Information Systems Security Engineer
Leidos has a career opening for an Information Systems Security Engineer located in Dayton, OH.
The job of the Information Systems Security Engineer is to perform research, developing, implementing, testing, and reviewing hardware/software information security requirements (IAW DoD/NIST RMF) to protect information and prevent unauthorized access. In this role, the ISSE will direct the contracting team on security measures, explain potential threats, implement security measures and monitor applications in order to meet or exceed all DoD/NIST RMF requirements, resulting in faster and more accurate software releases. Perform Network System Administrator roles in addition to securing Windows and Linux systems, and maintaining that security posture. Perform lead security roles on government system, showing initiative and attention to detail. In addition to securing Windows and Linux systems, and maintaining that security posture. Some travel required.
-Support the government program office’s Information Assurance team with Authorization to Operate (ATO) and Authority to Connect (ATC) certifications, required for software releases.
-Hardening of Operating Systems, applications, and network infrastructure using Department of Defense Security Requirement Guides (SRGs), Security Technical Implementation Guides (STIGs), and Information Assurance Vulnerability Alerts (IAVA)
-Working closely with the Chief Engineer to establish a system security engineering (SSE) process to plan, organize and manage efforts to achieve maximum system cybersecurity, cyber resiliency and survivability.
-Working with Windows OS Workstation/Server and Linux.
-Contribute to Program Protection planning, Anti-tamper planning and identification of Critical Program Information (CPI).
-Developing and maintaining system-specific Security Controls Test Matrix (SCTM), Risk Assessment Report, Plan of Action and Milestones (POA&M), System Security Plans (SSP), Application Security and Development Checklists, and other artifacts supporting software certification and accreditation in accordance with RMF and JSIG.
-Running vulnerability scans for applications using various tools such as HP Fortify or SCAP; working with software engineers to analyze the report; and running vulnerability scans for operating systems and network infrastructure using Nessus and/or ACAS.
-Working closely with software engineers supporting and troubleshooting the deployment of our software on government-provided infrastructure.
-Understanding components of, and support the development of, Security Assessment Reports.
-Reviewing existing system-specific Security Controls Test Matrix (SCTM), Risk Assessment Report, Plan of Action and Milestones (POA&M), System Security Plans (SSP), Application Security and Development Checklists, and other artifacts supporting software certification and accreditation in accordance with RMF to identify areas for Enterprise Cybersecurity & Cyber Resiliency opportunities for improvement
-Design, develop, integrate, test, implement, deploy and perform operations & maintenance (O&M) of tools for the automation of security testing in support of C&A/A&A.
-Perform architectural design, integration, installation, configuration, testing, and administration of systems and capabilities to support the scanning, monitoring, and reporting of Information Assurance Vulnerability Alerts (IAVA)/Intelligence Community Vulnerability Alerts (ICVA)
-Integrate, install, configure, test, administer C&A Management tools and capabilities to implement C&A/A&A business processes, workflow, based on government needs.
-System administration and O&M support for the A&A Management capability.
-Perform security assessments; design reviews; and provide guidance on new technologies for Fleet customers. New technologies may include, but are not limited to, Cross Domain Solutions, Hardware, Operating System, Web technologies; and Databases.
-Provide Security Engineering, on an as needed basis, to support to the Security Controls Assessors (SCAs) and Validators for A&A and C&A efforts, respectively.
-Design, develop, integrate, test, document, administer, perform O&M for systems that support hidden/malicious file content analysis and reporting; Reliable Human Review (RHR) workflow functionality, enforcement, and audit; and cross-domain transfers.
-Experience with information assurance, including accreditation security testing and evaluation.
-Expert technical knowledge of DoD, national level system security initiatives, and Security Information/LAN/WAN/Cross Domain Solutions.
-Experience designing and developing host based and network based scanning tools. Extensive experience with the use of host based and network based scanning tools.
-Experience with Security Content Automated Protocol (SCAP) based tools and specifications.
-Extensive experience in OS hardening; securing systems/software IAW , DoD, and industry best practices; development of security controls, testing methodologies, and procedures for systems, isolated networks and Cross Domain Solutions.
External Referral Eligible
-Bachelor’s and 4+ years of related experience. Additional years’ experience may be used in lieu of a degree.
-A minimum of five years’ experience with Microsoft Server (2012R2, 2016), Windows client (10), Linux, in a networked environment.
-Administrate modern Windows core server components (Group Policy, DNS, DHCP, Active Directory).
-Apply and remediate system lockdowns as mandated by DISA STIGS and related standards.
-Perform vulnerability analysis using ACAS (Tenable SecurityCenter and Nessus) and HBSS (McAfee ePO).
-Establish and maintain effective working relationships within the department, fellow contractors on the project, and Government personnel; interact appropriately with others in order to maintain a positive and productive work environment; maintain a regular and predictable work schedule.
-Travel within the US up to six times a year to manage remote sites, and introduce automation to minimize travel.
-Must have a Secret security clearance.
-Certification demonstrating Windows Server competency (MCSA/Windows Server, MCSE/Server Infrastructure) is strongly desired.
-Experience in improving computer systems which are not following best practices or operate very inefficiently.
-Experience with surviving inspections or external audits of security compliance.
-Design or implementation of systems that survive on-the-wire, Simulated network attacks (i.e. strong Blue Team approach).
-Ability to demonstrate how and why system hardening using particular piece of software or system against attack.
-Experience in maintaining computer networks without any Internet access.
-Practice automating Windows administration tasks with PowerShell.
-Advanced security certification (ISC2 CISSP, CEH).
-Experience packaging internally-developed applications for rapid deployment to workstations.
-Experience planning, testing, and executing moderate disaster recovery efforts.
-Practice writing infrastructure code (e.g. PowerShell DSC, Ansible Playbooks, Chocolatey).
Leidos is a global science and technology solutions leader working to solve the world’s toughest challenges in the defense, intelligence, homeland security, civil, and health markets. The company’s 33,000 employees support vital missions for government and commercial customers. Headquartered in Reston, Virginia, Leidos reported pro forma annual revenues of approximately $10 billion for the fiscal year ended January 1, 2016 after giving effect to the recently completed combination of Leidos with Lockheed Martin's Information Systems & Global Solutions business (IS&GS). For more information, visit www.Leidos.com. The company’s diverse employees support vital missions for government and commercial customers. Qualified women, minorities, individuals with disabilities and protected veterans are encouraged to apply. Leidos will consider qualified applicants with criminal histories for employment in accordance with relevant Laws. Leidos is an Equal Opportunity Employer.