Information System Security Engineer - Senior bei Amentum
Amentum · San Antonio, Vereinigte Staaten Von Amerika · Onsite
- Senior
- Optionales Büro in San Antonio
Your Impact:
Are you interested in using your skills to help shape the Cyber, Security, & Intel space? If so, look no further. Amentum is seeking an Information System Security Engineer - Senior to join our team of passionate individuals in San Antonio, TX. In this role you will support challenging, mission-critical projects that make a direct impact on the Nation’s security and intelligence mission.
The mission of the Lone Wolf program is to support, operate, and maintain the Distributed Continuity Integrated Network – Top Secret Enterprise Services (DCIN-TS ES) which is a DoD-provided, TS/SCI, integrated voice, video, and data, global communications network that facilitates collaboration among senior leaders and key staff. The Lone Wolf program boasts a professional workforce comprised of specialists throughout the Information Technology lifecycle and who contribute to a positive work environment.
The Lone Wolf Team is Mission Focused, Customer Oriented, Process Guided, and Solutions Driven. Candidates interested in joining the team must be critical thinkers, have a strong work ethic, and be able to work independently or as a member of a team in a dynamic environment that supports a critical and rewarding mission. We value candidates who are detail-oriented while also being able to think and react quickly to emerging and unique problem sets. To be successful, you must be able to rapidly adapt and learn how to operate the front and back end of new products and processes. The Team is expected to grow and is looking for people who can apply disciplined processes and provide imaginative solutions that enable the adoption of innovation and emerging technologies that create opportunities for transformative change.
Responsibilities:
The duties and responsibilities of the Information System Security Engineer - Senior include, but are not limited to, the following:
- Experience creating custom dashboards, writing queries, building, and generating reports, and setting up alerts and notifications using all the Cyber tools (Splunk, Tenable, Trellix).
- Demonstrated proficiency with recognizing and onboarding new data sources into the cyber tools and analyzing the data for anomalies and trends.
- Primarily responsible for maintaining the test and operational environments to include all cybersecurity tool sets and collaborating with systems and network engineers.
- Use knowledge, skills, and ability to conduct research for designing, integrating, and implementing security controls into current and future products/systems thus ensuring these systems can be accredited based on compliance with the Joint Special Access Program Implementation Guide (JSIG).
- Recommend the components to implement system security requirements using intimate knowledge of security design best practices for information systems. throughout the system development life cycle to support the generation of the security engineering products.
- Assist with the design, deployment, and administration of a multi-site, distributed Splunk environment. Including Multi-site Clustering, Search Head Clustering, Universal Forwarders, Deployer, and Deployment Server.
- Configure, operate, and maintain Trellix and its components (ePolicy Orchestrator, Trellix Agent, Data Loss Prevention, Host Intrusion Prevention System, Policy Auditor, Asset Baseline Monitor, and Virus Scan Enterprise) on Windows and Linux creating exceptions to allow essential processes to continue uninterrupted.
- Administration/operation of information security compliance tools/platforms with a special concentration in managing Tenable Security Center and NESSUS.
- Provide Tier 1, 2, and 3 maintenance support for deployed cyber security technologies.
- Assist with periodic and regular security assessments.
- Assist with the development and maintenance of information security policies, standards, and control procedures to enable compliance with RMF.
- Assist with POA&M management, mitigation statement formulation, and interfacing with system administrators to resolve open findings of high and at-risk systems.
- Perform security assessments on hardware/software products to include physical, virtual, boundary, and security appliances.
- Implement continuous monitoring tools and processes, development of improvements to security assessments regarding accuracy and efficiency as well as integration of new techniques to improve the confidentiality – integrity – availability of network/operational systems at multiple classifications levels.
%3Cp style=%22font-family: Arial;%22%3E%3Cstrong%3ERequirements: %3C/strong%3E%3C/p%3E%0A%3Cul%3E%0A%3Cli style=%22font-family: Arial;%22%3EExperience in Splunk role while working in a Splunk Clustered Environment%3C/li%3E%0A%3Cli style=%22font-family: Arial;%22%3EKnowledge and experience with NESSUS/ACAS and Trellix administration%3C/li%3E%0A%3Cli style=%22font-family: Arial;%22%3EMust be able to work a 40-hour work week, normally Monday through Friday.%26nbsp;%3C/li%3E%0A%3Cli style=%22font-family: Arial;%22%3EAbility to work overtime during critical peaks and be available to meet last-minute requests for overtime if needed.%26nbsp;%3C/li%3E%0A%3Cli style=%22font-family: Arial;%22%3EAbility to travel (5-10%) primarily within 75 miles.%3C/li%3E%0A%3Cli style=%22font-family: Arial;%22%3EFamiliarity with MS Office applications such as Excel, Word, Outlook, SharePoint, Project, and Visio. %26nbsp;%3C/li%3E%0A%3Cli style=%22font-family: Arial;%22%3EExceptional attention to detail; excellent verbal and written communication skills; strong critical thinking, organizational, time-management, and problem-solving skills. %26nbsp;%3C/li%3E%0A%3Cli style=%22font-family: Arial;%22%3EAbility to work both independently and as part of a team in a dynamic environment.%3C/li%3E%0A%3C/ul%3E%0A%3Cp style=%22font-family: Arial;%22%3E%3Cstrong%3EClearance Required:%26nbsp;%3C/strong%3E%3C/p%3E%0A%3Cul%3E%0A%3Cli style=%22font-family: Arial;%22%3EMust have active Top-Secret clearance with SCI or TS with the ability to acquire SCI %26nbsp;%3C/li%3E%0A%3C/ul%3E%0A%3Cp style=%22font-family: Arial;%22%3E%3Cstrong%3EMinimum Education:%3C/strong%3E%26nbsp;%3C/p%3E%0A%3Cul%3E%0A%3Cli style=%22font-family: Arial;%22%3EBachelor%26rsquo;s Degree in a related field (Cyber and/or Engineering)%3C/li%3E%0A%3C/ul%3E%0A%3Cp style=%22font-family: Arial;%22%3E%3Cstrong%3EMinimum Years of Experience:%26nbsp;%3C/strong%3E%3C/p%3E%0A%3Cul%3E%0A%3Cli style=%22font-family: Arial;%22%3E10 years of relevant experience %26nbsp;%3C/li%3E%0A%3C/ul%3E%0A%3Cp style=%22font-family: Arial;%22%3E%3Cstrong%3ERequired Certifications:%3C/strong%3E%3C/p%3E%0A%3Cul%3E%0A%3Cli style=%22font-family: Arial;%22%3EMust possess, or be able to obtain, one of the following 8140 IAT Level II or III baseline certifications before a start date:%0A%3Cul%3E%0A%3Cli style=%22font-family: Arial;%22%3ELevel II certs include %26ndash; CCNA Security, GISCP, GSEC, Security+ CE, SSCP%3C/li%3E%0A%3Cli style=%22font-family: Arial;%22%3ELevel III certs include %26ndash; CASP CE, CCNP Security, CISA, CISSP (or Associate), GCED, GCIH%3C/li%3E%0A%3C/ul%3E%0A%3C/li%3E%0A%3C/ul%3E%0A%3Cp style=%22font-family: Arial;%22%3E%3Cstrong%3EPreferred:%3C/strong%3E%26nbsp;%3C/p%3E%0A%3Cul%3E%0A%3Cli style=%22font-family: Arial;%22%3EAbility to work within VMWare, VCenter, and Nutanix building Red Hat systems%3C/li%3E%0A%3Cli style=%22font-family: Arial;%22%3EConfigure, operate, and maintain ForeScout, Tripwire and Ivanti tool suites%3C/li%3E%0A%3Cli style=%22font-family: Arial;%22%3EPossess understanding and experience with common cybersecurity toolsets and processes to include STIGS, IAVA Management and Implementation, and OPORD/FRAGO support%3C/li%3E%0A%3Cli style=%22font-family: Arial;%22%3EDemonstrated experience in analysis simulation environment, configuration/troubleshooting software/hardware enhancements, application deployments, and infrastructure upgrades in a dynamic information system hosting%26nbsp;environment%3C/li%3E%0A%3Cli style=%22font-family: Arial;%22%3EProficiency with Red Hat/Linux%3C/li%3E%0A%3Cli style=%22font-family: Arial;%22%3EManaging Red Hat Satellite/Ansible%26nbsp;%3C/li%3E%0A%3Cli style=%22font-family: Arial;%22%3EAt least one of the following certifications is preferred:%0A%3Cul%3E%0A%3Cli style=%22font-family: Arial;%22%3ESplunk Core Certified Advanced Power User%3C/li%3E%0A%3Cli style=%22font-family: Arial;%22%3ESplunk Enterprise Certified Administrator%3C/li%3E%0A%3Cli style=%22font-family: Arial;%22%3ESplunk Enterprise Certified Architect%3C/li%3E%0A%3Cli style=%22font-family: Arial;%22%3ESplunk Core Certified Consultant%3C/li%3E%0A%3C/ul%3E%0A%3C/li%3E%0A%3C/ul%3E%0A%3Cp style=%22font-family: Arial;%22%3E#javelin #externalreferral%3C/p%3E
*!Amentum is proud to be an Equal Opportunity Employer. Our hiring practices provide equal opportunity for employment without regard to race, religion, color, sex, gender, national origin, age, United States military veteran’s status, ancestry, sexual orientation, gender identity, marital status, family structure, medical condition including genetic characteristics or information, veteran status, or mental or physical disability so long as the essential functions of the job can be performed with or without reasonable accommodation, or any other protected category under federal, state, or local law. Learn more about your rights under Federal EEO laws and supplemental language at EEO including Disability/Protected Veterans and Labor Laws Posters. Jetzt bewerben