Cyber Systems Engineer - Information System Security Engineer (ISSE)

Chantilly, VA, United States

Arcfield

Arcfield was purpose-built to defend against the near-peer threat through innovations in systems engineering and integration, modeling, simulation and analysis, space and launch support, cybersecurity and test range support.

View company page

Overview

Arcfield is a leading provider of full lifecycle, mission-focused systems engineering and integration capabilities to the U.S. government and its allies. The company has more than 60 years of proven experience providing advanced engineering and analysis, IT and C5ISR capabilities to support our nation’s most critical national security missions. Headquartered in Chantilly, VA and with 16 offices around the world, Arcfield employs approximately 1,200 engineers, analysts, IT specialists, and other professionals who put our customers’ missions first, helping them solve their most complex challenges through innovations in modeling, simulation and analysis, digital transformation and C5ISR. Visit arcfield.com for more details.

Responsibilities

The ISSE supports the Engineer Group, assisting with implementation of the customer-level security policies, procedures, and accreditations. Skills and responsibilities include, but are not limited to:

  • Prepares assessments and cyber threat profiles of current and planned products based on sophisticated testing, research, and analysis
  • Define information security policies and procedures for the program
  • Perform as an expert to provide technical cyber security guidance for the program based on documented policy(s) and regulations
  • Perform both malicious code and intrusion detection support
  • Investigate system incidents to determine both root cause and risk
  • Determine causes of security breaches and researches, recommends, and implements changes to procedures to protect data from future violations; provide recommendations for mitigating issues
  • Ensure products and systems comply with requirements and government information assurance and cyber security standards and practices through formal verifications methods
  • Assist in the design of a strong security operations programs and an effective continuity plan
  • Assist team members with project objectives requiring new or improved information security devices or systems to create complex system designs, resolve engineering problems and propose preventative strategies
  • Provide or inform on IT security engineering solutions
  • Ability to maintain continuous monitoring standards
  • Ability to implement established standards for information systems procedures
  • Ability to translate customer requirement into solutions
  • Ability to create security concepts for various projects
  • Ability to share expertise and integrate across organizational teams
  • Ability to analyze and solve complex problems
  • Ability to implement exceptional organizational skills and communication skills
  • Ability to write technical documents that address complex issues
  • Ability to interpret threat analysis and security auditing
  • Ability to successful use and navigate security systems
  • Possess a strong foundation in policy and regulations governing information security/privacy, and information assurance utilized by Intelligence Community
  • Ability to convey technical information to non-technical individual in multiple formats such as: high-quality papers, presentations, recommendations, and findings knowledge of computing design concepts and implementation
  • Knowledge of network defense monitoring tools and systems
  • Experience with Jira and ServiceNow
  • Possess current security certifications: Certified Information System Security Professional (CISSP) or Government Security Engineer Certification (GSEC); Certification and Accreditation Professional (CAP); Certified Information Security Manager (CISM); GIAC Security Leadership Certificate (GLSC); Certified Ethical Hacker (CEH)

Qualifications

  • Must possess and be able to maintain a TS/SCI clearance with Polygraph
  • A degree (or equivalent experience) in Computer Science, Information Systems, Engineering, Business, or a scientific or technical discipline.
    • BS 10-12, MS 8-10, PhD 5-7
  • The ability to analyze systems, including forensically, for malware, misuse, and/or unauthorized activity.
  • Knowledge of investigation and analysis of all data sources, which may include Internet, Intelligence Community reporting, security events, firewall logs, forensic hard-drive images, and other data sources to identify malware, misuse, unauthorized activity or other cyber security related concerns.
  • Knowledge of computing design concepts and implementation.

Desired

  • Ability to provide technical cyber security guidance
  • Ability to convey technical information to non-technical individuals
  • Ability to create complex system designs, resolve engineering problems, and propose preventative strategies
  • Ability to work in a dynamic and challenging environment
  •  

EEO Statement

EEO

Arcfield proactively fulfills its role as an equal opportunity employer. We do not discriminate against any employee or applicant for employment because of race, color, sex, religion, age, sexual orientation, gender identity and expression, national origin, marital status, physical or mental disability, status as a Disabled Veteran, Recently Separated Veteran, Active-Duty Wartime or Campaign Badge Veteran, Armed Forces Services Medal, or any other characteristic protected by law.

Apply now Apply later
  • Share this job via
  • or

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Tags: Audits CEH CISM CISSP Clearance Computer Science Firewalls GIAC GSEC Intrusion detection ISSE Jira Malware Monitoring PhD Polygraph Privacy TS/SCI

Perks/benefits: Team events

Region: North America
Country: United States
Job stats:  7  0  0

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.