This A&A Engineer will serve as an Information Systems Security Officer (ISSO) and will be responsible for security processes and implementation supporting a large customer on a new multi-year contract.
The Information Assurance Engineer is a member of the Security Operations Center, and is responsible for the technical security operations in supporting a large customer on a unique and complex contract.
As a member of our diverse team, youll gain valuable career-enhancing experience as we support the design, development, testing, implementation, training, and maintenance of our federal governments critical systems.
Design and implement information assurance and security engineering systems with requirements of business continuity, operations security, cryptography, forensics, regulatory compliance, internal counter-espionage (insider threat detection and mitigation), physical security analysis (including facilities analysis, and security management).
The candidate will serve as a contract systems and business analyst supporting organization wide cyber assessments. This position will deliver technical and programmatic solutions to support activities of the group to target, assess, exploit and report risks and vulnerabilities of organization systems in order to provide senior decision makers with actionable data to make strategic investment decisions.
The Information Security System Engineer is a senior member of the Security Operations Center, and is responsible for the technical security operations in supporting a large customer on a unique and complex contract.
The candidate will lead the initial software development and early lifecycle support (Operations) of an Attribute Based Access Control ( ABAC ) system integrating with SharePoint, Outlook, Windows File Servers, and Windows Endpoints, and Classification Management Tool ( CMT ) with NextLabs Data Protection and Entitlement Management Software. Training will be provided on NextLabs products.
The primary focus will be to maintain system Operational Availability and ensure that information can be collected in the field utilizing the appropriate sensors in a secure manner and can pass Security Audits and Information System Security Assessments relative to Information system security policies and procedures.