Job Description:Intel's Government Information Technology and Security (GITS) organization enables Intel to win United States Government business by providing secure products, solutions, and services which meet U.S. regulatory requirements. The GITS team is part of Intel's Information Security organization and supports the unique IT information Security and Compliance requirements for Intel Federal LLC, a subsidiary of Intel that delivers products and/or services to the US Government (USG). As part of the GITS team, you will help us grow our secure solution suite to meet U.S. Government requirements for data safeguarding.Role overview:The Government IT and Security (GITS) organization is seeking an Information Systems Security Manager (ISSM). This role will report into the National Industrial Security Information Security group.
Responsibilities include but are not limited to:
- Assessing programs to determine special material handling requirements, drive security requirements within GITS team based on regulations.
- Maintain regulatory evidence including policies, standards, training, and compliance monitoring.
- Represent GITS in audit actions.
- Conduct risk assessments to help prioritize security controls deployment and ensure compliance with corporate cybersecurity policies, US Government regulations and standards.
- Coordinate with others to create computer-based and instructor-led material to meet regulatory requirements on personal training related to information safeguarding.
- Assessing impact and clearly communicating up to leadership and to the greater organization relevant information and actions needed in relation to incoming or new information safeguarding requirements.
- Utilize NIST frameworks to assess environments and maintain a System Security Plans (SSP's), Plan of Actions and Milestones (POAM's) and revise them on a regular cadence to ensure audit readiness.
- Apply defense-in-depth methodology when assessing the effectiveness of controls including how to apply a compensating control.
Responsibilities:
- Serves as Senior Technical Advisor on all Cyber / IT / IA activities and develop policies, procedures and guidelines.
- Provide daily oversight and direction to ISSOs.
- Manage the process and preparation of documentation reviews to include System Security Plans (SSPs), monitor Plan of Actions and Milestones (POAM) for corrective actions, Risk Assessment Reports, Certification and Accreditation (CA) packages, and System Requirements.
- Institute and implement a Configuration Control Board (CCB) charter.
- Provide management support to configuration management (CM) for information system security software, hardware, and firmware.
- Effectively oversee and manage ongoing monitoring activities, ensuring optimal efficiency and accuracy. This includes identifying potential issues, implementing corrective actions, and providing regular updates to stakeholders to maintain transparency and foster continuous improvement.
- Manage the performance of vulnerability/risk assessment analysis to support security authorization.
- Manage operational security posture for an Information System or program to ensure Information System Security policies, standards, procedures, and all customer requirements, are established and followed.
- Ensure that all personnel receive the necessary technical and security training to carry out their duties.
The ideal candidate should exhibit the following traits:
- Presentation skills to support communication to large organizations and VP level leadership alike using Teams, PowerPoint and in-person presentation of material on an ongoing basis.
- Influencing skills at all levels of the organization.
- Independent troubleshooting for successful problem resolution.
- Leadership, organization, and communication skills.
- Information Security skills to support Risk Management leadership.
Qualifications:You must possess the below minimum qualifications to be initially considered for this position. Preferred qualifications are in addition to the minimum requirements and are considered a plus factor in identifying top candidates. Experience listed below would be obtained through a combination of your degree, research and or relevant previous job and or internship experiences.
This position requires verification of U.S. citizenship due to citizenship-based legal restrictions. Specifically, this position supports United States government customers and is subject to certain citizenship-based restrictions.
High School Diploma and 10+ years of experience in Information Technology (IT) industry, Information Security or Government Support OR Bachelor's degree in Computer Science, Information Security, or any other related Information Technology field and 6+ years experience.
Minimum Qualifications:
- Ability to obtain US Government Top Secret (TS-SCI) with Polygraph.
- 6+ years of experience performing full range of ISSO and/or ISSM functions.
- Security certification to meet DoD 8570.01-M with a minimum certification of IAM Level II is required.
Preferred Qualifications:
- One of the following certifications:
- CISSP, CISM, GSLC, CCISO.
- 6+ years of experience with the NIST Risk Management Framework (RMF), NISPOM, JSIG, NIST 800-53, ICD-503.
- 6+ years of experience leading efforts to obtain ATOs for classified systems.
- 6+ years of experience with STIGs / SCAP / SRGs.
- 6+ years of experience maintaining IS package documentation (SSP, POAMs, RAR, SAR, SRTM, hardware and software inventories).
Experienced HireShift 1 (United States of America)US, Virginia, FairfaxUS, Arizona, Phoenix, US, California, Folsom, US, California, Santa Clara, US, Oregon, Hillsboro
Position of Trustoffer a total compensation package that ranks among the best in the industry. It consists of competitive pay, stock, bonuses, as well as, benefit programs which include health, retirement, and vacation. Find more information about all of our Amazing Benefits here:
Annual Salary Range for jobs which could be performed in the US:
This role will require an on-site presence. * Job posting details (such as work model, location or time type) are subject to change.