Computing Security & Information Protection Specialist 2/3
Boeing - Chantilly, VA

This job posting is no longer available on Boeing. Find similar jobs:Boeing jobs

Develops, deploys and maintains enterprise-wide computing and information security requirements, policies, standards, guidelines and procedures for stakeholder organizations or programs/sub programs. Develops and/or advises on a broad range of compliant information security and data protection requirements. Determines acceptability of unique configurations and verifies security parameter placement. Investigates and resolves security questions and incidents. Performs security compliance monitoring. Participates in security policy assessments and audits.

Candidate will be required to commute between Chantilly, Virginia and Herndon, Virginia to support programs at both locations.

Competencies

General
[ + ] Collaboration
Generally works effectively and cooperatively with work group members, direct supervisor, and occasionally members of others work groups; establishes and maintains good working relationships by helping people feel valued, appreciated, and included in discussions. Places higher priority on team and/or organization goals than on own goals. Normally offers to help work group members, direct supervisor, and occasionally members of others work groups when they need assistance.
[ + ] Follow-Up
Generally builds due dates into assignments and task delegations; communicates milestones and expected results. Asks questions of fellow work group members and occasionally of other interorganizational employees to obtain relevant information; schedules meetings to review progress and share information; gets feedback on results from those directly involved. Meets formally with fellow work group members and occasionally other interorganizational employees to review the results of an assignment, project, or delegated task.
[ + ] Initiating Action
Generally takes independent action when confronted with routine problems or situations. Implements new ideas or potential solutions without prompting; does not wait for others to take action or to request action. Occasionally takes action that goes beyond job requirements in order to achieve objectives.
[ + ] Planning And Organizing
Identifies more critical and less critical activities and assignments; adjusts priorities when appropriate. Determines project or assignment requirements by breaking them down into tasks and identifying types of equipment, materials, and people needed. Allocates appropriate amounts of time for completing own work; avoids scheduling conflicts. Takes advantage of available resources (individuals, processes, departments, and tools) to complete work efficiently; coordinates with internal and external partners. Uses time effectively and prevents irrelevant issues or distractions from interfering with work completion.
Technical
[ + ] Certification & Qualification
Basic - General knowledge of verification, validation, certification and qualification processes and procedures, including knowledge of governing regulations and compliance requirements. General ability to assess and document test or analysis data to show compliance.
Preferred - Complete knowledge of verification, validation, certification and qualification processes and procedures, including knowledge of governing regulations and compliance requirements. Ability to assess and document test or analysis data to show compliance.
[ + ] Government Security Reg
Basic - General knowledge of government security regulations (e.g., National Industrial Security Program Operating Manual [NISPOM], International Traffic in Arms Regulations [ITAR], Export Administration Regulations [EAR]) as appropriate to the assignment.
Preferred - Complete knowledge of government security regulations (e.g., National Industrial Security Program Operating Manual [NISPOM], International Traffic in Arms Regulations [ITAR], Export Administration Regulations [EAR]).
[ + ] Information Assurance
Basic - General knowledge of principles, concepts, practices, processes, tools and methodologies to assure confidentiality, integrity and availability of information and information systems. Understands current industry standard common body of knowledge (CBK) and common criteria methodology (CCM).
Preferred - Complete knowledge of principles, concepts, practices, processes, tools and methodologies to assure confidentiality, integrity and availability of information and information systems. Understands current industry standard common body of knowledge (CBK) and common criteria methodology (CCM).

Basic Qualifications For Consideration

Do you have BOTH: a) a current Single-Scope Background Investigation (SSBI); AND b) a current Counter-Intelligence (CI) Polygraph?

Typical Education/Experience

Level 2 - Technical bachelor's degree and typically 2 or more years' related work experience or a Master's degree or an equivalent combination of education and experience. A technical degree is defined as any four year degree, or greater, in a mathematic, scientific or information technology field of study.

Level 3 - Technical bachelor's degree and typically 5 or more years' related work experience or a Master's degree with typically 3 or more years' or a PhD degree or an equivalent combination of education and experience. A technical degree is defined as any four year degree, or greater, in a mathematic, scientific or information technology field of study.

About this company
1,606 reviews
Boeing is the world's largest aerospace company and leading manufacturer of commercial airplanes and defense, space and security systems. We...