Information Systems Security Engineer

Booz Allen HamiltonFort Belvoir, VA
21hOnsite

About The Position

Information Systems Security Engineer The Opportunity: In this role, you will support a Cyber team working with the Army Intelligence community. We’re looking for a self-starter who is proactive in providing engineering solutions and can be adaptable to changing requirements. The role is not primarily client-facing, but you should expect to have some interface with stakeholders. This position is located in Fort Belvoir, VA. What You’ll Work On:

Requirements

  • 7+ years of experience in information assurance (IA)
  • Experience with ACAS, CISCO ISE, and Cisco Networking
  • Experience with Nessus Scanners and Tenable Security Center resources
  • Experience performing proactive solution engineering with flexibility for changing requirements
  • Knowledge of how to perform a STIG check on a network
  • Knowledge of Network Accreditation Processes
  • Active TS/SCI clearance; willingness to take a polygraph exam
  • HS diploma or GED
  • IAT Level III Certification

Nice To Haves

  • Experience with Axonius
  • Experience with TACACS+
  • Experience with Active Directory
  • Experience with Elasticsearch
  • Knowledge of CTOs
  • CASP+ or Security X Certification

Responsibilities

  • Configure and maintain Nessus Scanners and Tenable Security Center (SC) resources.
  • Manage scan zones to ensure comprehensive coverage across varied network enclaves.
  • Utilize Axonius to aggregate data from Active Directory, Cisco ISE, and ACAS to identify unmanaged assets or shadow IT missing from standard scanning cycles.
  • Develop and distribute tailored vulnerability reports and dashboards for ISSOs, focusing on Cyber Tasking Orders (CTOs), Critical and High vulnerabilities, and STIG non-compliance trends.
  • Audit Cisco ISE policies to enforce 802.1X authentication, ensuring only authorized devices access the production environment.
  • Optimize Elasticsearch and ingest pipelines to parse logs from network devices, Cisco ISE, and Active Directory for real-time security alerting and historical trend analysis.
  • Conduct weekly audits of Active Directory logs to identify anomalous account behavior, privilege escalation attempts, or unauthorized changes to Group Policy Objects (GPOs).
  • Perform manual and automated STIG checks on network infrastructure, using tool-based evidence such as ACAS or ISE to support Risk Management Framework (RMF) authorization packages.
  • Author technical justifications and remediation plans for vulnerabilities that cannot be immediately mitigated due to operational constraints.
  • Author and maintain localized "How-To" documentation for tool-specific workflows, such as "Auditing a Cisco Router" or "Configuring a credentialed scan in ACAS."
  • Audit firewall rules and ACLs for ACAS scanning traffic and ISE RADIUS/TACACS traffic across internal enclaves.
  • Present critical or high priority threats and vulnerabilities on the network to stakeholders for awareness, action, and remediation.
  • Analyze digital evidence and investigate computer security incidents to derive useful information in support of system or network vulnerability mitigation.
  • Assess the effectiveness of cybersecurity measures utilized by system(s).
  • Assess threats to and vulnerabilities of computer system(s) to develop a security risk profile by leveraging existing tools and dashboards.
  • Manage and design the network scanning process end-to-end.
  • Assist ISSOs in developing vulnerability management processes for applicable systems, coordinate input from ISSOs and ISSMS into scanning processes, and recommend best practices to ISSOS, ISSMS, and PM based on scanning findings.
  • Build out applicable network architecture leveraging existing and approved tools.
  • Participate and offer input for policies, standards, procedures, and risk management.
  • Identify, assess, and recommend cybersecurity or cybersecurity‐enabled products for use within a system.
  • Recommend security measures that provide confidentiality, integrity, availability, authentication, and nonrepudiation.
  • Perform security reviews and identify security gaps.
  • Participate in client deliverables as requested by the ISSM or PM.

Benefits

  • Our offerings include health, life, disability, financial, and retirement benefits, as well as paid leave, professional development, tuition assistance, work-life programs, and dependent care.
  • Our recognition awards program acknowledges employees for exceptional performance and superior demonstration of our values.
  • Full-time and part-time employees working at least 20 hours a week on a regular basis are eligible to participate in Booz Allen’s benefit programs.
  • Individuals that do not meet the threshold are only eligible for select offerings, not inclusive of health benefits.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service