Information Systems Security Engineer The Opportunity: In this role, you will support a Cyber team working with the Army Intelligence community. We’re looking for a self-starter who is proactive in providing engineering solutions and can be adaptable to changing requirements. The role is not primarily client-facing, but you should expect to have some interface with stakeholders. This position is located in Fort Belv oir , VA. What You’ll Work On: Configure and maintain Nessus Scanners and Tenable Security Center ( SC ) resources. Manage scan zones to ensure comprehensive coverage across varied network enclaves. Utilize Axonius to aggregate data from Active Directory, Cisco ISE, and ACAS to identify unmanaged assets or shadow IT missing from standard scanning cycles. Develop and distribute tailored vulnerability reports and dashboards for ISSOs, focusing on Cyber Tasking Orders ( CTOs ) , Critical and High vulnerabilities, and STIG non-compliance trends. Audit Cisco ISE policies to enforce 802.1X authentication, ensuring only authorized devices access the production environment. Optimize Elasticsearch and ingest pipelines to parse logs from network devices, Cisco ISE, and Active Directory for real-time security alerting and historical trend analysis. C ond uct weekly audits of Active Directory logs to identify anomalous account behavior, privilege escalation attempts, or unauthorized changes to Group Policy Objects ( GPOs ) . Perform manual and automated STIG checks on network infrastructure, using tool-based evidence such as ACAS or ISE to support Risk Management Framework ( RMF ) authorization packages. Author technical justifications and remediation plans for vulnerabilities that cannot be immediately mitigated due to operational constraints. Author and maintain localized "How-To" documentation for tool-specific workflows, such as "Auditing a Cisco Router" or "Configuring a credentialed scan in ACAS." Audit firewall rules and ACLs for ACAS scanning traffic and ISE RADIUS / TACACS traffic across internal enclaves. Present critical or high priority threats and vulnerabilities on the network to stakeholders for awareness, action, and remediation. Analyze digital evidence and investigate computer security incidents to derive useful information in support of system or network vulnerability mitigation. Assess the effectiveness of cybersecurity measures utilized by system ( s ) . Assess threats to and vulnerabilities of computer system ( s ) to develop a security risk profile by leveraging existing tools and dashboards. Manage and design the network scanning process end-to-end. Assist ISSOs in developing vulnerability management processes for applicable systems, coordinate input from ISSOs and ISSMS into scanning processes, and recommend best practices to ISSOS, ISSMS, and PM based on scanning findings. Build out applicable network architecture leveraging existing and approved tools. Participate and offer input for policies , standards, procedures, and risk management. Identify, assess, and recommend cybersecurity or cybersecurity‐enabled products for use within a system. Recommend security measures that provide confidentiality, integrity, availability, authentication, and nonrepudiation. Perform security reviews and identify security gaps. Participate in client deliverables as requested by the ISSM or PM. Join us. The world can’t wait.
Stand Out From the Crowd
Upload your resume and get instant feedback on how well it matches this job.
Job Type
Full-time
Career Level
Mid Level
Education Level
High school or GED