×
Register Here to Apply for Jobs or Post Jobs. X

Manager, Cyber Intelligence

Job in Greenville, Hunt County, Texas, 75402, USA
Listing for: L3Harris Technologies
Full Time position
Listed on 2026-02-16
Job specializations:
  • IT/Tech
    Cybersecurity, Systems Engineer
Salary/Wage Range or Industry Benchmark: 60000 - 80000 USD Yearly USD 60000.00 80000.00 YEAR
Job Description & How to Apply Below

Overview

L3

Harris is dedicated to recruiting and developing high-performing talent who are passionate about what they do. Our employees are unified in a shared dedication to our customers’ mission and quest for professional growth. L3

Harris provides an inclusive, engaging environment designed to empower employees and promote work-life success. Fundamental to our culture is an unwavering focus on values, dedication to our communities, and commitment to excellence in everything we do. L3

Harris is the Trusted Disruptor in defense tech. With customers’ mission-critical needs always in mind, our employees deliver end-to-end technology solutions connecting the space, air, land, sea and cyber domains in the interest of national security.

Job Details

Job Title: Manager, Cyber Intelligence-ISSM
Job : 32734
Job Location: Greenville, TX;
On-site
Job Schedule: 9/80, Off every other Friday; 1st shift

Responsibilities
  • Develop and conduct risk assessment procedures for verification of RMF/Assessment and Authorization (A&A) safeguards to meet various regulatory requirements based upon government regulations and NIST 800 series (800-53, etc.) guidelines.
  • Author and provide oversight of various artifacts supporting RMF package artifacts to include the System Security Plan (SSP), Security Control Traceability Matrix (SCTM), Plan of Actions & Milestones (POA&M), Continuous Monitoring (Con Mon) Plan, CONOPS, and other RMF BoE artifacts.
  • Coordinate with internal/external partners to establish system security designs and validate compliance requirements.
  • Responsible for analyzing and/or administering security controls for information systems.
  • The selected candidate will act as a member of a diverse security team and participate in Engineering and Configuration Review Boards and Working Groups to develop secure system solutions.
  • Monitor IA Program compliance by performing periodic self-inspections, tests and reviews of the IS to ensure that systems are operating as authorized/accredited and that conditions have not changed.
  • Configuration of change management processes (hardware/software, account Management, Disposition, Assured File Transfers (AFT) and related documentation in accordance to policies and procedures.
  • Review audit data of the IS and IS components (technical & physical) for anomalous or unauthorized activities.
  • Participate in documenting and publishing security related workflows and procedures to mitigate vulnerabilities and recommend changes to system or system components.
  • Conduct Cybersecurity training, briefings, and presentations for multiple levels of business.
  • Provide leadership and oversight to ISSOs.
  • Participate in interdepartmental projects and provides council on Cybersecurity policies and procedures.
Essential Functions
  • Develop and conduct risk assessment procedures for verification of RMF/Assessment and Authorization (A&A) safeguards to meet various regulatory requirements based upon government regulations and NIST 800 series (800-53, etc.) guidelines.
  • Author and provide oversight of various artifacts supporting RMF package artifacts to include the System Security Plan (SSP), Security Control Traceability Matrix (SCTM), Plan of Actions & Milestones (POA&M), Continuous Monitoring (Con Mon) Plan, CONOPS, and other RMF BoE artifacts.
  • Coordinate with internal/external partners to establish system security designs and validate compliance requirements.
  • Responsible for analyzing and/or administering security controls for information systems.
  • The selected candidate will act as a member of a diverse security team and participate in Engineering and Configuration Review Boards and Working Groups to develop secure system solutions.
  • Monitor IA Program compliance by performing periodic self-inspections, tests and reviews of the IS to ensure that systems are operating as authorized/accredited and that conditions have not changed.
  • Configuration of change management processes (hardware/software, account Management, Disposition, Assured File Transfers (AFT) and related documentation in accordance to policies and procedures.
  • Review audit data of the IS and IS components (technical & physical) for anomalous or unauthorized activities.
  • P…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary