Information Systems Security Engineer
The Information Systems Security Manager (ISSM) shall contribute to the security planning, assessment, risk analysis, risk management, certification and awareness activities for system and networking operations. Reviews certification and accreditation (C&A) documentation, providing feedback on completeness and compliance of its content. Support ISSO and ISSE staff and interface with the CISA Office of the CIO (OCIO) and CSD/CD when performing the A&A processes required to ensure compliance with Federal security regulations, policies, guidelines, and applicable National Institute of Standards and Technology (NIST) standards to include the requirements identified in the DHS 4300 Series
- Develop and maintain a formal IS security program and policies for the assigned area of responsibility
- Provide technical and procedural Information System (IS) Security advice to government
- Develop and oversee operational information systems security implementation policy and guidelines
- Oversee ISSOs and ISSEs under their purview to ensure they follow established IS policies and procedures
- Assume ISSO responsibilities in the absence of the ISSO; maintain required IA certifications
- Ensure System Administrators (SA) monitor all available resources that provide warnings of system vulnerabilities or ongoing attacks
- Ensure all ISSOs receive the necessary technical and security training (e.g., operating system, networking, security management) to carry out their duties
- Ensure approved procedures are used for sanitizing and releasing system components and media
- Maintain a repository of all security authorizations for IS under their purview
- Coordinate IS security inspections, tests, and reviews
- Ensure proper measures are taken when an IS incident or vulnerability is discovered
- Ensure data ownership and responsibilities are established for each IS, and specific requirements (to include accountability, access, and special handling requirements) are enforced as per standards such as the DHS 4300 Series handbooks
- Ensure development and implementation of an effective IS security education, training, and awareness program
- Ensure CM policies and procedures for authorizing the use of hardware/software on an IS are followed. Any additions, changes or modifications to hardware, software, or firmware must be coordinated with the appropriate AO prior to the addition, change or modification
- Maintain a working knowledge of system functions, security policies, technical security safeguards, and operational security measures
- Manage, maintain, and execute the information security continuous monitoring plan
- Ensure a record is maintained of all security-related vulnerabilities and ensure serious or unresolved violations are reported to the; and assess changes to the system, its environment, and operational needs that could affect the security authorization
- Develop concept of operations for new systems
- 12+ years’ experience as an ISS on programs and contracts of similar scope, type, and complexity with at least 3 years as an ISSM is required.
- Bachelor’s degree in Computer Science, Information Assurance, Information Security System, or related discipline from an accredited college or university is required. Years of experience may be used in lieu of degree.
- Ability to obtain a Department of Homeland Security (DHS) TS/SCI determination
- Experience in assessing and documenting test or analysis data to show cybersecurity compliance.
- Demonstrated knowledge with security relevant tools, systems, and applications in support of RMF to include: NESSUS, SPLUNK, Crowdstrike, Cisco ESA& WSA, Acunetix, etc.
- Demonstrated experience with performing security compliance monitoring and security policy assessments/audits.
The Leidos pay range for this job level is a general guideline only and not a guarantee of compensation or salary. Additional factors considered in extending an offer include (but are not limited to) responsibilities of the job, education, experience, knowledge, skills, and abilities, as well as internal equity, alignment with market data, applicable bargaining agreement (if any), or other law.