About The Position

As a Information Systems Security Engineer (ISSE), you will perform advanced Information System Security Engineering support for various information systems throughout the system development lifecycle. Your responsibilities will include system hardening, preparing comprehensive assessment testing procedures, conducting system vulnerability scanning and mitigation, performing system maintenance and configuration, and ensuring thorough documentation. You will support the engineering team by providing direct input on the information system design to obtain and/or maintain a successful Authorization to Operate (ATO). You will perform in-depth analysis of various security hardening guides (DISA STIGs, CIS Benchmarks, vendor guides, SANS, etc.) to ensure security control coverage is addressed in the scanning methodology.

Requirements

  • An active TS/SCI clearance with polygraph is required.
  • Must have a current certification compliant with DoD 8570 IAM or IAT level 2.
  • Bachelor’s degree in Computer Science, Information Assurance, Information Security System Engineering, or equivalent and seven (7) years of directly related experience.
  • Knowledge of DCID 6/3, ICD 503, CNSSI 1253, NIST SP 800-53, NIST SP 800-53A, NIST SP 800-37, and security controls assessment criteria/procedures.
  • Implementing NIST 800-53 controls/ICD 503.
  • Navigating projects through the RMF process to achieve IATT & ATO within the NRO environment.
  • Participating in Assessment and Authorization (A&A) process.
  • Preparing systems security documentation (e.g., security plans, risk assessment reports, Plan of Actions and Milestones (POA&Ms), etc.).
  • Continuous Monitoring, mitigating scan findings, maintaining Ports, Protocols, and Services sheets (PPS).
  • Vulnerability assessment scanning experience (Security Center/NESSUS).
  • Working with engineers and system administrators to correct scan findings/system vulnerabilities.
  • Creation/use of Security Center Dashboards and reports.
  • Excellent communication and interpersonal skills.
  • Efficient time management and workload management.
  • Ability to support a flexible schedule and work in a dynamic, real-time environment with rapidly changing priorities.

Nice To Haves

  • Proficient in Microsoft Application tools (i.e., Excel and PowerPoint).
  • Experience with Sharepoint, Confluence, JIRA.
  • Experience with developing test plans for information systems.
  • Demonstrated system administration experience with Linux (Red Hat, CentOS) and/or Windows.
  • Experience with DevOps.
  • Familiarity with code quality and code analyzing security tools.
  • Experience with Amazon Web Services (AWS): Should have current or ability to obtain an Amazon Cloud certification, such as AWS Certified Solutions Architect – Associate or AWS Certified Security Specialty.
  • Audit log review: Ability to query and perform analysis in Splunk.
  • Experience within the Intelligence Community.

Responsibilities

  • Assess and Mitigate Security Threats: Analyze and mitigate system security threats, risks, and vulnerabilities throughout the program life cycle. Contribute to security planning, assessment, risk analysis, risk management, certification, and awareness activities for system operations.
  • Execute Assessment & Authorization (A&A): Perform the A&A process in accordance with government requirements (e.g., ICD-503).
  • Maintain Accreditation Data: Ensure that accreditation data is maintained within customer databases (e.g., SNOW).
  • Conduct Research: Research emerging technologies, vulnerability information, system hardening (e.g., STIGs), operating systems, application software, and security tools.
  • System Configuration and Maintenance: Execute system configuration and maintenance in support of the Security Engineering discipline.
  • Prepare Testing Documentation: Prepare comprehensive security assessment testing documentation to validate applied security controls in support of A&A testing.
  • Provide Technical Guidance: Offer technical guidance focused on information security architecture.
  • Generate Accreditation Artifacts: Create security accreditation artifacts, including Security Plans, Certification Test Plans, and Continuous Monitoring Plans.
  • Track and Fulfill Liens: Track and fulfill liens associated with A&A activities as documented in the Plan of Actions and Milestones (POA&M).
  • Perform Vulnerability Assessments: Conduct vulnerability assessments using standardized tools (Nessus, DISA STIGs) and perform configuration updates as required to comply with security requirements.
  • Guide System Hardening: Provide guidance on the hardening of operating systems, COTS products, and Open-Source products to support compliance with security requirements.
  • Engineering Services: Provide technical engineering services for the support of integrated security systems and solutions.
  • Team Participation: Participate as a member of a security engineering team that designs, develops, implements, evaluates, and/or integrates security architectures, systems, or system components.
  • Customer Interaction: Support and interact with customers in the enforcement of the design of security throughout the system life cycle.
  • Apply IA Policies: Apply knowledge of IA policies and procedures disseminated by the customer’s organization.

Benefits

  • Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives. We offer competitive compensation, benefits and learning and development opportunities. Our broad and competitive mix of benefits options is designed to support and protect employees and their families. At CACI, you will receive comprehensive benefits such as; healthcare, wellness, financial, retirement, family support, continuing education, and time off benefits.

Stand Out From the Crowd

Upload your resume and get instant feedback on how well it matches this job.

Upload and Match Resume

What This Job Offers

Job Type

Full-time

Career Level

Mid Level

Number of Employees

5,001-10,000 employees

© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service