Information Systems Security Engineer
What you will be doing:
In the role of an Information Systems Security Engineer, you will be responsible for performing or reviewing technical security assessments of computing environments to identify vulnerabilities and non-compliance with established Information Assurance (IA) standards and regulations. You will then recommend mitigation strategies. Additionally, you will validate and verify system security requirements definitions and analysis and establish system security designs. Your responsibilities will also include designing, developing, implementing, and integrating IA and security systems and system components for networking, computing, and enclave environments, including those with multiple enclaves and differing data protection/classification requirements. You will need to ensure that IA is built into systems deployed to operational environments and assist architects and systems developers in identifying and implementing appropriate information security functionality to ensure uniform application of Agency security policy and enterprise solutions. Furthermore, you will support the building of security architectures and enforce the design and implementation of trusted relations among external systems and architectures. As part of your role, you'll assess and mitigate system security threats/risks throughout the program life cycle and contribute to security planning, assessment, risk analysis, risk management, certification, and awareness activities for system and networking operations., you will perform or review technical security assessments of computing environments to identify points of vulnerability and non-compliance with established Information Assurance (IA) standards and regulations and recommend mitigation strategies. Validates and verifies system security requirements definitions and analysis and establishes system security designs. Design, develop, implement, and integrate IA and security systems and system components, including those for networking, computing, and enclave environments, including those with multiple enclaves and differing data protection/classification requirements. Builds IA into systems deployed to operational environments. Assists architects and systems developers in identifying and implementing appropriate information security functionality to ensure uniform application of Agency security policy and enterprise solutions. Supports the building of security architectures. Enforce the design and implementation of trusted relations among external systems and architectures. Assesses and mitigates system security threats/risks throughout the program life cycle. Contributes to the security planning, assessment, risk analysis, risk management, certification, and awareness activities for system and networking operations.
Requirements:
- Reviewing security architectures, firewall configurations, IDS/IPS, and security controls for new and proposed systems.
- Prevention and early detection and resolution of risks to high value assets.
- Development and management of strategic and tactical physical, personnel and procedural security programs.
- Architect, design, implement, support, and evaluate security-focused tools and services including project leadership roles.
- Providing software vulnerability remediation advice to software developers and software development teams.
- Implementing security vulnerability testing tools to provide continuous monitoring and patch verification.
- Test and evaluate products in a lab environment.
- Reviews certification and accreditation (C&A) documentation, providing feedback on completeness and compliance of its content.
- Knowledge of 8570 controls, testing information systems for compliance of the controls, and the creation of test cases.
- Knowledge of incident response and the creation, execution, and reporting of such activities.
- Knowledge of Firewalls, IDS/IPS, intrusion detection, VLANS, routing and other network security technologies.
- Knowledge of virtualization technologies including virtual firewalls, networking and segmentation.
- Knowledge of networking and firewall configuration and monitoring.
- Knowledge of SIEM technologies such as Splunk and creation of security event related dashboards.
- Knowledge of Malware identification, containment, and eradication.
- Knowledge of access control systems, PKI, multi-factor authentication, and entitlements management.
- Proficient in Microsoft Windows and Linux operating systems.
- Provide input into the development of security policies and procedures.
- Provide detailed security recommendations for the secure development and maintenance of systems.
- Evaluate and recommend new and emerging security products and technologies.
- Participate in projects that develop new intellectual property.
- Excellent written and verbal communication skills.
- Excellent leadership skills and teamwork skills.
- Results oriented, high energy, self-motivated.
- May be required to respond to after-hours requests as required in a 24 x 7 environment.
Certifications Required:
- DoD 8570 compliance with IASAE Level 3 is required.
Experience and Education Requirement:
- Fourteen (14) years’ experience as an ISSE on programs and contracts of similar scope, type, and complexity within the Federal Government is required.
- Bachelor’s degree in Computer Science, Information Assurance, Information Security System Engineering, or related discipline from an accredited college or university is required.
- Four (4) years of additional ISSE experience may be substituted for a bachelor’s degree
Independent Software is an Equal Opportunity Employer EOE, M/F/D/V.