THE OPPORTUNITY
This position requires, at minimum, a current and active TS/SCI security clearance. Military veterans highly encouraged to apply.
Everyone knows security needs to be baked in to a system architecture, but you actually know how to bake it in. You can identify and implement ways to harden systems and reduce their attack surface. What if you could use your cyber engineering skills to lead the design and building of secure systems for the Department of Defense? We re looking for an engineer who can create solutions that will stand up to even the most advanced cyber threats.
As a lead security engineer on our project, you ll design and support the implementation of new security tools and technologies. You ll coordinate work with the client to identify the right mix of tools and techniques to translate your customer s IT needs and future goals into a plan that will enable secure and effective solutions. Youll document all configuration changes as well as software and hardware versions using the appropriate office documentation processes. We need to come up with the best solution, so you ll advise on new techniques, break free from the legacy model, and go where the industry is going. You ll lead the team through a critical approach to network design, providing alternatives and customizing solutions to maintain a balance of security and mission needs.
Empower change with us.
Requirements
BASIC REQUIREMENTS
- Applicants selected will be subject to a security investigation and may need to meet eligibility requirements for access to classified information; TS/SCI clearance is required.
- 12+ years of experience with cybersecurity
- Experience in information or cybersecurity solution engineering with security tools and devices, including network firewalls, web proxy, intrusion prevention system, vulnerability scanner, penetration testing tools, and log review and analysis
- Experience with implementing enterprise endpoint detection and response security, including McAfee ePolicy Orchestrator, McAfee Endpoint Security (ENS), DoD Host Based Security System (HBSS), or DoD Endpoint Security Solutions (ESS)
- Experience with Nessus Vulnerability Scanner implementation, Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS), and Firewalls, including Palo Alto NGFW
- Experience with SIEM technologies, including SolarWinds and Splunk, and SOAR and User Activity Management architecture
- Experience engineering and deploying cybersecurity tools in cloud environments
- Knowledge of Federal compliance standards, including NIST 800-53, FIPS, FedRAMP, Security Technical Implementation Guides and the latest information assurance vulnerability alerts (IAVAs), Common Vulnerabilities and Exposures (CVE), and implementing appropriate mitigations
- HS diploma or GED
- 8140/8570 IAT or IAM Level III certification
PREFERRED REQUIREMENTS
- Experience with building and administering Windows Server and Active Directory along with managing security operations, including identity and access control, secure configuration management, network security, enforcement policy scripting, workload security, data security, and logging
- Experience with network ports and protocols management
- Knowledge of web service technologies, application of encryption, and common authentication protocols
- Ability to perform as the primary liaison between the system security engineers and coordinate with the information system security manager and system owner
Benefits
BUILD YOUR CAREER
You ll have the opportunity to connect with other professionals doing similar work across multiple markets. You ll share best practices and work through challenges as you gain experience and mentoring to develop your career.
In addition, you will have access to a wealth of training resources through our Engineering & Science University, an online learning portal where you can access more than 5000 tech courses, certifications and books. Build your technical skills through hands-on training on the latest tools and tech from our in-house experts.
Pursuing certifications that directly impact your role? You may be able to take advantage of our tuition assistance, on-site courses, vendor relationships, and a network of experts who can give you helpful tips.
We ll help you develop the career you want as you chart your own course for success.
BASIC REQUIREMENTS Applicants selected will be subject to a security investigation and may need to meet eligibility requirements for access to classified information; TS/SCI clearance is required. 12+ years of experience with cybersecurity Experience in information or cybersecurity solution engineering with security tools and devices, including network firewalls, web proxy, intrusion prevention system, vulnerability scanner, penetration testing tools, and log review and analysis Experience with implementing enterprise endpoint detection and response security, including McAfee ePolicy Orchestrator, McAfee Endpoint Security (ENS), DoD Host Based Security System (HBSS), or DoD Endpoint Security Solutions (ESS) Experience with Nessus Vulnerability Scanner implementation, Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS), and Firewalls, including Palo Alto NGFW Experience with SIEM technologies, including SolarWinds and Splunk, and SOAR and User Activity Management architecture Experience engineering and deploying cybersecurity tools in cloud environments Knowledge of Federal compliance standards, including NIST 800-53, FIPS, FedRAMP, Security Technical Implementation Guides and the latest information assurance vulnerability alerts (IAVAs), Common Vulnerabilities and Exposures (CVE), and implementing appropriate mitigations HS diploma or GED 8140/8570 IAT or IAM Level III certification PREFERRED REQUIREMENTS Experience with building and administering Windows Server and Active Directory along with managing security operations, including identity and access control, secure configuration management, network security, enforcement policy scripting, workload security, data security, and logging Experience with network ports and protocols management Knowledge of web service technologies, application of encryption, and common authentication protocols Ability to perform as the primary liaison between the system security engineers and coordinate with the information system security manager and system owner