Careers

Cybersecurity Management Officer (Germantown,MD)

  • National Geospatial-Intelligence Agency (NGA)
  • Germantown, MD, USA
  • Nov 09, 2020
[Information Technology]

Job Description

Job SummaryASSIGNMENT DESCRIPTION: Cybersecurity Management Officers ensure that Agency information systems comply with applicable standards and guidelines. They provide oversight of documentation, validation, accreditation, and authorization processes necessary for the implementation, operation, and maintenance of information technology systems. They ensure appropriate managerial responses for associated risk, compliance, and assurance from mission, security, and cost perspectives. These officers manage the strategic, personnel, infrastructure, policy enforcement, and emergency planning implications of information security for the organization, a specific program, or other area of responsibility.Additional Job InformationADDITIONAL INFORMATION: The Desktop Environment (DTE) is a centralized, commonly deployed IT service that provides connected users an experience of unparalleled mission integration and unified benefits. These services include everything from secure email and phone services, mobile access capabilities, chat options, print and directory services, to collaborative applications and much more. The DTE Integrated Program Office (IPO) provides a common desktop (DTE) to DIA, NGA and selected partners, contributing to efficiencies for both agencies, delivering improved and secure user experience, and enhancing the ability of DTE users to collaborative and share information. The Information Systems Security Manager (ISSM), DTE IPO is responsible for ensuring that the appropriate management and operational security posture is maintained for DTE services on the Common Operating Environment (COE) domain. This position will provide oversight and management of the DTE certification and accreditation process to secure and gain accreditation of the DTE Services. This position will ensure completion of the documentation, validation, accreditation, and authorization processes and analysis necessary to assure that new information technology systems meet all applicable Information Assurance and security laws, regulations, guidelines and standards. This position will ensure the appropriate treatment of risk, compliance, and assurance from mission, security, and cost Additional Application Requirement: You may be asked to complete one or more assessments in addition to the application you submit on this website as part of your application to NGA. These assessments may include but are not limited to: 1) Online questionnaires or assessments that require you to describe your job-related knowledge, skills, abilities, or other characteristics that are aligned with the mandatory and desirable qualifications of this job posting. The information you provide in the application you submit must support the response you provide to this questionnaire. You will receive an email to describe any additional assessments required. Please monitor your emails and complete any required assessments as soon as possible.Mandatory QualificationsMANDATORY QUALIFICATION CRITERIA: For this particular job, applicants must meet all competencies reflected under the Mandatory Qualification Criteria to include education (if required). Online applications must demonstrate qualification by providing specific examples and associated results, in response to the announcement's mandatory criteria specified in this vacancy announcement: 1. Experience with Risk Management Framework (RMF), and accreditation and authorization practices, as applied and validated within system constructs. 2. Demonstrated work experience in computer science/cyber security-related field, and with the use and operation of security tools for accreditation documentation, auditing, monitoring and scanning (i.e. XACTA, MAS, HBSS). 3. Proven ability to recommend highly complex risk mitigation strategies. EDUCATION REQUIREMENT: A. Education: Bachelor's degree from an accredited college or university in Computer Information Systems, Computer Science, Engineering, Information Science, Information Systems, Information Systems Management, Information Technology, Mathematics, Operations Research, Statistics, Technology Management, or degree that provided a minimum of 24 semester hours in one or more of the fields identified above and required the development or adaptation of applications, systems, or networks. -OR- B. Combination of Education and Experience: A minimum of 24 semester (36 quarter) hours of coursework in any area listed in option A, plus experience in IT policy development and implementation, IT standards development and implementation, IT project/program management, IT operations, or a related area that demonstrates the ability to successfully perform the duties associated with this work. As a rule, every 30 semester (45 quarter) hours of coursework is equivalent to one year of experience. Candidates should show that their combination of education and experience totals 4 years. -OR- C. Experience: A minimum of 4 years of experience in IT policy development and implementation, IT standards development and implementation, IT project/program management, IT operations, or a related area that demonstrates the ability to successfully perform the duties associated with this work. -AND- LICENSES/CERTIFICATIONS: Information Assurance Management I (IAM I) certification must be obtained within 6 months. -AND- Relevant Competencies: IT-related experience demonstrating each of the four competencies: Attention to Detail, Customer Service, Oral Communication, and Problem Solving.Highly Desired QualificationsQUALIFICATION CRITERIA: In addition to the mandatory qualifications, experience in the following is desired: 1. Experience conducting assessments related to threats and vulnerabilities for potential deviations from determined configurations or established guidelines, and recommending mitigation countermeasures. 2. Demonstrated competency deal with, and reduce ambiguity and uncertainty. Able to advance projects with changing priorities, ill-defined requirements and multiple dependencies. Flexibility, comfort with change, and a corporate focus are essential. 3. Experience comprehending and developing complex correspondence, influential strategic products and documents of record. Communicating clear and concise technical information to internal and external high-level officials. Addressing potentially controversial topics in an objective and skillful manner. 4. Experience working with IC and DoD partners, IT infrastructure, client server computing and architecture systems. 5. Possess an active TS/SCI Clearance.Additional Job RequirementsYou must be able to obtain and retain a Top Secret security clearance with access to Sensitive Compartmented Information. In addition, you are subject to a Counterintelligence Polygraph examination in order to maintain access to Top Secret information. All employees are subject to a periodic examination on a random basis in order to determine continued eligibility. Refusal to take the examination may result in denial of access to Top Secret information, SAP, and/or unescorted access to SCIFs. Employees with SCI access and who are under NGA cognizance are required to submit a Security Financial Disclosure Report, SF-714, on an annual basis in order to determine continued eligibility. Failure to comply may negatively impact continued access to Top Secret information, Information Systems, SAP, an
Associated topics: chief program officer, cpo, manage, manager, management, monitor, product manager, project manager, relationship manager, task