Product Security Engineer/with TS clearance
ClearanceJobs - Saint Charles, Missouri, United States
Work at ClearanceJobs
Overview
- View job
Overview
Our client is currently seeking a Product Security Engineer with TS clearance. Active Secret Clearance required to start. Primary responsibilities include assessing, updating, and maintaining the security posture of the programs, interacting with the cyber team compliance team to remediate vulnerabilities, generating IATT/ATO artifacts/packages, performing system analysis and developing system tests for cyber threats, supporting ATO/IATT packages, performing cyber risk assessments, managing software assurance tasks, ensuring product security engineering development lifecycle, performing criticality analysis, supporting proposal development efforts, facilitating collaboration and project management, applying Security Technical Implementation Guides, managing Cyber Tasking Orders, documenting installation and configuration steps, providing feedback to Cyber Leadership and engineers, collaborating with Information System Security Officers, supporting cyber threat intelligence activities, developing and maintaining cyber scanning, patching, remediation tools, supporting compliance drivers, performing cyber forensics, and defining technical concepts and solutions. Basic Qualifications (Required Skills/Experience): Bachelor or Master of Science degree from an accredited course of study, in engineering, computer science, mathematics, physics or chemistry. Active Top Secret clearance. Current DoD 8570 certification at IAT Level II / IAM Level I or higher. Experience using analytical, collaboration, communication and organizational skills. 2 years+ experience in product security / cybersecurity engineering. 2 years+ experience with industry standard cybersecurity frameworks (NIST, OWASP, DFARS). Preferred Qualifications (Desired Skills/Experience): 2 years+ experience in Windows/RHEL System admin experience, installing, tuning & troubleshooting Cyber Tools to include ESS/HBSS, ConfigOS, Splunk, etc. 2 years+ experience in configuring, running, and scripting audit tools. 2 years+ experience using knowledge of Software Assurance (SwA) static and/or dynamic code analysis (e.g. Fortify). Experience with Federal Information Security Management Act (FISMA)/RMF and National Institute of Standards and Technology (NIST) 800-53 requirements. Experience leading system and component level cyber test and evaluation, including threat and security assessments, and tabletop exercises. Experienced self-starter with strong written and oral communication skills, and a focus on translating technically complex issues into simple, easy to understand concepts. Growing understanding of DoD defense systems architectures and communications system concepts, mission, and common system test and data analysis techniques.