Cybersecurity Risk Management and Compliance-Leadershipother related Employment listings - Stennis Space Center, MS at Geebo

Cybersecurity Risk Management and Compliance-Leadership

The Department of Homeland Security (DHS) is recruiting professionals to support a range of leadership roles in Cybersecurity Risk Management and Compliance, including Cybersecurity Risk Management Lead, Cybersecurity Governance Team Lead, Senior Risk and Compliance Program Manager, Cybersecurity Risk Consultant, Risk Assessment and Compliance Manager.
All positions are in the DHS Cybersecurity Service.
There are a variety of Cybersecurity Risk Management and Compliance opportunities across the Department, including supporting several specialized programs at the , , and.
Depending on your career level and role, DHS Cybersecurity Service employees in the Leadership Career Track, with a technical capability in Risk Management and Compliance, will generally apply their expertise to perform a range of tasks, including:
Overseeing and/or leading the evaluation, documentation, validation, assessment, and authorization processes necessary to ensure that existing and new information technology systems meet the Department's cybersecurity and risk requirements, providing decision makers with the knowledge to make well-informed risk decisions.
Considering risk assumptions and organizational tolerance for risk to inform strategic decision making.
Leading and/or overseeing team or program in determining adverse impacts or consequences to DHS and customizes communications for different levels of leadership and target audiences to present strategic recommendations for driving investments and operational decisions for managing risk to DHS mission, function, image, reputation, assets, individuals, and/or organizations.
Assisting DHS leadership in making strategy or policy decisions for determining the adverse impact or consequences to the organization to guide and inform subsequent risk management processes and tasks.
Actively engaging with stakeholders within or across multiple organizations to identify, select, tailor, implement, document, and assess the security and privacy controls necessary to protect a system and/or the organization commensurate with the risk to organizational operations and assets.
Ensuring appropriate treatment of risk, compliance, and assurance from internal and external perspectives, reporting on the security state of systems to appropriate organizational stakeholders.
Preparing, overseeing, and/or organizing collaborative efforts for monitoring and maintaining an ongoing situational awareness about the security and privacy posture of systems and/or the organization in support of risk management decisions.
Collaborating with internal and external DHS stakeholders and/or National experts in risk management and compliance Authorizing system operation based upon a determination of the risk to organizational operations and assets.
Leading a team(s) in cybersecurity risk assessment and compliance to determine levels of risk, tolerance for policy, and determining policy impact on strategy.
This position is in the Leadership Track across a range of career levels.
Employees in this career track generally:
Have between 5-15 years of cybersecurity work experience.
Have between 0-5 years of cybersecurity leadership experience.
Are capable of serving as a seasoned cybersecurity manager who oversees multiple DHS or Federal cybersecurity programs or DHS organizations, including employees and contract resources, through subordinate managers.
DHS Cybersecurity Service employees with a technical capability in Risk Management and Compliance will generally:
Oversee, evaluate, and support the documentation, validation, assessment, and authorization processes necessary to ensure that existing and new information technology systems meet the Department's cybersecurity and risk requirements, and provide decision makers with the knowledge to make well-informed risk decisions.
Ensure that strategic considerations drive investment and operational decisions with regard to managing risk to organizational operations (including mission, function, image and reputation), organizational assets, individuals, other organizations (collaborating or partnering with federal agencies and contractors) and the nation.
Understand and utilize the National Institute of Standards and Technology (NIST) series of documents.
DHS Cybersecurity Service jobs are structured cybersecurity specializations - called technical capabilities.
To learn more about technical capabilities, visit our.
This position is focused on Cybersecurity Risk Management and Compliance.
DHS Cybersecurity Service jobs are structured cybersecurity specializations - called technical capabilities.
To learn more about technical capabilities, visit our.
DESIRED CERTIFICATION:
Certified Cloud Security Professional (CCSP) Certified Information Security Manager (CISM) Certified Information Systems Security Professional (CISSP) DESIRED TOOLS/INDUSTRY
Experience:
Knowledge of federal cybersecurity requirements (e.
g.
, Federal Information Security Management Act (FISMA), relevant Executive Orders, Office of Management and Budget (OMB) memoranda).
Exposure to tools/technologies required to implement or oversee hardware/software asset management; identity, credential, and access management; data discovery; secure cloud services; intrusion detection and prevention; endpoint detection and response; cyber threat intelligence; enterprise cybersecurity risk management; supply chain risk management.
Salary:
$120600 per year.
Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.