KEYW Corporation

  • Senior Cyber Security Engineer

    Job Locations 1 week ago(5/14/2018 7:27 AM)
    ID
    2018-17951
    # of Openings
    1
    Posted Date
    Information Technology
    Default: Location : Location
    US-AZ-Sierra Vista
    Default: Location : Location
    US-AZ-Sierra Vista
  • Overview

    Join our cyber security engineering team. We are responsible for the security and IAVA implementation that supports development, integration, test, and cyber security of the DCGS-A family of systems and products. The cyber security team identifies, researches, and implements a full IAVA approach and performs security scanning within an environment both for physical and virtual infrastructure. Our goal is to enhance system security while not impeding performance of the services that support our organization.

    Responsibilities

    As a cyber security engineer, you will be part of a team that provides Security Engineering support to the Software Engineering Center (SEC) Intelligence Support Division (ISD). This includes evaluating system security requirements to ensure all software releases and development systems can be accredited for processing at appropriate classification levels in compliance with applicable policies, regulations, and guidelines. Specifically, you will:

     

    • Support and advise on Information Assurance (IA) issues/concerns in all phases of development and throughout the software life cycle
    • Develop and prepare technical reports and related documentation for Assessment and Authorization (A&A) packages
    • Coordinate with software developers to implement Security Technical Implementation Guide (STIG) changes that apply to the DCGS-A family of system baselines
    • Support security risk analysis, mitigation, evaluation, and reporting in support of IA A&A processes
    • Research and analyze DoD and Department of the Army (DA) policies to mitigate implementation problems that may impact the Assured Compliance Assessment Solution (ACAS) implementation
    • Perform ACAS scans and analysis
    • Perform STIG assessments and verification
    • Design and prepare technical reports and related documentation, and create charts and graphs to record results

    Qualifications

    • A bachelor's degree in Computer Science or other Engineering or Technical Discipline and ten (10) years of professional work experience (or twelve years’ of professional experience, appropriate computing environment certification, and IA Workforce System Architecture and Engineer (IASAE) Specialty qualified experience in place of a degree) is required.
    • Must be knowledgeable with testing and recording DISA STIGs
    • Must be knowledgeable with A&A policies and directives (i.e., DoDI 8500.01, DoDI 8510.01) and the Risk Management Framework (RMF) process
    • Two to three years' experience installing, configuring, administering and/or operating ACAS in the DoD environment or previous DoD scanner’s.
    • Demonstrated experience with virtualization in a DoD environment
    • Solid understanding of Microsoft, Linux or Solaris operating systems and networking
    • Knowledge and experience in working with Firewalls
    • Knowledge and experience in working with Intrusion Detection and Prevention Systems (IDPS)
    • Ability to work independently and in a mentorship position
    • Current DoD 8570 IAT level II certification requirements (including Security+)
    • Active TS-SCI Clearance

    Preferred Qualifications

    • Demonstrated skills and expertise in the following technologies: SQL/XSQL Server Administrator (SA), Microsoft O/S and security, Information Assurance (IA), IP Data Networking and Vulnerability Assessment product engineering and design, IP network vulnerability scanner Tier 3 support, REM 3.X.
    • DoD 8570 Fully Compliant with formal Computing Environment certification (i.e., HBSS, ACAS, Microsoft, Linux, etc.)
    • DoD 8570 IAT-III with CISA, GCIH, GCED, CASP or CISSP
    •  

    About the Organization

    KeyW is a total solutions provider for the Intelligence Community, solving their toughest challenges. We support the collection, processing, analysis and dissemination of information across the full life cycle of the Intelligence Community’s mission. We employ and challenge the most talented professionals in the industry with solving such complex problems as preventing cyber threats, transforming geospatial imaging into intelligence, and combating global terrorism.   

    Options

    Sorry the Share function is not working properly at this moment. Please refresh the page and try again later.
    Share to your network!