Cyber Systems Engineer III – Cyber Ops SETA

Springfield, VA, United States

Applications have closed

Arcfield

Arcfield was purpose-built to defend against the near-peer threat through innovations in systems engineering and integration, modeling, simulation and analysis, space and launch support, cybersecurity and test range support.

View company page

Overview

Arcfield is a leading provider of full lifecycle, mission-focused systems engineering and integration capabilities to the U.S. government and its allies. The company has more than 60 years of proven experience providing advanced engineering and analysis, IT and C5ISR capabilities to support our nation’s most critical national security missions. Headquartered in Chantilly, VA and with 16 offices around the world, Arcfield employs approximately 1,200 engineers, analysts, IT specialists, and other professionals who put our customers’ missions first, helping them solve their most complex challenges through innovations in modeling, simulation and analysis, digital transformation and C5ISR. Visit arcfield.com for more details.

Responsibilities

Program Description:

The program provides Systems Engineering and Technical Assistance (SETA) support in the areas of Cyber Security and Management to improve the Information Assurance (IA) posture of a National customer.  The contracts support functions are:  IA Management, Federal Information Security Management Act (FISMA) coordination and reporting, Risk Management Framework (RMF) application, IA compliance measurements and metrics, Assessment and Authorization (A&A), Vulnerability Management, and Cyber Defense support.

 

Position Description:

The Cyber Systems Engineer Project Management Technical Support provides support to the customer in the area of Cyber Security. Daily Tasks include, but are not limited to:

  • Compile information to develop weekly, monthly and annual customer “Cyber Snapshot.” Report metrics on cases and incidents that have happened over the period as well as items of interest on cybersecurity that would be of interest to senior management
  • Verify/validate systems with specific emphasis on network operations and cyber warfare tactics, techniques, and procedures focused on threat to information networks
  • Assess security performance using evaluation criteria and technical performance measures
  • Participate in design reviews of components (hardware and software) to ensure applicability to the current system and traceability of requirements
  • Develop and maintain analytical procedures to meet changing requirements. Produce high quality papers, presentations, recommendations and findings for senior intelligence and operations officials
  • Provide identification and classification of system network vulnerabilities providing mitigation and remediation recommendations
  • Analyze policies and procedures against federal laws and regulations and provide recommendations for closing gaps
  • Develop strategies to comply with privacy and risk management requirements. Prepare threat analysis reports
  • Create indications of compromise for new and existing malware
  • Participate in cyber defense working groups, forums and IPTs to provide cyber defense guidance

Qualifications

Required:

  • 5 to 7 years with BS/BA or 3 to 5 years with MS/MA or 0 to 2 years with PhD.
  • Must possess and be able to maintain a TS/SCI with Poly
  • DoD 8570 certification in IAT or IAM
  • Able to support customer’s core hours (0900-1500; Mon – Fri)
  • Experience with customer’s Cybersecurity Processes
  • Experience in requirements development and analysis
  • Experience in security systems engineering involving various computer hardware and software operations systems and applicable solutions in both standalone and LAN/WAN configurations. Experience with security features and or vulnerability of various operating systems as defined by NIST, DISA (STIGs) and USCYBERCOM
  • Experience with networks and systems security administration, operating systems, security configuration and account management best practice
  • Solid understanding of network intrusion detection methods and techniques
  • Strong attention to detail
  • Ability to work in a team environment
  • Excellent oral and written communications skills

Desired:

  • Self-starter requiring limited direction and supervision
  • Bachelors of Science Degree in Science, Technology, Engineering or Mathematics (STEM) or an advanced IA certification (i.e. CISSP or CASP)
  • Experience briefing senior customer personnel
  • Ability to organize and prioritize numerous customer requests in a fast-paced deadline driven environment
  • Familiarity with the RMF process
  • Experience supporting IC or DoD in the Cyber Security Domain
  • Experience with SIEM technology and applications such as ArcSight or Splunk
  • Experience with FireEye or experience with an equivalent endpoint agent application.
  • Experience responding to detected security incidents
  • Experience implementing RMF processes and NIST 800-53 technical controls as well as developing maintaining associated certifications and accreditation documentation
  • Familiarity with Amazon Web Services (AWS)

EEO Statement

EEO

Arcfield proactively fulfills its role as an equal opportunity employer. We do not discriminate against any employee or applicant for employment because of race, color, sex, religion, age, sexual orientation, gender identity and expression, national origin, marital status, physical or mental disability, status as a Disabled Veteran, Recently Separated Veteran, Active-Duty Wartime or Campaign Badge Veteran, Armed Forces Services Medal, or any other characteristic protected by law.

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Tags: ArcSight AWS CASP+ CISSP Compliance Cyber defense DISA DoD DoDD 8570 FISMA IAM Intrusion detection Malware Mathematics NIST NIST 800-53 PhD Privacy Risk management RMF SIEM Splunk STEM STIGs TS/SCI Vulnerabilities Vulnerability management

Perks/benefits: Career development

Region: North America
Country: United States
Job stats:  4  0  0

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.