Information Security Officer

Company Name:
General Dynamics Bath Iron Works
Information Security Officer
Location Bath Iron Works, Bath, ME
Department B2601 Plant Security-Bath
Requisition Number 14-6735
Shift 1st
Number of Positions 1
Security Clearance Top Secret
Job Description We are seeking an Information Security Officer (ISO) who will be responsible for managing, coordinating, and establishing priorities for complete life-cycle of projects including planning, design, testing and implementation of security infrastructure for enterprise-wide applications in accordance with General Dynamics and Bath Iron Works (BIW) security policies and procedures. The BIW ISO conducts risk assessments; provides recommendations for application design; and handles the full range of security issues involving architecture, firewalls, electronic data traffic and network maintenance and disposal. In addition, the BIW ISO is responsible for the planning, coordinating and implementing of security measures to safeguard information against accidental or unauthorized modification, destruction, or disclosure by performing the following duties:
Manages all aspects of the BIW Information Security Program and/or other industrial security programs, ensuring compliance with governmental and company security policies and procedures (e.g. NIST 800-53).
Works with CIO and IT management, as well as other areas of the business to prioritize security initiatives and spending based on appropriate risk management.
Leads operational risk management activities to enhance the value of the company and brand.
Leads information security awareness and training initiatives to educate workforce about policies, procedures and information risks.
Oversees security analysts and potential vendors who safeguard the company's assets, intellectual property and computer systems.
Identifies protection goals, objectives and metrics consistent with corporate security policy.
Oversees incident response planning as well as the investigation of security breaches, and assists with disciplinary and legal matters associated with such breaches as necessary.
Works with outside consultants as appropriate for independent security audits.
Consults with managerial and systems administration and analysis personnel to clarify operational intent of systems, identify problems and suggest changes.
Defines use of encryption technology, penetration testing utilities and vulnerability analysis tools.
Provides security advice and support in the design and implementation of new systems, applications and solutions for external customer portals, and enterprise-wide systems and networks.
Designs and oversees the deployment of a cyber-security architecture and solutions.
Develops, tests and operates firewalls, instruction detection systems, enterprise anti-virus systems and software deployment tools.
Assures the safeguarding of the network against unauthorized infiltration, modification, destruction or disclosure.
Researches, evaluates, tests, recommends, communicates and implements new information security software or devices.
Oversees the implementation, enforcement, communication and development of security policies.
Maintains relationships with local, state and federal law enforcement and other related government agencies.
Required Education/Training Education/Experience: Bachelor's degree in Computer Science, Computer Technology, MIS, or comparable technology. Certifications: CISSP or GIAC.
Experience Minimum of five years related experience required with at least two as a team leader. Ten years related experience preferred.
Must have a solid understanding of information technology, information security and a solid understanding of computer operating systems and network architecture.
Familiarity with software engineering and secure coding principles is a plus.
Strong written and verbal communication skills and teamwork.
US Citizen and ability to attain a security clearance.

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.