Cybersecurity Engineer
Job Description:
JD::JOB TITLE: Cybersecurity Engineer JOB LOCATION: CO Springs, CO WAGE
Description/Comment:Off-Site Means they will be working
at the Contractor's Facility.Duration:0-12 month(s)Contractor or Contract to
Hire. looking for a Principle Cyber/Information Assurance leader to join the Cyber
team as the lead Information Systems Security Officer (ISSO) supporting the
development, operations and maintenance of custom cyber solutions supporting
the Global Positioning System Next Generation Ground Control System (GPS
OCX) located at Schriever Space Force Base (SSFB).
The Cyber Engineer will collaborate with program managers and team members in
Aurora, CO and on-site at SSFB to implement approaches to fully integrate,
operate, and maintain cyber operations in support of our customers' missions
located in the Colorado Springs Colorado area.The ideal candidate will have a
strong cyber experience across the full spectrum of cyber operations from a
mission execution perspective; should be knowledgeable about cyber-attack
strategies and defensive counter operations; be able to make and defend
risk-based decisions and is innovative problem solver. Candidate should have
experience with varying network and computer platforms, preferably with
background in cyber operations on both embedded and cloud platforms.Specialized
Skills required for this position:DoD 8570.01/8140 IAT III certification (CISSP
or similar IAT III certification) is mandatory.Experience with national
security information system related security requirements (e.g. ICD 503, RMF,
DIACAP) to include technical computer/network
system auditing.Windows Operating System, Linux, or TCP/IP network
troubleshooting abilitiesKnowledge and ability to perform Media Custodian
and/or Data Transfer Agent functionsExperience analyzing audit log data and determine
compliance with published standardsClearance Requirement: DOD
- Secret is required, (TS/SCI is strongly
desired)Required Skills:Demonstrated ability to monitor and manage
cybersecurity workforce improvement (e.g. training, certifications, performance
management, etc.).Experience in the oversight and execution of a continuous
monitoring/improvement program (to include but not limited to supporting
security control assessments, ensure user's training is up to date, log
management systems, automated inventory utilities, etc.).Experience
successfully interfacing with internal and external customers (i.e. SCAs,
Program Managers, etc.).Experience in the execution and management of IS
incident response and administrative inquiries/investigations in collaboration
with the external support agencies/departments.Experience with the
identification, development and oversight of appropriate Cybersecurity policy,
processes and procedures.Ability to deliver program IA Accreditations and
coordinate with External Stakeholders (Security Control Assessor /
Accreditation Authority)Strong understanding of security design and
architecture with ability to identify solutions to complex IS compliance and
security problemsDemonstrated vulnerability assessment/remediation experience
including the coordination or performance of patch/configuration deployments
across multiple platformsDemonstrated leadership experience with excellent
interpersonal skillsExcellent written & oral communication skills,
including presentation skillsExperience Mentoring more junior
engineersAdditional Job Details: Desired Skills: Experience with DISA STIGs
(Operating Systems, Applications, and Network) Experience securing Network
Architectures Experience onboarding, tuning and implementing enterprise security
solutions including: Tenable/Nessus SecurityCenter, and DoD HBSS
solution/McAfee ePolicy Orchestrator ePO, SecureVue Security Certification in
accordance with DoD 8570.01 IAT-II (e.g., Security+ CE) or higher (CISSP)
Experience with Agile, Scrum, HW and SW life-cycle management, &
engineering change proposal processes Project skills including cost, schedule,
supplier management, risk, and opportunity assessment Ability to provide
Technical Review of New Pursuits & Proposals Experience with two-factor authentication,
network surveillance technology, intrusion detection, endpoint protection, data
leakage protection, and encryption solutions and systems Analysis of IT systems
to identify, assess, and design security features Knowledge of all aspects of the
cyber exploitation and attack process, to include aspects of vulnerability
research techniques and operationalizationPreferred Required Education:
Typically requires a degree in Science, Technology, Engineering or Mathematics
(STEM) and a minimum of 8 years of prior relevant experience unless prohibited
by local laws/regulations