• Skip to main content
  • Skip to primary sidebar

ConvoCourses

Cyber Security Compliance and IT Jobs

  • Cyber Security Training
  • about me.
  • Information Assurance Jobs

Security Manager at Boston Area, MA

February 1, 2016 by Bruce Brown Leave a Comment

Please send your updated resume with rates expected for this position on shivamn@tscti.com
Title:                                                  Security Manager (57620-1)
Location:                                            Boston Area, MA
Duration:                                            6 Months+ Fulltime Permanent
Visa-                                                   US citizen and GC only
Comments:   
Long term position on site at client Merck
Job Description:  

The Account Security Manager (ASM) is the primary point of contact for the delivery of Cyber services to the customer. The ASM is responsible for assuring that the compliance of services and obligations is met for any in-scope delivery for the account. This includes overseeing other service centers as they deliver to the customer, as well as management oversight of all Cyber Security Managed services delivered to the account. The ASM will represent CSC to the account on all matters of IT Security and Compliance and will engage other Cyber resources as necessary to fulfill this obligation.

The ASM’s roles functions include the following:
* Develop a deep relationship with the client based on trust, delivery and execution in order to drive service excellence and ultimately sales
* Develop a thorough understanding of the client’s business and IT Security Risk & Compliance Management strategies; and deliver Cyber Security services accordingly
* Ensure that Cyber Security’s capabilities are provided maximum opportunity to support account expansion goals, including assisting in opportunity identification; strategy and service offering development; proposal writing; and client presentations
* Strive to become a ‘go-to security expert’ to the client, either providing expert technical advice themselves, or bringing in subject matter experts where appropriate from both within and outside CSC
* Coordinates investigation, management, and response to all security and virus incidents with impacts to the account and keeps appraised of all security and virus incidents and response in other regions
* Provides security reports to the client and the CSC account as required by contractual commitments or as operational conditions dictate
* Develops security and compliance strategy jointly with the client to anticipate future threats and requirements, and defines the strategic roadmap for future services and technology
* Manages “reach-back” support to the CSC Cybersecurity organization and other CSC product lines (PLs) for subject matter expert (SME) support and technical assistance, such as forensic investigation

Qualifications
CISSP/CISM or equivalent certification highly desired, or someone willing and able to achieve those certifications strongly preferred. It is also recommended that ASMs have an understanding of ITIL Foundations. An ASM should also have good communications, interpersonal and organizational skills.

Filed Under: Risk Management For DoD IT Tagged With: Account Security Manager, Boston Area, MA, Security Manager, Security Manager at Boston Area

Reader Interactions

Leave a Reply Cancel reply

You must be logged in to post a comment.

Social connect:

Primary Sidebar

search


This is a breakdown of each of the NIST 800-53 security control families and how they relate to each step in the NIST 800-37 risk management framework process.

also available on Amazon!

View Book


This is a breakdown of each of the NIST 800-53 security control families and how they relate to each step in the NIST 800-37 risk management framework process.

also available on Amazon!

View Book


This book is an overview of how the NIST SP 800-37 risk management framework works from the perspective of an information system security officer (ISSO).

also available on Amazon!

View Book

NIST RMF 800-37 templates
Free 800-37 templates

The NIST 800 Template download contains a .doc file template and xls templates for POAMs, Federal, State, cloud based and a legacy template as well as resources where you can find more on NIST 800-37 documents for your use.

View Book

Learn to Make 6 Figures in CyberSecurity

RMF ISSO Foundations Training
RMF ISSO Foundations Training

RMF ISSO Foundations

I was an Information System Security Officer (ISSO) doing Risk Management Framework (NIST SP 800-37) for over a decade. I am a Cybersecurity veteran and I can explain (in plain English) what you DO in the Risk Management Framework process as an ISSO.

View Course

NIST SP 800-37 Presentation
NIST SP 800-37 Presentation

View Course

login

  • Register
  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Recent Posts

  • Convocourses Podcast: Plan of Action and Milestone
  • Start with These IT Certifications (Part 1)
  • How to Tailor Security Controls in NIST 800
  • #cybersecurityjobs are recession proof
  • What IT Certifications for Information Security (part 2) (8140)

Meta

  • Register
  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Recent Comments

  • http://Www.Finance.Ipt.Pw/ on SRG/STIG Applicability Guide and Collection Tool Update
  • Elsa7 on ConvoCourses podcast: Cyber Security day to day activity
  • Tony on STIG Update – DISA has released the Microsoft SQL Server 2016 STIG Version 1
  • horloge on SCAP Compliance Checker SCC)
  • 218 Information assurance Success Criteria – ITSECURITYSURVIVAL.COM on Information Assurance Vulnerability Alert

Tags

8140 8570 ArcSight c&a CISSP convocourses cyber cybersecurity cyber security DIACAP DIARMF diarmf - implement disa DISA STIG dodd 8140 dodd 8140 cyberspace workforce IA implement implementation info assurance information assurance information security ISSO IT it jobs it jobs in usa job jobs Linux mcafee network nist nist risk management framework nist risk management framework 800-37 podcast risk risk assessment risk management risk management framework rmf security STIG stigs unix windows


This is a breakdown of each of the NIST 800-53 security control families and how they relate to each step in the NIST 800-37 risk management framework process.

also available on Amazon!

View Book

Copyright © 2023 · Author Pro on Genesis Framework · WordPress · Log in