10 Apr
Lead Cyber Engineer
Vacancy expired!
- UPDATE – Preferred, but not mandatory:
- DoD Top Secret Clearance – preferred, but any transferrable clearance will be acceptable as well as interim clearance or at least the capability of obtaining a clearance
- This position is working at the Navy facilities, but experience in any service would be preferred
- Name:
- Best Contact Info:
- Your Linked In:
- Where do you live and your desired geographical location:
- Why looking for a new job:
- Availability for interviews and a new job:
- Are you open to relocation if required:
- Do you have an active Passport:
- Are you open to travel if needed:
- Are you authorized to work in US (US, , Other): Do you require sponsorship at any time or will you in the future?
- Salary Expectations: (I need a range) $
- Sizes of staff overseen and their titles: (include # of direct reports)
- Budgetary Responsibility: $
- Education/Certs/Degrees: (also indicate which certs are active)
- Who Referred You/ How Did You Hear About Job/ DKKD Staffing:
- DoD experience:
- Secret Clearance:
- Branch of Service:
- Education/Certs/Degrees (indicate which certs are active)
- Bachelor’s degree from an accredited institution in Computer Science OR a related field desired:
- Graduate Degree in Engineering from accredited University
- Associates of Science (A.S.) or A.A. in Information Technology, Cybersecurity, Engineering or similar
- Certified Information Systems Security Professional (CISSP)
- CCNA & CCNP preferred, CCIE:
- Certification as IAT Level II per DoD 8570.01, or successor:
- Cisco Application Centric Infrastructure (ACI):
- Navy Qualified Validator Level II or III preferred:
- Five years’ experience related to network design and administration:
- Demonstrated knowledge network and operational technologies and embedded systems:
- Software-defined networking experience, preferably in Operational Technology (OT):
- Strong knowledge of Network Protocols and OS (OSPF, EIGRP, HSRP, BGP, TCP/IP, etc.):
- Knowledge of VPN, firewalls, IPS, load balancing, Cisco Access Points and Controllers:
- Experience with control systems engineering, preferably in a DoD environment:
- Relevant experience, to include Industrial Control System (ICS) experience:
- Windows Server (2008, 2012, 2016, 2019):
- Cyber Security:
- Experienced with security architecture and secure configurations of ICS/SCADA stack structures and protocols:
- Working experience in Risk Management Framework (RMF) and Enterprise Mission Assurance Support Service (eMASS):
- Possess an in-depth understanding of computer security, control system specifications, DoD IA policies for FRCS, and the ability to communicate clearly and succinct in written and oral presentations:
- Possess an in-depth understanding and experience in Risk Management Framework (RMF), Platform IT (PIT), and the implementation of Cyber Security and IA boundary defense techniques and various IA-enabled appliances. Examples of these appliances and applications are Firewalls, IDS, IPS, Switch/Routers, Cross Domain Solutions (CDS) and Host Based Security Systems (HBSS):
- Experience as a team lead:
- Experience working with distributed teams:
- Experienced developing technical papers, assessment reports, and test designs:
- Ability to manage time well to meet assigned milestones:
- Author DoD IA Assessment and Accreditation (A&A) artifacts. Document a system from an IA perspective using Microsoft Office including MS Word, MS Excel, MS Visio and other appropriate tools.
- Derive, document and/or identify system CONOPS for Mission Assurance Categorization per DoDI 8500.2.
- Lead the research, recommend and document logical and physical solutions that prevent, detect and correct the system to be certified and accredited.
- Research and apply DISA Security Technical Implementation Guides (STIGs) and NSA recommendations.
- Lead the identification of disagreements between as built specifications, security requirements and DoD security policies and design implementations to bring the system into compliance.
- Plan, Develop, execute and document results of security test procedures.
- Lead the analysis and testing of a designated US Naval warfare system against known vulnerabilities based upon security approaches and known hacker techniques and exploits.
- Lead and perform as Information Assurance Officer to be focal point for all security matters related to specific sets of information systems.
- Lead the preparation and execution an Information Assurance Vulnerability Management (IAVM) Plan.
- Lead obtaining Authorization To Operate (ATO) and resolve issues in the event a system is issued an Interim Authorization To Operate (IATO)
- Lead the technical support effort in identifying and specifying requirements and performing risk assessments.
- Ability to obtain clearance
- Associates of Science (A.S.) or A.A. in Information Technology, Cybersecurity, Engineering or similar preferred
- Certified Information Systems Security Professional (CISSP)
- Navy Qualified Validator Level II or III preferred
- Minimum 7 years of relevant experience, to include Industrial Control System (ICS) experience
- Working experience in Risk Management Framework (RMF) and Enterprise Mission Assurance Support Service (eMASS)
- Possess an in-depth understanding of computer security, control system specifications, DoD IA policies for FRCS, and the ability to communicate clearly and succinct in written and oral presentations
- Possess an in-depth understanding and experience in Risk Management Framework (RMF), Platform IT (PIT), and the implementation of Cyber Security and IA boundary defense techniques and various IA-enabled appliances. Examples of these appliances and applications are Firewalls, IDS, IPS, Switch/Routers, Cross Domain Solutions (CDS) and Host Based Security Systems (HBSS)
- Experience as a team lead desired
- Ability to manage time well to meet assigned milestones
- Experience working with distributed teams
Vacancy expired!