Chief Information Security Officer jobs in Hawaii

Chief Information Security Officer is responsible for determining enterprise information security policy and strategy. Oversees the development, implementation, and enforcement of information security standards and procedures. Being a Chief Information Security Officer ensures that all information systems are functional correctly regarding secure policy. In charge of IT risk evaluations, audits, and security incident investigation. Additionally, Chief Information Security Officer requires a bachelor's degree. Typically reports to top management. The Chief Information Security Officer manages a departmental function within a broader corporate function. Develops major goals to support broad functional objectives. Approves policies developed within various sub-functions and departments. To be a Chief Information Security Officer typically requires 8+ years of managerial experience. Comprehensive knowledge of the overall departmental function. (Copyright 2024 Salary.com)

A
Information Systems Security Officer
  • Alakaina Family of Companies
  • Maui, HI FULL_TIME
  • The Alaka’ina Foundation Family of Companies (FOCs) is looking for an Information Systems Security Officer to support our government customer out of Maui, Hawai'i.

    DESCRIPTION OF RESPONSIBILITIES:

    • Ensure that personnel accessing information systems have the proper and current Information Assurance (IA) certification to perform administrative functions in accordance with (IAW) DoD Manual 8140.03 Cyberspace Workforce Qualification and Management Program. Current IA Certifications must be obtained within 15 days after contract start.
    • Will act as the Local Registration Authority (LRA).

     Operation of Equipment:

      • Ensure all endpoints & network devices are patched & secured IAW the latest Defense Information Systems Agency (DISA) Security Technical Implementation Guides (STIGs), Information Assurance Vulnerability Alerts (IAVAs), Time Compliance Network Orders (TCNOs), Time Compliance Technical Orders (TCTOs), Approved Products List (APL), and Local Security Guidelines as directed.
      • Perform network scanning to identify vulnerabilities, misconfigurations, and patch/re-configure as required to comply with DISA STIGs, IAVAs, TCNOs, APL, and Local Security Guidelines as directed. AQL: 100% compliant with DISA STIGs, IAVAs, TCNOs, APL, and Local Security Guidelines.
      • Apply patches or configuration updates to servers identified in ACAS scans 100% of the time every month
      • Perform the duties of COMSEC Responsible Officer (CRO) including cryptographic rekeys in support of SIPRNet and JWICS operations.
      • Enter all database and maintenance changes in a log and retain for record.

    Inspection Support:

    Support all inspections of the Contractor’s area of responsibility (i.e., Command Cyber Readiness Inspections (CCRIs), Inspector General (IG) visits and actively support Unit Self-Assessments Program and MICT checklist(s) assignment.)

     Cyber Network Vulnerability Management:

      •  Furnish qualified on-site technicians to provide network vulnerability management, system scanning, network server support, troubleshooting, repair, and Assessment & Authorization (A&A)/Authority to Operate (ATO) documentation for 15 SPSS communications systems encompassing the operational network.
      • Perform all necessary actions to manage, maintain and ensure there is no lapse in the current Core Comm network accreditation via the Risk Management Framework and A&A/ATO package workflow IAW AFI 17-101.
      • The communications systems management AIS include Assured Compliance Assessment Solution (ACAS), AFNetOps Compliance Tracker (ACT), System Center Configuration Manager (SCCM), Remote Desktop, and Remedy Ticketing System.

    Vulnerability Management:

      •  Provide routine scans of security threats and perform corrective action IAW DISA STIGs, TCNOs, and local security guidance.
      • Monitor cyber event tasking in order to detect and mitigate malicious cyber events.
      • Coordinate with CFP for resolution of non-advertised TCNOs.
      • Monitor and maintain SCCM server health. The Contractor shall ensure SCCM is operational and prepared for vulnerability patching.
      • Maintain software exemption lists for automated patching.
      • Utilize approved AIS to monitor, review, and generate applicable TCNO status listing and report to CFP weekly.
      • Complete cyber network vulnerability management scans across the 15 SPSS NIPRNet, SIPRNet, and JWICS encompassing all network device Operating Systems (OS) utilizing approved AIS.
      • Apply patches or configuration updates to servers identified in ACAS scans 100% of the time every month.
      • Identify and implement required software patches to network OS in standard desktop and standard server configurations.
      • Monitor vulnerabilities on NIPRNet, SIPRNet, and JWICS network systems using the scanning methods IAW local operating procedures.

     Communications Security (COMSEC) Administration:

      • Effectively manage 747CS/CA632310 COMSEC sub-account E-46 on behalf of 15SPSS.
      • Provide personnel to support the responsibilities of the COMSEC Responsible Officer (CRO) and Cryptographic Access Program (CAP) administrator.
      • Provide the manpower necessary to maintain the COMSEC sub-account.
      • Complete all necessary COMSEC training and certification requirements as required from the main COMSEC account. Personnel shall support the CRO in training COMSEC users.
      • Document initial and refresher CUI training on the AF Form 4168.
      • Conduct assessments and inventories, document results and maintain EKMS forms on file.
      • Manage, control, protect and safeguard COMSEC facilities, material, equipment and documentation IAW all applicable NSA, AF and 747CS policies, procedures and instructions.
      • Perform COMSEC Responsible Officer (CRO) duties for sub-account E-46 under JBPH-H COMSEC Acct CA632310.
      • Provide crypto keying and cryptographic equipment accountability, as required.
      • Pick up and deliver COMSEC material from the supporting COMSEC account.
      • Keep keying materials secured in approved Government-provided GSA containers.
      • Complete reports involving physical, cryptographic, and personnel COMSEC incidents.
      • Establish, maintain, and dispose of COMSEC documentation.
      • 100% compliant with all applicable NSA, AF and 747CS policies, procedures and instructions.
      • Supporting personnel shall be responsible for requesting, downloading, storing and ensuring keying material is available for all encryption equipment on site.
      • COMSEC users shall be responsible for storing keying material, loading keying material into encryption devices.
      • Troubleshoot secure communications problems and coordinate with the CRO, COMSEC users and 747 COMSEC account to resolve any issues.  
      • Assigned and perform duties of a CRO for network (SIPRNet and JWICS) related COMSEC material IAW DoD 5220.22M Chapter 9 Section 4, AFMAN 17-1302 COMSEC Operations.
      • Receive CRO training from the 747th CS COMSEC office located at JBPHH.
      • Responsible for periodic loading and re-keying of network (SIPRNet)related cryptographic equipment.

    REQUIRED DEGREE/EDUCATION/CERTIFICATION:

    • Bachelors degree or higher from an accredited college or university OR
    • CAP or CASP or Cloud or CYCA or PenTest

    REQUIRED CITIZENSHIP AND CLEARANCE:

    • Must be a U.S. Citizen
    • Must have Top Secret clearance

    The Alaka`ina Foundation Family of Companies (FOCs) is a fast-growing government service provider. Employees enjoy competitive salaries. Eligible employees enjoy a 401K plan with company match; medical, dental, disability, and life insurance coverage; tuition reimbursement; paid time off; and 11 paid holidays.

    We are an Equal Opportunity/Affirmative Action Employer. We are proud to state that we do not discriminate in employment decisions on the basis of race, color, religion, sex, pregnancy, sexual orientation, gender identity, national origin, age, protected veteran status, or disability status. If you are a person with a disability and you need an accommodation during the application process, please click here to request accommodation. We E-Verify all employees.

    The Alaka`ina Foundation Family of Companies (FOCs) is comprised of industry-recognized government service firms designated as Native Hawaiian Organization (NHO)-owned and 8(a) certified businesses. The Family of Companies (FOCs) includes Ke`aki Technologies, Laulima Government Solutions, Kūpono Government Services, and Kāpili Services, Po`okela Solutions, Kīkaha Solutions, LLC, and Pololei Solutions, LLC. Alaka`ina Foundation activities principally benefit the youth of Hawaii through charitable efforts which includes providing innovative educational programs that combine leadership, science & technology, and environmental stewardship.

    For additional information, please visit www.alakainafoundation.com

    #LI-JS1

    #ClearanceJobs

  • 4 Days Ago

4
Sr. Information Security Officer/Engineer
  • 4S2 KBR Wyle Services, LLC
  • Kihei, HI FULL_TIME
  • Title: Sr. Information Security Officer/Engineer KBR is seeking a Sr ISSE/ISSM to join our team in Kihei, HI to provide advice and assistance to the Government regarding secure configuration and opera...
  • 20 Days Ago

W
Information Security Analyst
  • Watershed Security
  • Kauai, HI FULL_TIME
  • COMPANY OVERVIEW Watershed Security is a Veteran Owned Small Business and a leader in providing quality Cyber Security Services to the Federal Government. Watershed is a great place to work, offering ...
  • 15 Days Ago

S
Security Officer
  • Signal Security of Hawaii
  • Island, HI PART_TIME,FULL_TIME
  • **LOCALLY OWNED, WOMAN-OWNED, MINORITY-OWNED** Hawaii's ONLY locally-owned, globally trusted security team! Security with Aloha! Position Status: Full-Time and Part-Time Location: Oahu, Hawaii Pay Rat...
  • 1 Month Ago

S
Security Officer - Guard Card
  • Signal Security
  • Mililani, HI FULL_TIME
  • **LOCALLY OWNED, WOMAN-OWNED, MINORITY-OWNED** Hawaii's ONLY locally-owned, globally trusted security team! Security with Aloha! Position Status: Full-Time and Part-Time Location: Oahu, Hawaii Pay Rat...
  • 27 Days Ago

V
Security Officer
  • V.I.P. Security Services Hawaii, LLC
  • Honolulu, HI FULL_TIME
  • Security Officer Job DescriptionWe are looking for a competent Security Officer to undertake the surveillance of our premises and protection of our staff and visitors. You will be responsible for dete...
  • 1 Month Ago

Hawaii (/həˈwaɪi/ (listen) hə-WY-ee; Hawaiian: Hawaiʻi [həˈvɐjʔi]) is the 50th and most recent state to have joined the United States, having received statehood on August 21, 1959. Hawaii is the only U.S. state located in Oceania, the only U.S. state located outside North America, and the only one composed entirely of islands. It is the northernmost island group in Polynesia, occupying most of an archipelago in the central Pacific Ocean. The state encompasses nearly the entire volcanic Hawaiian archipelago, which comprises hundreds of islands spread over 1,500 miles (2,400 km). At the southea...
Source: Wikipedia (as of 04/11/2019). Read more from Wikipedia
Income Estimation for Chief Information Security Officer jobs
$264,168 to $365,194

Chief Information Security Officer in Grand Forks, ND
Instead of waiting for a data breach or security incident, the CISO is tasked with anticipating new threats and actively working to prevent them from occurring.
January 12, 2020
The CISO directs staff in identifying, developing, implementing, and maintaining processes across the enterprise to reduce information and information technology (IT) risks.
February 18, 2020
Chief Information Security Officer in Mobile, AL
Isn't the UK government long overdue a CISO itself? That's the question we have been asking the IT security industry, and the myriad responses have resoundingly agreed that the answer is yes.
January 24, 2020
Chief Information Security Officer in Rockford, IL
The chief information security officer (CISO) is responsible for the management of the entire information security department of an organisation.
December 05, 2019