Logo
Gilder Search Group

Cybersecurity Engineer II

Gilder Search Group, Baltimore, Maryland, United States,


Input Technology Solutions -Aberdeen Proving Ground, MD

Input Technology Solutions is seeking a

Cybersecurity Engineer II

for a great opportunity in Aberdeen Proving Ground, MD!Basic Qualifications:An individual must meet the following criteria to be considered:Pass a background investigation.Possess an active Secret security clearance.Bachelor’s degree in a relevant fieldFive (5) or more years of relevant experiencePossess a DoD 8570-compliant security certifications to meet IAT/IAM II or III requirements (Security +, CISSP, CCNA, etc.)General Required Skills:System Integration / DevelopmentDemonstrated experience and familiarity with DoD and Army Cybersecurity Policies and Regulations and Certification and Accreditation (C&A) process, including the provisions of ICD 503, the planning and execution of Security Test and Evaluation (STE), and Cybersecurity Test and Evaluation (CTE) eventsAdvanced experience with SELinux, Linux, and Windows server systemsUnderstanding of networking fundamentals and network protocols, like TCP/IP, SSH, SFTP, HTTP, and SCPExperience with RMF, ICD 503, CNSSI 1253, and NIST Special PublicationsExperience with the DoD Security Technical Implementation Guides (STIGS), Security Requirements Guides (SRG), and industry best practices for various applicationsExperience with Assured Compliance Assessment Solution (ACAS) and Host-Based Security Suite (HBSS) applicationsKnowledge of computer networking concepts and protocols, and network security methodologies.Knowledge of cyber threats and vulnerabilities.Knowledge of cybersecurity principles.Knowledge of national and international laws, regulations, policies, and ethics related to cybersecurity.Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).Knowledge of specific operational impacts of cybersecurity lapses.Key Job Functions:Apply a combination of expert engineering knowledge of security solutions to design, develop, and implement solutions to ensure they are consistent with enterprise architecture security policies and support full spectrum military cyberspace operations.Upgrade SW baseline through continuous monitoring with the understanding of the host HW (ie: Windows Server, ESXi, switching, routing, and Linux with the understanding of IAVA and STIG compliance.Provide technical support and coordination through the execution of systems engineering activities such as feature/requirements analysis, design, implementation planning, integration SW/HW, and test components for sustainment.Maintain system documentation for installation and deployment of system assessment.Establish a design framework from End-of-Life (EOL) to future requirements based on government needs and requirements that can be utilized to capture the key information for all existing, new, and enhanced features of our services and capabilities.Identify solution options and perform and document analyses of alternatives associated with technical solutions for needs, requirements, or use cases.Participates in the research, analysis, design, testing, and implementation of complex computer network security/protection technologies for company information and network systems/applications.Assists customers in identifying security solutions for the company's networks and virtual private networks, application systems, key public infrastructures, authentication, and directory services to ensure the security of the network and confidential data. Performs periodic vulnerability scans of networks to identify security vulnerabilities, provides remediation alternatives, and conducts security risk assessments to ensure compliance with corporate security policies and best practices.Designs enterprise and systems security throughout the development lifecycle; translates technology and environmental conditions (e.g., law and regulation) into security designs and processes.Provides subject matter expertise and analysis to bridge the gap between high-level security requirements and policies and ensures their integration into information technology component products and information systems through purposeful security design or configuration.Provide security consultation/guidance and engineering to PM product owners, customers, system owners, and developers, and maintain security process coordination within the Department's lifecycle management and governance process.Hands-on experience designing secured systems architecture deployed to DoD on-premise and Cloud secured architectures, hands-on securing Development/Test/Deployment environments, hands-on System Security Engineering, and assisting Information Systems Security Manager/Officer (ISSM/ISSO) Services throughout the system Assessment and Authorization processes.Develop/integrate cybersecurity designs for systems and networks with multilevel security requirements or requirements for processing multiple classification levels of data primarily applicable to government organizations (e.g., Unclassified, Secret, and Top Secret).Perform operational support and development for system environments and provide product recommendations for security technologies.

#J-18808-Ljbffr