ISSM, Systems Security Manager, Kuiper Government Solutions (KGS) Professional Services - Arlington, VA at Geebo

ISSM, Systems Security Manager, Kuiper Government Solutions (KGS)

Kuiper Government Solutions (KGS LLC), is currently seeking an Information Systems Security Manager (ISSM) to help develop, design, and implement a strategy to scale and manage the KGS security program that is compliant with the National Industrial Security Program (NISP) in Arlington, VA.
We are looking for an enthusiastic person with deep customer focus that can scale our program to meet the demands of multiple customers.
Excellent communications skills and strategic planning skills are a must.
This position will report to the KGS PSO.
Key job responsibilitieso Develop policy and procedures for all classified information systems (Stand-alone systems/ LAN/ WAN's).
o Ensure policies/procedures and relevant legal and regulatory requirements are established/maintained in compliance with customer requirements, that users are correctly following proper security procedures, and that all classified information systems are properly secured.
o Develop media sanitization (clearing, purging, or destroying) and reuse procedures.
o Develop and document processes, procedures, and guidelines for complying with protection requirements (e.
g.
, e-mail labels, media labels, etc.
), control procedures (e.
g.
, discretionary access control, need-to-know sharing, etc.
), incident management reporting, remote access requirements, system management and use of encryption.
o Configure, update, and monitor classified networks infrastructure devices consisting of routers, firewalls, intrusion detection/prevention components, and switches.
o Support business development, review and provide input to RFP's and author security volumes as required.
o Use tools authorized by customers to test/secure the system, i.
e.
vulnerability scanner, Security Technical Implementation Guide (STIG) compliance checker, and antivirus.
o Perform system administration functions for modern operating systems and applications, installing and configuring operating systems, installing patches and updates, adjusting security controls to meet federal requirements, monitoring operation, and creating and managing system back-ups.
o Interface directly with the Computer Network Defense Service Provider (CNDSP) to provide support related to CNDSP subscription services.
o Provide support to the FSO that may include interfacing with program management to address security issues and ensure that we are seen as a business enabler.
o Collaborate with the FSO and corporate security personnel for security metrics as well as escalating possible issues to leadership that could impact operations.
o Responsible for the local Host Based Security System (HBSS) implementation and operationo Assist with Security Awareness, Training and Education program.
o Completes required and recommended training activities necessary to maintain technical proficiency and required certifications.
o Maintain various daily logs for a variety of administrative functions associated with systems.
o Follow and enforce the KGS Security Standard Operating Procedures.
o Conduct weekly security checks of all accredited systems.
o Ensure System Security Plans for all classified computing areas are maintained.
o Perform other support functions as directed by the FSO/ DoD Security Operations Manager.
Security Clearance:
Candidates must have recent or active US Government security clearance of TS/SCI (with polygraph preferred) and be able to maintain a TS/SCI security clearance, so you must be a U.
S.
citizen for consideration.
.
Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.