Information System Security Engineer (ISSE) Lead

Grafenwoehr, Germany

Applications have closed

CSA

Discover how CSA can support your organization's mission with our world-class technology, mission, training, simulation and cybersecurity solutions.

View company page

CSA is seeking an ISSE Lead to supervise and manage the system and hardware engineering support services for all phases of constructive simulation federation(s). 



Minimum education and experience:

Bachelor’s degree plus three (3) years of recent specialized experience;
OR an Associate’s degree plus seven (7) years of recent specialized experience;
OR a major certification plus  seven (7) years of recent specialized experience;
OR eleven (11) years of recent specialized experience, if no degree.
Three (3) years of experience in the Microsoft SharePoint environment or similar web-based collaboration software tools.
Two (2) years of experience designing and implementing web design, collaboration tools, and content management.

Minimum qualifications:

Ability to transform management ideas and implement appropriate solutions.
Experience with electronic knowledge repository management, intranets/portals, collaborative tools, and social media tools.
Knowledge with database management, and server SW and programming.
Strong technical literacy with working knowledge of HTML, JavaScript, and other web technologies required to implement and maintain web portals.
Superior analytical and problem-solving skills.
Ability to document and update processes.
Ability to perform tasks under deadlines.
Ability to work with senior Government and Industry leaders.
Possess a very high degree of attention to detail.
Capable of working at a computer terminal for extended periods.
Outstanding interpersonal and written communication skills.
Must be a U.S. Citizen
Ability to speak, read, write and understand the English language.

Minimum certification:

DoD 8570 IAT Level II, and the ability to obtain IAT Level III within six (6) months of starting.

Minimum clearance:

Secret clearance with the ability to obtain and maintain TS with SCI access.

Responsibilities

  • Tests all beta and new simulation software, integration software or tools, and simulation federations.  Provides Windows and Linux System Administration and Engineering support of systems that run software to include JCATS, JDLM, LVC, JLCCTC ERF, JLCCTC MRF, LOTS, and DXTRS.  Integrates and presents system data to create a common operation picture (COP) in support of JMSC simulation exercises.
  • Provides technical integration solutions and recommendations for exercises to also include networks and computer systems layout and setups for simulations and AMCS.
  • Configures, integrates and manages Virtual Battle Space 3 (VBS3) simulations during exercises.
  • Maintains Windows 7/10 workstations, Windows 2012R2/2016/2019 Server, Red Hat Enterprise Linux Workstations, and Solaris 10 workstations, including software updates, patches, baselines, etc.
  • Uses Automated provisioning and updating systems to include VmWare, PDQ, RHEL Satellite, Windows Update Server (WSUS), and Windows Deployment Services (WDS).
  • Sets up exercises to include network connectivity, installing server/clients workstations with Windows 7/10, Windows Server 2008R2/2012R2/2016, Red Hat Enterprise Linux 6/7, and installing simulation software systems.
  • Supports the implementation, operation, and maintenance of Information Assurance (IA) logging and monitoring systems and services to include HBSS(AESS), Nessus/ACAS, VRealize, LogInsight, Log Correlation Engine, Veaam, Cyber ARK, GitLab, and others.
  • Administers multiple enclave infrastructures using VmWare Virtualization, CISCO Hyperflex Servers, Windows Server 2012R2 and 2016 Active Directory Domain Services, Group Policy, and PowerShell automation and scripting.
  • Applies customer Risk Management Framework (RMF) IA policies to create and implement procedures necessary to build, maintain, and document secure networking and computing operations in multiple enclave environments. STIG, SCAP skills and tools.
  • Utilizes Defense-in-Depth principles and technology, including access/control, authorization, identification and authentication, Public Key Infrastructure (PKI), network and enterprise security architecture, vulnerability and risk assessments and mitigation.
  • Performs heavy use of VmWare Virtualization (6.5) infrastructure and tools.
  • As needed, conducts the following:
  • Works from specifications and installation documentation to develop or modify operating systems applications.
  • Operates software in a distributed architecture in JLCCTC and JLVC environments.
  • Conducts technical operations, setup and tear down of servers, systems and integration tools; maintains RMF compliance; provides input to exercise design and technical planning products.
  • Creates constructive simulation and gaming simulation databases.

Qualifications

  • Bachelor’s degree plus three (3) years of recent specialized experience; OR an Associate’s degree plus seven (7) years of recent specialized experience; OR a major certification plus seven (7) years of recent specialized experience; OR eleven (11) years of recent specialized experience, if no degree.
  • Three (3) years of experience in the Microsoft SharePoint environment or similar web-based collaboration software tools
  • Two (2) years of experience designing and implementing web design, collaboration tools, and content management
  • Ability to transform management ideas and implement appropriate solutions
  • Experience with electronic knowledge repository management, intranets/portals, collaborative tools, and social media tools
  • Knowledge with database management, and server SW and programming
  • Strong technical literacy with working knowledge of HTML, JavaScript, and other web technologies required to implement and maintain web portals
  • Superior analytical and problem-solving skills
  • Ability to document and update processes
  • Ability to perform tasks under deadlines
  • Ability to work with senior Government and Industry leaders
  • Possess a very high degree of attention to detail
  • Capable of working at a computer terminal for extended periods
  • Outstanding interpersonal and written communication skills
  • Must be a U.S. Citizen
  • Ability to speak, read, write and understand the English language
  • DoD 8570 IAT Level II, and the ability to obtain IAT Level III within six (6) months of starting
  • Secret clearance with the ability to obtain and maintain TS with SCI access.
This job description is not designed to cover or contain a comprehensive listing of activities, duties, or responsibilities that are required of the employee. Duties, responsibilities and activities may change or new ones may be assigned at any time with or without notice.

Applicants may need to meet eligibility requirements for access to classified information; an active United States Department of Defense security clearance or the ability to obtain one may be required for this role.

As a federal contractor, CSA is subject to any federal vaccine mandates or other customer vaccination requirements. All new hires are required to report their vaccination status. 

WE BELIEVE great companies know who they are and what they stand for. CSA’s common purpose and core values were purposefully developed to create a culture focused on unlocking the full potential of our people—so they are inspired to solve our clients’ toughest challenges. It’s no secret, we owe the past 18 years of our success to our outstanding and ambitious team members. To support our hard working team, we offer an environment focused on learning and growth, an awesome benefits package, and opportunities to build a long and successful career.
 
We are constantly on the hunt for talented, forward-thinking problem solvers with an energetic attitude and a strong work ethic to join our elite team of CSAers.   
  

Be a part of CSA… do great things!

CSA is a Federal Contractor and an Equal Opportunity/Affirmative Action Employer.

If you are an individual with a disability and would like to request a reasonable workplace accommodation for any part of our employment process, please send an email to hr@csaassociates.com. Please indicate the specifics of the assistance needed. Assistance is reserved for individuals who are requesting a reasonable workplace accommodation. It is not intended for other purposes or inquiries. We’re an equal opportunity employer that empowers our people no matter their race, color, religion, sex, gender identity, sexual orientation, national origin, disability, or veteran status or other protected characteristic.

If you are a California resident applying for a job, you consent to our California Job Applicant Privacy Notice.

Notification for current or previously cleared professionals:

Official U.S. Government information appearing in the public domain shall not automatically be considered UNCLASSIFIED or approved for public release. CSA recognizes that information contained in resumes of current or previously cleared professionals may be sensitive, contain potentially proprietary and/or protected information. Protected Information is considered classified, in the process of a classification determination, or unclassified, but protected by statute. Therefore, all resumes should be approved for public release by a U.S. Government Official with Original Classification Authority, prior to posting the resume to CSA’s applicant tracking system.
By submitting my resume, I understand that I am NOT authorized to upload content with Official U.S. Government information that is considered, sensitive, proprietary, or protected.

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Tags: ACAS Active Directory Automation Clearance Compliance DoD DoDD 8570 GitLab ISSE JavaScript Linux Monitoring Nessus PKI Polygraph PowerShell Privacy Red Hat Risk assessment Risk management RMF SCAP Scripting Security Clearance SharePoint Solaris VMware Windows

Perks/benefits: Career development

Regions: Europe North America
Countries: Germany United States
Job stats:  8  0  0

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.