Identify security requirements for the proper handling of data. Assist architects and system developers in identifying and implementing appropriate information security. Provide PMO interface to customer organization. Provide guidance to development and operational efforts regarding IA functions, particularly focusing strategic planning, infrastructure protection, and defensive strategy. Contribute to cybersecurity planning, assessment, risk analysis, risk management, certification, and awareness activities for systems and networking operations. Monitor and suggest improvements to policy. Lead projects. Plan, draft, and present trade studies, cost benefit analyses, reports and briefings as required. Conduct Cyber Threat Assessments (CTA) using a developed methodology and framework.
8+ years experience in network engineering with a focus on cybersecurity. Bachelor's degree in a related field or 5 additional years of experience in lieu of a degree. Must be Security+ certified and Certified Ethical Hacker (CEH) or Certified Information Systems Security Professional (CISSP) certified. Demonstrated experience in cybersecurity includes practices/methodologies, associated technologies, application design, and/or experience in an operational environment. Working knowledge of vulnerability assessments, system security design process, defense-in-depth/breadth, engineering life cycle, information domains, cross domain solutions, identification, authentication, and authorization, system integration, DCID 6/3, risk management, intrusion detection, contingency planning, incident handling, configuration control, change management, auditing, C&A process, principles of IA, and security testing. Experience installing, configuring, and operating network intrusion tools. Experience with monitoring intrusion detection and security information management systems to detect malicious activity on a network. Demonstrated experience with performing threat and security analysis of vulnerability advisories, network penetration techniques and military intelligence threatreports using certified automated tools. Strong understanding of security design and architecture. Able to work collaboratively across traditional engineering disciplines. Must have “hands-on” technical experience in the following areas: Linux system administration; VMware; operating system hardening; and Certification and Accreditation (ICD503 preferred). Comfortable applying knowledge of current IA policies and technologies as a contributor to the architecture and design of secure solutions to customer needs and requirements. Must be able to learn on the job and demonstrate good analytical skills. Must be a US citizen. Must hold a current Top Secret clearance with SCI access and polygraph.