Cyber Engineer bei Bespoke Technologies, Inc.
Bespoke Technologies, Inc. · Chantilly, Vereinigte Staaten Von Amerika · Onsite
- Professional
- Optionales Büro in Chantilly
BT-144 – Cyber Security Project Engineer
Location: Chantilly (fully on-site, no remote option)
**MUST HAVE A POLY CLEARANCE TO APPLY. Those without a Poly clearance will not be considered.**
Introduction
The Cyber Security Team is responsible for managing the office’s system assessment and authorization processes as well as security engineering expertise in the systems development lifecycle in advancing new cyber security utilities to fruition that enable threat awareness, monitoring of cyber threats, and other forward thinking enablement activities in support of strategic goals. The Cyber Security Team is responsible for providing cyber security expertise across numerous systems and working closely with stakeholders and external partners to facilitate activities and perform tasks in support of successful system authorizations consistent with formalized processes.
The Cyber Security team works with others to identify, develop roadmaps, and implement deployment strategies for advanced cyber security tools, as well as provides best practices to make recommendations on securing a diverse and dynamic infrastructure and numerous mission related systems.
Work Requirements
- The Candidate shall assist with shepherding multiple IT systems through the Assessment and Accreditation (A&A) processes.
- The Candidate shall assist with continuous monitoring of IT systems that are required to sustain accreditation of these systems.
- The Candidate shall be knowledgeable in Networking, Linux, Windows, Log analysis, Malware detection and mitigations, and the A&A process of systems.
- The Candidate shall collaborate with personnel to improve requested metrics.
- The Candidate shall provide responses to questions from system security managers.
- The Candidate shall create A&A documentation such as System Security Plans (SSP) and Continuous Monitoring plans.
- The Candidate shall identify countermeasures to the latest IT threats.
- The Candidate shall identify potential exploitation vulnerabilities and propose mitigation approaches for ongoing IT operations.
- The Candidate shall perform configurations of security related systems.
- The Candidate shall utilize various security tools to perform log analysis, security incident response,
- vulnerability scanning, and automation of repetitive tasking’s.
- The Candidate shall decompose client requirements into technical solutions.
- The Candidate shall participate and brief at information systems architectural boards at the Group level.
- The Candidate shall work in a 24 hour, 7 day (on-call rotation) a week environment providing in-depth Tier 2 and Tier 3 level support and problem resolution for technology products and applications.
- The Candidate shall coordinate engineering projects including performing technical risk assessment, de-conflict implementations, and resolve technical questions or conflicts.
Required Skills and Demonstrated Experience
- Demonstrated experience in cyber security, InfoSec, security engineering, or network engineering.
- Demonstrated experience with vulnerability scanning tools.
- Demonstrated experience analyzing and documenting test results.
- Demonstrated experience assessing systems against information assurance policies and regulations.
- Demonstrated experience communicating complex technical concepts to both technical and non-technical audiences.
- Demonstrated experience coordinating and performing security testing.
- Demonstrated experience developing risk assessment and certification reports.
- Demonstrated experience leading security accreditation efforts for enterprise systems.
- Demonstrated experience recommending mitigating countermeasures to identified threats, vulnerabilities, or shortfalls.
- Demonstrated experience with Linux operating system.
- Demonstrated experience writing and reviewing documents such as requirements specifications, system architecture, design documents, test plans, or security plans.
- Demonstrated experience decomposing functional requirements into technical requirements.
- Demonstrated experience analyzing existing systems and identifying necessary corrective actions and improvements.
- Demonstrated experience preparing program documentation such as CONOPS, SSP, and preparing materials to support system accreditation.
Highly Desired Skills and Demonstrated Experience
- Demonstrated experience with creating and maintaining integrated master schedules.
- Demonstrated experience with offensive security practices.
- Demonstrated experience explaining protocols, technical procedures and processes clearly and accurately to both technical and non-technical audiences.