M.C. Dean, Inc.
Cybersecurity Engineer 4 - Annapolis Junction, MD
M.C. Dean, Inc., Annapolis Junction, Maryland, United States, 20701
Cybersecurity Engineer 4 - Annapolis Junction, MD
ID
11026
Location
Annapolis Junction, MD
Apply Now (https://phg.tbe.taleo.net/phg04/ats/careers/v2/applyRequisition?org=MCDEAN&cws=62&rid=11026)
Position Summary
You will be working with a dynamic team of system engineers responsible for design decisions and implementation in all areas of systems architecture, systems, engineering, and the technical direction of multiple projects across multiple programs for OCONUS operations. Responsibilities include designing the systems architectural framework for large complex resilient systems and formulating high-level architectural solutions to ensure implemented solutions meet stakeholder needs, standards, and performance requirements. You will be communicating architectural designs and solutions to the entire technical program team and to end-customer stakeholders. You will work closely with stakeholders to gather technical requirements, architect solutions, and execute on deliverables. You will be responsible for providing multi-tenant, multi-cloud, cloud and on-prem IT infrastructure solutions to ensure the success of multiple customers across multiple programs.
Essential responsibilities and activities include but are not limited to:
Perform Cybersecurity / Information Assurance for all customer managed systems, applications, and hardware
Design, implement, and maintain Department of Defense provided Security and Vulnerability tools including Host Based Security System (HBSS), Splunk, and Microsoft Defender for Endpoints
Support authorization/reauthorization efforts in alignment with the Department of Defense Risk Management Framework (RMF), NIST 800-53 (e.g. develop and apply Active Directory Group Policy Objects, develop deployment packages, etc.)
Analyze new security requirements, define courses of action, and design enterprise solutions, coordinating with engineering and operations teams to implement within the environment
Formalize and execute a process for communicating vulnerability results in a manner understood by technical and non-technical stakeholders based on risk tolerance and impact to the environment
Leverage vulnerability database sources to understand each weakness, its probability and remediation options, including vendor-supplied fixes and workarounds
Design, implement, and maintain, scripts used in asset discovery and vulnerability status
Conduct continuous independent discovery and vulnerability scans/security assessments of enterprise-wide assets and proactive control testing
Set up and execute Nessus scans; establish automated reporting
Document, prioritize, and formally report asset and vulnerability state, along with remediation recommendations and validation
Coordinate with system owners and system administrators/technical points of contact to identify system vulnerabilities, conduct vulnerability analysis, and formulate remediation strategies
Develop packages for complex remediation efforts and coordinate with vulnerability remediation specialists for deployment
Support and monitor patch management compliance across the infrastructure to align to audit requirements
Identify and apply DISA Security Technical Implementation Guide (STIG) benchmarks
Conduct manual STIG reviews
Support preparation of Plan of Action & Milestones (POAM) development to support compliance and authorization/reauthorization activities
Prepare and disseminate regular Cyber Compliance/vulnerability reporting; interact with the customer to explain results and address issues
Contribute to the development of Standard Operating Procedures, Work Instructions, User Guides, and checklists
Work as a team to consistently learn and share advanced skills and foster team excellence
Actively collaborate with the ISSO to develop, maintain, and enhance cyber security controls
Collaborate with security groups such as red teams, threat intelligence and risk management to form a holistic team dedicated to thwarting attackers and reducing attack surface
Position / Candidate Requirements
.
Active TS/SCI w/ Polygraph security clearance required
Bachelor's Degree in IT, Cybersecurity, Systems Engineering, Engineering, or a related discipline and 7+ Years of progressive experience
In lieu of a Bachelor's Degree, we will accept 10+ years of applicable progressive experience
DoD 8750 IAT Level II Certification (CCNA Security, CySA+, GICSP, GSEC, Security+ CE, CND, or SSCP)
Experience operating and maintaining a Nessus environment
Comply with DOD 8140.01 "Cyberspace Workforce Management" and maintain an appropriate and current IA certification to perform IA functions in accordance with Department of Defense (DoD) 8570.01-M, "Information Assurance Workforce Improvement Program"
Experience developing and implementing hardware and software solutions for data center and virtual infrastructure technologies.
Strong MS Excel, Word, PowerPoint, and Visio Skills
Ability to travel internationally up to 25% of the time.
Desired / Advantageous Qualifications
Experience with Hyperconverged architectures such as Cisco Hyper Flex, Nutanix, etc.
Experience with Cisco Unified Computing System (UCS), Fabric Interconnects and other similar technologies.
Experience with Virtualized Desktop Infrastructure, e.g., Citrix ZenDesktop, and/or VMware Horizon
Large on-premise storage engineering and administration experience with NetApp, Dell/EMC, Pure Storage, etc.
Experience designing and deploying Collaboration Platforms such as Microsoft SharePoint
Experience designing and deploying SQL Database Infrastructure such as Microsoft SQL Server
Experience engineering and implementing data center and campus area networks and security stacks.
Experience engineering and implementing platforms and services in a software-defined network environment
Experience with DoD IT security requirements including DISA STIG/SRGs.
Understanding of Department of Defense standards and best practices
Vendor certifications, VMware, Cisco, Microsoft, NetApp, etc.
Abilities:
Exposure to computer screens for an extended period of time.
Sitting for extended periods of time.
Reach by extending hands or arms in any direction.
Have finger dexterity in order to manipulate objects with fingers rather than whole hands or arms, for example, using a keyboard.
Listen to and understand information and ideas presented through spoken words and sentences.
Communicate information and ideas in speaking so others will understand.
Read and understand information and ideas presented in writing.
Apply general rules to specific problems to produce answers that make sense.
Identify and understand the speech of another person.
Applicants for this position may be required to obtain or provide proof of flu shots or of other vaccinations depending on customer requirements and nature of the position or demonstrate a valid basis for exception.
EOE Minorities/Females/Protected Veterans/Disabled
VEVRAA Contractor
ID
11026
Location
Annapolis Junction, MD
Apply Now (https://phg.tbe.taleo.net/phg04/ats/careers/v2/applyRequisition?org=MCDEAN&cws=62&rid=11026)
Position Summary
You will be working with a dynamic team of system engineers responsible for design decisions and implementation in all areas of systems architecture, systems, engineering, and the technical direction of multiple projects across multiple programs for OCONUS operations. Responsibilities include designing the systems architectural framework for large complex resilient systems and formulating high-level architectural solutions to ensure implemented solutions meet stakeholder needs, standards, and performance requirements. You will be communicating architectural designs and solutions to the entire technical program team and to end-customer stakeholders. You will work closely with stakeholders to gather technical requirements, architect solutions, and execute on deliverables. You will be responsible for providing multi-tenant, multi-cloud, cloud and on-prem IT infrastructure solutions to ensure the success of multiple customers across multiple programs.
Essential responsibilities and activities include but are not limited to:
Perform Cybersecurity / Information Assurance for all customer managed systems, applications, and hardware
Design, implement, and maintain Department of Defense provided Security and Vulnerability tools including Host Based Security System (HBSS), Splunk, and Microsoft Defender for Endpoints
Support authorization/reauthorization efforts in alignment with the Department of Defense Risk Management Framework (RMF), NIST 800-53 (e.g. develop and apply Active Directory Group Policy Objects, develop deployment packages, etc.)
Analyze new security requirements, define courses of action, and design enterprise solutions, coordinating with engineering and operations teams to implement within the environment
Formalize and execute a process for communicating vulnerability results in a manner understood by technical and non-technical stakeholders based on risk tolerance and impact to the environment
Leverage vulnerability database sources to understand each weakness, its probability and remediation options, including vendor-supplied fixes and workarounds
Design, implement, and maintain, scripts used in asset discovery and vulnerability status
Conduct continuous independent discovery and vulnerability scans/security assessments of enterprise-wide assets and proactive control testing
Set up and execute Nessus scans; establish automated reporting
Document, prioritize, and formally report asset and vulnerability state, along with remediation recommendations and validation
Coordinate with system owners and system administrators/technical points of contact to identify system vulnerabilities, conduct vulnerability analysis, and formulate remediation strategies
Develop packages for complex remediation efforts and coordinate with vulnerability remediation specialists for deployment
Support and monitor patch management compliance across the infrastructure to align to audit requirements
Identify and apply DISA Security Technical Implementation Guide (STIG) benchmarks
Conduct manual STIG reviews
Support preparation of Plan of Action & Milestones (POAM) development to support compliance and authorization/reauthorization activities
Prepare and disseminate regular Cyber Compliance/vulnerability reporting; interact with the customer to explain results and address issues
Contribute to the development of Standard Operating Procedures, Work Instructions, User Guides, and checklists
Work as a team to consistently learn and share advanced skills and foster team excellence
Actively collaborate with the ISSO to develop, maintain, and enhance cyber security controls
Collaborate with security groups such as red teams, threat intelligence and risk management to form a holistic team dedicated to thwarting attackers and reducing attack surface
Position / Candidate Requirements
.
Active TS/SCI w/ Polygraph security clearance required
Bachelor's Degree in IT, Cybersecurity, Systems Engineering, Engineering, or a related discipline and 7+ Years of progressive experience
In lieu of a Bachelor's Degree, we will accept 10+ years of applicable progressive experience
DoD 8750 IAT Level II Certification (CCNA Security, CySA+, GICSP, GSEC, Security+ CE, CND, or SSCP)
Experience operating and maintaining a Nessus environment
Comply with DOD 8140.01 "Cyberspace Workforce Management" and maintain an appropriate and current IA certification to perform IA functions in accordance with Department of Defense (DoD) 8570.01-M, "Information Assurance Workforce Improvement Program"
Experience developing and implementing hardware and software solutions for data center and virtual infrastructure technologies.
Strong MS Excel, Word, PowerPoint, and Visio Skills
Ability to travel internationally up to 25% of the time.
Desired / Advantageous Qualifications
Experience with Hyperconverged architectures such as Cisco Hyper Flex, Nutanix, etc.
Experience with Cisco Unified Computing System (UCS), Fabric Interconnects and other similar technologies.
Experience with Virtualized Desktop Infrastructure, e.g., Citrix ZenDesktop, and/or VMware Horizon
Large on-premise storage engineering and administration experience with NetApp, Dell/EMC, Pure Storage, etc.
Experience designing and deploying Collaboration Platforms such as Microsoft SharePoint
Experience designing and deploying SQL Database Infrastructure such as Microsoft SQL Server
Experience engineering and implementing data center and campus area networks and security stacks.
Experience engineering and implementing platforms and services in a software-defined network environment
Experience with DoD IT security requirements including DISA STIG/SRGs.
Understanding of Department of Defense standards and best practices
Vendor certifications, VMware, Cisco, Microsoft, NetApp, etc.
Abilities:
Exposure to computer screens for an extended period of time.
Sitting for extended periods of time.
Reach by extending hands or arms in any direction.
Have finger dexterity in order to manipulate objects with fingers rather than whole hands or arms, for example, using a keyboard.
Listen to and understand information and ideas presented through spoken words and sentences.
Communicate information and ideas in speaking so others will understand.
Read and understand information and ideas presented in writing.
Apply general rules to specific problems to produce answers that make sense.
Identify and understand the speech of another person.
Applicants for this position may be required to obtain or provide proof of flu shots or of other vaccinations depending on customer requirements and nature of the position or demonstrate a valid basis for exception.
EOE Minorities/Females/Protected Veterans/Disabled
VEVRAA Contractor