Check out this Senior Information Systems Security Engineer
opportunity with a proven global defense and space company! Message me for more information.
The Information Systems Security Engineer II shall perform or review technical security assessments of computing environments to identify points of vulnerability and non-compliance with established Information Assurance (IA) standards and regulations and recommend mitigation strategies.
- Validates and verifies system security requirements definitions and analysis and establishes system security designs.
- Designs, develops, implements, and/or integrates IA and security systems and system components, including those for networking, computing, and enclave environments to include those with multiple enclaves and differing data protection/classification requirements.
- Builds IA into systems deployed to operational environments. Assists architects and systems developers in the identification and implementation of appropriate information security functionality to ensure uniform application of Agency security policy and enterprise solutions.
- Supports the building of security architectures. Enforce the design and implementation of trusted relations among external systems and architectures.
- Assesses and mitigates system security threats/risks throughout the program life cycle. Contributes to the security planning, assessment, risk analysis, risk management, certification, and awareness activities for system and networking operations. Reviews certification and accreditation (C&A) documentation, providing feedback on completeness and compliance of its content.
- Applies system security engineering expertise in one or more of the following to: system security design process; engineering life cycle; information domain; cross-domain solutions; commercial off-the-shelf and government off-the-shelf cryptography; identification; authentication; and authorization; system integration; risk management; intrusion detection; contingency planning; incident handling; configuration control; change management; auditing; certification and accreditation process; principles of IA (confidentiality, integrity, non-repudiation, availability, and access control); and security testing.
- Verify stability, interoperability, portability, security, or scalability of system architecture.
- Collaborate with engineers or software developers to select appropriate design solutions or ensure the compatibility of system components.
- Perform technical security assessments of computing environments to identify points of vulnerability, non-compliance, with established Information Assurance (IA) standards and regulations, and recommend mitigation strategies.
- Enforce the design and implementation of trusted relations among external systems and architectures.
- Assess and mitigate system security threats/risks throughout the program life cycle.
- Review Plans of Actions and Milestones (POA&Ms) to ensure weaknesses are identified, effective/acceptable mitigation strategies are planned, and timelines are acceptable and on track.
- Contribute to the security planning, assessment, risk analysis, risk management, certification and awareness of activities for system and networking operations.
- Communicate with staff or clients to understand specific system requirements.
- Perform other duties and responsibilities as assigned.
- Bachelor’s degree in Computer Science, Information Assurance, Information Security System Engineering, or related discipline from an accredited college or university is required.
- Five (5) years of additional SA experience may be substituted for a bachelor’s degree
- Security + Certification required.
- 8 – 14 years of experience as an ISSE on programs and contracts of similar scope, type, and complexity is required
- DoD 8570.01-M compliance with IASAE Level 2 is required.
- CISSP Certification is required.
- Candidates must have a practical, working knowledge of IT audits, conducting security assessment and authorizations, familiarity with the use and operation of security tools, and be able to enforce the design and implementation of trusted relations among external systems and architectures.