Logo
Applied Research Solutions

Information System Security Engineer (ISSE) with Security Clearance

Applied Research Solutions, Dayton, Ohio, United States, 45444

Save Job

Overview

ARS is currently looking for an Information System Security Engineer (ISSE). Our desire is to build a team of highly qualified professionals that will provide expertise in Cybersecurity, Cloud, and Systems Engineering, who will support the development and sustainment of unique secure enclaves at the edge, that provide enterprise services and cyber network defense capabilities to customers across the DoD. This team will provide engineering expertise using technologies such as ePO, Splunk, ACAS, Azure Automation, STIG/SCAP, and other enterprise capabilities. The Information Systems Security Engineer (ISSE) shall perform, or review, technical security assessments of computing environments to identify points of vulnerability, non–compliance with established Information Assurance (IA) standards and regulations and recommend mitigation strategies.

Responsibilities

Engineer unique solutions to support ongoing Cyber Threat and Cyber Defensive Operations.

Automate threat assessment and reporting activities.

Analyze and report system and organizational security posture trends to the ISSM/ISSO.

Provide cybersecurity recommendations to the ISSM based on significant threats and vulnerabilities.

Implement system security measures in accordance with established procedures to ensure confidentiality, integrity, availability, authentication, and non–repudiation.

Plan and recommend modifications or adjustments based on exercise results.

Mitigate or correct security deficiencies identified during security and certification testing and/or recommend risk acceptance to the ISSM.

Audit support responsibilities.

Analyze and report organizational security posture trends to the ISSM/ISSO.

Analyze and report system security posture trends to the ISSM/ISSO.

Apply security policies to meet security objectives of the system to the ISSM/ISSO.

Assess adequate access controls based on principles of least privilege and need–to–know and report findings to the ISSM/ISSO.

Assess all the configuration management (change configuration/release management) processes and report findings to the ISSM/ISSO.

Assess the effectiveness of security controls and report findings to the ISSM.

Develop procedures and test fail–over for system operations transfer to an alternate site based on system availability requirements.

Ensure all systems security operations and maintenance activities are properly documented and updated as necessary.

Ensure cybersecurity–enabled products or other compensating security control technologies reduce identified risk to an acceptable level and report findings to the ISSM.

Implement security measures to resolve vulnerabilities, mitigate risks and recommend security changes to system or system components as needed.

Mitigate/correct security deficiencies identified during security/certification testing and/or recommend risk acceptance to the ISSM.

Plan and recommend modifications or adjustments based on exercise results or system environment.

Properly document all systems security implementation, operations and maintenance activities and updates necessary.

Provide cybersecurity recommendations to the ISSM based on significant threats and vulnerabilities.

Verify and update security documentation reflecting the application/system security design features.

Verify minimum security requirements are in place for all applications.

Assist the ISSM/ISSO in identifying the security requirements for the system, including the confidentiality, integrity, and availability of data.

Assist the ISSM/ISSO in describing and documenting the security controls that will be implemented to meet the security requirements.

Assist the ISSM/ISSO in describing and documenting the procedures that will be used to manage security risks and incidents.

Assist the ISSM/ISSO in describing and documenting how the security controls will be monitored and tested to ensure that they are effective.

Assist the ISSM/ISSO in describing and documenting how changes to the system will be managed to minimize security risks.

Assist the ISSM/ISSO in describing and documenting how the system will be recovered in the event of a security incident.

Assist the ISSM/ISSO in the collection and organization of supporting documentation and diagrams needed for an Authority to Operate Package.

Assist the ISSM/ISSO with conducting a security assessment of the system, identifying assets, threats, vulnerabilities, and risks.

Assist the ISSM/ISSO with developing a risk management plan identifying the security controls that will be implemented to mitigate risks.

Assist the ISSM/ISSO in writing the System Security Plan or updating a System Security Plan Addendum and ensuring SSP compliance with applicable DoD security policies and procedures.

Monitor and investigate security breaches.

Educate employees or clients about security procedures and programs.

Other duties as assigned.

Requirements

Must be a US citizen.

Advanced technical competency and experience in one or more of the following: Active Directory Domain Services, Active Directory Federated Services, Active Directory Certificate Services, Windows Server Update Services, ePO, Splunk, STIG/SCAP, YUM, ACAS Automation, and Azure Monitor / Log Analytics.

Security+ Certification.

5+ years related experience in SCI/SAP environments.

Bachelor's degree in computer science, Engineering, Finance, Business, or related field AND 3+ years leadership experience in relevant area of business OR equivalent experience.

8–12 years demonstrated performance in related technology.

Minimum Security Clearance Required Top Secret w/ SCI eligibility.

Additional or Preferred Qualifications

5+ years leadership experience in relevant area of business.

Technical certifications in Azure.

All positions at Applied Research Solutions are subject to background investigations. Employment is contingent upon successful completion of a background investigation including criminal history and identity check. This contractor and subcontractor shall abide by the requirements of 41 CFR 60–741.5(a). This regulation prohibits discrimination against qualified individuals on the basis of disability, and requires affirmative action by covered prime contractors and subcontractors to employ and advance in employment qualified individuals with disabilities. This contractor and subcontractor shall abide by the requirements of 41 CFR 60–300.5(a). This regulation prohibits discrimination against qualified protected veterans, and requires affirmative action by covered contractors and subcontractors to employ and advance in employment qualified protected veterans.

#J-18808-Ljbffr