Job Title: Info Security Sys Engineering Job Code: 19724 Job Location: Palm Bay, FL Job Schedule: 9/80 Job Description: Applies current systems security engineering methods, practices and technologies to the architecture, design, development, evaluation and integration of systems and networks to maintain system security. Works closely with Government customers to ensure that the security protection needs, concerns and requirements are defined and implemented with appropriate fidelity and rigor, early and in a sustainable manner throughout the life cycle of system that will allow for the security authorization of the system of interest. Works with systems developers or commercial product vendors in the design and evaluation of state-of-the-art secure systems, networks, and database products. Uses methods such as encryption technology, vulnerability analysis and security management. Responsible for integration of multiple methods into a cohesive system security perimeter and environment and the policies and procedures necessary to monitor and maintain such an environment. Will prepare Certification and Accreditation documentation, using multiple standards, to achieve security authorization of supported systems. Represents program security needs, concerns and requirements at customer meetings. Essential Functions: Expected to contribute to Product or Network Information Security Engineering activities pertaining to CDRLs, trade studies, security requirements analysis, secure architecture development, management & compliance with security controls, design review milestones (SRR, SDR, PDR, CDR) and security test/verification activities. Perform functional analysis, timeline analysis, detailed trade studies, requirements derivation and allocation, and interface definition studies to translate customer Information Security requirements into hardware and software specifications. Provide Information Assurance (IA) technical leadership for development teams of new multi-discipline (mechanical, electrical, software, RF, etc.) products. Responsible for developing security overlays, data flow diagrams, internal requirements, CONOPs and interface control documents from customer / product requirements. Knowledge of security requirements, documentation, and risk mitigation strategies. AWS cloud security knowledge including architecture, design, deployment, and management of cloud security technologies. Strong familiarity with Linux. Familiarity with security related tools – SIEM, malware, HIPS, etc Identify security risks, threats and vulnerabilities of networks, systems, applications and new technology initiatives (hardware, software, cross-domain solutions, cryptographic devices, firewalls, intrusion detection systems, anti-virus systems and software deployment tools). Experience in writing and managing RMF body of evidence documents (e.g., System Security Plan (SSP), Security Compliance Traceability Matrix (SCTM), Risk Assessment Report (RAR), Continuous Monitoring (ConMon) Plan, and Security Assessment Plans and Procedures (SAPP). Knowledgeable with malware detection systems for Windows and Linux. This is an On-Site Position Qualifications: Education Bachelor’s Degree and minimum 9 years of prior relevant experience, or Graduate Degree and a minimum of 7 years of prior related experience. In lieu of a degree, minimum of 13 years of prior related experience. TS/SCI security clearance required. DOD 8140 IAM 2 certification. Preferred Additional Skills: Familiarity with Model Based System Engineering (UML, SysML, DoDAF). DoD 8140.03 IASAE Level 3 certification (e.g. CISSP - ISSEP or ISSAP). Experience in configuration and use of cyber defense and vulnerability assessment tools such as ACAS and SCC. Moderate understanding of vulnerability analysis tools such Tenable Security products. Experience in the content development and administration of SEIM/audit reduction tools (e.g., Splunk). Foundational knowledge of Layer 3 architecture and diagramming within Visio (or equivalent). General knowledge of common threats to information systems and how compromise would damage system integrity. Supporting account management, PKI cert management, LDAP configuration/management. Scripting experience (Bash/Shell, Python, Perl, PowerShell)
...in on a little secretwhile everyone knows that America Runs on Dunkin', we know that Dunkin' runs on our incredible team members. Ready... ...Information In 1950, Bill Rosenberg opened the first Dunkin' Donuts shop in Quincy, Massachusetts. Dunkin' Donuts licensed the first...
...experience in a repair shop environment Strong problem-solving skills and mechanical knowledge Company Description We have been an Automotive service and repair center since 1976. We offer automotive diagnostics, suspension, brakes, tune-ups, flushes, new tires and tire...
...HIring all roles for the warehouse including: - Warehouse Associates - Order Pickers - Inventory Control Associates - Logistics Coordinators Meet the Recruiting Team and the Warehouse Managers in Person. We welcome you to take a tour of our facility and...
...React Native Mobile Developer Location: Remote Position Type: Contract US Citizen, Green Card, TN, GC EAD and H4 EAD only. No Third-party agencies corp to corp. Job Description: We need someone with experience designing and developing Android and iOS applications...
...Pizza Hut Restaurant General Manager Flynn Hut joined the Pizza Hut system in 2021. In 2023, we expanded internationally acquiring Pizza Hut's master franchisee in Australia with 260+ units. Today we are the largest Pizza Hut franchisee in the world with 1200+ locations...