Information Security Engineer, Senior

Warrenton, VA

Applications have closed

Allen Integrated Solutions

View company page

 
 

Information Security Engineer, Senior-2 positions available 

Location: Warrenton, VA 
Category: Information Technology 
Job ID: CIS0000JV and CIS0000JW 

 

The mission of the Allen Integrated Solutions Lone Wolf Team is to operate and maintain the Distributed Continuity Integrated Network – Top Secret Enterprise Services (DCIN-TS ES). The DCIN-TS ES is a DoD provided, TS/SCI, integrated voice, video, and data, global communications network that facilitates collaboration among senior leaders and key staff. 

You are expected to have a strong work ethic and possess the ability to work as a critical member of a team in pursuit of mission objectives and in the support of our customers. We value candidates who are detail-oriented while also being able to think and react quickly to emerging and unique problem sets. To be successful in this role you'll be able to rapidly adapt and learn how to operate the front and back end of new products and processes.  

Responsibilities:  

•             Primarily responsible for maintaining the test and operational environments to include all cybersecurity tool sets and collaborating with systems and network engineers. 

•             Creates and implements methods and procedures for inspecting, testing, and evaluating the security and effectiveness of products and production equipment. 

•             Effectively choose the appropriate standards, processes, procedures, and tools throughout the system development life cycle to support the generation of the security engineering products. 

•             Design technical, operational, and organizational controls to maintain acceptable security posture for the organization. 

•             Assist with the design, deployment, and administration of a multi-site, distributed Splunk environment. Including Multi-site Clustering, Search Head Clustering, Universal Forwarders, Deployer, and Deployment Server. 

•             Administration and operation of information security compliance tools and platforms with a special concentration in managing the Assured Compliance Assessment Solution (ACAS) and ePolicy Orchestrator (EPO) suite. 

    Installation, monitoring, testing, troubleshooting, and administration of the ACAS/Nessus Vulnerability Scanner applications. 

•             Ensure scheduled scans are covering 100% of intended assets and are being run successfully. 

•             Ensure SC is being updated regularly; address unsuccessful updates of the SC and identify the root cause of the unsuccessful update. 

•             Configure, optimize, and test vulnerability scans against new and existing Operating Systems and platforms. 

•             Configure, operate, and maintain HBSS and its components (ePolicy Orchestrator, McAfee Agent, Data Loss Prevention, Host Intrusion Prevention System, Policy Auditor, Asset Baseline Monitor, and Virus Scan Enterprise) on Windows and Linux creating exceptions to allow essential processes to continue uninterrupted. 

•             Provide guidance on vulnerability and malware remediation. 

•             Configure, operate, and maintain ForeScout, Trip Wire and Lumension tool suites. 

•             Identify potential conflicts with implementation of any cyber security tools within the enterprise and develop recommendations to remediate these conflicts. 

•             Provide Tier 3 maintenance support for deployed cyber security technologies. 

•             Assist with periodic and regular security assessments. 

•             Assist with the development and maintenance of information security policies, standards, and control procedures to enable compliance with RMF. 

•             Assist with POA&M management, mitigation statement formulation, interfacing with system administrators to resolve open findings of high and at-risk systems 

Here’s What You’ll Need: 

Active TS/SCI Clearance 

BS or BA degree in a Computer Science or a related scientific discipline 

Minimum 8 years of related experience. 

Practical experience in infrastructure administration (Linux, networking, Windows, firewalls). 

Must meet DoD 8570.01-M IAM-II or IASAE-I baseline certification requirements such as CASP CE or equivalent. 

Proficiency with Red Hat/ Linix 

Working experience with ForeScout 

Working experience with NESSUS 

Working knowledge and experience with ACAS and HBSS administration. 

Experience with developing and presenting vulnerability information for technical and non-technical audiences. 

Well-developed verbal and written communication skills. 

Preferred: (nice to have but not required, ex. Education): 

Possess understanding and experience with common cybersecurity toolsets and processes to include STIGS, IAVA Management and Implementation, and OPORD/FRAGO support. 

Demonstrated experience in analysis simulation environment, configuring/troubleshooting software/hardware enhancements, application deployments, and infrastructure upgrades in a dynamic information system hosting environment. 

2+ years of Splunk experience in designing, implementing, and maintaining a fully operating Splunk solution. 

Allen Integrated Solutions is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, religion, creed, color, national origin, ancestry, sex (including pregnancy, childbirth, breastfeeding, or medical conditions related to pregnancy, childbirth, or breastfeeding), age, medical condition, marital or domestic partner status, sexual orientation, gender, gender identity, gender expression and transgender status, mental disability or physical disability, genetic information, military or veteran status, citizenship, low-income status or any other status or characteristic protected by applicable law. Learn more about your rights under Federal EEO laws and supplemental language. 

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Tags: ACAS CASP+ Clearance Compliance Computer Science DoD DoDD 8570 Firewalls IAM Intrusion prevention Linux Malware Monitoring Nessus POA&M Red Hat RMF Security assessment Splunk STIGs Top Secret TS/SCI Vulnerability scans Windows

Region: North America
Country: United States
Job stats:  3  0  0

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.