The SSE is responsible for the design, development, implementation, and/or integration of a DOD CS/IA architecture, system, or system component for use within CE (computing environment), NE (network environment), and/or enclave environments in support of higher ranking CS/IA professionals.
The Information Security Engineer - Application Security role is an individual contributor role to support a global program to actively identify and exploit vulnerabilities across Equifax applications utilizing dynamic, manual, and static methodologies.
In this role, you will provide full-spectrum systems engineering, integration, manufacturing, and life cycle. The selected candidate will develop and maintain Cyber Security Assessment and Authorization processes to evaluate compliance.
The Security Engineer II will design, build, integrate, and support information security solutions and specifically for the Information Security Cyber Defense area (ISCD) specific to the Endpoint (laptops/desktops/VDI/mobile). The engineer will focus on solutions to support the Security Operations Center in their security efforts related to endpoints, as well as develop new endpoint authoritative endpoint solutions.
The compliance engineer serves as a security expert and provides technical contribution to facilitate network standardization, capacity management, CCRI inspection preparation, traffic shaping, quality of service analysis, and other network engineering tasks necessary in order to satisfy contractual requirements according to high-level architectural designs.
In this role, the selected candidate will perform work related to security incidents and security engineering services; works with users, IT support staff and vendor partners to troubleshoot and resolve problems associated with security products and related processes, include develop and maintain documentation of the design, implementation and operation of security products and processes.
In this role, you will assist with the development of a strategic roadmap for PKI by conducting feasibility studies and evaluates solutions with regard to their ability to integrate with the existing infrastructure and their adoption of general security practices.