TrustedQA, Inc.
Cybersecurity Engineer (TS Clearances)
TrustedQA, Inc., Norfolk, Virginia, United States, 23500
Position:
Cybersecurity Engineers
Openings:
5+
Customer:
Naval Information Warfare Center Atlantic (NIWC Atlantic)
Locations:
Charleston, SC, Norfolk, VA, Washington, DC, San Diego, CA
Summary:
TrustedQA is supporting the Naval Information Warfare Center Atlantic (NIWC Atlantic) with its Information Technology (IT) and Operational Technology (OT) software engineering, systems engineering, enterprise cybersecurity implementations and operations, advanced technology, and project management services. The scope of our support centers around the below areas:
Risk Management Framework (RMF) Support
Step 0 – Preparation, Step 1 – Categorize System, Step 2 – Select Security Controls, Step 3 - Implement Security Controls, Step 4 – Assess Security Controls, Step 5 – Authorize System, Step 6 – Monitor Security Controls, assist with Package Submitting Officer (PSO) with Echelon II RMF Package reviews (i.e., triage, checklists, categorization)
Validation Services for RMF A&A
Conduct validation procedures to confirm or establish by testing, evaluation, examining, investigating, or competent evidence that IS assigned CCIs are implemented correctly and are effective in their application and draft an executive summary documented within the RMF package.
Security Assessments
Execute manual STIG Checklists
Use STIG Viewer to import all system applicable ACAS and SCAP automated scans and all system applicable STIG Checklists
Use system appropriate software (Powershell, Dumpsec, Registry Editor, MMC Console with snap-ins (Certificates, Component Services, Event Viewer, Group Policy Object Editor, Local Users and Groups, Security Configuration and Analysis with the latest OS STIG, Services and Shared Folders), etc.) to enable all manual checks are completed.
Cybersecurity Documentation
Assist with the preparation and submission of all RMF A&A packages required to support the IT and OT systems.
Penetration Testing
Execute penetration testing based on the engagement documentation. This includes, but is not limited to: password strength and quality assessments; SIEM gap analysis, Web Application testing and exploitation, wireless network exploitation, phishing campaigns, data exfiltration, automated network share crawls for PII and other sensitive data, exploitation of lateral movement, and cryptographic strength assessments.
Enterprise Security Architecture and Solutions Design and Deployment
Establish a new cybersecurity architecture and a standard set of controls
Evaluate current and future network designs to ensure that security is incorporated.
Establish an Enterprise Data Security Architecture that identifies sensitive data elements
Evaluate information security threat models and methodologies.
Create actionable intelligence through triggers, filters, and signatures
Support the deployment of information security solutions at all layers of the OSI model
Hands-on Technical Security Risk Assessments
Assist Agile DevSecOps team with integrating security into cutting-edge automated development pipelines
Implement and operate security tools - use configuration management tools (e.g. Ansible, Chef, PowerShell) to manage systems. The security tools include but are not limited to: Splunk, Exabeam Threat Hunter, Prisma Cloud Compute (formerly Twistlock), Tenable.io, Cisco Next Generation Firewall (formerly FirePOWER), Cisco Secure Network Analytics (formerly StealthWatch), Cisco Secure Malware Analytics (formerly Threat Grid), Cisco Secure Workload (formerly Tetration), CrowdStrike Falcon, Modern static code analysis tools (e.g. CheckMarx, Coverity, etc.), open-source library compliance trackers (e.g. Black Duck, CheckMarx, Sonatype Nexus iqServer, etc.), ZScaler or similar solution providing Zero Trust Network Access (ZTNA) / Secure Access Service Edge (SASE) capabilities.
Cloud Security
Should be versed with Amazon Web Services (AWS), Azure, Google Cloud Platform (GCP), and Microsoft 365 - architecture and design of the respective environments including associated services, how the cloud interconnects with agencies, and how to conduct business within the environment in a secure manner.
Security Information and Event Management (SIEM) and Development
Operate the Security Information and Event Management (SIEM) suite of tools and work collaboratively with development and operational teams to set and implement standards for logging. The system currently in use is Splunk Enterprise.
Security Code Review
Conduct web application and code testing
#J-18808-Ljbffr
Cybersecurity Engineers
Openings:
5+
Customer:
Naval Information Warfare Center Atlantic (NIWC Atlantic)
Locations:
Charleston, SC, Norfolk, VA, Washington, DC, San Diego, CA
Summary:
TrustedQA is supporting the Naval Information Warfare Center Atlantic (NIWC Atlantic) with its Information Technology (IT) and Operational Technology (OT) software engineering, systems engineering, enterprise cybersecurity implementations and operations, advanced technology, and project management services. The scope of our support centers around the below areas:
Risk Management Framework (RMF) Support
Step 0 – Preparation, Step 1 – Categorize System, Step 2 – Select Security Controls, Step 3 - Implement Security Controls, Step 4 – Assess Security Controls, Step 5 – Authorize System, Step 6 – Monitor Security Controls, assist with Package Submitting Officer (PSO) with Echelon II RMF Package reviews (i.e., triage, checklists, categorization)
Validation Services for RMF A&A
Conduct validation procedures to confirm or establish by testing, evaluation, examining, investigating, or competent evidence that IS assigned CCIs are implemented correctly and are effective in their application and draft an executive summary documented within the RMF package.
Security Assessments
Execute manual STIG Checklists
Use STIG Viewer to import all system applicable ACAS and SCAP automated scans and all system applicable STIG Checklists
Use system appropriate software (Powershell, Dumpsec, Registry Editor, MMC Console with snap-ins (Certificates, Component Services, Event Viewer, Group Policy Object Editor, Local Users and Groups, Security Configuration and Analysis with the latest OS STIG, Services and Shared Folders), etc.) to enable all manual checks are completed.
Cybersecurity Documentation
Assist with the preparation and submission of all RMF A&A packages required to support the IT and OT systems.
Penetration Testing
Execute penetration testing based on the engagement documentation. This includes, but is not limited to: password strength and quality assessments; SIEM gap analysis, Web Application testing and exploitation, wireless network exploitation, phishing campaigns, data exfiltration, automated network share crawls for PII and other sensitive data, exploitation of lateral movement, and cryptographic strength assessments.
Enterprise Security Architecture and Solutions Design and Deployment
Establish a new cybersecurity architecture and a standard set of controls
Evaluate current and future network designs to ensure that security is incorporated.
Establish an Enterprise Data Security Architecture that identifies sensitive data elements
Evaluate information security threat models and methodologies.
Create actionable intelligence through triggers, filters, and signatures
Support the deployment of information security solutions at all layers of the OSI model
Hands-on Technical Security Risk Assessments
Assist Agile DevSecOps team with integrating security into cutting-edge automated development pipelines
Implement and operate security tools - use configuration management tools (e.g. Ansible, Chef, PowerShell) to manage systems. The security tools include but are not limited to: Splunk, Exabeam Threat Hunter, Prisma Cloud Compute (formerly Twistlock), Tenable.io, Cisco Next Generation Firewall (formerly FirePOWER), Cisco Secure Network Analytics (formerly StealthWatch), Cisco Secure Malware Analytics (formerly Threat Grid), Cisco Secure Workload (formerly Tetration), CrowdStrike Falcon, Modern static code analysis tools (e.g. CheckMarx, Coverity, etc.), open-source library compliance trackers (e.g. Black Duck, CheckMarx, Sonatype Nexus iqServer, etc.), ZScaler or similar solution providing Zero Trust Network Access (ZTNA) / Secure Access Service Edge (SASE) capabilities.
Cloud Security
Should be versed with Amazon Web Services (AWS), Azure, Google Cloud Platform (GCP), and Microsoft 365 - architecture and design of the respective environments including associated services, how the cloud interconnects with agencies, and how to conduct business within the environment in a secure manner.
Security Information and Event Management (SIEM) and Development
Operate the Security Information and Event Management (SIEM) suite of tools and work collaboratively with development and operational teams to set and implement standards for logging. The system currently in use is Splunk Enterprise.
Security Code Review
Conduct web application and code testing
#J-18808-Ljbffr