview
Review AIS assessment plans
Coordinate with PSO or cognizant security official on approval of external information systems (e.g., guest systems, interconnected system with another organization)
Conduct periodic assessments of the security posture of the authorization boundaries
Ensure configuration management (CM) for security-relevant changes to software, hardware, and firmware and that they are properly documented
Ensure periodic testing is conducted to evaluate the security posture of IS by employing various intrusion/attack detection and monitoring tools (shared responsibility with ISSOs)
Ensure that system recovery and reconstitution processes developed and monitored to ensure that the authorization boundary can be recovered based on its availability level determination
Ensure all authorization documentation is current and accessible to properly authorized individuals
Ensure that system security requirements are addressed during all phases of the system life cycle
Develop Assured File Transfers (AFT) on accordance with the JSIG
Participate in self-inspections
Conduct the duties of the Information System Security Officer (ISSO) if one is not present and/or available
Qualifications:
Experience:
MANDATORY: 7-9 years related experience
Prior performance in roles such as ISSO or ISSM
SAP experience
Certifications:
IAT Level 2 or IAM Level 2
$134k-140.5k yearly 6d ago
Information Systems Security Manager (ISSM) II - TS/SCI
Hruckus LLC
Security engineer job in Eglin Air Force Base, FL
Veteran-Owned Firm Seeking an Information Systems Security Manager II with TS/SCI for a role at Eglin Air Force Base (AFB) in Florida. My name is Stephen Hrutka. I lead a Veteran-Owned management consulting firm in Washington, DC. We specialize in Technical and Cleared Recruiting for the Department of Defense (DoD), the Intelligence Community (IC), and other advanced defense agencies.
At HRUCKUS, we support fellow Veteran-Owned businesses by helping them recruit for positions across organizations such as the VA, SBA, HHS, DARPA, and other leading-edge R&D-focused defense agencies.
We seek to fill an Information Systems Security Manager position at Eglin Air Force Base (AFB) in Florida.
The ideal candidate must hold an active TS/SCI clearance and have at least 7-9 years of proven expertise with the Risk Management Framework (RMF) and JSIG authorization process. They should also have DoD Directive 8570.01-M IAT Level II or IAM Level II certification.
If you're interested, I'll gladly provide more details about the role and discuss your qualifications further.
Thanks,
Stephen M Hrutka
Principal Consultant
HRUCKUS LLC
Executive Summary: HRUCKUS seeks an Information Systems Security Manager II for a role supporting the Department of the Air Force at Eglib AFB in Florida.
Position Description: The ISSM's primary function serves as a principal advisor on all matters, technical and otherwise, involving the security of information systems under their purview. Primary support will be working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense, and Military Compartment efforts. The position will provide "day-to-day" support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
Position Job Duties:
* Perform oversight of the development, implementation and evaluation of information system security program policy; special emphasis placed upon integration of existing SAP network infrastructures
* Develop and oversee operational information systems security implementation policy and guidelines of network security, based upon the Risk Management Framework (RMF) with emphasize on Joint Special Access Program Implementation Guide (JSIG) authorization process
* Advise customer on Risk Management Framework (RMF) assessment and authorization issues
* Perform risk assessments and make recommendations to DoD agency customers
* Advise government program managers on security testing methodologies and processes
* Evaluate authorization documentation and provide written recommendations for authorization to government PM's
* Develop and maintain a formal Information Systems Security Program
* Ensure that all IAOs, network administrators, and other cyber security personnel receive the necessary technical and security training to carry out their duties
* Develop, review, endorse, and recommend action by the AO or DAO of system assessment documentation
* Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media
* Develop and execute security assessment plans that include verification that the features and assurances required for each protection level functioning
* Maintain a and/or applicable repository for all system authorization documentation and modifications
* Develop policies and procedures for responding to security incidents, to include investigating and reporting security violations and incidents
* Ensure proper protection or corrective measures have been taken when an incident or vulnerability has been discovered within a system
* Ensure that data ownership and responsibilities are established for each authorization boundary, to include accountability, access rights, and special handling requirements
* Ensure development and implementation of an information security education, training, and awareness program, to include attending, monitoring, and presenting local cyber security training.
* Evaluate threats and vulnerabilities to ascertain whether additional safeguards are needed
* Assess changes in the system, its environment, and operational needs that could affect the authorization
* Ensure that authorization is accomplished a valid Authorization determination has been given for all authorization boundaries under your purview
* Review AIS assessment plans
* Coordinate with PSO or cognizant security official on approval of external information systems (e.g., guest systems, interconnected system with another organization)
* Conduct periodic assessments of the security posture of the authorization boundaries
* Institute and implement a Configuration Control Board (CCB) charter
* Ensure configuration management (CM) for security-relevant changes to software, hardware, and firmware and that they are properly documented
* Ensure periodic testing is conducted to evaluate the security posture of IS by employing various intrusion/attack detection and monitoring tools (shared responsibility with ISSOs)
* Ensure that system recovery and reconstitution processes developed and monitored to ensure that the authorization boundary can be recovered based on its availability level determination
* Ensure all authorization documentation is current and accessible to properly authorized individuals
* Ensure that system security requirements are addressed during all phases of the system life cycle
* Participate in self-inspections
* Periodically review system security to accommodate changes to policy or technology
* Coordinate all technical security issues outside of area of expertise or responsibility with ISSE
* Provide expert research and analysis in support of expanding programs and area of responsibility as it pertains to cyber security and information technology activities
* Develop Assured File Transfers (AFT) on accordance with the JSIG
* Provide leadership, mentoring, and quality assurance for Cyber Security and Information Technology team members
Position Qualifications:
* 7-9 years related experience with the Risk Management Framework (RMF) and the Joint Special Access Program Implementation Guide (JSIG) authorization process.
* Prior performance in roles such as ISSO or ISSM
* Must having working knowledge of DoD, National and applicable service and agency security policy, manuals and standards.
Education:
* Bachelor's degree in a related area or equivalent experience (4 years)
Certifications:
* Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level II or Information Assurance Manager Level II within 6 months of the date of hire.
Security Clearance:
* Must possess current Top Secret/Special Compartmented Information (TS/SCI) eligibility
* Eligibility for access to Special Access Program Information
* Willingness to submit to a Counterintelligence polygraph
Details:
* Job Title: Information Systems Security Manager II
* Location: Eglin AFB, FL 32542
* Security Clearance Requirement: TS/SCI
* Assignment Type: Full-time
* Salary: Dependent on the candidate's experience, with a target range of up to $138,000.
$138k yearly 6d ago
Information System Security Manager II
Global Resource Solutions, Inc. 4.4
Security engineer job in Valparaiso, FL
Summary: The ISSM II's primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
Essential Duties & Responsibilities:
Perform oversight of the development, implementation and evaluation of information system security program policy; special emphasis placed upon integration of existing SAP network infrastructures
Perform analysis of network security, based upon the RMF or JAFAN authorization process; advise customer on IT assessment and authorization issues
Perform risk assessments and make recommendations to customers
Advise government program managers on security testing methodologies and processes
Evaluate assessment documentation and provide written recommendations for authorization to government PM's
Periodically review system security to accommodate changes to policy or technology
Develop and maintain a formal Information Systems Security Program
Ensure that all IAOs, network administrators, and other AIS personnel receive the necessary technical and security training to carry out their duties
Develop, review, endorse, and recommend action by the AO or DAO of system assessment documentation
Ensure approved procedures are in place for clearing, purging, declassifying, and releasing system memory, media, and output
Conduct assessment tests that include verification that the features and assurances required for each protection level are functional
Maintain a repository for all system authorization documentation and modifications
Coordinate AIS security inspections, tests, and reviews
Develop policies and procedures for responding to security incidents, and for investigating and reporting security violations and incidents
Ensure proper protection or corrective measures have been taken when an incident or vulnerability has been discovered within a system
Ensure that data ownership and responsibilities are established for each AIS, to include accountability, access rights, and special handling requirements
Ensure development and implementation of an information security education, training, and awareness program, to include attending, monitoring, and presenting local AIS security training.
Ensure that security assessments are completed and documented
Evaluate threats and vulnerabilities to ascertain whether additional safeguards are needed
Assess changes in the system, its environment, and operational needs that could affect the authorization
Ensure that authorization is accomplished on each AIS
Review AIS assessment plans
Conduct periodic assessments of the security posture of the AIS
Ensure configuration management (CM) for security-relevant AIS software, hardware, and firmware are properly documented.
Ensure that system recovery processes are monitored to ensure that security features and procedures are properly restored
Ensure all AIS authorization documentation is current and accessible to properly authorized individuals
Ensure that system security requirements are addressed during all phases of the system life cycle
Participate in self-inspections; identify security discrepancies and report security incidents
Coordinate all technical security issues outside of area of expertise or responsibility with SSE
Provide expert research and analysis in support of expanding programs and area of responsibility
Perform file transfers between local systems to storage devices
Provide leadership, mentoring, and quality assurance for Team Members
Requirement:
Seven (7) to Nine (9) years related experience
Bachelor's Degree in a related area or equivalent experience (Four (4) years)
Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level 3 within 6 months of the date of hire.
Security Requirements:
Current Top Secret Clearance with SCI Eligibility
Eligibility for access to Special Access Programs
Willingness to submit to a Counterintelligence Polygraph
Skills:
Ability to work in a dynamic environment and effectively interact with numerous DOD, military/civilian personnel and industry partners
Working knowledge of Microsoft Office (Word, PowerPoint, and Excel)
Possess a high degree of originality, creativity, initiative requiring minimal supervision
Must be familiar with security policy/manuals and the appropriate DCIDs/JAFANs and other guiding policy documents
Requires travel within the organizational geographic Area of Responsibility (AOR) (note - could be extensive, and will include both air and ground transportation)
Must be able to lift up to 50lbs
Physical Requirements: This position requires employees to be willing and able to: sit, bend, reach, stoop, squat, stand, and walk.
Communication: Excellent customer service via phone and face to face conversation, excellent written and oral command of English.
GRS is an Equal Opportunity Employer. GRS will continue to abide by obligations under VEVRRA and Section 503 physical or mental disability, protected veteran status, or any other characteristics that are protected by law.
$86k-112k yearly est. Auto-Apply 5d ago
Information System Security Manager II (ISSM II)
Targeted Solutions, LLC 3.9
Security engineer job in Eglin Air Force Base, FL
Job DescriptionSalary: Up to $61.86 hourly
The ISSMs primary function serves as a principal advisor on all matters, technical and otherwise, involving the security of information systems under their purview. Primary support will be working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense, and Military Compartment efforts. The position will provide day-to-day support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
Performance shall include:
Perform oversight of the development, implementation and evaluation of information system security program policy; special emphasis placed upon integration of existing SAP network infrastructures.
Develop and oversee operational information systems security implementation policy and guidelines of network security, based upon the Risk Management Framework (RMF) with emphasize on Joint.
Special Access Program Implementation Guide (JSIG) authorization process.
Advise customer on Risk Management Framework (RMF) assessment and authorization issues.
Perform risk assessments and make recommendations to DoD agency customers.
Advise government program managers on security testing methodologies and processes.
Evaluate authorization documentation and provide written recommendations for authorization to government PMs.
Develop and maintain a formal Information Systems Security Program.
Ensure that all IAOs, network administrators, and other cyber security personnel receive the necessary technical and security training to carry out their duties.
Develop, review, endorse, and recommend action by the AO or DAO of system assessment documentation.
Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media.
Develop and execute security assessment plans that include verification that the features and assurances required for each protection level functioning.
Maintain a and/or applicable repository for all system authorization documentation and modifications.
Institute and implement a Configuration Control Board (CCB) charter.
Develop policies and procedures for responding to security incidents, to include investigating and reporting security violations and incidents.
Ensure proper protection or corrective measures have been taken when an incident or vulnerability has been discovered within a system.
Ensure that data ownership and responsibilities are established for each authorization boundary, to include accountability, access rights, and special handling requirements.
Ensure development and implementation of an information security education, training, and awareness program, to include attending, monitoring, and presenting local cyber security training.
Evaluate threats and vulnerabilities to ascertain whether additional safeguards are needed.
Assess changes in the system, its environment, and operational needs that could affect the authorization.
Ensure that authorization is accomplished a valid Authorization determination has been given for all authorization boundaries under your purview.
Review AIS assessment plans.
Coordinate with PSO or cognizant security official on approval of external information systems (e.g., guest systems, interconnected system with another organization).
Conduct periodic assessments of the security posture of the authorization boundaries.
Ensure configuration management (CM) for security-relevant changes to software, hardware, and firmware and that they are properly documented.
Ensure periodic testing is conducted to evaluate the security posture of IS by employing various intrusion/attack detection and monitoring tools (shared responsibility with ISSOs)
Ensure that system recovery and reconstitution processes developed and monitored to ensure that the authorization boundary can be recovered based on its availability level determination.
Ensure all authorization documentation is current and accessible to properly authorized individuals.
Ensure that system security requirements are addressed during all phases of the system life cycle.
Develop Assured File Transfers (AFT) on accordance with the JSIG.
Participate in self-inspections.
Conduct the duties of the Information System Security Officer (ISSO) if one is not present and/or available.
EDUCATION:
Bachelor's degree or equivalent experience (4 years)
CLEARANCE:
Top Secret w/SCI Eligibility
Willingness to submit to a Counterintelligence polygraph
MANDATORY
7-9 years related experience; Prior performance in roles such as ISSO or ISSM; SAP experience; DoD 8570.01-M IAM Level II (in lieu of IAT Level II)
BENEFITS:
We offer a competitive compensation package including a generous PTO and Flexible holiday package, tax-free healthcare cost reimbursement, and an immediate vesting 401K with 4% matching.
$61.9 hourly 7d ago
Information System Security Manager II
Grs, Inc. 4.4
Security engineer job in Valparaiso, FL
Global Resource Solutions, Inc. (GRS) is seeking an enthusiastic, motivated, detail orientated, and talented individual for the position of Information System Security Manager II.
Job Descriptio n:
Summary: The ISSM II's primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
Essential Duties & Responsibilities:
Perform oversight of the development, implementation and evaluation of information system security program policy; special emphasis placed upon integration of existing SAP network infrastructures
Perform analysis of network security, based upon the RMF or JAFAN authorization process; advise customer on IT assessment and authorization issues
Perform risk assessments and make recommendations to customers
Advise government program managers on security testing methodologies and processes
Evaluate assessment documentation and provide written recommendations for authorization to government PM's
Periodically review system security to accommodate changes to policy or technology
Develop and maintain a formal Information Systems Security Program
Ensure that all IAOs, network administrators, and other AIS personnel receive the necessary technical and security training to carry out their duties
Develop, review, endorse, and recommend action by the AO or DAO of system assessment documentation
Ensure approved procedures are in place for clearing, purging, declassifying, and releasing system memory, media, and output
Conduct assessment tests that include verification that the features and assurances required for each protection level are functional
Maintain a repository for all system authorization documentation and modifications
Coordinate AIS security inspections, tests, and reviews
Develop policies and procedures for responding to security incidents, and for investigating and reporting security violations and incidents
Ensure proper protection or corrective measures have been taken when an incident or vulnerability has been discovered within a system
Ensure that data ownership and responsibilities are established for each AIS, to include accountability, access rights, and special handling requirements
Ensure development and implementation of an information security education, training, and awareness program, to include attending, monitoring, and presenting local AIS security training.
Ensure that security assessments are completed and documented
Evaluate threats and vulnerabilities to ascertain whether additional safeguards are needed
Assess changes in the system, its environment, and operational needs that could affect the authorization
Ensure that authorization is accomplished on each AIS
Review AIS assessment plans
Conduct periodic assessments of the security posture of the AIS
Ensure configuration management (CM) for security-relevant AIS software, hardware, and firmware are properly documented.
Ensure that system recovery processes are monitored to ensure that security features and procedures are properly restored
Ensure all AIS authorization documentation is current and accessible to properly authorized individuals
Ensure that system security requirements are addressed during all phases of the system life cycle
Participate in self-inspections; identify security discrepancies and report security incidents
Coordinate all technical security issues outside of area of expertise or responsibility with SSE
Provide expert research and analysis in support of expanding programs and area of responsibility
Perform file transfers between local systems to storage devices
Provide leadership, mentoring, and quality assurance for Team Members
Requirement:
Seven (7) to Nine (9) years related experience
Bachelor's Degree in a related area or equivalent experience (Four (4) years)
Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level 3 within 6 months of the date of hire.
Security Requirements:
Current Top Secret Clearance with SCI Eligibility
Eligibility for access to Special Access Programs
Willingness to submit to a Counterintelligence Polygraph
Skills:
Ability to work in a dynamic environment and effectively interact with numerous DOD, military/civilian personnel and industry partners
Working knowledge of Microsoft Office (Word, PowerPoint, and Excel)
Possess a high degree of originality, creativity, initiative requiring minimal supervision
Must be familiar with security policy/manuals and the appropriate DCIDs/JAFANs and other guiding policy documents
Requires travel within the organizational geographic Area of Responsibility (AOR) (note - could be extensive, and will include both air and ground transportation)
Must be able to lift up to 50lbs
Physical Requirements : This position requires employees to be willing and able to: sit, bend, reach, stoop, squat, stand, and walk.
Communication: Excellent customer service via phone and face to face conversation, excellent written and oral command of English.
GRS is an Equal Opportunity Employer. GRS will continue to abide by obligations under VEVRRA and Section 503 physical or mental disability, protected veteran status, or any other characteristics that are protected by law.
$91k-114k yearly est. Auto-Apply 8d ago
ISSM II - Information Systems Security Manager
Watermark Risk Management International
Security engineer job in Eglin Air Force Base, FL
Job DescriptionCome make your mark with Watermark!🎖️ FOUNDED BY USAF VETERANS in 2007, we are proud to be a Service-Disabled Veteran Owned Small Business.🌎 SUBJECT MATTER EXPERTS specializing in security and risk management. We're intimately familiar with DOD security programs and mission requirements.
⭐ OUR CORE VALUES drive every action we take as a company. We strive to exhibit PERSPECTIVE, PASSION, COMMUNICATION, INTEGRITY AND ETHICS, and BALANCE in all we do.
💲 COMPETITIVE BENEFITS PACKAGE to address our employees' physical, mental, emotional, and financial well-being. This includes 100% employer- paid medical insurance, ample paid leave, a free employee assistance program, and a competitive 401k savings plan. At Watermark, our people come first! Information Systems Security Manager II
The ISSM's primary function serves as a principal advisor on all matters, technical and otherwise, involving the security of information systems under their purview. Primary support will be working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense, and Military Compartment efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
In this role you will…
Perform oversight of the development, implementation and evaluation of information system security program policy; special emphasis placed upon integration of existing SAP network infrastructures
Develop and oversee operational information systems security implementation policy and guidelines of network security, based upon the Risk Management Framework (RMF) with emphasize on Joint Special Access Program Implementation Guide (JSIG) authorization process
Advise customer on Risk Management Framework (RMF) assessment and authorization issues
Perform risk assessments and make recommendations to DoD agency customers
Advise government program managers on security testing methodologies and processes
Evaluate authorization documentation and provide written recommendations for authorization to government PMs
Develop and maintain a formal Information Systems Security Program
Ensure that all IAOs, network administrators, and other cyber security personnel receive the necessary technical and security training to carry out their duties
Develop, review, endorse, and recommend action by the AO or DAO of system assessment documentation
Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media
Develop and execute security assessment plans that include verification that the features and assurances required for each protection level functioning
Maintain a and/or applicable repository for all system authorization documentation and modifications
Institute and implement a Configuration Control Board (CCB) charter
Develop policies and procedures for responding to security incidents, to include investigating and reporting security violations and incidents
Ensure proper protection or corrective measures have been taken when an incident or vulnerability has been discovered within a system
Ensure that data ownership and responsibilities are established for each authorization boundary, to include accountability, access rights, and special handling requirements
Ensure development and implementation of an information security education, training, and awareness program, to include attending, monitoring, and presenting local cyber security training.
Evaluate threats and vulnerabilities to ascertain whether additional safeguards are needed
Assess changes in the system, its environment, and operational needs that could affect the authorization
Ensure that authorization is accomplished a valid Authorization determination has been given for all authorization boundaries under your purview
Review AIS assessment plans
Coordinate with PSO or cognizant security official on approval of external information systems (e.g., guest systems, interconnected system with another organization)
Conduct periodic assessments of the security posture of the authorization boundaries
Ensure configuration management (CM) for security-relevant changes to software, hardware, and firmware and that they are properly documented
Ensure periodic testing is conducted to evaluate the security posture of IS by employing various intrusion/attack detection and monitoring tools (shared responsibility with ISSOs)
Ensure that system recovery and reconstitution processes developed and monitored to ensure that the authorization boundary can be recovered based on its availability level determination
Ensure all authorization documentation is current and accessible to properly authorized individuals
Ensure that system security requirements are addressed during all phases of the system life cycle
Participate in self-inspections
Periodically review system security to accommodate changes to policy or technology
Coordinate all technical security issues outside of area of expertise or responsibility with ISSE
Provide expert research and analysis in support of expanding programs and area of responsibility as it pertains to cyber security and information technology activities
Develop Assured File Transfers (AFT) on accordance with the JSIG
Provide leadership, mentoring, and quality assurance for Cyber Security and Information Technology team members
Additional duties as assigned
Experience Requirements:
7-9 years related experience
Prior performance in roles such as ISSO or ISSM
Education Requirements:
Bachelor's degree in a related area or equivalent experience (4 years)
Certification Requirements:
IAT Level 3 (CISSP, CASP+ CE, CCNP Security, CISA, etc.) or IAM Level 3
Security Clearance Requirements:
Active/Current TS/SCI.
Must be able to obtain CI Poly.
Other Requirements:
Reports to a physical location which occasionally requires the ability to traverse between buildings
Must be able to regularly lift up to 50 lbs
May require sedentary work at least 50% of the time
Ability to manage stress with a high degree of maturity/professionalism
Demonstrated critical thinking and leadership skills and the ability to work well with others
Effective verbal and written communication skills
All Level I & Level II positions - candidate should possess some Special Access Program (SAP) experience
All Level III positions -candidate should possess 2+ years of Special Access Program (SAP) experience
Watermark provides salary ranges with job postings in states where it is legally required; any other salary ranges associated with our postings are third party estimates and may not be an accurate reflection of Watermark's total compensation package.
Multiple considerations are taken into account when determining the final salary/hour rate, including but not limited to, Contract Wage Determination, education and certifications, relevant work experience, related skills and competencies, as well as Federal Government Contract Labor categories. Central to Watermark's employment philosophy is the wellbeing of our employees which is why we offer a robust benefits package and wellness program alongside of annual base compensation.)
Watermark is an equal opportunity employer. All terms and conditions of employment are established without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, pregnancy, genetic information, disability, veteran status, or any other protected category under applicable federal, state, and local laws.
Powered by JazzHR
WkPJpt4YFo
$87k-117k yearly est. 8d ago
Information Systems Security Manager (ISSM) - Journeyman
JBW Federal
Security engineer job in Eglin Air Force Base, FL
JBW Federal is a subsidiary company of the Kanaka Foundation - An NHO who's mission is to support Native Hawaiians.
You will receive a comprehensive benefits package that includes:
Health insurance
Dental insurance
Vision insurance
Pet insurance
Annual membership to Costco or Sam's
401K
...and much, much more!
Job Description: JBW Federal is seeking an Information Systems Security Manager to support the 39th Information Operations Squadron (39 IOS) from Hurlburt Field, FL or Joint Base San Antonio, TX.
What You'll Be Doing:
You will understand cybersecurity concepts and methodologies at the professional level with knowledge equivalent to: Certified Information Systems Security Professional, or similar certifications.
You will direct, oversee, and manage and perform records management for all Account Forms including, but not limited to: Authorized User Agreements and associated user forms for all networks required for duty at the 39 IOS, System Authorization Access Requests, Privileged User Agreements, 8570/8140 validation, Operating System Certification validation, and associated user forms.
You will manage and update MICT checklists for assigned programs including, but not limited to: Privileged User, 17-1301 COMPUSEC, and 17-101 RMF.
You will verify Cybersecurity Awareness training for all students as well as maintaining appointment letters for Program Managers, ISSO, ISSM, ISSE, Systems Administrators, Client Systems Technicians, and Cybersecurity Liaisons.
You will ensure equipment inspection prior to entry and exit of the facilities and ensure entry and exit logs are accomplished as well as overseeing and performing wireless scanning throughout the facility to ensure no rogue activity.
You will review, update, and enforce Media Control policy including, but not limited to: Issuing and tracking removable media and ensuring media sanitization along with reviewing equipment purchase requests to ensure items are on approved products listings and meet requirements to enter the facilities.
You will direct and conduct network audits and review vulnerability scans on all networks used by the 39 IOS as well as responding to any vulnerabilities appropriately while overseeing and performing COMPUSEC and Information Security (INFOSEC) duties.
You will validate administrator accounts on all networks and respond to any discrepancies appropriately by monitoring, validating, and reporting administrators 8570/8140 certification status.
You will respond to incidents and oversee response and reporting to include but not limited to: performing random walkthroughs, bag inspections with the Security team and review, update, and enforce contingency plan policy
You will ensure cybersecurity marking and standards enforcement including but not limited to: Classification stickers and markings on all systems, Bomb threat aids posted by all phones, and Combined Security Cards are posted by all workstations.
You will answer all TASKORDS/ taskers by MAJCOM for action on unit owned networks including but not limited to: vulnerability remediation and data calls.
You will oversee the Risk Management Framework (RMF) process for all networks owned and operated by the 39 IOS including, but not limited to: answer data calls, prepare system package, categorize system by guiding documents, select security controls for risk mitigation, implement security controls, assess security control effectiveness, monitor system and update accreditation package, Security Impact Analysis (SIA) submissions for tenants requesting changes and install of new software, and respond to and coordinate requirements for accreditation package not owned by the squadron.
You will order, issue, manage, and account for all tokens granting access to networks to include auditing and inventorying the issuance of student user tokens.
You will manage the Cybersecurity Liaison program for the squadron under the direction of the Wing Cybersecurity Office by reviewing, updating, and enforcing the Security Concept of Operations (SECONOPS) policy.
What Required Qualifications You'll Bring:
Associate's Degree (preferably in a STEM field) or Approved Equivalent Experience.
2 years of risk management framework experience within the last 5 years
IAT/M Level III certification
Ability to travel CONUS and OCONUS Occasionally. Must have a current passport or able to acquire within the first 60 days of employment
Clearance - Top Secret/SCI
Kanaka Family of Companies is an Equal Opportunity Employer, and all qualified candidates will receive consideration for employment without regard to race, color, religion, national origin, marital status, sex (including pregnancy), gender identity or expression, age, disability, veteran status, sexual orientation, genetic information (family medical history), or any other status protected by federal, state or local laws. EEO/AA employer/Vet/Disabled.
Job Posted by ApplicantPro
$87k-117k yearly est. 10d ago
Information Systems Security Manager (ISSM) II
Redtrace Technologies Inc.
Security engineer job in Eglin Air Force Base, FL
Job DescriptionSECURITY CLEARANCE REQUIREMENT: TS, WITH SCI ELIGIBILITY REQUIRES US CITIZENSHIP*** Information System Security Manager II (ISSM II) The ISSM's primary function serves as a principal advisor on all matters, technical and otherwise, involving the security of information systems under their purview. Primary support will be working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense, and Military Compartment efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
We are seeking an ISSM II to carry out the following duties and responsibilities:
• Perform oversight of the development, implementation and evaluation of information
system security program policy; special emphasis placed upon integration of existing
SAP network infrastructures
• Develop and oversee operational information systems security implementation policy
and guidelines of network security, based upon the Risk Management Framework
(RMF) with emphasize on Joint Special Access Program Implementation Guide (JSIG)
authorization process
• Advise customer on Risk Management Framework (RMF) assessment and
authorization issues
• Perform risk assessments and make recommendations to DoD agency customers
• Advise government program managers on security testing methodologies and
processes
• Evaluate authorization documentation and provide written recommendations for
authorization to government PMs
• Develop and maintain a formal Information Systems Security Program
• Ensure that all IAOs, network administrators, and other cyber security personnel
receive the necessary technical and security training to carry out their duties
• Develop, review, endorse, and recommend action by the AO or DAO of system
assessment documentation
• Ensure approved procedures are in place for clearing, sanitizing, and destroying
various types of hardware and media
• Develop and execute security assessment plans that include verification that the
features and assurances required for each protection level functioning
• Maintain a and/or applicable repository for all system authorization documentation and
modifications
• Develop policies and procedures for responding to security incidents, to include
investigating and reporting security violations and incidents
• Ensure proper protection or corrective measures have been taken when an incident or
vulnerability has been discovered within a system
• Ensure that data ownership and responsibilities are established for each authorization
boundary, to include accountability, access rights, and special handling requirements
• Ensure development and implementation of an information security education, training,
and awareness program, to include attending, monitoring, and presenting local cyber
security training.
• Evaluate threats and vulnerabilities to ascertain whether additional safeguards are
needed
• Assess changes in the system, its environment, and operational needs that could
affect the authorization
• Ensure that authorization is accomplished a valid Authorization determination has
been given for all authorization boundaries under your purview
• Review AIS assessment plans
• Coordinate with PSO or cognizant security official on approval of external information
systems (e.g., guest systems, interconnected system with another organization)
• Conduct periodic assessments of the security posture of the authorization boundaries
• Institute and implement a Configuration Control Board (CCB) charter
• Ensure configuration management (CM) for security-relevant changes to software,
hardware, and firmware and that they are properly documented
• Ensure periodic testing is conducted to evaluate the security posture of IS by
employing various intrusion/attack detection and monitoring tools (shared responsibility
with ISSOs)
• Ensure that system recovery and reconstitution processes developed and monitored to
ensure that the authorization boundary can be recovered based on its availability level
determination
• Ensure all authorization documentation is current and accessible to properly
authorized individuals
• Ensure that system security requirements are addressed during all phases of the
system life cycle
• Develop Assured File Transfers (AFT) on accordance with the JSIG
• Participate in self-inspections
• Periodically review system security to accommodate changes to policy or technology
• Coordinate all technical security issues outside of area of expertise or responsibility with ISSE
• Provide expert research and analysis in support of expanding programs and area of responsibility as it pertains to cyber security and information technology activities
• Develop Assured File Transfers (AFT) on accordance with the JSIG
• Provide leadership, mentoring, and quality assurance for Cyber Security and Information Technology team members
Qualifications:
Required:
• 7 - 9 years related experience
• Prior performance in roles such as ISSO or ISSM
• SAP Experience
• Must meet position and certification requirements outlined in DoD Directive 8570.01-M for IAM II
• Must be able to regularly lift up to 50 lbs.
Desired:
• Bachelor's degree or equivalent experience (4 years)
Security Clearance:
• TS with SCI eligibility
• Eligibility for access to Special Access Program Information
• Willingness to submit to a Counterintelligence polygraph
Employee Benefits:
Competitive salary for well qualified applicants
401(k) plan
Annual performance bonus
Certification and advanced degree attainment bonuses
Student Loan / Tuition reimbursement
Health Care Insurance (medical, dental, vision)
Up to four weeks of paid vacation
11 Federal Holidays, and 3 Floating Holidays
Team bonding events
RedTrace Technologies is an EOE employer
Powered by JazzHR
Rn7bs5uLiX
$87k-117k yearly est. 8d ago
Network Security Administrator
Sql Database Administrator In Fort Belvoir, Virginia
Security engineer job in Pensacola, FL
Responsibilities & Qualifications
The Network Security Administrator is responsible for network boundary protection, cybersecurity posture, and accreditation oversight of IT systems across the Navy Medicine Operational Training Command (NMOTC) Enterprise. This role ensures compliance with DoD cybersecurity policies, oversees network security operations, and supports system accreditation processes under DISA, DoN, and DHA frameworks.
RESPONSIBILITIES
Manage and maintain perimeter defense systems (e.g., firewalls, IDS/IPS, VPNs).
Monitor network activity for signs of unauthorized access or anomalous behavior.
Implement and manage network segmentation and access control policies.
Oversee system security authorization efforts, including support for RMF (Risk Management Framework).
Coordinate with Information System Security Officers (ISSOs) and Information System Security Managers (ISSMs) to maintain Authority to Operate (ATO) status.
Ensure compliance with DISA STIGs, DoD 8500.01, DoDI 8510.01, and other applicable regulations.
Conduct vulnerability scans and ensure remediation of findings using tools such as ACAS (Tenable/Nessus).
Track, document, and report open security findings and POA&Ms (Plans of Action and Milestones).
Maintain configuration baselines and patch management across systems and devices.
Detect and respond to security incidents and breaches in accordance with NMOTC protocols.
Conduct incident analysis, reporting, and mitigation.
Work with cyber defense teams and respond to escalations.
Maintain detailed security documentation for system configurations, incidents, and compliance audits.
Support development of security plans, SOPs, and accreditation artifacts.
Submit reports to the Contracting Officer Representative (COR) and Security Manager as required.
Collaborate with network administrators, system engineers, and application developers to implement secure architectures.
Provide cybersecurity input during system design, integration, and upgrades.
Serve as SME (subject matter expert) on cybersecurity policies and procedures.
Support PKI, CAC, and multi-factor authentication integration.
Review and audit system access requests and ensure users meet appropriate clearance levels.
Ensure implementation of least privilege and separation of duties.
Ensure team members complete annual Cyber Awareness, CUI, and OPSEC training.
Promote cybersecurity best practices across the contract team.
REQUIRED QUALIFICATIONS
5+ years of DoD IT or 7+ years of general IT experience.
Must be trained and certified on the specific Operating System or Computing Environment they maintain (e.g., Windows Server, Linux, Cisco)
IAT LVL III (e.g., GIAC, CISSP, CASP, CISM)
Must have Top Secret clearance
COMPETENCIES
Network Security & Architecture
Cybersecurity & Compliance
System Accreditation & ATO Support'
Incident Response
Communications & Documentation
Technical Toolsets (e.g., ACAS, HBSS, Splunk, etc.)
Overview
We are seeking a Network Security Administrator to join ITSS supporting Department of Navy.
TekSynap is a fast-growing high-tech company that understands both the pace of technology today and the need to have a comprehensive well planned information management environment. “Technology moving at the speed of thought” embodies these principles - the need to nimbly utilize the best that information technology offers to meet the business needs of our Federal Government customers.
We offer our full-time employees a competitive benefits package to include health, dental, vision, 401K, life insurance, short-term and long-term disability plans, vacation time and holidays.
Visit us at *****************
Apply now to explore jobs with us!
The safety and health of our employees is of the utmost importance. Employees are required to comply with any vaccination requirements mandated by contract, applicable law or regulation.
By applying to a role at TekSynap you are providing consent to receive text messages regarding your interview and employment status. If at any time you would like to opt out of text messaging, respond "STOP".
As part of the application process, you agree that TekSynap Corporation may retain and use your name, e-mail, and contact information for purposes related to employment consideration.
Additional Job Information
WORK ENVIRONMENT AND PHYSICAL DEMANDS
The work environment characteristics described here are representative of those an employee encounters while performing the essential functions of the job. Reasonable accommodation may be made to enable individuals with disabilities to perform the essential functions.
Location: Onsite coverage at NMOTC HQs Pensacola, FL
Type of environment: Office
Noise level: Medium
Work schedule: Schedule is day shift Monday - Friday during core business hours
Amount of Travel: 20% - The Contractor will be required to do site visits throughout the Continental United States (CONUS) during the performance of this contractor
PHYSICAL DEMANDS
The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
While performing the duties of this job, the employee is regularly required to use hands to handle, feel, touch; reach with hands and arms; talk and hear. The employee is regularly required to stand; walk; sit; climb or balance; and stoop, kneel, crouch, or crawl. The employee is regularly required to lift up to 10 pounds. The employee is frequently required to lift up to 25 pounds; and up to 50 pounds. The vision requirements include close vision, distance vision, peripheral vision, depth perception, and ability to adjust focus.
WORK AUTHORIZATION/SECURITY CLEARANCE
US Citizenship
Clearance requirement: Active TS
OTHER DUTIES
Please note this job description is not designed to cover or contain a comprehensive listing of activities, duties or responsibilities that are required of the employee for this job. Duties, responsibilities and activities may change at any time with or without notice.
EQUAL EMPLOYMENT OPPORTUNITY
In order to provide equal employment and advancement opportunities to all individuals, employment decisions will be based on merit, qualifications, and abilities. TekSynap does not discriminate against any person because of race, color, creed, religion, sex, national origin, disability, age, genetic information or any other characteristic protected by law (referred to as “protected status”). This nondiscrimination policy extends to all terms, conditions, and privileges of employment as well as the use of all company facilities, participation in all company-sponsored activities, and all employment actions such as promotions, compensation, benefits, and termination of employment.
$60k-86k yearly est. Auto-Apply 60d+ ago
Network Security Administrator
Teksynap
Security engineer job in Pensacola, FL
Responsibilities & Qualifications
The Network Security Administrator is responsible for network boundary protection, cybersecurity posture, and accreditation oversight of IT systems across the Navy Medicine Operational Training Command (NMOTC) Enterprise. This role ensures compliance with DoD cybersecurity policies, oversees network security operations, and supports system accreditation processes under DISA, DoN, and DHA frameworks.
RESPONSIBILITIES
Manage and maintain perimeter defense systems (e.g., firewalls, IDS/IPS, VPNs).
Monitor network activity for signs of unauthorized access or anomalous behavior.
Implement and manage network segmentation and access control policies.
Oversee system security authorization efforts, including support for RMF (Risk Management Framework).
Coordinate with Information System Security Officers (ISSOs) and Information System Security Managers (ISSMs) to maintain Authority to Operate (ATO) status.
Ensure compliance with DISA STIGs, DoD 8500.01, DoDI 8510.01, and other applicable regulations.
Conduct vulnerability scans and ensure remediation of findings using tools such as ACAS (Tenable/Nessus).
Track, document, and report open security findings and POA&Ms (Plans of Action and Milestones).
Maintain configuration baselines and patch management across systems and devices.
Detect and respond to security incidents and breaches in accordance with NMOTC protocols.
Conduct incident analysis, reporting, and mitigation.
Work with cyber defense teams and respond to escalations.
Maintain detailed security documentation for system configurations, incidents, and compliance audits.
Support development of security plans, SOPs, and accreditation artifacts.
Submit reports to the Contracting Officer Representative (COR) and Security Manager as .
Collaborate with network administrators, system engineers, and application developers to implement secure architectures.
Provide cybersecurity input during system design, integration, and upgrades.
Serve as SME (subject matter expert) on cybersecurity policies and procedures.
Support PKI, CAC, and multi-factor authentication integration.
Review and audit system access requests and ensure users meet appropriate clearance levels.
Ensure implementation of least privilege and separation of duties.
Ensure team members complete annual Cyber Awareness, CUI, and OPSEC training.
Promote cybersecurity best practices across the contract team.
REQUIRED QUALIFICATIONS
5+ years of DoD IT or 7+ years of general IT experience.
Must be trained and certified on the specific Operating System or Computing Environment they maintain (e.g., Windows Server, Linux, Cisco)
IAT LVL III (e.g., GIAC, CISSP, CASP, CISM)
Must have Top Secret clearance
COMPETENCIES
Network Security & Architecture
Cybersecurity & Compliance
System Accreditation & ATO Support'
Incident Response
Communications & Documentation
Technical Toolsets (e.g., ACAS, HBSS, Splunk, etc.)
Overview
We are seeking a Network Security Administrator to join ITSS supporting Department of Navy.
TekSynap is a fast-growing high-tech company that understands both the pace of technology today and the need to have a comprehensive well planned information management environment. “Technology moving at the speed of thought” embodies these principles - the need to nimbly utilize the best that information technology offers to meet the business needs of our Federal Government customers.
We offer our full-time employees a competitive benefits package to include health, dental, vision, 401K, life insurance, short-term and long-term disability plans, vacation time and holidays.
Visit us at *****************
Apply now to explore jobs with us!
The safety and health of our employees is of the utmost importance. Employees are required to comply with any vaccination requirements mandated by contract, applicable law or regulation.
By applying to a role at TekSynap you are providing consent to receive text messages regarding your interview and employment status. If at any time you would like to opt out of text messaging, respond "STOP".
As part of the application process, you agree that TekSynap Corporation may retain and use your name, e-mail, and contact information for purposes related to employment consideration.
Additional Job Information
WORK ENVIRONMENT AND PHYSICAL DEMANDS
The work environment characteristics described here are representative of those an employee encounters while performing the essential functions of the job. Reasonable accommodation may be made to enable individuals with disabilities to perform the essential functions.
Location: Onsite coverage at NMOTC HQs Pensacola, FL
Type of environment: Office
Noise level: Medium
Work schedule: Schedule is day shift Monday - Friday during core business hours
Amount of Travel: 20% - The Contractor will be required to do site visits throughout the Continental United States (CONUS) during the performance of this contractor
PHYSICAL DEMANDS
The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
While performing the duties of this job, the employee is regularly required to use hands to handle, feel, touch; reach with hands and arms; talk and hear. The employee is regularly required to stand; walk; sit; climb or balance; and stoop, kneel, crouch, or crawl. The employee is regularly required to lift up to 10 pounds. The employee is frequently required to lift up to 25 pounds; and up to 50 pounds. The vision requirements include close vision, distance vision, peripheral vision, depth perception, and ability to adjust focus.
WORK AUTHORIZATION/SECURITY CLEARANCE
US Citizenship
Clearance requirement: Active TS
OTHER DUTIES
Please note this job description is not designed to cover or contain a comprehensive listing of activities, duties or responsibilities that are required of the employee for this job. Duties, responsibilities and activities may change at any time with or without notice.
EQUAL EMPLOYMENT OPPORTUNITY
In order to provide equal employment and advancement opportunities to all individuals, employment decisions will be based on merit, qualifications, and abilities. TekSynap does not discriminate against any person because of race, color, creed, religion, sex, national origin, disability, age, genetic information or any other characteristic protected by law (referred to as “protected status”). This nondiscrimination policy extends to all terms, conditions, and privileges of employment as well as the use of all company facilities, participation in all company-sponsored activities, and all employment actions such as promotions, compensation, benefits, and termination of employment.
$60k-86k yearly est. Auto-Apply 60d+ ago
Information Systems Security Manager (ISSM) III
Modern Technology Solutions, Inc. 4.6
Security engineer job in Eglin Air Force Base, FL
Position Overview The ISSM's primary function serves as a principal advisor on all matters, technical and otherwise, involving the security of information systems under his/her purview. Primary support will be working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense, and Military Compartment efforts.
The position will provide "day-to-day" support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
Information Systems Security Manager (ISSM) III Lead, cultivate and maintain productive working relationships with other DoD agencies managers, data stewards, and senior leadership to foster productive and positive cyber security profile Participate in the strategic planning and implementation of the Cyber Security Program Provide expert input to the formulation of cyber security policies based upon the Risk Management Framework (RMF) with emphasize on Joint Special Access Program Implementation Guide (JSIG) authorization process Advise customer on Risk Management Framework (RMF) assessment and authorization issues Develop and implement a security assessment plan Perform risk assessments and make recommendations to DoD agency customers Advise government program managers on security testing methodologies and processes Evaluate authorization documentation and provide written recommendations for authorization to government PM's Develop and maintain a formal Information Systems Security Program Ensure that all IAOs, network administrators, and other cyber security personnel receive the necessary technical and security training to carry out their duties Develop, review, endorse, and recommend action by the AO or DAO of system assessment documentation Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media Develop and execute security assessment plans that include verification that the features and assurances required for each protection level functionin Institute and implement a Configuration Control Board (CCB) charter Maintain a and/or applicable repository for all system authorization documentation and modifications Develop policies and procedures for responding to security incidents, to include investigating and reporting security violations and incidents Ensure proper protection or corrective measures have been taken when an incident or vulnerability has been discovered within a system Ensure that data ownership and responsibilities are established for each authorization boundary, to include accountability, access rights, and special handling requirements Ensure development and implementation of an information security education, training, and awareness program, to include attending, monitoring, and presenting local cyber security Evaluate threats and vulnerabilities to ascertain whether additional safeguards are needed Assess changes in the system, its environment, and operational needs that could affect the authorization Ensure that authorization is accomplished a valid Authorization determination has been given for all authorization boundaries under your purview Review AIS assessment plans Coordinate with PSO or cognizant security official on approval of external information systems (e.
g.
, guest systems, interconnected system with another organization) Conduct periodic assessments of the security posture of the authorization boundaries Ensure configuration management (CM) for security-relevant changes to software, hardware, and firmware and that they are properly documented Ensure periodic testing is conducted to evaluate the security posture of IS by employing various intrusion/attack detection and monitoring tools (shared responsibility with ISSOs) Ensure that system recovery and reconstitution processes developed and monitored to ensure that the authorization boundary can be recovered based on its availability level determination Ensure all authorization documentation is current and accessible to properly authorized individuals Ensure that system security requirements are addressed during all phases of the system life cycle Establish and develop a self-inspection program within the organization Periodically review system security to accommodate changes to policy or technology Coordinate all technical security issues outside of area of expertise or responsibility with ISSE Provide expert research and analysis in support of expanding programs and area of responsibility as it pertains to cyber security and information technology actives Develop Assured File Transfers (AFT) on accordance with the JSIG Provide leadership, mentoring, and quality assurance for Cyber Security and Information Technology team members Required Experience: 10+ years related experience 2 Years SAP Experience required (Clearly place number of SAP experience years at the beginning of the resume) Prior performance in roles such as ISSO or ISSM Master's degree or equivalent experience (6 years) Must have expert knowledge of DoD, National and applicable service and agency security policy, manuals and standards.
Must be able to regularly lift up to 50 Required Certifications: Must meet position and certification requirements outlined in DoD Directive 8570.
01-M for Information Assurance Technician Level 3 or Information Assurance Manager Level 3 Required Clearance: Current Top Secret Clearance with SCI Eligibility Prior experience for access to Special Access Program Information Willingness to submit to a Counterintelligence polygraph #LI-BH1 #MTSI #MTSIJobs
$80k-104k yearly est. Auto-Apply 6d ago
Network Security Consultant
Sa Technologies Inc. 4.6
Security engineer job in Destin, FL
Satincorp (****************** is a market leader and one of the fastest growing IT consulting firms with operations in US, Canada, Mexico & India. SAT is an Oracle Gold Partner, SAP Services Partner & IBM Certified enterprise. We guarantee you the best rate for your skills and performance.
Job Description
Position:
Network Security Consultant
Location:
Destin, Florida
Duration:
3+ Months Contract
We need an IT Consultant (Technology Evangelist - Restaurants) for our direct client in Destin, FL. The ideal candidate will have below skills. Please submit your best word resume for this 3 months contract.
Ideal Candidates will have:
• Significant technical skills with IT infrastructure (Email, Network Security, Desktops, Firewall etc.)
• Expert with Network security, PCI compliance, Firewall management
• Exposure to restaurant industry (someone who has worked with restaurant chain will be a huge plus but not mandatory)
• Familiarity with restaurant applications such as (POSItouch, Avero, Ctuit, iControl) is a huge plus but not mandatory
• Be able to collaborate effectively across organization.
• Advise on best practices and suggest management on technology needs
Additional Information
Syed Mohammad Asif
************
$76k-105k yearly est. 15h ago
Information System Security Officer (ISSO)
Canvas Management Associates
Security engineer job in Eglin Air Force Base, FL
Job Title: Information System Security Officer (ISSO)
Canvas provides engineering services and technical solutions for customers in federal and commercial markets. We are recognized by our customers and industry partners for our ethical standards, world-class technical expertise, and dedication to accomplish the mission in a responsive, efficient, and affordable manner.
Duties:
· Deploys program information security measures for assigned systems to meet government requirements, policies, and instructions
· Implements Department of Defense (DoD) Joint Special Access Program Implementation Guide (JSIG) and Air Force Instruction 17-101, Risk Management Framework (RMF), processes for assigned systems
· Accomplishes security analysis of system threats, vulnerabilities, and internal interfaces; defines and assesses compliance with government standards
· Identifies root causes and threat prioritization; recommends/executes corrective actions
· Performs audits, security assessments, and continuous monitoring to safeguard the security position and integrity of assigned systems
· Ability to work independently and closely with the Information Assurance Officer (IAO)/Information System Security Manager (ISSM) to coordinate and implement system security patch management, hardware and software upgrades, installs, diagnosis, and troubleshooting efforts
· Supports authorized independent inspections and risk assessments; implements appropriate risk mitigations and leads/participates in incident response actions
· Conducts vulnerability scans, pushes patches to the systems, and mitigates vulnerabilities
· Coordinates with team members, IAO/ISSM as required to maintain Interim Authority to Test (IATT) or Authority to Operate (ATO).
Education/Experience:
· This position requires 3 to 10 years of experience and a Bachelor's or Master's degree in the applicable discipline.
· Excellent verbal/written communication and customer interaction skills are required
· Must be willing and able to learn and apply experience to unique information systems
· Must be able to work effectively alone, unsupervised, or within a group
· Must meet position and certification requirements outlined in DoDM 8140.03 Cyberspace Workforce Qualifications and Management Program.
· Must have CompTIA Security+ Certification
· Preferred; Certified Information Systems Security Professional - Information Systems SecurityEngineering Professional (CISSP-ISSMP)
· Desired; Experience with the DoD JSIG
· Selected candidate must have the ability to be granted and maintain, access to Special Access Programs (SAP).
Security Clearance: Must be able to obtain and maintain a Secret security clearance and able to obtain Top Secret clearance if needed.
About Us
Founded in 2007, Canvas connects a passion for going beyond the expected with the knowledge and expertise to deliver what our clients need now and in the future. Canvas has been recognized as a Great Place to Work Certified ™, Fortune Best Small Workplace ™, Fortune Best Workplace for Millennials ™ (2022), Best Place for Working Parents (2022 & 2023), HIRE Vets Gold Medallion Awardee (2021 & 2022), Best Places to Work Awardee, 2019 Government Contracting - Technology Business of the Year, and Woman-Owned Small Business of the Year (2018) by the Huntsville/Madison Chamber of Commerce.
Benefits of Working with Canvas
To reflect our company culture, Canvas offers an exciting array of benefits that makes up our employees' total rewards package. Those benefits may include:
Competitive Wages*
Medical, Rx, Dental & Vision Insurance
Generous company-funded Basic Life Insurance
Company-funded Short-Term & Long-Term Disability
11 Paid Federal Holidays
Generous Paid Time Off (PTO)
Dependent Care and Medical Flexible Spending Accounts
401(k) retirement plan with company match and 100% immediate vesting
Tuition Reimbursement for ongoing training, continuing education, or advanced degree programs
Robust Employee Assistance Program
Employee Referral Bonus Program
Corporate Sponsored Events & Community Outreach
Spot Awards for Exemplary Individual Performance
Discretionary performance-based bonuses
And many more!
*Final compensation for this position is determined by a variety of factors, such as a candidate's relevant work experience, skills, certifications, and geographic location.
Canvas is an Equal Opportunity Employer
Canvas is an equal opportunity employer and a VEVRAA federal contractor who affords equal employment opportunity to protected veterans and people with disabilities.
Canvas has equal employment opportunities that are based upon a candidate's qualifications and capabilities to perform the essential functions of a particular job and are free from discrimination based on race, color, religion, national origin, sex, sexual orientation, gender identity, age, disability, protected veteran status, genetic information, or any other characteristic protected by law. For our complete EEO/AA and Pay Transparency statement, please visit our Careers page. U.S. citizenship is required for most positions.
Canvas is committed to expanding access to employment for people with disabilities and disabled veterans. If you are a qualified individual with a disability or a disabled veteran, and your disability prevents you from applying, please advise what reasonable accommodation Canvas can provide to assist you in applying for one of our open positions. You may contact us by sending an email to *********************.
Reasonable accommodations are considered on a case-by-case basis. Please note that only those inquiries concerning a request for reasonable accommodation for applying for a specific posted position will be responded to. Requests will be kept confidential and shared strictly on a need-to-know basis. Please be aware, scammers may try to impersonate our company by reaching out regarding job opportunities. We will never ask you for bank account information, checks, or other sensitive information as part of our hiring process. If you're unsure, please email ********************* with questions.
For further information on Canvas including more information on employee benefits and our company culture, visit our website.
Founded in 2007, Canvas connects a passion for going beyond the expected with the knowledge and expertise to deliver what our clients need now and in the future. Canvas has been recognized as a Great Place to Work Certified ™, Fortune Best Small Workplace ™, Fortune Best Workplace for Millennials ™ (2022), Best Place for Working Parents (2022 & 2023), HIRE Vets Gold Medallion Awardee (2021 & 2022), Best Places to Work Awardee, 2019 Government Contracting - Technology Business of the Year, and Woman-Owned Small Business of the Year (2018) by the Huntsville/Madison Chamber of Commerce.
Benefits of Working with Canvas
To reflect our company culture, Canvas offers an exciting array of benefits that makes up our employees' total rewards package. Those benefits may include:
Competitive Wages*
Medical, Rx, Dental & Vision Insurance
Generous company-funded Basic Life Insurance
Company-funded Short-Term & Long-Term Disability
11 Paid Federal Holidays
Generous Paid Time Off (PTO)
Dependent Care and Medical Flexible Spending Accounts
401(k) retirement plan with company match and 100% immediate vesting
Tuition Reimbursement for ongoing training, continuing education, or advanced degree programs
Robust Employee Assistance Program
Employee Referral Bonus Program
Corporate Sponsored Events & Community Outreach
Spot Awards for exemplary individual performance
Discretionary performance-based bonuses
And many more!
*Final compensation for this position is determined by a variety of factors, such as a candidate's relevant work experience, skills, certifications, and geographic location.
Canvas is an Equal Opportunity Employer
Canvas is an equal opportunity employer and a VEVRAA federal contractor who affords equal employment opportunity to protected veterans and people with disabilities.
Canvas has equal employment opportunities that are based upon a candidate's qualifications and capabilities to perform the essential functions of a particular job and are free from discrimination based on race, color, religion, national origin, sex, sexual orientation, gender identity, age, disability, protected veteran status, genetic information, or any other characteristic protected by law. For our complete EEO/AA and Pay Transparency statement, please visit our Careers page. U.S. citizenship is required for most positions.
Canvas is committed to expanding access to employment for people with disabilities and disabled veterans. If you are a qualified individual with a disability or a disabled veteran, and your disability prevents you from applying, please advise what reasonable accommodation Canvas can provide to assist you in applying for one of our open positions. You may contact us by sending an email to *********************.
Reasonable accommodations are considered on a case-by-case basis. Please note that only those inquiries concerning a request for reasonable accommodation for applying for a specific posted position will be responded to. Requests will be kept confidential and shared strictly on a need-to-know basis. Please be aware, scammers may try to impersonate our company by reaching out regarding job opportunities. We will never ask you for bank account information, checks, or other sensitive information as part of our hiring process. If you're unsure, please email ********************* with questions.
For further information on Canvas including more information on employee benefits and our company culture, visit our website.
How much does a security engineer earn in Pensacola, FL?
The average security engineer in Pensacola, FL earns between $64,000 and $119,000 annually. This compares to the national average security engineer range of $77,000 to $141,000.