Lead Cybersecurity Engineer Job at CDIT in Scott Air Force Base
CDIT - Scott Air Force Base, IL, United States
Work at CDIT
Overview
- View job
Overview
Lead Cybersecurity Engineer
The Lead Cybersecurity Engineer shall have a bachelor's degree in Information Technology, Engineering, or a related field with a minimum of 10 years of progressive enterprise engineering and management experience. This position requires an IAT III certification.
The lead cybersecurity engineer will be the principle technical advisor and subject matter expert for system categorization, security controls selection, security controls implementation, security controls assessment, and ATO for approved cyber security tools. The lead cybersecurity engineer must have demonstrated the ability to manage complex tasks and teams.
The lead cybersecurity engineer's responsibilities include but are not limited to:
•Provide expertise in the engineering design, development, direction, and implementation of enterprise network cyber defense capabilities to prevent sophisticated cyber threats and vulnerabilities or detect when prevention fails.
•Understand the fundamentals of layered defense and zero trust technologies and processes.
•Understand the lifecycle of the network threats, attack vectors and methods of exploitation.
•Have specialized knowledge in computer network theory and understand IT standards and cyber security tools' architectures, including but not limited to, the Open System Interconnection (OSI) model and the methods of exploiting those standards.
•Be familiar with the utilization, configuration, and implementation of industry standard cyber defense capabilities, including but not limited to, web content filters, email security capabilities, Intrusion Detection System (IDS), Intrusion Prevention System (IPS), Host-Based Security System (HBSS), Security Event and Incident Management (SEIM), DNS security practices, advanced log analysis, network monitoring, network flow analysis, packet capture analysis, network proxies, firewalls, anti-virus capabilities, and access control lists.