Saic
Cyber Security Cloud Engineer
Saic, Woodbridge, Virginia, us, 22195
DescriptionSAIC is seeking a proven Senior Cyber Security Cloud Engineer
to join the Enterprise Cloud Management Agency (ECMA) Cloud Enterprise Technology Services (CETS) program and the opportunity to evaluate and potentially re-invent how the Army delivers IT services and make use of data and analytics to meet mission requirements. The CETS program provides Information Technology services and technical subject matter expertise (SME) for the Army ECMA to support overall strategy and migration to the cARMY environment up to Department of Defense (DoD) Impact Level (IL) 6. This position is your opportunity to utilize your skills and background as a Senior Cyber Security Cloud Engineer and deliver support to the warfighting mission with cutting edge cloud application migration and business process refinement for the US Army.
This position is contingent upon contract award which is expected February 2025.
This position is a hybrid position; however, candidate must be able to be on customer site at Fort Belvoir when needed within 24 hours so must be within 250 miles to the Fort Belvoir, VA area.
Performs Cyber Systems Architecture, Cyber Technology Research Development, Cyber Data Administration, Cyber Knowledge Management, Cyber Network Services, Cyber Systems Administration, Cyber Systems Analysis, and Cybersecurity Defense Infrastructure Support activities from the National Initiative for Cybersecurity Education (NICE) Framework. This work can primarily be categorized as Infrastructure Security, in that employees in this job code are concerned with the maintenance, administration, engineering, architecture, development, patching, and upgrades of the various toolsets, devices, applications, and systems used to perform cybersecurity and cyberspace operations. In accordance with enterprise IT change and configuration management policies, implements changes to cybersecurity and/or cyberspace operational systems, software, appliances, devices, etc. Implements system configuration and monitoring changes in order to increase effectiveness or efficiencies in the systems capabilities in regards to monitoring and implementing logical access controls in order to enforce policy. May support cybersecurity and/or cyberspace operations metrics development, maintenance, and reporting. Designs, develops, documents, tests, and debugs cybersecurity and/or cyberspace operations application software using secure coding practices. Provides specific, detailed information for selection, implementation techniques, and tools for the most efficient solution to meet business needs, including present and future capacity requirements, facility requirements, data storage, backup, monitoring, operating systems, directory services, identity management, access management, and automation. Ensures compliance with established standards, policies, and configuration guidelines.
KNOWLEDGE/SKILLS AND ABILITY: Applies advanced technical principles, theories, and concepts. Contributes to development of new principles and concepts. Participates with senior managers to establish strategic plans and objectives. Recommends/makes decisions on administrative or project work matters and ensures effective achievement of program, project, or organizational objectives.
PROBLEM COMPLEXITY: Works on unusually complex technical problems and provides solutions which are highly innovative and ingenious.
FREEDOM TO ACT: Works under consultative direction toward pre-determined long-range goals and objectives. Assignments are often self-initiated. Determine and pursue courses of action necessary to obtain desired results. Work checked through consultation and agreement with others rather than by formal review of supervisor. Exercises independent judgment in methods, techniques and evaluation criteria for obtaining results.
IMPACT: Develops advanced technological ideas and guides their development into a final product. Erroneous decisions or recommendations would typically results in failur to achieve critical organizational objectives and affect image of organization's technological capability.
LIASON: Serves as organization spokesperson on advanced projects and/or programs. Acts as advisor to management and customers on advanced technical research studies and applications.
QualificationsEDUCATION AMD EXPERIENCE:
Bachelor's Degree and ten (10+) years of experience supporting DoD customers within Cybersecurity
CERTIFICATION REQUIREMENT:
Active CISSP
Active Sec+
CLEARANCE REQUIREMENT:
Must have a Secret clearance
SAIC accepts applications on an ongoing basis and there is no deadline.
Covid Policy: SAIC does not require COVID-19 vaccinations or boosters. Customer site vaccination requirements must be followed when work is performed at a customer site.#J-18808-Ljbffr
to join the Enterprise Cloud Management Agency (ECMA) Cloud Enterprise Technology Services (CETS) program and the opportunity to evaluate and potentially re-invent how the Army delivers IT services and make use of data and analytics to meet mission requirements. The CETS program provides Information Technology services and technical subject matter expertise (SME) for the Army ECMA to support overall strategy and migration to the cARMY environment up to Department of Defense (DoD) Impact Level (IL) 6. This position is your opportunity to utilize your skills and background as a Senior Cyber Security Cloud Engineer and deliver support to the warfighting mission with cutting edge cloud application migration and business process refinement for the US Army.
This position is contingent upon contract award which is expected February 2025.
This position is a hybrid position; however, candidate must be able to be on customer site at Fort Belvoir when needed within 24 hours so must be within 250 miles to the Fort Belvoir, VA area.
Performs Cyber Systems Architecture, Cyber Technology Research Development, Cyber Data Administration, Cyber Knowledge Management, Cyber Network Services, Cyber Systems Administration, Cyber Systems Analysis, and Cybersecurity Defense Infrastructure Support activities from the National Initiative for Cybersecurity Education (NICE) Framework. This work can primarily be categorized as Infrastructure Security, in that employees in this job code are concerned with the maintenance, administration, engineering, architecture, development, patching, and upgrades of the various toolsets, devices, applications, and systems used to perform cybersecurity and cyberspace operations. In accordance with enterprise IT change and configuration management policies, implements changes to cybersecurity and/or cyberspace operational systems, software, appliances, devices, etc. Implements system configuration and monitoring changes in order to increase effectiveness or efficiencies in the systems capabilities in regards to monitoring and implementing logical access controls in order to enforce policy. May support cybersecurity and/or cyberspace operations metrics development, maintenance, and reporting. Designs, develops, documents, tests, and debugs cybersecurity and/or cyberspace operations application software using secure coding practices. Provides specific, detailed information for selection, implementation techniques, and tools for the most efficient solution to meet business needs, including present and future capacity requirements, facility requirements, data storage, backup, monitoring, operating systems, directory services, identity management, access management, and automation. Ensures compliance with established standards, policies, and configuration guidelines.
KNOWLEDGE/SKILLS AND ABILITY: Applies advanced technical principles, theories, and concepts. Contributes to development of new principles and concepts. Participates with senior managers to establish strategic plans and objectives. Recommends/makes decisions on administrative or project work matters and ensures effective achievement of program, project, or organizational objectives.
PROBLEM COMPLEXITY: Works on unusually complex technical problems and provides solutions which are highly innovative and ingenious.
FREEDOM TO ACT: Works under consultative direction toward pre-determined long-range goals and objectives. Assignments are often self-initiated. Determine and pursue courses of action necessary to obtain desired results. Work checked through consultation and agreement with others rather than by formal review of supervisor. Exercises independent judgment in methods, techniques and evaluation criteria for obtaining results.
IMPACT: Develops advanced technological ideas and guides their development into a final product. Erroneous decisions or recommendations would typically results in failur to achieve critical organizational objectives and affect image of organization's technological capability.
LIASON: Serves as organization spokesperson on advanced projects and/or programs. Acts as advisor to management and customers on advanced technical research studies and applications.
QualificationsEDUCATION AMD EXPERIENCE:
Bachelor's Degree and ten (10+) years of experience supporting DoD customers within Cybersecurity
CERTIFICATION REQUIREMENT:
Active CISSP
Active Sec+
CLEARANCE REQUIREMENT:
Must have a Secret clearance
SAIC accepts applications on an ongoing basis and there is no deadline.
Covid Policy: SAIC does not require COVID-19 vaccinations or boosters. Customer site vaccination requirements must be followed when work is performed at a customer site.#J-18808-Ljbffr