What are the responsibilities and job description for the Cyber Security Lead position at SYSUSA Inc?
We are seeking a Cybersecurity Risk Management Lead to:
- Manage and approve Accreditation Packages (e.g., ISO/IEC 15026- 2).
- Review authorization and assurance documents to confirm that the level of risk is within acceptable limits for each software application, system, and network.
- Establish acceptable limits for the software application, network, or system.
- Maturing capabilities of Enterprise Risk Management Framework and implementation of Continuous Authority to Operate procedures
- Preparation and delivery of Cybersecurity Risk Posture Reports
- Provide Knowledge Management capabilities and visualization of cybersecurity posture with multiple stakeholders
- Provide oversight of integration of emergent technologies to enable Automation and Optimization of cybersecurity processes
- Provide oversight of cybersecurity vulnerability management operations
- Assist in establishing common operating picture of agency cross-domain connections and data flows
- Assist in generating and visualizing Cybersecurity Business Intelligence from enterprise sources
- Integrate cybersecurity software assurance
Other key roles include:
- Provide leadership to develop, modernize, and enhance information assurance capabilities
- Provide leadership, guidance, and training to a diverse team of security administrators, analysts, and IT professionals.
- Review, implement, update and document enterprise level information security policies and procedures.
- Manage security audits and vulnerability and threat assessments, and direct responses to network or system intrusions.
- Ensure fulfillment of information security mandates, including providing leadership with compliance reports and audit findings.
- Keep abreast of industry security trends and developments, as well as applicable government regulations.
- Researches, evaluates, and recommends new security tools, techniques, and technologies and introduces them to the enterprise in alignment with IT security strategy.
- Create and execute strategies to improve the reliability and security of IT projects.
- Respond immediately to security-related incidents and provide a thorough post-event analysis.
Familiar with following Cybersecurity Knowledge Domains:
- New and emerging information technology (IT) and cybersecurity technologies.
- System and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code).
- Knowledge of structured analysis principles and methods; Knowledge of systems diagnostic tools and fault identification techniques.
- Risk management processes (e.g., methods for assessing and mitigating risk).
- Laws, regulations, policies, and ethics as they relate to cybersecurity and privacy.
- Cybersecurity and privacy principles., cyber threats and vulnerabilities.
- Information technology (IT) architectural concepts and frameworks.
- Risk Management Framework (RMF) requirements.
- Vulnerability information dissemination sources (e.g.,alerts, advisories, errata, and bulletins).
- Supply Chain Risk Management Practices (NIST SP 800-161)
- Import/export control regulations and responsible agencies for the purposes of reducing supply chain risk / supply chain risk management standards, processes, and practices.
- Cloud-based knowledge management technologies and concepts related to security, governance, procurement, and administration.
- Organizational process improvement concepts and process maturity models (e.g., Capability Maturity Model Integration (CMMI) for Development, CMMI for Services, and CMMI for Acquisitions).
- Service management concepts for networks and related standards (e.g., Information Technology Infrastructure Library, current version [ITIL]).
- Applied knowledge of security architecture concepts and enterprise architecture reference models (e.g., Zachman, Federal Enterprise Architecture [FEA]).
- Security models (e.g., Bell-LaPadula model, Biba integrity model, Clark-Wilson integrity model).
- Personally Identifiable Information (PII) data security standards.
- Payment Card Industry (PCI) data security standards. K0262: Knowledge of Personal Health Information (PHI) data security standards.
- Keen understanding of laws, policies, procedures, or governance relevant to cybersecurity for critical infrastructures.
- Confidentiality, integrity, and availability principles. Knowledge of embedded systems.
- Penetration testing principles, tools, and techniques. Knowledge of controls related to the use, processing, storage, and transmission of data.
- Application Security Risks (e.g. Open Web Application Security Project Top 10 list)
- Information technology (IT) acquisition/procurement requirements / life cycle process.
Requirements
- Demonstrated leadership experience serving as an information security manager or information assurance/engineering team lead for a minimum of five (5) years.
- Demonstrated experience presenting briefings to senior customer management and customer stakeholders.
- Demonstrated leadership experience with RMF and accreditation processes (e.g. NIST800-53, ICD503).
- Demonstrated hands on experience with accreditation tools (e.g., Xacta, Nessus, AppDetective, WebInspect).
- In-depth knowledge/expertise with one or more of the following tools: ArcSight, Continuum, Fortify, Tenable Security Center, Nessus; other Security Information and Event Management (SIEM) tools; antivirus such as Sophos and McAfee desired.
- An active Top Secret SCI clearance is required for consideration.
- Must currently possess one of the following IAM Level 3 - DOD 8570 certifications: CISM, CISSP, GSLC, CCISO
- Bachelor’s degree, or higher, in computer engineering, computer science, IS or cybersecurity-related discipline, or equivalent six (6) years’ experience in information assurance or systems and network security.
- A cloud-based industry security certification (e.g. CCSP, Microsoft Azure Security Engineer).
- Experience securing infrastructure solutions and applications deployed in public and/or community cloud environments desired.
- Experience implementing secure DevOps methodologies desired.
- Experience integrating AWS with DevSecOps teams desired.
Job Type: Full-time
Benefits:
- 401(k)
- Dental insurance
- Health insurance
- Paid time off
- Tuition reimbursement
- Vision insurance
Schedule:
- 8 hour shift
Experience:
- RMF: 4 years (Preferred)
- Cybersecurity: 5 years (Preferred)
License/Certification:
- IAM Level 3 - DOD 8570: CISM, CISSP, GSLC, CCISO (Preferred)
- TS/SCI Clearance (Preferred)
Work Remotely:
- No
Technical Security Engineer
Cyber Security Innovations -
Hyattsville, MD
Cyber Readiness Lead, TS/SCI (Springfield, VA)
GuidePoint Security -
Springfield, VA
Cyber Security Operations Lead
SITEC Consulting -
West Springfield, VA