Operations

Positions

Information Systems Security Engineer


Description

The Information Systems Security Engineer shall perform, or review, technical security assessments of computing environments to identify points of vulnerability, non-compliance with established Information Assurance (IA) standards and regulations, and recommend mitigation strategies.

  • Validates and verifies system security requirements definitions and analysis and establishes system security designs. Designs, develops, implements and/or integrates lA and security systems and system components including those for networking, computing, and enclave environments to include those with multiple enclaves and with differing data protection/classification requirements.
  • Builds lA into systems deployed to operational environments. Assists architects and systems developers in the identification and implementation of appropriate information security functionality to ensure uniform application of Agency security policy and enterprise solutions. Supports the building of security architectures.
  • Enforce the design and implementation of trusted relations among external systems and architectures.
  • Assesses and mitigates system security threats/risks throughout the program life cycle. Contributes to the security planning, assessment, risk analysis, risk management, certification and awareness activities for system and networking operations.
  • Reviews certification and accreditation (C&A) documentation, providing feedback on completeness and compliance of its content.


Requirements

Qualifications include demonstrated combined experience:

  • 4-8 years experience in Information Assurance/Information System Security Engineering.
  • Two (2) years of recent experience with Defense in Depth principles and technology including access/control, authorization, Identification and authentication, public key infrastructure, network, and enterprise security architecture.
  • Excellent knowledge of Federal, NSA, Intelligence Community and DoD Information Security regulations, publications, and policy.
  • Demonstrated experience applying security risk assessment methodology to system development, including threat model development, vulnerability assessments, and resulting security risk analysis.
  • Possess a solid understanding of the NSA Certification and Accreditation process (NISCAP).