Security Clearance Requirement: TS/SCI with FSP
Immediate Need to Fill
Company Culture: Our client provides a culture that facilitates employee development and provides a challenging and professional work atmosphere. Prospective employees will find that they offer competitive salaries, generous benefits, and career advancement opportunities. Our client is in search of professionals with experience working in a virtualized, automated “on-demand’ utility computing environment.
- Medical, Dental and Vision
- Life insurance
- PTO – 4 weeks
- Education and training – IT Certification reimbursement
- 401k Match
- Twenty (20) years of experience as an Information Systems Security Engineer on programs and contracts of similar scope, type, and complexity is required.
- Bachelor’s degree in Computer Science, Information Assurance, Information Security System Engineering, or related discipline from an accredited college or university is required.
- DoD 8570 compliance with IASAE Level 3 is required.
- Both Information Systems Security Engineering Professional (ISSEP) and. CISSP Certifications are required.
- A Master’s degree in Computer Science, Information Assurance, Information Security System Engineering, or related discipline may be substituted for two (2) years of experience, reducing the requirements to eighteen (18) years of experience.
- Four (4) years of additional Information Security System Engineering experience may be substituted for a bachelor’s degree.
- Advocate and recommend system-level solutions to resolve security requirements. Monitors and suggests improvement to IA policy.
- Interact with customers, IT staff, and high-level corporate officers to define and achieve required IA objectives.
- Provide the Government assistance to ensure that the architecture and design of information systems are functional and secure, including program of record systems and special purpose environments with platform IT interconnectivity.
- Provide expert guidance and work product evaluation to one or more security engineers that support Engineering teams for the design, development, implementation, evaluation, and/or integration of secure networking, computing, and enclave environments.
- Perform or review technical security assessments of computing environments to identify points of vulnerability, noncompliance with established Information Assurance IA standards and regulation, and recommend mitigation strategies. Validates and verifies system security requirements definition and analysis and establishes system security designs.
- Designs, develops, implements and/or integrates IA and security systems and system components including those for networking, computing, and enclave environments to include those with multiple enclaves and with differing data protection/classification requirements. Builds IA into systems deployed to operational environments.
- Supports the building of security architectures.
- Enforce the design and implementation of trusted relations among external systems and architectures.
- Assesses and mitigates system security threats/risks throughout the program life cycle.
- Contributes to the security planning, assessment, risk analysis, risk management, certification and awareness activities for system and networking operations.
- Reviews certification and accreditation (C&A) documentation, providing feedback on completeness and compliance of its content.
- Support security authorization activities in compliance with NSA/CSS Information System Certification and Accreditation Process (NISCAP) and DoD Risk Management Framework (RMF), the NIST Risk Management Framework (RMK) process, and prescribed NSA/CSS business processes for security engineering
- Applies system security engineering expertise in one or more of the following to:
- system security design process; engineering life cycle; information domain; cross domain solutions; commercial off-the-shelf and government off-the-shelf cryptology; identification; authentication; and authorization; system integration; risk management; intrusion detection; contingency planning; incident handling; configuration control; change management; auditing; certification and accreditation process; principles of IA (confidentiality, integrity, nonrepudiation, availability, and access control); and security testing.
Please email firstname.lastname@example.org for more information.