XX
Cyber Security Engineer - Information Systems Security EngineerClearanceJobsUnited States
XX

Cyber Security Engineer - Information Systems Security Engineer

ClearanceJobs
  • US
    United States
  • US
    United States

Über

divh2Cyber Security - Information Systems Security Engineer (ISSE)/h2pModern Technology Solutions, Inc. (MTSI) is seeking a Cyber Security - Information Systems Security Engineer (ISSE) in Dayton, OH or Hanscom Air Force Base, MA. As a Cybersecurity Engineer / Information Systems Security Engineer (ISSE) with MTSI you will support a customer operating out of Wright Patterson AFB in Dayton, OH or Hanscom AFB, MA. Position requires travel up to 20%, as required by the Government. The ISSE serves as the Program Offices information security professional responsible for conducting information system security engineering activities that capture and refine their requirements and ensure security is integrated into system and security architecture designs. The ISSE works with the Systems Engineering teams to incorporate cyber resiliency objectives, techniques, and design principles into all engineering and development efforts throughout the systems development life cycle (SDLC)./ppResponsibilities:/pulliServe as the Information Systems Security Officer (ISSE) providing technical input, recommendations, and assistance with the implementation of both higher and granular-level cyber security approaches, methods and solutions that incorporate and maintain compliance to requirements resulting from laws, regulations, and other pertinent guidance./liliParticipate in acquisition meetings (PMR, PDR, CDR, etc.), concept of operation (CONOP) working groups, change boards, technical exchange meetings and other similar activities./liliDesign and develop security requirements that drive down risk while maintaining operational capability./liliWork between architecture-level and implementation-level engineering meetings to maintain a system-wide view of security functions and apply risk mitigation strategies at the appropriate level./liliGuide and verify defense contractors work against program requirements and goals. This includes participating in technical discussions, trade studies and working groups, and conducting research on industry best practices for potential implementation./liliInterface with program managers to explain security requirements, risks and mitigations relative to their priorities of cost and schedule to ensure an acceptable risk tolerance./liliEvaluate newly identified threats and vulnerabilities to customer information systems to ascertain the need for additional safeguards and develop timely implementation strategies to reduce risk./liliEnforce the design and implementation of trusted relationships among external systems and architectures./liliAssess proposed changes to customer information systems, their operation environment, and mission needs for impacts to cybersecurity architectures and continued compliance with cybersecurity requirements./liliProvide inputs to development teams responsible for designing and developing organizational information systems and upgrading legacy systems./liliEmploy best practices when implementing security requirements for information systems including software engineering methodologies, system/security engineering principles, secure design, secure architecture, and secure coding techniques./liliKeep abreast of current and new security technologies and threats to better support the customer in maintaining cybersecurity resilience./liliIdentify integration issues related to the implementation of new systems within the existing infrastructure; recommend mitigation and/or resolution options as appropriate./liliAssist in the design of systems and networks that encompass multiple enclaves to include those with differing data protection/classification requirements./li/ulpQualifications:/ppRequired Qualifications:/pulli18+ years technical experience in cybersecurity, information technology with focus on cybersecurity implementations./liliDemonstrated ability to understand cybersecurity needs of systems at varied stages of the SDLC./liliFirm understanding of the DoD 8500.1-M, DoDM 5205.07, Volume 1, Joint SAP Implementation Guide (JSIG), National Institute of Standards and Technology (NIST) Special Publication 800-53, Intelligence Community Directive (ICD) Number 503./liliExcellent oral and written communication skills and ability to clearly translate client technical needs into technical specifications./liliDemonstrated ability to complete tasks, drive projects to closure, assimilate and correlate project information in a fast-paced environment./liliDemonstrated ability to assess and articulate risk, including to non-technical audiences./li/ulpDesired Qualifications:/pulliExperience working on DISA Security Technical Implementation Guide (STIG) implementation./liliExperience working on-site in a government client environment./liliFamiliarity with security procedures while working in a SCIF/SAPF environment./liliCloud Security Implementation experience./liliFamiliarity and experience with NSA requirements for COMSEC./liliExperience with DoD Acquisition Lifecycle experience and/or Rapid Acquisition / Rapid Delivery experience/liliCapable of applying system security engineering expertise to various client programs/processes (e.g., system security design process, engineering life cycle, information domain and cross domain solutions, identification/authentication/authorization of commercial off-the-shelf and government off-the-shelf software employment, system integration, risk management, intrusion detection, contingency planning, incident handling, configuration control, change management, continuous monitoring, auditing, assessment and authorization, confidentiality, integrity, and availability./li/ulpEducation Requirements:/pulliBachelors degree in engineering, computer science, cybersecurity, networking, or programming./liliMasters degree in engineering, computer science, cybersecurity, networking, or programming, (Highly Desired)./li/ulpCertification Requirements in one or more of the following:/pulliCertified Information Systems Security Professional (CISSP or (CISSP-ISSEP/CISSP-ISSAP)/liliCertified Cloud Security Professional (CCSP)./liliAWS Architect or other similar cloud technology security certification/lipClearance Requirements:/pulliSecurity Clearance Level Required: Must possess an active Top Secret security clearance, current within five (5) years, based upon a T5 or T5R investigation (formerly known as Single Scope Background Investigation (SSBI) or SSBI Periodic Review (SBPR)./liliPlease Note: U.S. Citizenship is required./li/ul/ul/div
  • United States

Sprachkenntnisse

  • English
Hinweis für Nutzer

Dieses Stellenangebot stammt von einer Partnerplattform von TieTalent. Klicken Sie auf „Jetzt Bewerben“, um Ihre Bewerbung direkt auf deren Website einzureichen.