Logo
Applied Research Solutions

Information System Security Engineer (ISSE)

Applied Research Solutions, Dayton, Ohio, United States, 45444

Save Job

Description ARS is currently looking for an Information System Security Engineer (ISSE). Our desire is to build a team of highly qualified professionals that will provide expertise in Cybersecurity, Cloud, and Systems Engineering, who will support the development and sustainment of unique secure enclaves at the edge, that provide enterprise services and cyber network defense capabilities to customers across the DoD. This team will provide engineering expertise using technologies such as ePO, Splunk, ACAS, Azure Automation, STIG/SCAP, and other enterprise capabilities. The Information Systems Security Engineer (ISSE) shall perform, or review, technical security assessments of computing environments to identify points of vulnerability, non-compliance with established Information Assurance (IA) standards and regulations and recommend mitigation strategies. Why Work with us? Applied Research Solutions (ARS) is respected as a world-class provider of technically integrated solutions as we deliver premier talent and technology across our focused markets for unparalleled, continuous mission support.Awarded a Best Places to Work nominee since 2020, ARS recognizes that without our career- driven, loyal professionals, we would not be able to deliver state-of-the-art results for our mission partners. We firmly believe that prioritizing our employees is of the upmost importance. We provide a culture where our employees are challenged to meet their career goals and aspirations, while still obtaining a work/life balance. ARS employees are motivated through our industry competitive benefits package, our awards and recognition program, and personalized attention from ARS Senior Managers. Responsibilities: Engineer unique solutions to support ongoing Cyber Threat and Cyber Defensive Operations.

Automate threat assessment and reporting activities.

Analyze and report system and organizational security posture trends to the ISSM/ISSO.

Provide cybersecurity recommendations to the ISSM based on significant threats and vulnerabilities.

Implement system security measures in accordance with established procedures to ensure confidentiality, integrity, availability, authentication, and non-repudiation.

Plan and recommend modifications or adjustments based on exercise results.

Mitigate or correct security deficiencies identified during security and certification testing and/or recommend risk acceptance to the ISSM

Audit support responsibilities

Analyze and report organizational security posture trends to the ISSM/ISSO

Analyze and report system security posture trends to the ISSM/ISSO

Apply security policies to meet security objectives of the system to the ISSM/ISSO

Assess adequate access controls based on principles of least privilege and need-to-know and reports findings to the ISSM/ISSO

Assess all the configuration management (change configuration/release management) processes and reports findings to the ISSM/ISSO

Assess the effectiveness of security controls and reports findings to the ISSM

Be able to develop procedures and test fail-over for system operations transfer to an alternate site based on system availability requirements

Ensure all systems security operations and maintenance activities are properly documented and updated as necessary

Ensure cybersecurity-enabled products or other compensating security control technologies reduce identified risk to an acceptable level and reports findings to the ISSM

Implement security measures to resolve vulnerabilities, mitigate risks and recommend security changes to system or system components as needed

Implement system security measures in accordance with established procedures to ensure confidentiality, integrity, availability, authentication, and non-repudiation

Mitigate/correct security deficiencies identified during security/certification testing and/or recommend risk acceptance to the ISSM

Plan and recommend modifications or adjustments based on exercise results or system environment

Properly document all systems security implementation, operations and maintenance activities and updates necessary

Provides cybersecurity recommendations to the ISSM based on significant threats and vulnerabilities

Verify and update security documentation reflecting the application/system security design features

Verify minimum security requirements are in place for all applications

Assists the ISSM/ISSO in identifying the security requirements for the system, including the confidentiality, integrity, and availability of data

Assists the ISSM/ISSO in describing and documenting the security controls that will be implemented to meet the security requirements

Assists the ISSM/ISSO in describing and documenting the procedures that will be used to manage security risks and incidents

Assists the ISSM/ISSO in describing and documenting how the security controls will be monitored and tested to ensure that they are effective

Assists the ISSM/ISSO in describing and documenting how changes to the system will be managed to minimize security risks

Assists the ISSM/ISSO in describing and documenting how the system will be recovered in the event of a security incident

Assists the ISSM/ISSO in the collection and organization of supporting documentation and diagrams needed for an Authority to Operate Package

Assists the ISSM/ISSO with conducting a security assessment of the system. This includes identifying the system's assets, threats, vulnerabilities, and risks.

Assists the ISSM/ISSO with developing a risk management plan. This plan identifies the security controls that will be implemented to mitigate the risks to the system.

Assists the ISSM/ISSO in writing the System Security Plan or updating a System Security Plan Addendum

Assists the ISSM/ISSO in reviewing and updating the System Security Plan or Addendum

Assists the ISSM/ISSO in ensuring that the SSP is compliant with applicable DoD security policies and procedures

Monitors and investigates security breaches

Educates employees or clients about security procedures and programs

Requirements: Must be a US citizen

Advanced technical competency and experience in one or more of the following areas: Active Directory Domain Services, Active Directory Federated Services, Active Directory Certificate Services, Windows Server Update Services, ePO, Splunk, STIG/SCAP, YUM, ACAS Automation, and Azure Monitor / Log Analytics.

Security+ Certification

5+ years related experience in SCI/SAP environments.

Bachelors degree in computer science, Engineering, Finance, Business, or related field AND 3+ years leadership experience in relevant area of business OR equivalent experience.

8-12 years demonstrated performance in related technology.

Minimum Security Clearance Required Top Secret w/ SCI eligibility Travel Up to 100% Additional or Preferred Qualifications 5+ years leadership experience in relevant area of business.

Technical certifications in Azure

All positions at Applied Research Solutions are subject to background investigations. Employment is contingent upon successful completion of a background investigation including criminal history and identity check. This contractor and subcontractor shall abide by the requirements of 41 CFR 60-741.5(a). This regulation prohibits discrimination against qualified individuals on the basis of disability, and requires affirmative action by covered prime contractors and subcontractors to employ and advance in employment qualified individuals with disabilities. This contractor and subcontractor shall abide by the requirements of 41 CFR 60-300.5(a). This regulation prohibits discrimination against qualified protected veterans, and requires affirmative action by covered contractors and subcontractors to employ and advance in employment qualified protected veterans. Equal Opportunity Employer/Protected Veterans/Individuals with Disabilities This employer is required to notify all applicants of their rights pursuant to federal employment laws. For further information, please review the Know Your Rights (https://www.eeoc.gov/poster) notice from the Department of Labor. #J-18808-Ljbffr