Title: Information Security Manager II
Description:
Solutions3 LLC is supporting a U.S. Government customer on a large mission critical development and sustainment program to provide support for onsite incident response to civilian Government agencies and critical asset owners who experience cyber-attacks, providing immediate investigation and resolution.
Solutions3 LLC is seeking an experienced and technically proficient Information Security Manager II to support this critical customer mission by performing investigations to characterize the severity of breaches, developing mitigation plans, and assisting with the restoration of services.
This position requires support during assigned shifts, including nights/weekends
Eligibility:
- Must be a US Citizen
- Must have an active TS/SCI clearance
- Must be able to obtain DHS Suitability prior to starting employment
- 2+ years of directly relevant experience in information security
Responsibilities Include:
- Providing 24 x 7 watch supporting continuous monitoring and incident response for hybrid cloud/ on-prem customer networks
- Providing support in the detection, response, mitigation, and reporting of cyber threats affecting customer networks
- Producing reports and briefs to provide an accurate depiction of the current threat landscape and associated risk based on customer, community, and open-source reporting
- Facilitating the customer's posturing to aggressively investigate cyber activity targeting customer information and its information infrastructure
- Analyzing and reporting cyber threats as well as assist in deterring, identifying, monitoring, investigating, and analyzing computer network intrusions
- Providing support during assigned shifts, including nights/weekends, with hybrid work on-site
- Developing and implementing training standards and procedures, to include Work Instructions, Joint Qualification Requirements, and Standard Operating Procedures
- Oversee the training of newly assigned analysts
Required Skills:
- Knowledge of Computer Network Defense (CND) policies, procedures, and regulations
- Knowledge of defense-in-depth principles and network security architecture
- Knowledge of boundary protection and enclaving
- Knowledge of authentication and access management technologies
- Knowledge of several of the following areas is required: Understanding of business security practices and procedures; current security tools available; hardware/software security implementation; different communication protocols; encryption techniques/tools; familiarity with commercial products, and current lab infrastructure technology
- Ability to serve as an Information System Security Officer (ISSO)
- Must be able to work collaboratively across physical locations
Desired Skills:
- DHS experience
- Cybersecurity skills including threat hunting
- Advanced knowledge of RMF framework
- Experience working ATO’s
Desired Certifications: CISSO, CISM, CISSP
Required Education: BS Information Management, Cybersecurity, Computer Science, or related degree; or HS Diploma and 4+ years information security experience
Top Skills
What We Do
Who We Are:
Solutions³ is an award-winning consulting and training organization, providing full lifecycle IT Management solutions built on industry best practices. Our complete solution includes innovation, thought leadership, and market-leading applications, implemented by a highly qualified team. This collaborative methodology results in projects that are clearly defined and understood, and support our clients’ business objectives.
What We Do:
Solutions³ focuses on the architecture, implementation, and training of each solution we provide. Our unique training, led by instructors who are also practitioners, brings valuable experience into the classroom.
Our three-dimensional approach of people, process, and technology, combined with partner expertise, ensures that all aspects of the solution function effectively. We provide custom training to equip people with the knowledge and hands-on experience to manage their IT solutions, we enable business improvement with ITIL-based processes and best-of-breed technology, and our strong partner ecosystem allows us to address a broader range of IT needs.
Within our expertise areas, we provide assessments, component design, implementation plans, test plans, application deployment and integration, process and policy definition, knowledge transfer, custom end-user training, and ongoing operation and maintenance. These expertise areas include:
- Cybersecurity Training & Governance
- IT Service Management (Service Desk & ITIL®)
- IT Operations Management
- Critical Notification Systems
- Project Management
- Staff Augmentation