Logo
M.C. Dean, Inc.

Cybersecurity Engineer 4 - Annapolis Junction, MD

M.C. Dean, Inc., Annapolis Junction, MD


Position Summary

You will be working with a dynamic team of system engineers responsible for design decisions and implementation in all areas of systems architecture, systems, engineering, and the technical direction of multiple projects across multiple programs for OCONUS operations. Responsibilities include designing the systems architectural framework for large complex resilient systems and formulating high-level architectural solutions to ensure implemented solutions meet stakeholder needs, standards, and performance requirements. You will be communicating architectural designs and solutions to the entire technical program team and to end-customer stakeholders. You will work closely with stakeholders to gather technical requirements, architect solutions, and execute on deliverables. You will be responsible for providing multi-tenant, multi-cloud, cloud and on-prem IT infrastructure solutions to ensure the success of multiple customers across multiple programs.

Essential responsibilities and activities include but are not limited to:
  • Perform Cybersecurity / Information Assurance for all customer managed systems, applications, and hardware
  • Design, implement, and maintain Department of Defense provided Security and Vulnerability tools including Host Based Security System (HBSS), Splunk, and Microsoft Defender for Endpoints
  • Support authorization/reauthorization efforts in alignment with the Department of Defense Risk Management Framework (RMF), NIST 800-53 (e.g. develop and apply Active Directory Group Policy Objects, develop deployment packages, etc.)
  • Analyze new security requirements, define courses of action, and design enterprise solutions, coordinating with engineering and operations teams to implement within the environment
  • Formalize and execute a process for communicating vulnerability results in a manner understood by technical and non-technical stakeholders based on risk tolerance and impact to the environment
  • Leverage vulnerability database sources to understand each weakness, its probability and remediation options, including vendor-supplied fixes and workarounds
  • Design, implement, and maintain, scripts used in asset discovery and vulnerability status
  • Conduct continuous independent discovery and vulnerability scans/security assessments of enterprise-wide assets and proactive control testing
  • Set up and execute Nessus scans; establish automated reporting
  • Document, prioritize, and formally report asset and vulnerability state, along with remediation recommendations and validation
  • Coordinate with system owners and system administrators/technical points of contact to identify system vulnerabilities, conduct vulnerability analysis, and formulate remediation strategies
  • Develop packages for complex remediation efforts and coordinate with vulnerability remediation specialists for deployment
  • Support and monitor patch management compliance across the infrastructure to align to audit requirements
  • Identify and apply DISA Security Technical Implementation Guide (STIG) benchmarks
  • Conduct manual STIG reviews
  • Support preparation of Plan of Action & Milestones (POAM) development to support compliance and authorization/reauthorization activities
  • Prepare and disseminate regular Cyber Compliance/vulnerability reporting; interact with the customer to explain results and address issues
  • Contribute to the development of Standard Operating Procedures, Work Instructions, User Guides, and checklists
  • Work as a team to consistently learn and share advanced skills and foster team excellence
  • Actively collaborate with the ISSO to develop, maintain, and enhance cyber security controls
  • Collaborate with security groups such as red teams, threat intelligence and risk management to form a holistic team dedicated to thwarting attackers and reducing attack surface

Position / Candidate Requirements.
  • Active TS/SCI w/ Polygraph security clearance required
  • Bachelor's Degree in IT, Cybersecurity, Systems Engineering, Engineering, or a related discipline and 7 Years of progressive experience
  • In lieu of a Bachelor's Degree, we will accept 10 years of applicable progressive experience
  • DoD 8750 IAT Level II Certification (CCNA Security, CySA , GICSP, GSEC, Security CE, CND, or SSCP)
  • Experience operating and maintaining a Nessus environment
  • Comply with DOD 8140.01 "Cyberspace Workforce Management" and maintain an appropriate and current IA certification to perform IA functions in accordance with Department of Defense (DoD) 8570.01-M, "Information Assurance Workforce Improvement Program"
  • Experience developing and implementing hardware and software solutions for data center and virtual infrastructure technologies.
  • Strong MS Excel, Word, PowerPoint, and Visio Skills
  • Ability to travel internationally up to 25% of the time.

Desired / Advantageous Qualifications
  • Experience with Hyperconverged architectures such as Cisco Hyper Flex, Nutanix, etc.
  • Experience with Cisco Unified Computing System (UCS), Fabric Interconnects and other similar technologies.
  • Experience with Virtualized Desktop Infrastructure, e.g., Citrix ZenDesktop, and/or VMware Horizon
  • Large on-premise storage engineering and administration experience with NetApp, Dell/EMC, Pure Storage, etc.
  • Experience designing and deploying Collaboration Platforms such as Microsoft SharePoint
  • Experience designing and deploying SQL Database Infrastructure such as Microsoft SQL Server
  • Experience engineering and implementing data center and campus area networks and security stacks.
  • Experience engineering and implementing platforms and services in a software-defined network environment
  • Experience with DoD IT security requirements including DISA STIG/SRGs.
  • Understanding of Department of Defense standards and best practices
  • Vendor certifications, VMware, Cisco, Microsoft, NetApp, etc.

Abilities:
  • Exposure to computer screens for an extended period of time.
  • Sitting for extended periods of time.
  • Reach by extending hands or arms in any direction.
  • Have finger dexterity in order to manipulate objects with fingers rather than whole hands or arms, for example, using a keyboard.
  • Listen to and understand information and ideas presented through spoken words and sentences.
  • Communicate information and ideas in speaking so others will understand.
  • Read and understand information and ideas presented in writing.
  • Apply general rules to specific problems to produce answers that make sense.
  • Identify and understand the speech of another person.