Expert Cyber Security Engineer

All times are in Eastern Daylight Time.
Requisition ID
2016-9898
Job Locations
USVAChantilly
Posted Date
9/13/2016
Category
Cyber Security
Clearance Level Must Currently Possess
No Clearance Required
Telecommuting Options
Telecommuting 100%
Clearance Level Must Be Able to Obtain
No Clearance Required

Opportunity Details:

Overview:

Overview

Designs, develops, or recommends integrated security system solutions that will ensure proprietary/confidential data and systems are protected. Conducts and reviews incident/event investigation and analysis. Assesses network vulnerabilities. Provides technical engineering services for the support of integrated security systems and solutions. Participates with the client in the strategic design process to translate security and business requirements into technical designs.  Supports security posture assessments. Maintains awareness of cyber trends, threats, and vulnerabilities. Develops, integrates and maintains security toolsets.  Exercises and mentors with a deep understanding of current computer technologies and technical security requirements as applied to the design, development, evaluation, and integration of computer systems and networks to sustain compliance with national policy as well as best practices. Conducts analysis and technical evaluations for vulnerabilities; develops and recommends security countermeasures to mitigate identified risks. Mentors project/account personnel.

Responsibilities:

Responsibilities

  • Designs, develops, or recommends integrated security system solutions that will ensure proprietary/confidential data and systems are protected. 
  • Conducts and reviews incident/event investigation and analysis. 
  • Assesses network vulnerabilities. 
  • Maintains security system infrastructure. 
  • Provides technical engineering services for the support of integrated security systems and solutions. 
  • Participates with the client in the strategic design process to translate security and business requirements into technical designs. 
  • Supports security posture assessments.
  • Maintains awareness of cyber trends, threats, and vulnerabilities.
  • Develops, integrates and maintains security toolsets.
  • Leads security engineering and validation testing of system configuration/hardening. 
  • Exercises and mentors with a deep understanding of current computer technologies and technical security requirements as applied to the design, development, evaluation, and integration of computer systems and networks to sustain compliance with national and corporate policy as well as best practices. 
  • Reviews certification test analysis and technical evaluations for vulnerabilities; develops and recommends security countermeasures to mitigate identified risks. Mentors project/account personnel.
  • Solid understanding of Cyber Security terminology, concepts and technology.
  • Network and host monitoring
  • Incident response
  • Develops and monitors system level risk (POA&Ms)  
  • Job Responsibilities:
  • Provide leadership in technical problem management and the resolution of security issues, working closely with team members, customers, vendors and other stakeholders.
  • Conduct information system security engineering analysis on a variety of information processing systems at various security levels, developing action plans to investigate and resolve complex issues/problems and clearly communicate these to team members, customers and/or relevant managers.
  • Conceptualize/design and implement security systems as well as review/recommend secure network, operating system, and application architectures.        
  • Provides advice and guidance on the implementation of network/system security in accordance with mandates through the application of information assurance vulnerability alerts, Security Technical Implementation Guides, and other directives. – Analyze and test software applications and enterprise-level security solutions; Support Continuous Diagnostic and Monitoring (CDM) activities and work closely with client
  • Collaborate with the Security Team and other groups to resolve vulnerabilities; Advocate security awareness and teach secure behavior and methods – Support technical security incident response activities and forensic investigations.
  • Implement best-practice security procedures, standards, and guidelines; Support the security review of IT systems and architecture as well as security policy development on IT service use, access, refresh, and configuration control, etc.
  •  Promotes awareness of security issues among management and ensures sound security principles are followed.

Qualifications:

Qualifications

Years Of Experience:10+ Years; Required Education:Bachelors; Desired Education:Masters Required Skill: – CISSP or CISM certification – Broad technical knowledge of networks, servers, work stations, operating systems, and applications as well as IT security with demonstrated hands-on experience in architecture design, development, engineering and troubleshooting – Analytical capability to identify and articulate weakness of a network and application design, especially from security perspective, given particular constrains and requirements – Good written and oral communication and inter-personal skills to work with other technical and management staff and make sound recommendations                                                  Preferred Skills: – Master of Science in Computer Science, Engineering/Information Security – Deep technical understanding of designing, installing, configuring, of network, security, wireless products, Windows and other operating systems, as well as storage and industry standard servers – Versatility, flexibility, and willingness to work with enthusiasm in an environment with constantly changing priorities – Exposure to the following IT Security products: – Tenable Security Center/Nessus Scanner, PVS – McAfee ePolicy Orchestrator, Host Intrusion Prevention (HIPS), VirusScan (VSE), Data Loss Prevention (DLP), or Application Control, Policy Auditor – Splunk and Splunk Enterprise Security – Phishing campaigns – PMP

Source:https://jobs.csra.com/job/-/-/3459/3016302

. . . . . . . .

Leave a Reply