Blackspoke ยท 2 days ago
Information Assurance Security Engineer
Wonder how qualified you are to the job?
Maximize your interview chances
ConsultingInformation Technology
Growth Opportunities
Insider Connection @Blackspoke
Responsibilities
Provide expert technical services on all aspects of Information Security, including writing information security policy drafts, advising and assessing system design/architecture, managing multi-agency information sharing and integration security, and maintaining affiliations with high-level personnel.
Perform tasks like incident response, system access approval, audit log review, Configuration Control Board, report, document, and investigate security-related incidents, and assist with corrective measures development and implementation.
Support efforts to operate, maintain, and dispose of information system materials in accordance with security directives, policies, and practices, ensuring IA hardware and software compliance with security configuration guides, and enforcing IA policies and procedures.
Conduct forensic traffic/log analysis, respond to escalated troubleshooting requests, maintain and administer network infrastructure standards, documentation, and fault tolerance, and perform/support integration testing as required.
Install, harden, deploy, document, troubleshoot network perimeter security technologies, script on Unix and/or RHEL OS, and demonstrate proficiency in network routing/vlan technology.
Qualification
Find out how your skills align with this job's requirements. If anything seems off, you can easily click on the tags to select or unselect skills to reflect your actual expertise.
Required
IAM II certification to start in accordance with DOD 8570.1M.
Bachelor's Degree in Computer Science or a related technical discipline, or the equivalent combination of education, professional training, or work experience.
10-15 years of related experience in data security administration.
US Citizenship required.
Preferred
CISSP certification or equivalent (CAP, GSLC, CISM).
System administration experience.
Network engineering experience.
System design and development experience.
Knowledge of and experience with ICD 503 and familiarity with Cloud Infrastructure/AWS-based solutions.
Understanding of how the customer's RMF process works and how system security requirements will be met.
Work with all IT groups to build IT systems with security planned from the start and identify the level of protection systems will need.
Act as the representative of the Information System Security Manager ensuring compliance with IS security procedures.
Support efforts to operate, maintain, and dispose of information system materials in accordance with security directives, policies, and practices.
Generate and implement requisite security training ensuring user security awareness of responsibilities prior to system access.
Initiate protective and corrective measures when incidents or vulnerabilities are discovered.
Ensure IA hardware and software comply with security configuration guides.
Implement and enforce IA policies and procedures as defined by A&A documentation.
Ensure users are aware of their IA responsibilities.
Perform Operations & Sustainment (O&S) functions for the NCE network security infrastructure.
Perform maintenance and/or advanced configuration of equipment to protect the network from emerging cyber threats.
Conduct forensic traffic/log analysis to isolate issues or respond to analyst alerts.
Respond to escalated troubleshooting requests.
Maintain and administer network infrastructure standards, documentation, and fault tolerance.
Present Monitoring/Test Results and Reports as required.
Perform/support integration testing as required.
Participate in special projects as required.
Review Plan of Action and Milestones (POA&Ms) and conduct a technical decomposition categorization, remediation, and lien resolution.
Execute remediation process to implement technical solutions to address vulnerability findings via ACAS security scan.
Install, harden, deploy, document, and troubleshoot network perimeter security technologies.
Scripting ability on Unix and/or RHEL OS.
Proficiency in network routing/vlan technology.
Benefits
A high-growth environment with numerous opportunities for professional growth.
A collaborative team environment that values innovation and efficiency.
A competitive benefits package that underscores our commitment to attracting and retaining top talent.