Information System Security Manager Resume Samples

4.8 (110 votes) for Information System Security Manager Resume Samples

The Guide To Resume Tailoring

Guide the recruiter to the conclusion that you are the best candidate for the information system security manager job. It’s actually very simple. Tailor your resume by picking relevant responsibilities from the examples below and then add your accomplishments. This way, you can position yourself in the best way to get hired.

Craft your perfect resume by picking job responsibilities written by professional recruiters

Pick from the thousands of curated job responsibilities used by the leading companies

Tailor your resume & cover letter with wording that best fits for each job you apply

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Resume Builder
CHOOSE THE BEST TEMPLATE - Choose from 15 Leading Templates. No need to think about design details.
USE PRE-WRITTEN BULLET POINTS - Select from thousands of pre-written bullet points.
SAVE YOUR DOCUMENTS IN PDF FILES - Instantly download in PDF format or share a custom link.

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Create a Resume in Minutes
ZS
Z Skiles
Zora
Skiles
856 Streich Square
Los Angeles
CA
+1 (555) 634 9028
856 Streich Square
Los Angeles
CA
Phone
p +1 (555) 634 9028
Experience Experience
Detroit, MI
Information System Security Manager
Detroit, MI
Wyman, Predovic and Wintheiser
Detroit, MI
Information System Security Manager
  • Familiarity with network and information system security principles and test practices
  • Provide support to the Command Cyber Readiness Inspection (CCRI)
  • Ensuring development and implementation of procedures for authorizing the use of software, hardware, and firmware on the system
  • Perform Data Transfer Agent duties
  • Performing site lead tasks and responsibilities to include managing personnel
  • Perform compliance inspections
  • Performs other duties, tasks and responsibilities as assigned
Houston, TX
Information System Security Manager
Houston, TX
Bogan-Klocko
Houston, TX
Information System Security Manager
  • Manage and develop project plans for systems development, implementation, and production support activities
  • Assist in the development of and adherence to Information Technology (IT) security policy
  • Assist and advise in the development of Concept of Operation (CONOP) documents to describe and clarify operational parameters
  • Providing support and expertise to various high-level technical working groups
  • Conduct Security Assessment Visits and provide detailed reports to management
  • Ensuring development and implementation of an information security education, training, and awareness program
  • Performing security compliance monitoring and security policy assessments/audits
present
Philadelphia, PA
Information System Security Manager, Senior
Philadelphia, PA
Morissette-Schmitt
present
Philadelphia, PA
Information System Security Manager, Senior
present
  • Certified with one of the following: Certified Information Systems Security Professionals (CISSP), ISC2 Certified Authorization Professional (CAP), GIAC Security Leadership Certification (GSLC), ISACA Certified Information Security Manager (CISM), ISACA Certified Information System Auditor (CISA)
  • Develop SOPs in support of the OSO ISSO team
  • Develop, implement, and enforce information systems security policies
  • Manage OSO thumb drive and IS/IT incident response program
  • Works closely with the System Administration to maintain the various system and application certifications and accreditations (C&A) status
  • Ensure implementation of a Configuration Management Plan (CMP) for software, hardware, and firmware is documented and maintained, and serve as a member of the Configuration Management Board, with Information System Security Manager (ISSM) and System Owner concurrence
  • Conduct security reviews of media provided by external sources prior to this media being introduced into FBI ISs
Education Education
Bachelor’s Degree in Originality
Bachelor’s Degree in Originality
University of Virginia
Bachelor’s Degree in Originality
Skills Skills
  • Professional demeanor, good interpersonal skills, and ability to excel in a high-paced multi-tasked environment
  • Ability to apply information system knowledge to other government compliance documents (JAFAN, DCID, JSIG, and ICD)
  • Ability to interact appropriately with the public when necessary
  • Be able to convey a sense of purpose and mission that motivates others
  • Will hold themselves accountable for continuous improvement
  • Detailed understanding of the Risk Management Framework (RMF), NIST, ICD, and CNSS standards
  • Ensure proper protection and / or corrective measures have been taken when an incident or vulnerability has been discovered
  • Excellent written and oral communications
  • Ability to act independently, prioritize tasks, and manage to schedule
  • UNIX/LINUX experience (i.e., auditing, configuring, vulnerability assessing)
Create a Resume in Minutes

14 Information System Security Manager resume templates

1

Information System Security Manager, Senior Resume Examples & Samples

  • Ensure that all users have the requisite security clearances, authorization, and need-to¬ know before granting access to the IS, and administer/witness signing of user agreements and/or Rules of Behavior
  • Develop, implement, and enforce information systems security policies
  • Develop and maintain System Security Plans (SSPs) and all other system security documentation, reviewing and updating them at least annually for all assigned systems
  • Support risk assessment and evaluation activities throughout the Certification and Accreditation (C&A) or site accreditation process
  • Oversee IS recovery processes for all unplanned outages, including Disaster Recovery and initiation of the CP, whether actual or exercise
  • Responsible for changes to the classified systems' components, environment, and location
  • Manage OSO thumb drive and IS/IT incident response program
  • Support OSO special IT/IS security related projects as required
  • Bachelor degree in relevant field or 5 years of Information Assurance (IA) Security consulting experience
  • Experience with large Local Area Networks, Wide Area Networks, vulnerability management, as well as Security Technical Implementation Guides (STIG) compliance and must be familiar with Incident Response, Security Analysis, and Nessus
  • Certified with one of the following: Certified Information Systems Security Professionals (CISSP), ISC2 Certified Authorization Professional (CAP), GIAC Security Leadership Certification (GSLC), ISACA Certified Information Security Manager (CISM), ISACA Certified Information System Auditor (CISA)
  • Able to multi-task, delivery on-time and with quality
2

Information System Security Manager Resume Examples & Samples

  • Work closely with Information Technology department to establish and administer appropriate security systems, policies, standards, and procedures in compliance with applicable government and directives, guidelines, and contractual obligations
  • Ensures security policies, standards, and procedures are enforced
  • Optimize IT infrastructure auditing and monitoring capability to analyze incident and event notifications
  • Coordinate information security inspections, tests, and reviews of systems
  • Conduct audits and analysis of software and hardware used on client’s network
  • Prepares, maintains, and implements a SSP that accurately reflects the security protection measures for each classified information system for which he or she is responsible
  • Provide written recommendations, in sufficient detail, to permit sponsor to make an informed, independent decision to grant and/or disapprove System Security Plans submitted for review
  • Provide direct customer support for knowledge-based implementation of security features on laptops, workstations, servers, and network components as required
  • Assist in the development of and adherence to Information Technology (IT) security policy
  • Provide support to the Command Cyber Readiness Inspection (CCRI)
  • Conduct Security Assessment Visits and provide detailed reports to management
  • Ability to maintain active security clearance
  • 10 years of related experience in Information Assurance administration
  • Knowledge of DoD 8570, NIST 800-53/FISMA, C&A, DIACAPS, POAMS and other audit and security requirements
  • Dod 8570 compliance or the ability to quickly obtain and maintain Network +, Security +, GCIA, GCIH, CEH
  • Active security clearance
  • Be willing to travel up to 10% (all CONUS)
  • CISSP and CEH certifications
  • Strong understanding of DOD information assurance policy and regulation
  • Experience in one or more of the following Information Security disciplines: Network Security, Physical Security, Government Computer Systems, Firewall/Router Management, Security Project Management, and/or Network Vulnerability Analysis
3

Information System Security Manager Resume Examples & Samples

  • Must have leadership skills and experience
  • Be able to convey a sense of purpose and mission that motivates others
  • Must have strong technical skills as well as strong verbal and written communication skills
  • Must set high expectations for him/herself first, and have the courage to raise the bar continuously/routinely
  • Will hold themselves accountable for continuous improvement
  • Will communicate expectations directly, openly and effectively
  • Must proactively determine project or assignment requirements by breaking them down into tasks and identifying types of equipment, materials, and people needed
  • Must consistently and proactively identify more critical and less critical activities and assignments and effectively adjust priorities when appropriate
  • Minimum of 6 years computing security or information assurance experience
  • SCAP/NESSUS/WASSP/SECSCN experience
  • Splunk, or equivalent log management software knowledge/experience
  • Experience with XACTA
  • Experience supporting various hardware and multiple operating systems in
4

Information System Security Manager Resume Examples & Samples

  • Perform site lead tasks and responsibilities to include managing a small number of direct reports
  • Support security authorization activities in compliance with NISCAP and DIACAP
  • 05-07 years w/Masters Degree
5

Information System Security Manager Resume Examples & Samples

  • CISSP, IT or security-related certifications preferred
  • Should have extensive experience working with Government classified systems
  • Should have experience in one or more of the following Information Security disciplines: Network Security, Physical Security, Government Computer Systems, Firewall/Router Management, Security Project Management, and/or Network Vulnerability Analysis
  • Should be knowledgeable of exploitation methods, attacks and tools used by skilled hackers
  • Should have familiarization with security vulnerability testing tools: Nessus, AppDetective, WebInspect, NMAP, & self-scans
  • Should have familiarization with doing assessments in the Cloud
  • Should have familiarization with system and network designs which includes an engineering background
  • Should have familiarization with multiple operating systems: Windows 2003/2008/, Vista, Windows 7/8/10, Macintosh, Unix, Linux, and Solaris
  • Should have familiarization with secure implementations such as VPNS, encryption technologies, IPSEC, V-LANS, and Wireless technologies
  • Should have a thorough understanding of the federal regulations that encompass the SCI and collateral security process. This includes, but is not limited to
6

Information System Security Manager Resume Examples & Samples

  • Develop, document, maintain and implement security plans for standalone and networked information systems per NISPOM
  • Provide systems support, and maintenance
  • Responsible for system and user administration
  • Audit systems and monitor system security logs
  • Investigate violations
  • Interface with government agencies for review and approval of plans and systems
  • Develop and/or maintain Master System Security Plans
  • Ability to interact appropriately with the public when necessary
  • Ability to adhere to workplace rules
  • Windows 7, XP, Server 2008 required
  • Network Administration and Microsoft Active Directory required
  • Hardware and software troubleshooting skills required
  • US Citizenship Required
  • Active Security clearance a plus must be able to obtain DoD Clearance
  • 2-4 years’ experience in relevant work field
  • Microsoft Certification a plus
  • Experience with Agilent PNA and other test equipment a plus
  • Windows Security Policy/Group Policy a plus
7

Information System Security Manager Resume Examples & Samples

  • Assessment and Authorization (A&A) of assigned systems (SSPs, CMP, RMP, CTP, etc.)
  • Perform technical security controls assessments and baseline validations to identify vulnerabilities and control deficiencies as part of continuous monitoring program
  • Information System Self Inspection, Auditing, and Continuous Monitoring
  • Interfacing with External Customers, Program Managers/Directors, IT, etc
  • 4+ years of experience in Information Systems Security/Information Assurance, Security Engineering
  • Experience developing System Security Plans (SSPs) and supporting Assessment & Authorization (A&A) documentation
  • Experience supporting various computer hardware platforms and multiple operating systems in both stand alone and LAN/WAN configurations
  • Working knowledge of operating systems security features and settings (e.g. Windows, Unix, and Linux)
  • Proven ability to make sound decisions and implement all aspects of information systems security as it applies to NISPOM Chapter 8, ICD 503, NIST SPs, and other government doctrine
  • Demonstrated ability to act independently, prioritize tasks, and manage to schedule
  • Must be willing and able to travel as required up to 10% of work schedule
  • Experience with computer forensic tools and investigation methodologies
  • Experience with various information system security assessment/hardening tools - SCAP Compliance Checker, Nessus, WASSP, DISA Gold Disk, SECSCN, DISA SRR, Retina, etc
  • Working knowledge of Wide-Area and Local Area Networks (WAN/LAN), to include Cisco-based routers, switches, and firewalls
  • DoD 8570.1M compliant Professional Certification (e.g. Security +, CISSP, GSEC, etc.)
  • In-depth knowledge of NIST special publications, CNSS policies and instructions
8

Information System Security Manager Resume Examples & Samples

  • Coordinates the information system security program with other information system security programs
  • Ensures that periodic self-inspections of the information system security program are conducted as part of the overall facility self-inspection program and that corrective action is taken for all identified findings and vulnerabilities
  • Ensures the development of information security related procedures to govern marking, handling, controlling, removing, transporting, sanitizing, reusing, and destroying media and equipment containing classified information
  • Prepares and recommends operating and personnel budgets for approval. Monitors spending for adherence to budget, recommends variances as necessary
  • Strong analytical and problem solving skills for resolving security issues, may include national security information
  • Experience working with government accreditation process
9

Information System Security Manager Resume Examples & Samples

  • Must be able to respond on-site for all systems for which they are responsible within a reasonable amount of time, here defined as 90 minutes
  • Minimum of seven years operational excellence in a field directly related to Information Systems Security
  • At least two Systems or Information Security certifications, one of which fulfills DoDD 8570. The other certification should be CISSP or an equivalent
  • Bachelor's degree preferably in Computer Science or Cyber Security
10

Information System Security Manager Resume Examples & Samples

  • Conducting weekly system security audits
  • Perform security compliance assessments and analysis using automated scanning tools
  • Set up and maintain both classified and unclassified mission related network servers and workstations to support software and systems verification and validation. This will include configuring Linux, VMware, SQL and no-SQL databases, web servers, and analytical software
  • Support customer software installations on mission systems
  • Support accreditation reviews and processes including server and workstation hardening
  • Hardware sanitization and release utilizing preapproved procedures
  • Perform Data Transfer Agent duties
  • Perform compliance inspections
  • Security Configuration Management (Sec-CM) for classified systems
  • Develop accreditation documentation and coordinate and oversee all Certification and Accreditation activities
  • Provide information assurance guidance and oversight
  • Implement and manage system security requirements on all classified systems as identified and directed
  • Assist and advise in the development of Concept of Operation (CONOP) documents to describe and clarify operational parameters
  • Conduct annual assessments of the security compliance posture
  • Technical bachelor's degree and typically 9 or more years' related work experience or a Master's degree with typically 7 or more years' or a PhD degree with typically 4 or more years' related work experience or an equivalent combination of education and experience. A technical degree is defined as any four year degree, or greater, in a mathematic, scientific or information technology field of study
  • Familiar with information assurance policies to include: ICD-503, NISPOM, JAFAN, JSIG and NIST 800 series special publications
  • Experience with ICD-503 (Intelligence Community Information Technology Systems Security Risk Management, Certification and Accreditation) and/or JSIG (Joint SAP Implementation Guide)
  • Experience in assessing and documenting test or analysis data to show compliance
  • Experience in developing and writing security plans and overseeing security awareness programs per the ICD-503, JSIG/NIST guidelines
  • Demonstrated knowledge of processes and tools to maintain, archive, sanitize, and retrieve digital files
  • Demonstrated knowledge of Risk Management Framework and FISMA including vulnerability scanning tools such as WASSUP, SECSCAN or NESSUS/ACAS
  • Experience with performing security compliance monitoring and security policy assessments/audits
  • Demonstrated ability to identify and assess security controls for the following Operating systems: Microsoft Windows, Red Hat Linux
  • Must complete DSS Information Systems Security in the National Industrial Security Program Curriculum within 6 months of hire
  • Current and Active Top Secret/SCI clearance; polygraph preferred
  • A strong working knowledge of networking hardware to include: Routers, firewalls, switches, and test equipment
  • CISSP (Certified Information System Security Professional) preferred or attain DoD approved 8570 IAM Level II certification within 6 months of hire
11

Information System Security Manager Resume Examples & Samples

  • The Information Systems Security Manager (ISSM) provides management of information technology and information system security issues affecting the mission of the customer by implementing common information system security practices, policies and technologies
  • Manage operational security posture for a program or information system
  • Leads security authorization activities in compliance with DIACAP, RMF, DSS
  • Perform vulnerability/risk assessment analyses to support certification and accreditation
  • Prepare and review documentation to include System Security Plans (SSPs), Risk Assessment, POA&Ms, SARs, Vulnerability Reports, Certification and Accreditation (C&A) packages, and System Requirements Traceability Matrices (SRTMs)
  • 16-18 years w/High School Diploma
12

Information System Security Manager Resume Examples & Samples

  • Experience with auditing and security functions
  • Knowledge of the assessment and authorization process for DoD computers
  • Knowledge of the NISPOM, JAFAN 6/3 or JSIG, DCIDs and ICDs, and other government security directives
  • Knowledge of incident handling, including data spills, for unclassified and classified systems
  • BA or BS degree and 2 years of experience with ISSM or ISSO or 6+ years of experience with ISSM or ISSO in lieu of a degree
  • Level I IAM Certification
13

Information System Security Manager Resume Examples & Samples

  • Develop and maintain A&A packages for information systems based on our customers’ policy and guidance
  • Prepare and analyze test results for development into a Plans of Action and Milestones (POA&M)
  • Provide full IS A&A support and technical security guidance in all phases of the system accreditation process and/or Risk Management Framework
  • Perform Information Assurance (IA) testing by conducting monthly/quarterly/annual reviews
  • Research and identify security vulnerabilities and provide guidance to mitigate risks to Engility information systems (IS) undergoing the A&A process
  • Perform data spill investigation and eradication. Represent the Certification Services department in all Security registration meetings and Technical Exchange Meetings (TEM) with internal and external customers
  • Present User and Privileged User IS Education and Awareness trainings
  • DOD8570.01M compliant certification is required, (IAM Level III preferred)
  • Security+ is required, CISSP strongly preferred
  • In-depth knowledge working with ICD503 and NISPOM processes and requirements
  • Experience with Win7/Server 2008 environments
  • Experience with data spill investigation and remediation practices
  • Broad background in IA activities to effectively lead A&A efforts
  • Familiarity with network architecture, desktop support, ports / protocols and encryption for the Microsoft Windows environment
  • Successful prior ISSO experience in the Intelligence Community
  • Ability to effectively communicate – in writing and verbally - with different levels of internal and external customers
14

Information System Security Manager Resume Examples & Samples

  • Developing and maintaining a formal Information Systems Security Program
  • Implementing and enforcing IS security policies
  • Reviewing all SSPs and endorsing those found to be acceptable
  • Overseeing all ISSOs to ensure that they are following established information security policies and procedures
  • Ensuring that all ISSOs receive the necessary technical and security training to carry out their duties
  • Ensuring the development of system certification documentation by reviewing and endorsing such documentation and recommending action by the DAA
  • Ensuring approved procedures are in place for clearing, purging, declassifying, and releasing system memory, media, and output
  • Maintaining, as required by the DAA, a repository for all system certification documentation and modifications
  • Coordinating IS security inspections, tests, and reviews
  • Developing procedures for responding to security incidents, and for investigating and reporting (to the DAA Representative and to local management) security violations and incidents, as appropriate
  • Ensuring proper protection or corrective measures have been taken when an incident or vulnerability has been discovered within a system
  • Ensuring that data ownership and responsibilities are established for each IS, to include accountability, access rights, and special handling requirements
  • Ensuring development and implementation of an information security education, training, and awareness program
  • Ensuring development and implementation of procedures for authorizing the use of software, hardware, and firmware on the system
  • If a configuration management board exists, serving as a member of the board. (However, the ISSM may elect to delegate this responsibility to the ISSO)
  • Analyze current and future business challenges and define necessary information technology assets required to support those challenges. Support the budgeting process and tracking IT expenses, timelines, and resource requirements
  • Responsible for application of and adherence to Infrastructure security initiatives and measures
  • Ensure appropriate network backups are made regularly in support of data retention and recovery guidelines
  • Setup, secure, monitor and maintain data access into the company. Monitor network and systems for potential security risk
  • Manage and develop project plans for systems development, implementation, and production support activities
  • Assists in negotiations with consultants, technical personnel, and suppliers for products and services
  • Assists in providing support to end users in the selection, procurement, usage and maintenance of application software and consulting services in alignment with corporate and information technology strategic vision as set by the IT Director
  • Pursue personal development of skills and knowledge necessary for the effective performance
  • Hold US Government security clearances/access approvals commensurate with the level of information processed by the system
  • Access only that data, control information, software, hardware, and firmware for which they are authorized access and have a need-to-know, and assume only those roles and privileges for which they are authorized
15

Information System Security Manager Resume Examples & Samples

  • 4+ years related experience or 2 years with related Master’s Degree Background in Information Security, Information Technology or Related Disciplines
  • Existing Secret Clearance
  • Bachelor's Degree in either Computer Science, Information Systems Management, Information Technology, Criminal Justice, Business or other relevant degree
  • Experience working with government regulations, such as NISPOM, JAFAN, JSIG, DIACAP and Risk Management Framework. Regulation is based on customer requirements
  • Working experience with operating systems (Solaris, HPUX, Linux, Windows etc.)
  • Experience supporting various system configurations (Stand Alone, Local Area Networks, Wide Area Networks)
  • Vulnerability scanning tool experience
  • Experience with certifying compliance and auditing the security aspects of various operating systems (Windows, LINUX, UNIX etc.)
  • Preparation of Certification and Accreditation (C&A) documents and procedures
  • Experience with development and delivery of IA related briefings and training material
  • Experience with Interconnected Security Agreements (ISA), Network Security Plans (NSP), Memorandum of Agreement/Understanding (MOA/U)
  • Ability to utilize forward thinking to anticipate customer/government changes and challenges
  • Customer focused, adaptable and willing to work varying assignments
  • Ability to handle difficult people and/or situations in high pressure environments and make tough decisions
  • Self-motivated with strong communication skills (written and oral)
  • Customer focused and excellent time management skills
  • Ability to obtain and maintain Information Security professional certification commensurate with DoD 8570.1-M requirements (CISM, CISSP or other) within six months of employment
16

Information System Security Manager Resume Examples & Samples

  • 10+ years experience
  • An IAM Level 3 certificate (CISSP, GSLC, CISM) per DoD 8570.01M
  • Current TS/SCI clearance required; favorable CI Polygraph preferred
  • Technical competency in one or more of the following supported platforms: Microsoft Windows Server, Red Hat Enterprise Linux servers, MS HyperV/VMWare/ESx/Xen Hypervisors, Enterprise Networking/Firewalls/Intrusion Detection/Prevention Systems, Forensic Analysis/Vulnerability Assessment Toolkits, Security Information Event Managers, ACAS/Nessus/SCAP, Mandatory/Role-Based Access Control concepts (SElinux extensions to RHEL, PitBull, AppArmor, Sentris ), Video Teleconferencing/VOIP, Oracle/MSSQL database security, Apache/IIS Web server security
  • Excellent writing and presentation ability
17

Information System Security Manager Resume Examples & Samples

  • Excellent written and oral communications. High level of personal motivation and initiative to learn and acquire new skills, and adapt seamlessly to an ever-changing security environment
  • Experience with development and implementation of IA Policies and Procedures
  • Experience with certifying compliance of various systems (Windows, Linux and UNIX)
  • Experience with ODAA Baseline Standards requirements for security configuration
18

Information System Security Manager Resume Examples & Samples

  • Information assurance sustainment activities (hardware/software change management, account management, auditing, media protection, user interface, file transfers, etc.)
  • System self-inspections, audit log reviews, secure baselines, and continuous monitoring
  • Interfacing with internal and external customers, program managers, IT staff, etc
  • Prepare and conduct initial and annual general/privileged IA training and awareness
  • Conduct various actions related to cyber incident response, investigation, and resolution
  • Development, maintenance, and execution of effective, well-written, and customer compliant IA policies and procedures for various customer bases
  • 4+ years of experience in information systems security/information assurance, security engineering
  • Working knowledge of operating systems security features and settings (e.g. Windows, Unix, Linux, and OS X)
  • Proven ability to make sound decisions and implement all aspects of information systems security as it applies to NISPOM Chapter 8, JSIG, ICD 503, NIST SPs, and other government doctrine
  • Strong communication skills with the ability to communicate effectively in both oral and written modes, and be able to author and present subject specific presentations
  • Must be willing and able to travel as required up to 25% of work schedule
  • Experience with various information system security assessment/hardening tools - SCAP Compliance Checker, STIG Viewer, ACAS, Nessus, SECSCN, DISA SRR, Retina, etc
  • Current Top Secret clearance with SCI access and polygraph
19

Information System Security Manager Resume Examples & Samples

  • Convey sense of purpose and mission that motivates others; maintains direction, and balances big-picture concerns with day-to-day issues
  • Set high expectations for him/herself first, and have the courage to raise the bar continuously
  • Hold themselves and others accountable for continuous improvement
  • Communicate expectations directly, openly and effectively
  • Communicate with team leaders, managers and internal employees in the decision-making process as warranted to obtain needed information, make the most appropriate decisions, and ensure buy-in and understanding of resulting decisions
  • Proactively determine project or assignment requirements by breaking them down into tasks and identifying types of equipment, materials, and people needed
  • Consistently and proactively identify more critical and less critical activities and assignments and effectively adjust priorities when appropriate
  • Interface with the appropriate government customers, suppliers, and company personnel to implement protective mechanisms and to ensure understanding of and compliance with cybersecurity requirements
  • Rely on cybersecurity and technical background to perform security analysis of operational environments, threats, vulnerabilities and internal interfaces to define and assess compliance with accepted industry and government standards
  • Develop authorization and assessment (A&A) documentation for new and existing information systems, to include Memorandums of Understanding (MOU) and Risk Acceptance Letters (RAL)
  • Review various operating systems such as Windows, Linux, and Solaris for compliance with NISPOM and Designated Approving Authority Process Manual (DAAPM) standards
  • Assess and document test or analysis data to show compliance with security requirements
  • Direct, conduct and mitigate comprehensive complex risk assessments and investigations; and oversee activities of incident response
  • Experience working with Defense Security Service (DSS) verification, validation, certification and qualification processes and procedures
  • Experience working with governing regulations and compliance requirements
  • Experience with networking computing hardware and software applications
  • Experience with tools to maintain, archive, and retrieve digital files
  • Experience reading and understanding DD-254s
  • Experience working with the Secret Internet Protocol Router Network (SIPRNet) and the SIPRNet Connection Process
  • IAM Level III DoD 8570 Certification required. (i.e. GSLC, CISM, and CISSP)
  • Demonstrated advanced knowledge of processes and tools to maintain, archive, sanitize, and retrieve digital files
  • Experience with security relevant tools, systems, and applications in support of RMF to include: NESSUS, ACAS, DISA STIGs, SCAP, and HBSS
  • Experience performing security compliance monitoring and security policy assessments/audits
20

Information System Security Manager Resume Examples & Samples

  • Development of all Assessment and Authorization artifacts (SSP, SCTM, SSP attachments, POA&M, testing documentation, etc.)
  • Interfacing with Internal/External Customers; Program Managers/Directors, IT, etc
  • Fully coordinating with other security personnel to ensure collaboration across security disciplines
  • Oversight of ISSOs and System Administrators to ensure compliance
  • Basis of Estimate (BOE) development
  • US Citizen with a current Single Scope Background Investigation (SSBI)
  • 6-8+ years of experience in Information Systems Security/Information Assurance, Security Engineering, or IT Systems Administration
  • ISSM/IAM or alternate ISSM/IAM experience
  • Experience executing a compliant IA program under various key governing requirements (e.g. ICD 503, JSIG, NISPOM,etc.)
  • Experience successfully and effectively interacting with internal and external customers (PSOs, SCAs, DAOs, ISSPs, Program Managers, etc.)
  • Experience developing System Security Plans (SSPs) and supporting Certification and Accreditation (C&A) documentation
  • Experience supporting various computer hardware platforms and multiple operating systems, both stand alone and LAN/WAN configurations
  • Working knowledge of operating systems security features and settings (e.g. Windows, UNIX, and Linux)
  • Ability to act independently, prioritize tasks, and manage to schedule
  • Experience with various information system security assessment/hardening tools – SCAP, Nessus, Retina, WASSP, ACAS, etc
21

Information System Security Manager Resume Examples & Samples

  • Performing site lead tasks and responsibilities to include managing personnel
  • Acting as one of the customer’s key Subject Matter Experts
  • Maintaining operational security posture for information systems
  • Conducting risk assessment analysis to support Assessment and Authorization (A&A)
  • Preparing and reviewing A&A documentation in accordance with ICD 503
  • Supporting industry partners with their A&A efforts
  • Providing support and expertise to various high-level technical working groups
22

Information System Security Manager Resume Examples & Samples

  • Knowledge of the NISPOM Chapter 8, ODAA Process Guide, and ISFO Manual
  • Familiarity with the JAFAN 6/3, CNSSI 1253, NIST 800-53 and DoD 8000 series
  • Ability to partner with internal and external customers and security peer
  • Demonstrated ability to drive results and work in a time-sensitive, high pressure environment
  • C&A experience
  • Knowledge of INFOSEC assessment methodology/evaluation methodology
  • Experience securing Windows 2008 and 2012 server platforms and Windows 7 OS according to DoD STIGs or other hardening guides
  • Experience with vulnerability assessment tools ACAS/Nessus or similar products
  • Security + or CISSP certification
  • Must be able to obtain/maintain a US Government Security Clearance at the appropriate level
23

Information System Security Manager Resume Examples & Samples

  • Writing security plans and overseeing security awareness programs per the NISPOM, ICD-503 and JSIG guidelines
  • Assessing and documenting test or analysis data to show compliance
  • Performing security compliance monitoring and security policy assessments/audits
  • Assessing security controls for the following Operating systems: Microsoft Windows, Red Hat Linux
  • A Current Top Secret clearance - Applicants MUST include their Security Clearance Level, Investigation Type and Investigation Date clearly on their resume
  • Advanced experience with policies and implementation of Risk Management Framework (RMF) to include: NISPOM, ICD-503, JSIG and NIST 800 series special publications
  • Working knowledge of multiple security disciplines, such as physical security, document control, COMSEC, investigations, etc
  • Demonstrated advanced knowledge with relevant tools, systems, and applications to support RMF posture to include: NESSUS/ACAS, DISA STIGs, and HBSS
24

Information System Security Manager Resume Examples & Samples

  • 8+ years of experience in a professional work environment
  • BA or BS degree and 4 years of experience with information security
  • DoD 8570.01-M Information Assurance Manager Level 3 Certification
  • Experience with Aircraft or acquisitions a plus
25

Information System Security Manager Resume Examples & Samples

  • Bachelor's degree or equivalent and 8+ years related experience
  • Current DoD 8570 baseline certification for IAM II
  • Detailed understanding of the Risk Management Framework (RMF), NIST, ICD, and CNSS standards
  • Familiarity with network technologies (LAN & WAN) and best practices within a classified environment to include crypto and key management
  • Expert with Microsoft Windows, Linux, and system virtualization (multiple hypervisors) in a secure network environment
  • Must be able to work in a constantly changing regulatory environment with short, mid, and long term timelines for remediating any non-compliance
  • Good writing and verbal presentation skills
  • Active TOP SECRET clearance with SCI eligibility
  • DoD IS knowledge and experience
  • Microsoft OS Certification (MCSE Win 7 or other)
  • Linux certification (RHCSA, CompTIA Linux, LCFS/LCFE, etc)
  • Understanding of Sensitive Compartmented Information Facility (SCIF) standards
  • Candidates must be able to obtain a TS/SCI with Polygraph clearance