Sorry, this listing is no longer accepting applications. Don’t worry, we have more awesome opportunities and internships for you.

Cybersecurity Engineer IV

Input Technology Solutions

Cybersecurity Engineer IV

Washington, DC
Full Time
Paid
  • Responsibilities

    Basic Qualifications:

    An individual must meet the following criteria to be considered:

     · U.S. Citizen

     · Pass a background investigation.

     · Possess an active TS/SCI security clearance.

     · Education: Bachelor’s degree in computer science or related discipline.

     · Six or more years of experience in network, host, data, and/or application security in multiple operating system environments.

     · Possess DoD 8570-compliant security certifications to meet IAT/IAM III requirements (CASP+ CE, CISSP, CISM, etc.)

    Job Highlights:

    Join the Cybersecurity Engineering team to help architect and engineer systems that utilize existing and emerging technologies. In this role, you will have the opportunity to perform cybersecurity engineering for single-node, enterprise-level, and cloud-computing information systems. You will support the development of system designs that meet functional, security policy, and assurance requirements.

    Required Skills:

     · Thorough implementation experience of the DoD Risk Management Framework (RMF) lifecycle (Step 1 – Step 6) for various information systems (single node to large (100+ node) heterogeneous architectures).

     · Thorough implementation experience in selecting and engineering security controls via NIST SP 800-53.

     · Thorough implementation experience in selecting and engineering National Security System security controls via CNSSI 1253.

     · Thorough experience in assessing the technical and administrative implementation of security controls in accordance with NIST SP 800-53A.

     · Thorough implementation experience with the Enterprise Mission Assurance Support Service (eMASS).

     · Demonstrated knowledge of applying security controls to Unix variants (i.e., Linux, Debian, etc.) and Microsoft operating systems.

     · Demonstrated knowledge of applying security controls to network devices (i.e., routers,

     · switches, etc).

     · Demonstrated knowledge of Information Assurance (IA) solutions

     · Ability to apply security principles and mechanisms to single node/application systems and enterprise systems designs.

     · Knowledge of networking, software development, scripting languages, software integration or related skills.

     · Experience with networking protocols and understanding of security-related technologies, including encryption, IPsec, PKI, VPNs, firewalls, proxy services, DNS, and access lists.

     · Experience with the DoD Security Technical Implementation Guides (STIGS), Security Requirements Guides (SRG), and industry best practices for various applications.

     · Experience with DoD Assured Compliance Assessment Solution (ACAS) and Host-Based Security Suite (HBSS) applications.

    Key Job Functions:

     · Provide engineering analysis, design recommendations, and support.

     · Support the operational requirements to discern technical and administrative cybersecurity requirements and implement those requirements to meet DoD and Federal laws and directives.

     · Assess operational requirements to discern technical and administrative A&A requirements and develop project plans/schedules.

     · Perform computer and/or network security vulnerability assessments to identify, evaluate, and mitigate security risks, threats, and vulnerabilities.

     · Assess the operational requirements to discern technical and administrative project

    management requirements.

     · Define, develop, and deliver the Information Assurance Vulnerability Management (IAVM) requirements to mitigate security risks.

     · Develop the Authorization & Assessment (A&A) BoE to meet DoD and Federal directives.

     · Produce Plan of Action and Milestone (POA&M) records to support applicable IAVMs.

     · Monitor security audit and intrusion detection system logs for system and network anomalies.

     · Develop, implement, and monitor technical access control methods to ensure the operational integrity of the system and data.

     · Develop detailed computer-generated engineering specifications, diagrams, and

     · documentation.

     · Review and recommend the installation, modification, or replacement of hardware or

    software components and any configuration change(s) that impact the security posture.

     · Provide enforcement of security directives, orders, standards, plans, and procedures.