Cybersecurity Engineer

Washington, DC, Hybrid

Missing Link Security

Optimal Link provides health care technology and security solutions to the federal government.

View company page

Apply now Apply later

Description

Missing Link Security, a government contractor dedicated to driving digital transformation, is seeking a skilled Cybersecurity Engineer, contingent upon contract award, to join our dynamic and innovative organization. As a key member of our Veterans Affairs Digital Transformation (DTC) OMEGA team, you will play a crucial role in supporting our mission to harness technology to modernize and optimize information systems across various sectors. We are committed to fostering innovation and efficiency through cutting-edge management practices, and we are looking for individuals who share our passion for driving digital transformation at the Department of Veterans Affairs. If you are a talented Cybersecurity Engineer looking to contribute to meaningful technological advancements, we encourage you to apply to our open position.


Job Title: Cybersecurity Engineer

Customer: Department of Veterans Affairs

Program: Veterans Affairs Digital Transformation (DTC) OMEGA 

Location:  Veteran’s Affairs Facility, Hybrid

Background check: Level 2 to include fingerprints

Position Type: Full-time


Job Description: 

We are seeking a highly skilled Cybersecurity Engineer with expertise to join our Veterans Affairs Digital Transformation (DTC) OMEGA opportunity. In this role, you will have specialized knowledge and skills in security architecture and LCNC security authorization control and protocols. You will provide guidance, solve complex problems, drive innovation, and ensure successful execution of project deliverables.


Key Responsibilities:

  • Responsible for operational oversight, configuration, and delivery of security controls as outlined across various assessment and authorization (A&A) requirements.
  • Communicate the security requirements, feedback, and status of target solution delivery across various audience inclusive of DTC, OIS, vendor, GSA teams.
  • Comply with VA OIS’ guidance and direction.
  • Manage DTC delivery and completion of security authorization requirements. 
  • Collaborate across audiences by applying knowledge of security architecture and LCNC security authorization controls and protocols to identify, manage, and resolve solution delivery risks, future security requirements, and prioritization change management.
  • Identify when additional expertise and/or support will be required to assist a VA customer in satisfactorily responding to end user controls.  
  • Develop processes, SOPs, AUPs, and other end user guides to ensure customer responsible controls are meeting security best practice standards.


Qualifications:

  • Bachelor’s degree in engineering, or a related scientific or technical discipline.
  • Minimum of 10 years of experience 
  • Minimum of 8 years of additional experience can be substituted for education 
  • One industry recognized certificate, may include Security+, CISM, GSEC, CCSK, etc. 
  • Proficiency in developing SOPs, AUPs, and other end user guides.
  • Experience in creating, implementing, and monitoring security systems and features
  • Excellent communication, leadership, and problem-solving skills.
  • Ability to work effectively in a fast-paced, collaborative environment.

Missing Link Security does not discriminate in employment opportunities, terms, and conditions of employment, or practices on the basis of race, age, gender, religious or political beliefs, national origin or heritage, disability, sexual orientation, or any characteristic protected by law.

Apply now Apply later
  • Share this job via
  • or

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  2  0  0

Tags: CCSK CISM GSEC Monitoring

Region: North America
Country: United States

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.