Logo
M.C. Dean, Inc.

Cybersecurity Engineer 4 - Annapolis Junction, MD

M.C. Dean, Inc., Annapolis Junction, Maryland, United States, 20701


Cybersecurity Engineer 4 - Annapolis Junction, MD

ID

11026

Location

Annapolis Junction, MD

Apply Now (https://phg.tbe.taleo.net/phg04/ats/careers/v2/applyRequisition?org=MCDEAN&cws=62&rid=11026)

Position Summary

You will be working with a dynamic team of system engineers responsible for design decisions and implementation in all areas of systems architecture, systems, engineering, and the technical direction of multiple projects across multiple programs for OCONUS operations. Responsibilities include designing the systems architectural framework for large complex resilient systems and formulating high-level architectural solutions to ensure implemented solutions meet stakeholder needs, standards, and performance requirements. You will be communicating architectural designs and solutions to the entire technical program team and to end-customer stakeholders. You will work closely with stakeholders to gather technical requirements, architect solutions, and execute on deliverables. You will be responsible for providing multi-tenant, multi-cloud, cloud and on-prem IT infrastructure solutions to ensure the success of multiple customers across multiple programs.

Essential responsibilities and activities include but are not limited to:

Perform Cybersecurity / Information Assurance for all customer managed systems, applications, and hardware

Design, implement, and maintain Department of Defense provided Security and Vulnerability tools including Host Based Security System (HBSS), Splunk, and Microsoft Defender for Endpoints

Support authorization/reauthorization efforts in alignment with the Department of Defense Risk Management Framework (RMF), NIST 800-53 (e.g. develop and apply Active Directory Group Policy Objects, develop deployment packages, etc.)

Analyze new security requirements, define courses of action, and design enterprise solutions, coordinating with engineering and operations teams to implement within the environment

Formalize and execute a process for communicating vulnerability results in a manner understood by technical and non-technical stakeholders based on risk tolerance and impact to the environment

Leverage vulnerability database sources to understand each weakness, its probability and remediation options, including vendor-supplied fixes and workarounds

Design, implement, and maintain, scripts used in asset discovery and vulnerability status

Conduct continuous independent discovery and vulnerability scans/security assessments of enterprise-wide assets and proactive control testing

Set up and execute Nessus scans; establish automated reporting

Document, prioritize, and formally report asset and vulnerability state, along with remediation recommendations and validation

Coordinate with system owners and system administrators/technical points of contact to identify system vulnerabilities, conduct vulnerability analysis, and formulate remediation strategies

Develop packages for complex remediation efforts and coordinate with vulnerability remediation specialists for deployment

Support and monitor patch management compliance across the infrastructure to align to audit requirements

Identify and apply DISA Security Technical Implementation Guide (STIG) benchmarks

Conduct manual STIG reviews

Support preparation of Plan of Action & Milestones (POAM) development to support compliance and authorization/reauthorization activities

Prepare and disseminate regular Cyber Compliance/vulnerability reporting; interact with the customer to explain results and address issues

Contribute to the development of Standard Operating Procedures, Work Instructions, User Guides, and checklists

Work as a team to consistently learn and share advanced skills and foster team excellence

Actively collaborate with the ISSO to develop, maintain, and enhance cyber security controls

Collaborate with security groups such as red teams, threat intelligence and risk management to form a holistic team dedicated to thwarting attackers and reducing attack surface

Position / Candidate Requirements

.

Active TS/SCI w/ Polygraph security clearance required

Bachelor's Degree in IT, Cybersecurity, Systems Engineering, Engineering, or a related discipline and 7+ Years of progressive experience

In lieu of a Bachelor's Degree, we will accept 10+ years of applicable progressive experience

DoD 8750 IAT Level II Certification (CCNA Security, CySA+, GICSP, GSEC, Security+ CE, CND, or SSCP)

Experience operating and maintaining a Nessus environment

Comply with DOD 8140.01 "Cyberspace Workforce Management" and maintain an appropriate and current IA certification to perform IA functions in accordance with Department of Defense (DoD) 8570.01-M, "Information Assurance Workforce Improvement Program"

Experience developing and implementing hardware and software solutions for data center and virtual infrastructure technologies.

Strong MS Excel, Word, PowerPoint, and Visio Skills

Ability to travel internationally up to 25% of the time.

Desired / Advantageous Qualifications

Experience with Hyperconverged architectures such as Cisco Hyper Flex, Nutanix, etc.

Experience with Cisco Unified Computing System (UCS), Fabric Interconnects and other similar technologies.

Experience with Virtualized Desktop Infrastructure, e.g., Citrix ZenDesktop, and/or VMware Horizon

Large on-premise storage engineering and administration experience with NetApp, Dell/EMC, Pure Storage, etc.

Experience designing and deploying Collaboration Platforms such as Microsoft SharePoint

Experience designing and deploying SQL Database Infrastructure such as Microsoft SQL Server

Experience engineering and implementing data center and campus area networks and security stacks.

Experience engineering and implementing platforms and services in a software-defined network environment

Experience with DoD IT security requirements including DISA STIG/SRGs.

Understanding of Department of Defense standards and best practices

Vendor certifications, VMware, Cisco, Microsoft, NetApp, etc.

Abilities:

Exposure to computer screens for an extended period of time.

Sitting for extended periods of time.

Reach by extending hands or arms in any direction.

Have finger dexterity in order to manipulate objects with fingers rather than whole hands or arms, for example, using a keyboard.

Listen to and understand information and ideas presented through spoken words and sentences.

Communicate information and ideas in speaking so others will understand.

Read and understand information and ideas presented in writing.

Apply general rules to specific problems to produce answers that make sense.

Identify and understand the speech of another person.

Applicants for this position may be required to obtain or provide proof of flu shots or of other vaccinations depending on customer requirements and nature of the position or demonstrate a valid basis for exception.

EOE Minorities/Females/Protected Veterans/Disabled

VEVRAA Contractor