C2BMC Cyber Engineer

General Dynamics Mission Systems, IncColorado Springs, CO

About The Position

At General Dynamics Mission Systems, we create the technologies, products and services that help our nation’s heroes keep our nation safe. The work we do is so advanced, we are continuously moving the boundaries of what’s possible. Here you’ll work with the best and your talent will be front and center on projects that impact the world. Are you up to the challenge? We apply advanced technologies such as Artificial Intelligence, Blockchain, AR/VR, Cloud Native and Quantum Physics to solve our customers’ missions in cyber, RF, undersea, interstellar and everything in between.Leading and overseeing the information security budget, staffing, and contracting, you’ll direct a team that handles a wide range of security issues including architectures, electronic data traffic and network access. As the Advanced IT Security Specialist, we’ll rely on you to apply defensive functions (e.g., encryption, access control, identity management) to reduce exploitation opportunities of vulnerabilities, as well as conduct import/export reviews for acquiring cryptographic systems. You’ll also apply current computer science technologies to the design, development, evaluation, and integration of computer systems and networks to maintain system security. Are you ready to make a difference? What you’ll experience: Technologies that aren’t just top-notch, they’re often top-secret A team of bold thinkers committed to exploring what’s next Opportunities to gain new knowledge - as it’s discovered

Requirements

  • Bachelor’s degree in a related specialized area or equivalent plus a minimum of 5 years of relevant experience; or Master's degree plus a minimum of 3 years of relevant experience
  • Department of Defense Secret security clearance is required at time of hire. Applicants selected will be subject to a U.S. Government security investigation and must meet eligibility requirements for access to classified information. Due to the nature of work performed within our facilities, U.S. citizenship is required.
  • Proficient knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code)
  • Strong knowledge of electronic devices (e.g., computer systems/components, access control devices, digital cameras, electronic organizers, hard drives, memory cards, modems, network components, printers, removable storage devices, scanners, telephones, copiers, credit card skimmers, facsimile machines, global positioning systems [GPSs])
  • Assesment and Authorization background.
  • Solid Cybersecurity Engineering skills with working knowledge of Cyber Technologies.
  • Thorough understanding of ACAS/SCC outputs and hands on experience of reviewing scan data, STIGs, and RMF controls.

Nice To Haves

  • Extremely proficient in processes for seizing and preserving digital evidence (e.g., chain of custody)
  • Experience managing Cyber Task Orders/IAVMs and POA&Ms.
  • Knowledge/Understanding of eMASS?Xacta and Cross Domain Solutions (CDS).
  • Proficient knowledge of legal governance related to admissibility (e.g., Federal Rules of Evidence).
  • Knowledgeable of applicable laws (e.g., Electronic Communications Privacy Act, Foreign Intelligence Surveillance Act, Protect America Act, search and seizure laws, civil liberties and privacy laws), U.S. Statutes (e.g., Titles 10, 18, 32, 50 in U.S. Code), Presidential Directives, executive branch guidelines, and/or administrative/criminal legal guidelines and procedures relevant to work performed.

Responsibilities

  • Leading and overseeing the information security budget, staffing, and contracting
  • Directing a team that handles a wide range of security issues including architectures, electronic data traffic and network access
  • Apply defensive functions (e.g., encryption, access control, identity management) to reduce exploitation opportunities of vulnerabilities
  • Conduct import/export reviews for acquiring cryptographic systems
  • Apply current computer science technologies to the design, development, evaluation, and integration of computer systems and networks to maintain system security
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service