Endpoint Security Cybersecurity Engineer, Lead

Booz Allen HamiltonSan Diego, CA
1d$99,000 - $225,000

About The Position

Endpoint Security Cybersecurity Engineer, Lead The Opportunity: Serve as a cybersecurity engineer responsible for designing, deploying, and maintaining a distributed security architecture in support of critical missions. Develop, implement, and integrate enterprise, cybersecurity operations center, and endpoint security solutions in alignment with best practices and mission objectives. Maintain awareness of market and technology trends to bring new and best of breed solutions to the client. Apply leading-edge principles, theories, and concepts and contribute to the development of new principles and concepts to advance mission requirements. Perform as part of a team as they troubleshoot and analyze complex challenges for customers using your knowledge of network and security devices and applications. Manage the research of technology and market trends to further develop security solutions. Assess security threats and implement infrastructure controls using your expertise in Endpoint Detection and Response (EDR) tools such as Trellix EDR or HBSS, Nessus, FirePower, FireEye, Palo Alto FW, and other systems. Work under limited supervision and apply extensive knowledge for a wide range of IA concepts, practices, and procedures to ensure the secure integration and operation of all enclave systems. Work independently or lead and direct others, and solve IA problems quickly and completely. Develop and implement security solutions in alignment with security strategy, and maintain an awareness of market and technology trends to bring best of breed solutions to the client. Develop relationships quickly and easily with other teams, communicating the complexities of security with a wide variety of audiences, including senior management. Manage infrastructure and cybersecurity controls, including enhanced detection and vulnerability capabilities and improved event correlation in large enterprises. Lead risk and vulnerability assessments in network, system, and application areas, and leverage big data analytics and traditional security event types to identify advanced threats or indicators of compromise. Work with us as we secure and protect the Navy's security posture for the better.

Requirements

  • 10+ years of experience deploying, maintaining, administrating, and integrating endpoint security solutions for Navy CONUS and OCONUS networks
  • 5+ years of experience with security engineering, network engineering, and integration of C4I systems and tools
  • Experience with endpoint detection and response tools, including Trellix and HBSS
  • Experience integrating cybersecurity engineering principles into infrastructure planning, design, and deployment
  • Knowledge of security architecture design and integration, and virtualization
  • Ability to devise and execute client deliverables, work independently, identify problems and devise analysis and solutions, communicate results, and lead the accomplishments of client tasks from inception to completion
  • Top Secret clearance
  • Bachelor’s degree
  • DoD 8140 Certification

Nice To Haves

  • Experience with network engineering functions, including Windows, Linux, and virtual operating systems, and security tools, platforms, and technologies, including network and web application firewalls, web proxy, intrusion prevention systems, vulnerability scanners, and penetration tools
  • Experience deploying, implementing, maintaining, and integrating cybersecurity tools and applications
  • Experience with configuration management and CMPro
  • Knowledge of the RMF process and cybersecurity compliance testing using industry standard tools, including Assured Compliance Assessment Solution (ACAS) and DoD Security Technical Implementation Guides (STIGs)
  • Ability to meet cyber schedule, performance, and quality metrics within the systems development lifecycle and acquisition lifecycle
  • Ability to identify and analyze risks and opportunities at both tactical and strategic levels
  • TS/SCI clearance
  • Master’s degree
  • OS Certification

Responsibilities

  • Serve as a cybersecurity engineer responsible for designing, deploying, and maintaining a distributed security architecture in support of critical missions.
  • Develop, implement, and integrate enterprise, cybersecurity operations center, and endpoint security solutions in alignment with best practices and mission objectives.
  • Maintain awareness of market and technology trends to bring new and best of breed solutions to the client.
  • Apply leading-edge principles, theories, and concepts and contribute to the development of new principles and concepts to advance mission requirements.
  • Perform as part of a team as they troubleshoot and analyze complex challenges for customers using your knowledge of network and security devices and applications.
  • Manage the research of technology and market trends to further develop security solutions.
  • Assess security threats and implement infrastructure controls using your expertise in Endpoint Detection and Response (EDR) tools such as Trellix EDR or HBSS, Nessus, FirePower, FireEye, Palo Alto FW, and other systems.
  • Work under limited supervision and apply extensive knowledge for a wide range of IA concepts, practices, and procedures to ensure the secure integration and operation of all enclave systems.
  • Work independently or lead and direct others, and solve IA problems quickly and completely.
  • Develop and implement security solutions in alignment with security strategy, and maintain an awareness of market and technology trends to bring best of breed solutions to the client.
  • Develop relationships quickly and easily with other teams, communicating the complexities of security with a wide variety of audiences, including senior management.
  • Manage infrastructure and cybersecurity controls, including enhanced detection and vulnerability capabilities and improved event correlation in large enterprises.
  • Lead risk and vulnerability assessments in network, system, and application areas, and leverage big data analytics and traditional security event types to identify advanced threats or indicators of compromise.

Benefits

  • health
  • life
  • disability
  • financial
  • retirement benefits
  • paid leave
  • professional development
  • tuition assistance
  • work-life programs
  • dependent care
  • recognition awards program
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service