Design, deploy, and manage the deployment of multiple information security technologies. The technologies include end point security, application security, database security, infrastructure security, and identity management solutions.
In this role, you will implement, configure, and manage Hawk SIEM appliances, assist / Backup other security operation staff with other Security Operation tools, like IDS / IPS, Red Seal, BlueCoat, McAfee Email Gateway, Juniper Remote Access, NDLP, HDLP, and other security Operational tools.
In this role, you will work with Booz Allen colleagues and government clients from various DoD and government agencies to develop and deliver the next generation of military GPS receivers to Warfighters.
In this role, the selected candidate develops and produces a variety of cyber security related deliverable products that range from briefing charts, to requirements documents, assessments, recommendations, and analyses.
In this role, the selected candidate must have experience with, and ability to use development frameworks, programming languages, big-data platforms, data analytics, and how these tie together to create a data-rich environment.
Cyber security engineering support to smc for planning, acquisition, and sustainment of space-enabled global communications comprised of satellites, terminals, and control stations of various acquisition categories, in different phases of their lifecycles, providing communications to aircraft, ships, mobile, and fixed sites.
You will be part of a dynamic and talented team of security experts. You will be the hacker, reverse engineering the software, testing it to its capabilities. Breaking in, then advising the teams on the risks and guiding them through the easiest most secure ways to lock down their applications.
This position is within a technical growth area; we are looking for individuals willing to apply their engineering knowledge to the system security engineering or program protection disciplines of anti-tamper, cyber security, software assurance, supply chain exploitation, and threat and design vulnerability analysis.
In this role, the selected candidate will ensure NERC-CIP compliance for the industrial power systems and SCADA systems, to include development and validation of documentation artifacts in support of NERC-CIP compliance.