Logo
TrustedQA, Inc.

Cybersecurity Engineer (TS Clearances)

TrustedQA, Inc., Norfolk, Virginia, United States, 23500


Position:

Cybersecurity Engineers

Openings:

5+

Customer:

Naval Information Warfare Center Atlantic (NIWC Atlantic)

Locations:

Charleston, SC, Norfolk, VA, Washington, DC, San Diego, CA

Summary:

TrustedQA is supporting the Naval Information Warfare Center Atlantic (NIWC Atlantic) with its Information Technology (IT) and Operational Technology (OT) software engineering, systems engineering, enterprise cybersecurity implementations and operations, advanced technology, and project management services. The scope of our support centers around the below areas:

Risk Management Framework (RMF) Support

Step 0 – Preparation, Step 1 – Categorize System, Step 2 – Select Security Controls, Step 3 - Implement Security Controls, Step 4 – Assess Security Controls, Step 5 – Authorize System, Step 6 – Monitor Security Controls, assist with Package Submitting Officer (PSO) with Echelon II RMF Package reviews (i.e., triage, checklists, categorization)

Validation Services for RMF A&A

Conduct validation procedures to confirm or establish by testing, evaluation, examining, investigating, or competent evidence that IS assigned CCIs are implemented correctly and are effective in their application and draft an executive summary documented within the RMF package.

Security Assessments

Execute manual STIG Checklists

Use STIG Viewer to import all system applicable ACAS and SCAP automated scans and all system applicable STIG Checklists

Use system appropriate software (Powershell, Dumpsec, Registry Editor, MMC Console with snap-ins (Certificates, Component Services, Event Viewer, Group Policy Object Editor, Local Users and Groups, Security Configuration and Analysis with the latest OS STIG, Services and Shared Folders), etc.) to enable all manual checks are completed.

Cybersecurity Documentation

Assist with the preparation and submission of all RMF A&A packages required to support the IT and OT systems.

Penetration Testing

Execute penetration testing based on the engagement documentation. This includes, but is not limited to: password strength and quality assessments; SIEM gap analysis, Web Application testing and exploitation, wireless network exploitation, phishing campaigns, data exfiltration, automated network share crawls for PII and other sensitive data, exploitation of lateral movement, and cryptographic strength assessments.

Enterprise Security Architecture and Solutions Design and Deployment

Establish a new cybersecurity architecture and a standard set of controls

Evaluate current and future network designs to ensure that security is incorporated.

Establish an Enterprise Data Security Architecture that identifies sensitive data elements

Evaluate information security threat models and methodologies.

Create actionable intelligence through triggers, filters, and signatures

Support the deployment of information security solutions at all layers of the OSI model

Hands-on Technical Security Risk Assessments

Assist Agile DevSecOps team with integrating security into cutting-edge automated development pipelines

Implement and operate security tools - use configuration management tools (e.g. Ansible, Chef, PowerShell) to manage systems. The security tools include but are not limited to: Splunk, Exabeam Threat Hunter, Prisma Cloud Compute (formerly Twistlock), Tenable.io, Cisco Next Generation Firewall (formerly FirePOWER), Cisco Secure Network Analytics (formerly StealthWatch), Cisco Secure Malware Analytics (formerly Threat Grid), Cisco Secure Workload (formerly Tetration), CrowdStrike Falcon, Modern static code analysis tools (e.g. CheckMarx, Coverity, etc.), open-source library compliance trackers (e.g. Black Duck, CheckMarx, Sonatype Nexus iqServer, etc.), ZScaler or similar solution providing Zero Trust Network Access (ZTNA) / Secure Access Service Edge (SASE) capabilities.

Cloud Security

Should be versed with Amazon Web Services (AWS), Azure, Google Cloud Platform (GCP), and Microsoft 365 - architecture and design of the respective environments including associated services, how the cloud interconnects with agencies, and how to conduct business within the environment in a secure manner.

Security Information and Event Management (SIEM) and Development

Operate the Security Information and Event Management (SIEM) suite of tools and work collaboratively with development and operational teams to set and implement standards for logging. The system currently in use is Splunk Enterprise.

Security Code Review

Conduct web application and code testing

#J-18808-Ljbffr