- Search jobs
- Palm Bay, FL
- information technology manager
Information technology manager Jobs in Palm Bay, FL
Create a job alert for this search
Information technology manager • palm bay fl
Information Systems Security Officer
Kegman IncMelbourne, FL, USIM Solutions is hiring : Audio Visual / Information Technology (AV / IT) Program Mana
IM SolutionsMelbourne, FL, United StatesDesign & Technology
Schools (Government)Melbourne, Northern Metropolitan- Promoted
National Health Information Manager
Calvary HealthcareMelbourne, Florida, USAInformation Systems Security Officer (ISSO) II
GDITBeach, Walton, Fort, FL, USAInformation Systems Security Analyst (ACL)
V2XMelbourne, Florida, United StatesGeneral Manager, Area ICT (Information and Communication Technology), Americas
WärtsiläMelbourne, FL, USElectrician
Hiring ManagerMelbourne, FL, USSpecialist, Information Security Systems Engineer Secret - FL
L3HarrisPalm Bay, FL, United StatesSr Information Security Systems Engineer
Innova SolutionsPalm Bay,Florida,United StatesIM Solutions, Inc. is hiring : Audio Visual / Information Technology (AV / IT) Progra
IM Solutions, Inc.Melbourne, FL, United StatesSenior Information Security Systems Engineer
Acara SolutionsPalm Bay, FL, USMelbourne Management Information Systems Tutor
Varsity TutorsMelbourne, FL, US- Promoted
Senior HR Business Partner, Information Technology
Owens & MinorPalm Bay, FL, USAdjunct Faculty, Information Technology (Academic Year 2024 - 2025)
Pensacola State CollegeFL, USHealth Information Specialist I
DatavantMelbourne, FL, USAudio Visual / Information Technology (AV / IT) Program Manager
IM Solutions, LLCMelbourne, FL, USInformation Security Systems Engineer
LancesoftMelbourne, FL, USSpecialist, Information Security Systems Engineer Secret - FL
L3 TechnologiesPalm Bay, FL, United States- forensic pathologist (from $ 328,151 to $ 338,822 year)
- product owner (from $ 115,000 to $ 238,000 year)
- database architect (from $ 126,750 to $ 237,500 year)
- fashion design (from $ 52,650 to $ 230,700 year)
- forensic engineer (from $ 192,200 to $ 227,700 year)
- software architect (from $ 140,000 to $ 227,700 year)
- data architect (from $ 146,263 to $ 226,000 year)
- vp engineering (from $ 180,000 to $ 225,000 year)
- verification engineer (from $ 153,813 to $ 224,450 year)
- fpga design engineer (from $ 145,000 to $ 224,450 year)
- Tacoma, WA (from $ 126,452 to $ 186,486 year)
- Los Angeles, CA (from $ 107,500 to $ 164,978 year)
- Fremont, CA (from $ 120,000 to $ 164,219 year)
- Chicago, IL (from $ 110,200 to $ 163,000 year)
- Houston, TX (from $ 93,895 to $ 155,250 year)
- New York, NY (from $ 95,000 to $ 150,819 year)
- Philadelphia, PA (from $ 80,000 to $ 143,869 year)
- Phoenix, AZ (from $ 81,686 to $ 125,424 year)
The average salary range is between $ 87,289 and $ 150,000 year , with the average salary hovering around $ 109,996 year .
Related searches
Information Systems Security Officer
Kegman IncMelbourne, FL, US- Temporary
Job Description
Job Description
Information System Security Officer
Kegman Inc. is a Woman-Owned / Service-Disabled Veteran-Owned Small Business headquartered in Melbourne FL that provides engineering and technical support services to U.S. Government clients. We are seeking an Information System Security Officer (ISSO) to join our team at Patrick Space Force Base in Melbourne, FL.
NOTE : This is not a remote / telework job. This job requires the selected applicant to have an active U.S. Government-issued security clearance at time of hire and, therefore, requires U.S. citizenship.
The ISSO will be involved in all aspects of cybersecurity operations and will partner with program / site leads as well as government staff and mission partners to maintain an effective information security program. This position will document, implement, and assess security controls to perform system monitoring and compliance assessment activities. In addition, this ISSO will provide Risk Management Framework (RMF) support.
Responsibilities
- Work as part of an integrated team to develop and maintain RMF body of evidence documentation (example : System Security Plan, Security Controls Traceability Matrix, Plan of Action and Milestones, ATO’s) using Microsoft products such as Word, Excel, PowerPoint, and Visio.
- Maintain repositories of all body of evidence documentation for systems under your purview and ensure they are accessible only to properly authorized individuals.
- Develop and execute security control assessment procedures to verify conformance with control requirements as part of ongoing continuous monitoring and authorization assessment activities.
- Work in close coordination with system administrators and other cyber team members to ensure systems are operated, maintained, and disposed of in accordance with applicable security policies and procedures and notify the ISSM when changes occur that might impact system authorization posture.
- Support the CISO, PM, ISSM or ISO in maintaining current authorization to operate, and approval to connect, and in implementing corrective actions identified in the plan of action and milestones. Coordinates, with the CISO, PM, ISSM and AO staffs, development of an IS Configuration Management strategy and monitor any proposed or actual changes to the system and its environment.
- Ensure all security-related vulnerabilities and deficiencies are documented in the Plan of Action and Milestones (POA&M).
- Ensure integration of cybersecurity into, and throughout the lifecycle of the IT, on behalf of the ISSM and ISO.
- Ensure the development and implementation of an effective information security education, training, and awareness program.
- Ensure configuration management policies and procedures for authorizing use of hardware / software on a system are followed and coordinate any additions, changes or modifications to hardware, software, or firmware with the ISSO / ISSM prior to the addition, change or modification.
- Ensure software, hardware, and firmware complies with appropriate security configuration guidelines (e.g., security technical implementation guides (STIG) / security requirement guides).
- Reports security incidents or vulnerabilities to the CISO / ISSM / wing cybersecurity office according to AFI 17-203, Cyber Incident Handling.
Basic Qualifications
Preferred Qualifications
Education
Or
OTHER :
Kegman Inc. is an equal opportunity employer, and all qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability status, protected veteran status or any other characteristic protected by law.
Kegman will abide by the requirements of 41 CFR 60741.5(a). This regulation prohibits discrimination against qualified individuals on the basis of disability and requires affirmative action by covered prime contractors and subcontractors to employ and advance in employment qualified individuals with disabilities.
Please be aware many of our positions require an active security clearance. Security clearances are be granted to U.S. citizens. In addition, applicants who accept a conditional offer of employment that requires a security clearance will be subject to government security investigation(s) and must meet and maintain eligibility requirements for access to classified information.
By submitting your résumé for this position, you understand and agree that Kegman may share your résumé, as well as any other related personal information or documentation you provide, with its subsidiaries and affiliated companies for the purpose of considering you for other available positions.
Kegman maintains a drug-free workplace and performs pre-employment substance abuse testing where permitted by law.
Powered by JazzHR
ZCZlLO6KZF