Recent Searches

You haven't searched anything yet.

2 Information Systems Security Manager (ISSM) Jobs in Goldsboro, NC

SET JOB ALERT
Details...
Security Jobs Jobs Hiring
Goldsboro, NC | Full Time
$53k-79k (estimate)
Just Posted
RSC2
Goldsboro, NC | Full Time
$113k-140k (estimate)
6 Months Ago
Information Systems Security Manager (ISSM)
RSC2 Goldsboro, NC
$113k-140k (estimate)
Full Time | Consumer Services 6 Months Ago
Save

RSC2 is Hiring an Information Systems Security Manager (ISSM) Near Goldsboro, NC

Founded in 2009, RSC2, Inc. is a Small Business Administration (SBA) Certified HUBZone Professional Services company headquartered in Baltimore, Maryland. RSC2 provides breakthrough expertise, support services, and technologies to make operations, programs and systems of record perform better. Our professional staff is trained to provide world-class services to all types of customers. We uphold the integrity and quality of our work so you can expect only the best from us.RSC2 is looking for an Information Systems Security Manager (ISSM) to join our growing team! This individual will be supporting the 4th Medical Group on-site at Seymour Johnson Airforce Base in Goldsboro, NC.Responsibilities:
  • Support necessary compliance activities (e.g., ensure system security configuration guidelines are followed, compliance monitoring occurs).
  • Continuously validate the organization against policies/guidelines/procedures/regulations/laws to ensure compliance.
  • Acquire and manage the necessary resources, including leadership support, financial resources, and key security personnel, to support information technology (IT) security goals and objectives and reduce overall organizational risk.
  • Advise senior management (e.g., CIO) on risk levels and security posture.
  • Advise appropriate senior leadership or Authorizing Official of changes affecting the organization’s cybersecurity posture.
  • Collect and maintain data needed to meet system cybersecurity reporting.
  • Communicate the value of information technology (IT) security throughout all levels of the organization stakeholders.
  • Ensure security improvement actions are evaluated, validated, and implemented as required.
  • Ensure that cybersecurity inspections, tests, and reviews are coordinated for the network environment.
  • Ensure that cybersecurity requirements are integrated into the continuity planning for that system and/or organization(s).
  • Identify alternative information security strategies to address organizational security objective.
  • Identify information technology (IT) security program implications of new technologies or technology upgrades.
  • Interpret patterns of non-compliance to determine their impact on levels of risk and/or overall effectiveness of the enterprise’s cybersecurity program.
  • Manage the monitoring of information security data sources to maintain organizational situational awareness.
  • Participate in the development or modification of the computer environment cybersecurity program plans and requirements.
  • Prepare, distribute, and maintain plans, instructions, guidance, and standard operating procedures concerning the security of network system(s) operations.
  • Track audit findings and recommendations to ensure appropriate mitigation actions are taken.
  • Identify security requirements specific to an information technology (IT)system in all phases of the System Life Cycle.
  • Ensure plans of actions and milestones or remediation plans are in place for vulnerabilities identified during risk assessments, audits, inspections, etc.
  • Assure successful implementation and functionality of security requirements and appropriate information technology (IT) policies and procedures that are consistent with the organization’s mission and goals.
Requirements:
  • Minimum Secret Clearance
  • Skilled in relating policies that reflect system security objectives and determining how a security system should work (including its resilience and dependability capabilities) and how changes in conditions, operations, or the environment will affect these outcomes.
  • Knowledge of Personally Identifiable Information (PII) data security standards.
  • IAT III, CISSP is preferred but IAT Level II, SEC , would be required within 90 days of placement into this position
  • Knowledge of applicable laws (e.g., Electronic Communications Privacy Act, Foreign Intelligence Surveillance Act, Protect America Act, search and seizure laws, civil liberties and privacy laws), statutes (e.g., in Titles10, 18, 32, 50 in U.S. Code), Presidential Directives, executive branch guidelines, and/or administrative/criminal legal guidelines and procedures relevant to work performed.
  • Ability to apply cybersecurity strategy to cloud computing service and deployment models, identifying proper architecture for different operating environments.
  • Knowledge of penetration testing principles, tools, and techniques.
  • Knowledge of how traffic flows across the network (e.g., Transmission Control Protocol [TCP] and Internet Protocol [IP], Open System Interconnection Model [OSI], Information Technology Infrastructure Library, current version[ITIL]).
  • Knowledge of secure acquisitions (e.g., relevant Contracting Officer’s Technical Representative [COTR] duties, secure procurement, supply chain risk management).
  • Knowledge of network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services.
  • Knowledge of risk management processes and requirements per the Risk Management Framework (RMF).
Work Location: Goldsboro, NCEmployment Type: Full-time, Salary-Exempt Benefits Package: We offer a top tier benefits package which includes medical, dental, vision, PTO, employer matching retirement plan, and more! We are an equal opportunity employer. We evaluate qualified applicants without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, veteran status, or any other protected characteristic. The EEO is the Law poster is available here. 

Job Summary

JOB TYPE

Full Time

INDUSTRY

Consumer Services

SALARY

$113k-140k (estimate)

POST DATE

10/19/2023

EXPIRATION DATE

05/16/2024

WEBSITE

rsc2inc.com

HEADQUARTERS

CATONSVILLE, MD

SIZE

50 - 100

TYPE

Private

CEO

SCOTT CHESELDINE

REVENUE

$10M - $50M

INDUSTRY

Consumer Services

Show more

RSC2
Full Time
$51k-64k (estimate)
1 Week Ago
RSC2
Full Time
$53k-65k (estimate)
2 Weeks Ago
RSC2
Remote | Full Time
$76k-94k (estimate)
2 Months Ago

The job skills required for Information Systems Security Manager (ISSM) include Information Security, Cybersecurity, Leadership, Risk Management, IT Security, Security Systems, etc. Having related job skills and expertise will give you an advantage when applying to be an Information Systems Security Manager (ISSM). That makes you unique and can impact how much salary you can get paid. Below are job openings related to skills required by Information Systems Security Manager (ISSM). Select any job title you are interested in and start to search job requirements.

For the skill of  Information Security
CARsgen Therapeutics Corpora
Full Time
$103k-132k (estimate)
2 Weeks Ago
For the skill of  Cybersecurity
Central Business Solutions
Full Time
$59k-71k (estimate)
9 Months Ago
For the skill of  Leadership
Allen Tate Company
Full Time
$79k-123k (estimate)
Just Posted
Show more

The following is the career advancement route for Information Systems Security Manager (ISSM) positions, which can be used as a reference in future career path planning. As an Information Systems Security Manager (ISSM), it can be promoted into senior positions as a Cross-Platform Security Manager that are expected to handle more key tasks, people in this role will get a higher salary paid than an ordinary Information Systems Security Manager (ISSM). You can explore the career advancement for an Information Systems Security Manager (ISSM) below and select your interested title to get hiring information.