×
Register Here to Apply for Jobs or Post Jobs. X

Manager, Cyber Intelligence Security Clearance

Job in Greenville, Hunt County, Texas, 75401, USA
Listing for: L3Harris Technologies
Full Time position
Listed on 2026-01-14
Job specializations:
  • IT/Tech
    Cybersecurity, Information Security, Systems Engineer
Job Description & How to Apply Below
Position: Manager, Cyber Intelligence with Security Clearance
L3

Harris is dedicated to recruiting and developing high-performing talent who are passionate about what they do. Our employees are unified in a shared dedication to our customers' mission and quest for professional growth. L3

Harris provides an inclusive, engaging environment designed to empower employees and promote work-life success. Fundamental to our culture is an unwavering focus on values, dedication to our communities, and commitment to excellence in everything we do. L3

Harris Technologies is the Trusted Disruptor in the defense industry. With customers' mission-critical needs always in mind, our employees deliver end-to-end technology solutions connecting the space, air, land, sea and cyber domains in the interest of national security.

Job Title:

Manager, Cyber Intelligence-ISSM Job

Job Location:

Greenville, TX;
On-site

Job Schedule:

9/80, Off every other Friday; 1st shift

Job Description:

L3

Harris Greenville, Texas, is seeking an Information System Security Manager (ISSM) in support of Defense Counterintelligence and Security Agency (DCSA) programs. Duties for successful candidates include, but are not limited to reviewing and developing information system accreditation/certification support documentation; interacting with customers when changes occur that may affect the information system accreditation/certification; performing system and network self-inspections; identifying information system vulnerabilities and implementing countermeasures;
Responsibility for program policy creation/update; maintaining information system security records. The ISSM will provide assistance on IT and information system security issues that may affect the mission of the customer. This ISSM reports to the Director of Cyber Intelligence for the site.
* Develop and conduct risk assessment procedures for verification of RMF/Assessment and Authorization (A&A) safeguards to meet various regulatory requirements based upon government regulations and NIST 800 series (800-53, etc.) guidelines.

* Author and provide oversight of various artifacts supporting RMF package artifacts to include the System Security Plan (SSP), Security Control Traceability Matrix (SCTM), Plan of Actions & Milestones (POA&M), Continuous Monitoring (Con Mon) Plan, CONOPS, and other RMF BoE artifacts.

* Coordinate with internal/external partners to establish system security designs and validate compliance requirements.

* Responsible for analyzing and/or administering security controls for information systems.

* The selected candidate will act as a member of a diverse security team and participate in Engineering and Configuration Review Boards and Working Groups to develop secure system solutions.

* Monitor IA Program compliance by performing periodic self-inspections, tests and reviews of the IS to ensure that systems are operating as authorized/accredited and that conditions have not changed.

* Configuration of change management processes (hardware/software, account Management, Disposition, Assured File Transfers (AFT) and related documentation in accordance to policies and procedures.

* Review audit data of the IS and IS components (technical & physical) for anomalous or unauthorized activities.

* Participate in documenting and publishing security related workflows and procedures to mitigate vulnerabilities and recommend changes to system or system components.

* Conduct Cybersecurity training, briefings, and presentations for multiple levels of business.

* Provide leadership and oversight to ISSOs.

* Participate in interdepartmental projects and provides council on Cybersecurity policies and procedures.

Essential Functions:

* Develop and conduct risk assessment procedures for verification of RMF/Assessment and Authorization (A&A) safeguards to meet various regulatory requirements based upon government regulations and NIST 800 series (800-53, etc.) guidelines.

* Author and provide oversight of various artifacts supporting RMF package artifacts to include the System Security Plan (SSP), Security Control Traceability Matrix (SCTM), Plan of Actions & Milestones (POA&M), Continuous Monitoring (Con Mon) Plan, CONOPS, and other RMF BoE artifacts.

* Coordinate with internal/external partners to establish system security designs and validate compliance requirements.

* Responsible for analyzing and/or administering security controls for information systems.

* The selected candidate will act as a member of a diverse security team and participate in Engineering and Configuration Review Boards and Working Groups to develop secure system solutions.

* Monitor IA Program compliance by performing periodic self-inspections, tests and reviews of the IS to ensure that systems are operating as authorized/accredited and that conditions have not changed.

* Configuration of change management processes (hardware/software, account Management, Disposition, Assured File Transfers (AFT) and related documentation in accordance to policies and procedures.

* Review audit data of the IS and IS components…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary