Information Systems Security Manager #1278
, AZ, United States
{"itemID":"9200264717972_1","postingInstructions":[],"links":[],"additionalProperties":{},"requisitionTitle":"Information Systems Security Manager #1278","postDate":"2021-06-16T14:58:00.000-04:00","screeningRequirements":[],"organizationalUnits":[],"sponsoredVisaTypeCodes":[],"customFieldGroup":{"dateFields":[{"dateValue":"2021-06-16T14:58Z","nameCode":{"codeValue":"PostingDate"}},{"dateValue":"2021-10-05T02:33Z","nameCode":{"codeValue":"CurrentServerDateTime"}}],"indicatorFields":[{"indicatorValue":false,"nameCode":{"codeValue":"PriortyStatusFlag"}},{"indicatorValue":false,"nameCode":{"codeValue":"InternalPostingFlag"}},{"indicatorValue":true,"nameCode":{"codeValue":"MinValue"}},{"indicatorValue":true,"nameCode":{"codeValue":"IsVsidApplicable"}},{"indicatorValue":false,"nameCode":{"codeValue":"IsSassDlReqForExtPostFlag"}},{"indicatorValue":false,"nameCode":{"codeValue":"IsSassDlReqForIntPostFlag"}},{"indicatorValue":false,"nameCode":{"codeValue":"IsMonetaryFlag"}},{"indicatorValue":false,"nameCode":{"codeValue":"IsNonMonetaryFlag"}}],"numberFields":[{"numberValue":0.0,"categoryCode":{"codeValue":"ApplicantCount"}},{"categoryCode":{"codeValue":"AwardAmount"}}],"stringFields":[{"stringValue":"365977","nameCode":{"codeValue":"ExternalJobID"}},{"nameCode":{"codeValue":"CareerCenterRefId"}},{"nameCode":{"codeValue":"GuidelineOid"}},{"nameCode":{"codeValue":"CurrencySymbolOrCode"}},{"stringValue":"","nameCode":{"codeValue":"HomeDepartment"}},{"nameCode":{"codeValue":"JobClass"}}]},"clientRequisitionID":"1278","requisitionDescription":"\u003cdiv\u003e\u003cdiv\u003e\u003clink href\u003d\"https://cdn.jsdelivr.net/npm/[email protected]/css/froala_editor.pkgd.min.css\" rel\u003d\"stylesheet\" type\u003d\"text/css\"\u003e\u0026nbsp;\u003clink href\u003d\"https://cdn.jsdelivr.net/npm/[email protected]/css/froala_style.min.css\" rel\u003d\"stylesheet\" type\u003d\"text/css\"\u003e\u003cdiv class\u003d\"fr-view\"\u003e\u003cp\u003e\u003cu\u003eLABOR CATEGORY\u003c/u\u003e: Information Systems Security Manager\u003c/p\u003e\u003cp\u003e\u003cu\u003eSEHLKE POSITION TITLE\u003c/u\u003e: SME II/SME III\u003c/p\u003e\u003cp\u003e\u003cu\u003eLOCATION\u003c/u\u003e: MCAS Yuma, Arizona\u003c/p\u003e\u003cp\u003e\u003cu\u003eJOB DESCRIPTION\u003c/u\u003e: Sehlke Consulting is currently seeking qualified candidates to provide Cyber/Information Systems Security Support to Marine Corps Air Station (MCAS) Yuma commands. \u0026nbsp; The project includes technical contracted services solutions that will accelerate product delivery, enhance data analytics, and optimize the effectiveness of resources provided Testing and Evaluation. This effort requires a comprehensive solution that seamlessly integrates the personnel, processes, systems, and data necessary to reliably deliver data packages, measure of effectiveness and recommendations for improvement effectiveness, and recommend improvements to the Marine Aviation user community. \u0026nbsp;\u003c/p\u003e\u003cp\u003eDuties and expectations include, but are not limited to the following:\u003c/p\u003e\u003cul\u003e\u003cli\u003ePlan, develop, and implements proven high-tech solutions to increase security and defend against hacking, malware and ransomware, insider threats, and other types of information systems/cyber-crimes.\u0026nbsp;\u003c/li\u003e\u003cli\u003eOversee monitoring of computer networks, identifies security issues, and anticipates security breaches.\u0026nbsp;\u003c/li\u003e\u003cli\u003eExecute the installation and maintenance of security programs, plans, and software, including firewalls and data encryption programs.\u0026nbsp;\u003c/li\u003e\u003cli\u003eAssure protection of the organization\u0026#39;s data and infrastructure by enabling the appropriate security controls.\u0026nbsp;\u003c/li\u003e\u003cli\u003eInvestigate and analyze security breaches and cyber security incidents to determine the source of the issues, and assesses the damaged caused.\u0026nbsp;\u003c/li\u003e\u003cli\u003eDocument all parts of security incidents or breaches.\u0026nbsp;\u003c/li\u003e\u003cli\u003eOversee security technology and audit or intrusion systems.\u0026nbsp;\u003c/li\u003e\u003cli\u003eDevelop and handle secure network solutions to protect against advanced persistent threats.\u0026nbsp;\u003c/li\u003e\u003cli\u003eKeep abreast of industry security trends and developments, as well as applicable government regulations.\u003c/li\u003e\u003c/ul\u003e\u003cp\u003e\u003cu\u003eCLEARANCE REQUIREMENTS\u003c/u\u003e: Secret\u0026nbsp;\u003c/p\u003e\u003cp\u003e\u003cu\u003eEDUCATION REQUIREMENTS\u003c/u\u003e: Bachelor\u0026rsquo;s degree\u0026nbsp;\u003c/p\u003e\u003cp\u003e\u003cu\u003eCERTIFICATION REQUIREMENTS\u003c/u\u003e: Desired: Certified Information System Security Professional (CISSP); Certified Information Security Manager (CISM)\u003c/p\u003e\u003cp\u003e\u003cu\u003eEXPERIENCE REQUIREMENTS:\u003c/u\u003e 5+ years\u0026rsquo; experience performing assessments and penetration tests to identify network and system vulnerabilities, troubleshoots security and network problems, determines the best way to avoid them, and responds to system or network security breaches. \u0026nbsp;\u003c/p\u003e\u003cp\u003e\u003cu\u003eSYSTEM SPECIFIC EXPERIENCE REQUIREMENTS\u003c/u\u003e:\u0026nbsp;\u003c/p\u003e\u003cul\u003e\u003cul\u003e\u003cli\u003eKnowledge of new and emerging information technology (IT) and cybersecurity technologies.\u0026nbsp;\u003c/li\u003e\u003cli\u003eKnowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code).\u003c/li\u003e\u003cli\u003eMicrosoft suite of systems\u003c/li\u003e\u003c/ul\u003e\u003cli\u003e\u003cp\u003e\u0026nbsp;\u003c/p\u003e\u003c/li\u003e\u003c/ul\u003e\u003cp\u003e\u003cbr\u003e\u003c/p\u003e\u003cp\u003e\u003cbr\u003e\u003c/p\u003e\u003cp\u003e\u003cbr\u003e\u003c/p\u003e\u003cp\u003e\u003cu\u003eADDITIONAL REQUIREMENTS\u003c/u\u003e:\u0026nbsp;\u003c/p\u003e\u003cul\u003e\u003cli\u003eTravel required two weeks per year.\u003c/li\u003e\u003cli\u003eMust be able to lift 50 pounds.\u003c/li\u003e\u003cli\u003eAbility to effectively communicate orally and written.\u003c/li\u003e\u003cli\u003eAbility to multi-task and employ problem-solving skills.\u003c/li\u003e\u003c/ul\u003e\u003cp\u003e\u003cbr\u003e\u003c/p\u003e\u003cp\u003e\u003cbr\u003e\u003c/p\u003e\u003cp\u003eFounded in 2011, Sehlke Consulting is an Equal Opportunity Employer that values the strength diversity brings to the workplace. Individuals with Disabilities and Protected Veterans are encouraged to apply.\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e","requisitionLocations":[{"aliasNames":[],"address":{"cityName":"","countrySubdivisionLevel1":{"codeValue":""},"postalCode":""},"nameCode":{"shortName":"YUMA, AZ"}}]}
#J-18808-Ljbffr