Logo
Senecanationgroup

Cybersecurity Engineer (ISSE/ISSO)

Senecanationgroup, Orlando, Florida, us, 32885


Seneca Holdings is the investment arm of the Seneca Nation with the mission of delivering long-term, economic self-sufficiency to the members of the Seneca Nation.Seneca Holdings operates a diversified portfolio of businesses, including the Seneca Nation Group. Our more than 500 employees work nationwide and internationally to support our customers across the federal government, defense, and health sectors.Seneca Global Services, LLC

is part of the Seneca Nation Group (SNG) portfolio of companies. SNG is the federal government contracting business wholly owned by the Seneca Nation. SNG meets mission-critical needs of federal civilian, defense, and intelligence community customers across a variety of domains. The SNG portfolio receives shared services support from its parent company Seneca Holdings and is comprised of multiple companies that participate in the Small Business Administration 8(a) program.The Seneca Nation Group companies offer competitive compensation and a strong benefits package including comprehensive medical and dental care, matching 401K, paid time off, flexible spending accounts, disability coverage, and other benefits that help provide financial protection for you and your family. We pride ourselves on our collaborative work environment and culture which embraces our mission of providing financial and non-financial benefits back to the members of the Seneca Nation.Seneca Global Services is seeking a Cybersecurity Engineer (ISSE/ISSO) ready to support a dynamic, innovative acquisition program. This position will perform in-depth program analysis and coordination assignments, and services in support of the program. The ideal candidate for this role must be comfortable working in a transparent, collaborative team environment and possess outstanding communication, leadership, critical thinking, and problem-solving skills.Roles and Responsibilities include but are not limited to:Assist with defining the roadmaps, principles, process, and governance for the enterprise.Assist in aligning end-to-end technology strategies with program goals.Assist in designing and evaluating Contractor proposed build, deployment, and monitoring standards.Assist in designing and evaluating Contractor proposed scripts and/or templates to automate infrastructure provisioning and management tasks.Assist in designing and evaluating Contractor proposed end-to-end automation of deployment, monitoring, and infrastructure management in a cloud environment.Assist in planning, designing, and evaluating Contractor proposed migration/onboarding plans for portfolio of programs and data to the cloud.Provide advice on acquisition strategy alternatives relating to commercial technology maturity applicable to acquisition program requirements.Assist in coordination of program Interconnection Security Agreement (ISA). Assist in the integration of programs of record (PORs) into enterprise support and provide the customer support necessary to ensure the PORs are supported in their utilization of program services.Assist in defining security guidance, governance, risk management, scalability, and cost optimization of the cloud environment.Assist in defining and evaluating Contractor proposed multi-level security implementation plans.Assist the coordination of all cyber operations activities within the acquisition life cycle considering emerging requirements for cyber within the multi-domain operations.Serve as a cybersecurity and cyber operations subject matter expert for assigned projects, with responsibility for directing, coordinating, reviewing and providing expert technical advice relative to the overall acquisition effort associated with a complex, enterprise level program.Work with all stakeholders to ensure cyber operations requirements and considerations are factored into all aspects of the acquisition process.Assist in the management and execution of Cybersecurity and Risk Management Framework (RMF 2.0) for the UnlTE networks, systems, and services, IAW DoD and Army policies and directives.Assist in the secure configuration and hardening of networks, systems, and services, IAW DISA STIGs, BBPs, and DoD and Army policies and directives.Assist in the persistent execution of vulnerability management, through proactive and reactive means, to include but not limited to, patch management and flaw remediation, threat identification and mitigation, continuous monitoring, and reporting.Assist in the execution of Security Operations, to provide governance and compliance, auditing, scanning, and reporting, and incident response.Perform other duties as assigned.Basic Qualifications:An active Secret Clearance Required and be eligible to receive Top Secret clearance as needed.Bachelor’s Degree in IT, Engineering, or relevant field from an accredited college/university; years of experience may be used as a substitute for education.3-5 yrs. in IT, Cyber Security, and/or related Engineering.Must have at least 1 certification in IAM I or IAM II.Expertise/knowledge/experience with the following:DOD IS or PIT system.Cybersecurity incident/vulnerability discovery, response and reporting.Review and evaluate the effects on security of system changes.Systems security or privacy engineering activities as part of the Software Development Life Cycle (SDLC).Agile DevSecOps (SCRUM/JIRA/Confluence).

#J-18808-Ljbffr