Cybersecurity Engineer

Job Description:

JD::JOB TITLE: Cybersecurity Engineer JOB LOCATION: CO Springs, CO WAGE
 Description/Comment:Off-Site Means they will be working at the Contractor's Facility.Duration:0-12 month(s)Contractor or Contract to Hire. looking for a Principle Cyber/Information Assurance leader to join the Cyber team as the lead Information Systems Security Officer (ISSO) supporting the development, operations and maintenance of custom cyber solutions supporting the Global Positioning System Next Generation Ground Control System (GPS
OCX) located at Schriever Space Force Base (SSFB). The Cyber Engineer will collaborate with program managers and team members in Aurora, CO and on-site at SSFB to implement approaches to fully integrate, operate, and maintain cyber operations in support of our customers' missions located in the Colorado Springs Colorado area.The ideal candidate will have a strong cyber experience across the full spectrum of cyber operations from a mission execution perspective; should be knowledgeable about cyber-attack strategies and defensive counter operations; be able to make and defend risk-based decisions and is innovative problem solver. Candidate should have experience with varying network and computer platforms, preferably with background in cyber operations on both embedded and cloud platforms.Specialized Skills required for this position:DoD 8570.01/8140 IAT III certification (CISSP or similar IAT III certification) is mandatory.Experience with national security information system related security requirements (e.g. ICD 503, RMF,
DIACAP) to include technical computer/network system auditing.Windows Operating System, Linux, or TCP/IP network troubleshooting abilitiesKnowledge and ability to perform Media Custodian and/or Data Transfer Agent functionsExperience analyzing audit log data and determine compliance with published standardsClearance Requirement: DOD
- Secret is required, (TS/SCI is strongly desired)Required Skills:Demonstrated ability to monitor and manage cybersecurity workforce improvement (e.g. training, certifications, performance management, etc.).Experience in the oversight and execution of a continuous monitoring/improvement program (to include but not limited to supporting security control assessments, ensure user's training is up to date, log management systems, automated inventory utilities, etc.).Experience successfully interfacing with internal and external customers (i.e. SCAs, Program Managers, etc.).Experience in the execution and management of IS incident response and administrative inquiries/investigations in collaboration with the external support agencies/departments.Experience with the identification, development and oversight of appropriate Cybersecurity policy, processes and procedures.Ability to deliver program IA Accreditations and coordinate with External Stakeholders (Security Control Assessor / Accreditation Authority)Strong understanding of security design and architecture with ability to identify solutions to complex IS compliance and security problemsDemonstrated vulnerability assessment/remediation experience including the coordination or performance of patch/configuration deployments across multiple platformsDemonstrated leadership experience with excellent interpersonal skillsExcellent written & oral communication skills, including presentation skillsExperience Mentoring more junior engineersAdditional Job Details: Desired Skills: Experience with DISA STIGs (Operating Systems, Applications, and Network) Experience securing Network Architectures Experience onboarding, tuning and implementing enterprise security solutions including: Tenable/Nessus SecurityCenter, and DoD HBSS solution/McAfee ePolicy Orchestrator ePO, SecureVue Security Certification in accordance with DoD 8570.01 IAT-II (e.g., Security+ CE) or higher (CISSP) Experience with Agile, Scrum, HW and SW life-cycle management, & engineering change proposal processes Project skills including cost, schedule, supplier management, risk, and opportunity assessment Ability to provide Technical Review of New Pursuits & Proposals Experience with two-factor authentication, network surveillance technology, intrusion detection, endpoint protection, data leakage protection, and encryption solutions and systems Analysis of IT systems to identify, assess, and design security features Knowledge of all aspects of the cyber exploitation and attack process, to include aspects of vulnerability research techniques and operationalizationPreferred Required Education: Typically requires a degree in Science, Technology, Engineering or Mathematics (STEM) and a minimum of 8 years of prior relevant experience unless prohibited by local laws/regulations


Share Profile