Information Systems Security Engineer Level 2 with Security Clearance Engineering - Severn, MD at Geebo

Information Systems Security Engineer Level 2 with Security Clearance

The Information Systems Security Engineer shall perform, or review, technical security assessments of computing environments to identify points of vulnerability, non-compliance with established Information Assurance (IA) standards and regulations, and recommend mitigation strategiesValidates and verifies system security requirements definitions and analysis and establishes system security designsDesigns, develops, implements and/or integrates IA and security systems and system components including those for networking, computing, and enclave environments to include those with multiple enclaves and with differing data protection/classification requirementsBuilds IA into systems deployed to operational environmentsAssists architects and systems developers in the identification and implementation of appropriate information security functionality to ensure uniform application of Agency security policy and enterprise solutionsSupports the building of security architecturesEnforce the design and implementation of trusted relations among external systems and architecturesAssesses and mitigates system security threats/risks throughout the program life cycleContributes to the security planning, assessment, risk analysis, risk management, certification and awareness activities for system and networking operationsKey tasks include:
o Reviewing security architectures, firewall configurations, IDS/IPS, and security controls for new and proposed systems.
Prevention and early detection and resolution of risks to high value assets.
Development and management of strategic and tactical physical, personnel and procedural security programs.
Architect, design, implement, support, and evaluate security-focused tools and services including project leadership roles.
Providing software vulnerability remediation advice to software developers and software development teams.
Implementing security vulnerability testing tools to provide continuous monitoring and patch verification.
Test and evaluate products in a lab environment.
Reviews certification and accreditation (C&A) documentation, providing feedback on completeness and compliance of its content.
Knowledge of 8570 controls, testing information systems for compliance of the controls, and the creation of test cases.
Knowledge of incident response and the creation, execution, and reporting of such activities.
Knowledge of Firewalls, IDS/IPS, intrusion detection, VLANS, routing and other network security technologies.
Knowledge of virtualization technologies including virtual firewalls, networking and segmentation.
Knowledge of networking and firewall configuration and monitoring.
Knowledge of SIEM technologies such as Splunk and creation of security event related dashboards.
Knowledge of Malware identification, containment, and eradication.
Knowledge of access control systems, PKI, multi-factor authentication, and entitlements management.
Proficient in Microsoft Windows and Linux operating systems.
Provide input into the development of security policies and procedures.
Provide detailed security recommendations for the secure development and maintenance of systems.
Evaluate and recommend new and emerging security products and technologies.
Provide security operations support as needed.
Participate in projects that develop new intellectual property.
Evangelize security within the organization and be an advocate for customer trust.
Excellent written and verbal communication skills.
Excellent leadership skills and teamwork skills.
Results oriented, high energy, self-motivated.
Candidate may be required to respond to after-hours requests as required in a 24 x 7 environmentRequirements Fourteen (14) years' experience as an ISSE on programs and contracts of similar scope, type, and complexity within the Federal Government is requiredBachelor's degree in Computer Science, Information Assurance, Information Security System Engineering, or related discipline from an accredited college or university is requiredFour (4) years of additional ISSE experience may be substituted for a bachelor's degree DoD 8570 compliance with IASAE Level 2 is requiredBenefits PTO:
Our variable PTO plan lets you decide the amount that's best for youChoose as few as 2 weeks or as much as 6 weeksHolidays:
10 annually 401k:
5% Company match; fully-vested from Day 1 Quarterly Bonus:
Totaling 2.
5% of your base salary annually Pay for any extra hours in cash or comp time Pay for unused holidays or comp time Training Budget:
Up to 5,250 annually Cell Phone/Internet Allowance:
Monthly reimbursement up to 75 Gym/Health Club Membership:
Monthly reimbursement up to 50 Personal Technology Allowance:
Up to 500 annually Cool Logo Wear:
At least 100 annually Health Insurance:
Provided through CareFirst Blue Cross/Blue ShieldThree plans to choose from - HSA Silver, HMO Platimun, PPO PlatimumFiveTwelve covers 80% of the premium for employees and their dependentsDental and Vision Insurance:
Provided through CareFirst Blue Cross/Blue ShieldFiveTwelve covers 100% of the premium for employees and their dependentsShort Term and Long Term Disability:
FiveTwelve pays 100% of premium Referral Bonus:
Up to 10,000 for fully-cleared referrals Recommended Skills Access Controls Assessments Communication Dashboard Data Protection In Plane Switching (Ips) Apply to this job.
Think you're the perfect candidate? Apply on company site Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.