Cyber Security Engineer SME

McLean, VA

Applications have closed

Dark Wolf Solutions

The Alphaof technology Dark Wolf Solutions operates at the nexus of mission and technology to meet our Nation's most challenging missions. JOIN THE PACK Connect Our Background About Us We combine the most innovative emerging technologies with...

View company page

Dark Wolf Solutions is looking for a Cyber Security Engineer who will serve as a technical cyber investigator supporting the design, engineering, implementation, and maintenance of various enabling technologies utilized in mission systems/networks and applications. In this capacity, the candidate will be responsible for analyzing network/system topologies from a cyber security and network/system engineering perspective.

The position requires candidates with a breadth of knowledge and experience to examine a variety of system and network technologies and operational activities for cyber risks. Activities performed in this capacity include but are not restricted to:

  • Lead technical assessments of system/network topologies and write assessment reports based on
  • Analyze IP network topologies, technical and operational vulnerabilities and
  • Review configurations of IP based network equipment such as routers, switches, firewalls, IDS/IPS, One Way Transfer (OWT) appliances for security policy and deployment guideline compliance, operating system and security patch updates, configuration
  • Conduct and evaluate automated system and network scans using tools such as Wireshark, NMap, Nessus, Nipper
  • Support external customer projects by providing system and network engineering expertise and cyber guidance in working groups, customer meetings, and in written communications to ensure the projects comply with Agency policy and regulations while fulfilling the customer's operational
  • Provide cyber recommendations to architecture and design reviews.
  • Evaluate network operations using network management platforms, network scanning tools, auditing functions, and log
  • Review procurement processes of hardware, software and services to comply with cyber and operational
  • Maintain current knowledge of relevant technology as
  • The individual performing this work will be required to work independently with little supervision and should be flexible to support customers located throughout the WMA.

Required Qualifications:

  • 16 years’ work experience and a Bachelor's Degree in Computer Science, Engineering, or a related technical discipline, or the equivalent combination of education, technical certifications or training, or work experience
  • 10+ years of network/system engineering experience in a secure environment and five or more years supporting mission based TCP/IP networks.
  • Experience with planning, configuring, securing, and maintaining IP network products including routers, switches, wireless networking, VPN's, IDS/IPS, Firewalls, One Way Transfer (OWT) appliances.
  • Experience with planning, configuring, securing, and/ or maintaining cloud-based services such as Amazon Web Services (AWS), Microsoft Azure, Google Cloud, IBM Cloud.
  • Demonstrated experience with communications protocols such as IP, TCP, UDP, MPLS, OSPF, IGRP, BGP.
  • Experience with network operating systems such as Cisco iOS, NXOS, JunOS.
  • Virtualized Platform (VMware, Virtua Box, Microsoft Hyper -V, QEM U) experience.
  • Experience with Windows Server (2012/2016), Windows Workstation (8.X, 10), Linux (Redhat/Debian), OSX operating systems.
  • Knowledge and experience with encryption products, methodologies, configuration.
  • Experience with Network Packet Capture and System analysis tools such as Wireshark, Snort, NMAP, Nipper Studio, Nessus.
  • Experience with Network Management products such as HP OpenView, Solarwinds, Nagios.
  • Familiar with cyber security standards such as Intelligence Community Directive (ICD) 503, Committee on National Security Systems Publication (CNSSP) 1253, Federal Information Processing Standards (FIPS) 140-2, 199, 200, National Institute of Standards and Technology (NIST) Special Publications 800-37, 800-39, 800-53.
  • Experience with Computer Aided Design programs such as CAD or Visio.
  • One or more of the following certifications:
    • Amazon Cloud Service Certification (Solutions Architect Associate or higher) or similar cloud certification
    • Cisco Certified Network Associate (CCNA), Cisco Certified Network Professional (CCNP), Juniper NCSP, or Juniper NCP
    • Microsoft Certified Solutions Associate (MCSA) or Microsoft Certified Solutions Expert (MCSE)
    • Red Hat Certified Engineer (RHCE) or Red Hat Certified Security Specialist (RHCSS) or similar Linux certification
    • VMWare Certified Professional vSphere 5 (VCPS) or similar virtual machine certification
    • Certified Information Systems Security Professional (CISSP)
  • Active TS/SCI with Polygraph security clearance required

Desired Qualifications:

  • Experience with VOiP Telephony Systems.
  • Firm understanding of business legal structures and business operations (contracts, accounts receivable, accounts payable, business banking, procurement processes, and logistics).
  • One or more of the following certifications:
    • Offensive Security Experienced Penetration (OSEP) Tester Certification
    • Certified Ethical Hacker (CEH)
    • Project Management Professional (PMP)
    • EMC, NetApp or similar certification

 

We are proud to be an EEO/AA employer Minorities/Women/Veterans/Disabled and other protected categories.
 
In compliance with federal law, all persons hired will be required to verify identity and eligibility to work in the United States and to complete the required employment eligibility verification form upon hire.

Tags: Audits AWS Azure Banking CCNP CEH CISSP Clearance Clearance Required Cloud Compliance Computer Science Debian Encryption Firewalls GCP IDS iOS IPS Linux Nagios Nessus NIST Nmap Offensive security Polygraph Red Hat Security Clearance Snort TCP/IP TS/SCI VMware VPN Vulnerabilities Windows

Perks/benefits: Flex hours

Region: North America
Country: United States
Job stats:  11  0  0

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.