More jobs:
Supervisory IT Cybersecurity Specialist; Infosec; Title Security Clearance
Job in
Robinson, Benton County, Arkansas, USA
Listed on 2026-02-27
Listing for:
Department of the Army
Full Time
position Listed on 2026-02-27
Job specializations:
-
IT/Tech
Cybersecurity, Information Security
Job Description & How to Apply Below
Location: Robinson
Duties
1. Serves as the principle advisor to the CIO and the respective staff on the latest industry and technological projections as they pertain to Cyber Security/Information Security for the network enclave infrastructure. Develops policies for organization deployed throughout the headquarters. Must anticipate the effects of new emerging technology and develop policies to control it to prevent security violations. Duties include oversight of eMASS, Risk Management Framework (RMF) and accreditation of all systems IAW with all command, Army, JS and DOD security directives, policies and procedures.
Ensures that all elements are in compliance with guidance concerning accreditation of automated information systems, risk management, control of computer viruses, and other similar issues. Ensures that a wide variety of security incidents are investigated and reported IAW with all command, Army, NGB and DOD security directives, policies and procedures to include: computer viruses and sanitation of highly classified information from organization.
2. Provides executive leadership, guidance, and direction to ensure acquisition, development, and retention of a professional, highly capable workforce to accomplish assigned missions. Provides supervision in the daily operations for security activities for the enclave. Coordinates the work of team members to ensure that short-term and long-term goals and objectives are met. Directs, manages, and monitors a system of internal controls that ensure effective and appropriate use of resources.
3. Establishes performance standards and evaluates employee performance. Reviews and recommends approval of, candidates for promotions and recognition. Reviews and approves: work plans to be accomplished by subordinates; priorities and schedules for completion of work; sets broad objectives; monitors subordinate employees' performance in providing IT services; reviews accomplishments; and takes appropriate action of correction when deficiencies are noted. Gives advice, counsels, or instructs individual employees, on both work and administrative matters.
Develops and evaluates performance standards; recommends and approves awards; hears and resolves group employee grievances or serious employee complaints. Reviews and makes decisions on serious disciplinary actions involving employees and makes decisions on work problems presented by subordinates. Initiates recognition and disciplinary actions for personnel. Identifies and arranges for appropriate training and development opportunities. Determines and approves training needs and establishes formal training plans.
4. ISSM responsibilities include (taken from DoDI 8500.01 and 8510.01):
A. Support implementation of the RMF. Maintain and report IS and PIT systems assessment and authorization status and issues in accordance with DoD Component guidance. Provide direction to the ISSO in accordance with DoD, Army and NGB directives. Coordinate with the organization's cybersecurity service provider to ensure issues affecting the organization's overall security are addressed appropriately. Maintain a repository for all organizational or system-level Cybersecurity-related documentation.
Ensure that ISSOs are appointed in writing and provide oversight to ensure they are following established Cybersecurity policies and procedures.
B. Monitor compliance with cybersecurity policy, as appropriate, and review the results of such monitoring. Ensure that Cybersecurity inspections, tests, and reviews are synchronized and coordinated with affected parties and organizations. Ensure implementation of IS security measures and procedures including reporting incidents to the AO and appropriate reporting chains, and coordinating system-level responses to unauthorized disclosures in accordance with DoD, Army, and NGB guidelines.
Ensure handling of possible or actual data spills of classified information resident in ISs, are conducted in accordance with applicable guidelines.
C. Act as the primary cybersecurity technical advisor to the AO for DoD IS and PIT systems under their purview. Ensure that Cybersecurity-related events or configuration changes that may impact DoD IS and PIT systems authorization or security posture are formally reported to the AO and other affected parties, such as IOs and stewards and AOs of interconnected DoD ISs. Ensure the secure configuration and approval of IT below the system level (i.e., products and IT services) in accordance with applicable guidance prior to acceptance into or connection to a DoD IS or PIT system.
DUTIES CONTINUED UNDER
EDUCATION:
Requirements Conditions of employment Conditions of Employment If you are a male applicant who was born after 12/31/1959 and are required to register under the Military Selective Service Act, the Defense Authorization Act of 1986 requires that you be registered or you are not eligible for appointment in this agency ( ).
* Federal employment suitability as determined by a background…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
Search for further Jobs Here:
×