CSI-posted 1 day ago
Full-time • Mid Level
Chantilly, VA

Candidate will work closely with a diverse client project team responsible for cybersecurity engineering, development of technical guidance, information assurance functions, and/or achieving Authorizations to Operate. These functions will be applied to specific client IT programs or across a large enterprise of federated programs developed by different organizations. Depending on current team needs, the candidate will be responsible for leading or supporting one or more of the following security-focused disciplines: cybersecurity strategy, policy, and technical guidance; enterprise security risk management and governance; IT security engineering and data protection requirements; enterprise and solution security architectures; and security assessment and authorization. Technical capability areas of focus include: large enterprise networks; cloud security services; data security tagging and curation; cross-domain solutions; enterprise audit; identity, credentials, access management, computer network defense, and incident response. About Cleared Solutions Inc.: Cleared Solutions is a national security-focused, small business platform for highly skilled IT consultants and strategic advisers specializing in transforming legacy technical environments into modern, agile, and secure IT enterprises. Our expertise in Data/Information, IT Services/Applications, Cybersecurity/Information Assurance, and Counterintelligence/Insider Threats enables us to effectively operate from the C-Suite to the Dev-Suite working with partners and clients to solve the most difficult challenges. We drive towards rapid decision making and high-quality, trusted, and comprehensive deliverables. Our consultants thrive in integrated contractor teams where collaboration with our corporate and government partners yield targeted, measurable, and mission-oriented results. We have multiple national security clients in the Washington Metro Area across multiple contract vehicles in need of top-notch talent.

  • Positions require U.S. Citizenship and active TS/SCI security clearance with polygraph
  • Bachelor’s, Master’s, or Doctorate Degree in Computer Engineering, Computer Science, Electrical Engineering, Information Systems, Information Technology, or a closely-related Engineering or IT discipline
  • Minimum 10 years (with minimum 5 years in the IC) developing, securing, integrating, deploying, maintaining, and evaluating systems
  • experienced in one or more of the following areas: Large enterprise networks; cloud security services; data security tagging and curation; cross-domain solutions; enterprise audit; or identity, credentials, and access management
  • Security architectures, engineering requirements, specifications, and data protection and information assurance requirements for complex IT enterprise architectures and solutions
  • End-to-end life-cycle software development, to include test engineering or quality assurance
  • National security-related cybersecurity guidance (e.g., ICD 503, ICS 503-03, ICS 502, ICS 502-1, ICS 502-2, ICS 502-04, ICS 503-04, ICS 500-27; TDF, EDH and ISM XML specifications; CNSS 1253; NIST SPs 800-30, 800-37, 800-39, 800-53, and 800-53a)
  • Procedures and protocols required by the Federal Information Security Management Act of 2002; IA best practices; and IT enterprise standards and protocols within IT enterprise architectures
  • Assessment and authorization procedures, processes, and evaluations for IC IT systems (to include: networking systems, penetration testing, protocols, and vulnerability assessments)
  • Security Body of Evidence, System Security Plans, and associated security risk management documentation
  • Collaboration with Subject Matter Experts (SMEs) to develop authorization packages in support of achieving Authority to Operate (ATO)
  • Computer network defense procedures, processes, and protocols for IT enterprise architectures
  • Exploits, attacks, and tools used by skilled hackers, insider threat detection triggers, monitoring technologies, and insider threat program technical management in accordance with NITTF Insider Threat Program Guide and Federal Information Systems Modernization Act (FISMA)
  • Firmware or embedded systems; cloud, data center, virtualization, and server technologies; database formats, queries, structures, and schema; and data protection technologies (e.g., multi-factor authentication, data encryption, etc.)
  • Operating systems, applications, and security vulnerability tools running locally, virtualized, or in cloud-based environment (e.g., Windows 2000/2003/XP/7, UNIX, Linux, Solaris, VMware, Red Seal, Tenable NESSUS Security Center, Splunk, XACTA 360, WebInspect, AppDetective, Nessus Security Scanner, NMAP)
  • Prefer at least one certification in the cybersecurity field (e.g., CISSP, CEH, CHFI, Security +, CND-IR, GLSC, or SANS GSEC)
  • 100% covered medical, dental, orthodontia, vision, and prescription insurance premiums
  • 401(k) with company match
  • Section 125 flexible spending accounts
  • flexible leave policy
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service