Information Assurance/Security Engineer

Washington, DC, United States

Applications have closed

Peraton

Peraton drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world’s leading mission capability integrator and transformative enterprise IT provider, we deliver trusted and highly...

View company page

Responsibilities

Provides technical and programmatic information assurance services to internal and external customers in support of network and information security systems. Designs, develops, and implements security requirements within an organization’s business processes. Prepares documentation from information obtained from customer using accepted guidelines. Prepares security test and evaluation plans. Provides certification and accreditation support in the development of security and contingency plans and conducts complex risk and vulnerability assessments. Analyzes policies and procedures against Federal laws and regulations and provides recommendations for closing gaps. Recommends system enhancements to improve security deficiencies. Develops, tests, and integrates computer and network security tools. Secures system configurations and installs security tools, scans systems to determine compliancy and report results and evaluates products and various aspects of system administration. Conducts security program audits and develops solutions to lessen identified risks. Provides information assurance support for the development and implementation of security architectures to meet new and evolving security requirements. Provides assistance in computer incident investigations. Performs vulnerability assessments including development of risk mitigation strategies.

  • Develop RMF security documentation (i.e., System Security Plans (SSP), Security Control Traceability Matrix (SCTM), Incident Response Plans (IRP), Memorandums of Understanding (MOU), Interconnection Security Agreements (ISA), Risk Acceptance Memorandums, Continuous Monitoring (CONMON) Plans, Configuration Management Plans (CMP), Contingency Plans (CP), and Plan of Action and Milestones (POA&M) reports that support the Assessment and Authorization (A&A).
  • Experience developing Security Control Assessment (SCA) artifacts, including the Security Assessment Plan (SAP), Security Assessment Reports (SAR), and System Security Plan (SSP).
  • Experience developing Plans of Action and Milestones (POA&Ms), including providing risk mitigation strategies, steps, and milestone.
  • Review system scans/tests using the Security Content Automation Protocol (SCAP) Compliance Checker (SCC), and the Assured Content Assessment Solution (ACAS).
  • Working with engineers to ensure vulnerabilities are addressed within 30 days of their discovery date and track vulnerabilities until closure (POA&M, patching, etc.).
  • Evaluates the security controls within the enterprise to identify vulnerabilities and compliance issues; recommend actions to correct problems.
  • Experience in mapping security controls within eMASS and addressing controls that are related to STIGs.
  • Perform System Impact Assessments.
  • Experience with XACTA.
  • Knowledge of vulnerability scoring systems (CVSS/CMSS)
  • Create /Manage Nessus dashboards, deploy /manage Nessus Agents, deploy/mange Nessus Network Monitor (NNM).
  • Experience or have knowledge of using tools such as HBSS, Splunk, and other tools to assist with performing tasks related to A & A.
  • Knowledge of integrating Nessus with Splunk a plus.
  • Working knowledge of the NIST 800 series publications to include but not limited to: 800-30, 800-53a, SP 800-137, SP 800-171, and SP 800-37, DoDI 8500.01, and DoDI 8510.01

Qualifications

  • BS 2-4 Years, MS 0-2 or HS 8-10; additional experience may be considered in lieu of a degree
  • Active TS/SCI level clearance is required
  • IAM Level III certification required
  • DoD 8570 IAT II certification (Security+) required
  • Experience working with Tenable Security Center and Tenable Nessus agents desired.
  • Experience with general RHEL administration and troubleshooting.
  • Experience working with multiple network security zones, subnetting, VRFs, and VLANs
  • Motivated self-starter with strong written and verbal communication skills, and the ability to create complex technical reports on analytic findings.
  • Strong analytical and troubleshooting skills.
  • Experience as a Navy Qualified Validator or Fully Qualified Navy Validator desired.
  • ITILv4 Foundation Certification desired

Peraton offers enhanced benefits to employees working on this critical National Security program, which include heavily subsidized employee benefits coverage for you and your dependents, 25 days of PTO accrued annually up to a generous PTO cap and participation in an attractive bonus plan

  •  

Peraton Overview

Peraton drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world’s leading mission capability integrator and transformative enterprise IT provider, we deliver trusted and highly differentiated national security solutions and technologies that keep people safe and secure. Peraton serves as a valued partner to essential government agencies across the intelligence, space, cyber, defense, civilian, health, and state and local markets. Every day, our employees do the can’t be done, solving the most daunting challenges facing our customers.

Target Salary Range

$112,000 - $179,000. This represents the typical salary range for this position based on experience and other factors.

Tags: ACAS Audits Automation Clearance Compliance CVSS DoD DoDD 8570 eMASS IAM Incident response Monitoring Nessus Network security NIST POA&M RMF SAP SCAP SCTM Security assessment Security Assessment Report Splunk STIGs System Security Plan TS/SCI Vulnerabilities

Perks/benefits: Career development Health care Salary bonus

Region: North America
Country: United States
Job stats:  9  0  0

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.