Military OneSource Cybersecurity Manager Government - Waldorf, MD at Geebo

Military OneSource Cybersecurity Manager

Description The Cybersecurity Manager is responsible for the implementation, management, security.
and availability of all Contractor computer equipment and personnel on the Military One Source (MOS) contract.
Responsible for Information Assurance (IA) related training, operational procedures, documentation and business processes required to obtain and retain official accreditation of the online resources by full compliance of DoD Information Assurance Risk Management Framework.
The MOS program provides for 5.
2 million military members and their families at locations worldwide services similar to a commercial Employee Assistance Program (EAP) with a broad array of information and referrals as well as counseling services including adoption information, child care, exceptional family member programs, deployment support, disability information, elder care, educational services for adults, children and youth, spouse education and career information, relocation services, pet care, non-medical counseling, financial counseling, tax assistance, health and wellness coaching, housing assistance, legal service referrals, single service member services, lodging, military benefits, relationship support, parenting, spouse relocation and transition, peer-to-peer support, and everyday issues (e.
g.
, locating a plumber, car repair).
These services are available 24 hours a day, seven days a week (24/7), through the Internet, by telephone (via 800 number and collect calls), electronic mail (e-mail), postal mail, video counseling, and face-to-face counseling.
The Military One Source job postings are in anticipation of future work.
Primary ResponsibilitiesLeads efforts to ensure adequate security processes and solutions to mitigate or remediate identified risks sufficiently to meet business objectives, contractual and/or regulatory requirementsLeads incident response activities, ensuring security incidents are properly contained, eradicated, and recoveredDrives development of security policies, standards and plans to ensure the protection of corporate data against unauthorized use, access, modification, and destruction.
Ensures proper security logs are generated and sent to the organization's Security Information and Event Management (SIEM) systemResearches and implements emerging technologies to enhance the security portfolioPersistently evaluates adherence with defined policies and standardsLeads efforts with identifying, remediating, and/or mitigating vulnerabilities in the environment, ensuring appropriate response to high risk and aged findingsLeads the development, design, implementation, and maintenance of a secure environment for the MOS ProgramEnsures security processes and solutions are protected against a failure or attack that reduces the organization's ability to respond to security incidentsEnsures processes and solutions are maintained securely and highly available to protect the confidentiality, integrity and availability of assetsMonitors and ensures systems revisions and patches are up to dateManages and performs changes to the solutions and remove unnecessary servicesUnderstands risks and impact to systems in the corporate environment and their interconnectivityPerforms forensic analysis and risk assessments for the entire environmentDesigns and manages enterprise high-availability solutions running a complex arrangement of operating systems, including system updates, log analysis, access controls and backupPerforms changes to the solution configurations to add new services, adapt existing services, and removes unnecessary services.
Monitors, remediates, and mitigates security violations for network, devices, servers and other assetsDesigns, implements, and maintains security guidelines and a security infrastructure for the MOS programDevelops technical solutions to autonomously verify compliance with required technical controlsOther duties as assignedBasic QualificationsA Bachelor's Degree from an accredited college or university in Computer IT, Management Information Systems, Computer Science, or other IT-related field to include course work in information security and program or project managementA minimum of 10 years of experience managing IT and cybersecurity programs and projects of similar scope and complexity that directly support the DoD military community.
Certified DoD 8570.
01 - M - IAM Level III is REQUIREDMust possess one or more of the following active certifications:
a.
CompTIA Advanced Security Practitioner (CASP
CE)b.
Cisco Certified Network Professional (Security-focus) (CCNP Security)c.
Certified Information Systems Auditor (CISA)d.
Certified Information Systems Manager (CISM)e.
Certified Information Systems Security Professional (CISSP)f.
GIAC Certified Enterprise Defender (GCED)g.
GIAC Certified Incident Handler (GCIH)h.
GIAC Security Leadership Certification (GSLC)i.
Certified Cloud Security Professional (CCSP)j.
Certified Chief Information Security Officer (CCISO)Must be an U.
S.
citizenMust speak fluent EnglishPreferred Qualifications Experience in a military environmentFormer Military/Veteran, Military Spouse, or Wounded WarriorPay Range:
Pay Range $118,300.
00 - $182,000.
00 - $245,700.
00The Leidos pay range for this job level is a general guideline onlyand not a guarantee of compensation or salary.
Additional factors considered in extending an offer include (but are not limited to) responsibilities of the job, education, experience, knowledge, skills, and abilities, as well as internal equity, alignment with market data, applicable bargaining agreement (if any), or other law.
Recommended Skills Access Controls Business Informatics Business Planning Business Processes Certified Information Security Manager Certified Information Systems Security Professional Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.