Information Systems Security Engineer

Silver Spring, MD, United States

Peraton

Peraton drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world’s leading mission capability integrator and transformative enterprise IT provider, we deliver trusted and highly...

View company page

Responsibilities

Peraton is seeking an Information Systems Security Engineer in support of Strategic Innovation Group’s information assurance and information technology operations. This is a full-time on-site position working out of Peraton’s Silver Spring, Maryland office with occasional travel to

our other facilities in New Jersey and New Hampshire.

 

Responsibilities include but not limit to:

  • Manage classified and unclassified information systems running flavors of Linux and Microsoft operating systems; perform monthly system patches outside of the normal business hours
  • Apply security controls based on the DoD Security Technical Implementation Guidance
  • Build, install, maintain, effectively troubleshoot, and make enhancement to information systems, IT services, and network devices-- include operating system, hardware, firmware and software application
  • Perform regular data backup; recommend and implement enhancement to data backup solutions
  • Perform a Weekly audit (review of logs) for each accredited information system.
  • Identify root-causes of operational issues and process inefficiencies
  • Manage security vulnerabilities; implement remediation timely; monitor security logs for violations and anomalous events; report information security concerns and problems when necessary;
  • Provide support to Information System Security Manager (ISSM) for the ISSM Roles and Responsibilities as laid out in DAAPM 2.2, JSIG Rev 4, ICD-503, and other applicable documentation.
  • Prepare, deliver and update all required documentation using the current approved templates, forms, regulations, and methods.
  • Work closely with the key stakeholders to identify any additional controls that are applicable to the system(s) to maintain a favorable security posture.
  • Assist in incident response and annual self-inspection and inventory efforts.
  • Track the deployment of software to the environment.
  • Generate Plan of Actions & Milestones (POA&Ms) for each non-compliant control, manage all applicable POA&Ms throughout the information system lifecycle. Proper documentation shall be filed and updated as required.
  • Provide, track, and report security requirements throughout the system life cycle of all information systems that are within the accreditation boundary.
  • Provide timely and detailed responses to all user requests.
  • Continuously maintain a thorough understanding of all relevant corporate policies, security control plans as well as system configurations, architecture, installed software, accounts (both Operating System and Application), data flows, ports, protocols, and other relevant data for each Information System.
  • Maintain required certifications for this role.

Qualifications

Required Qualifications/Skills:

  • Minimum 5 years with BS/BA, 3 years with MS/MA, 0 years with PhD
  • Degree in a technical discipline such as computer science, cybersecurity, or information technology
  • Additional relevant experience will be considered in lieu of formal education
  • Security+ CE or equivalent certification (DoD 8570 IAT 2) with ability to obtain IAT 3 certification within 12 months of employment
  • 2+ years of solid Linux system administration working experience with specific focus on Ubuntu and RedHat distributions
  • Have Microsoft Windows system administration experience
  • Have written or revised Linux shell scripts
  • Have working experience in racking servers, performing hardware troubleshooting and installation
  • Have in-depth knowledge of TCP/IP and networking concepts; have solid understanding of the well-known services including DHCP, DNS, SSH, TLS, IPSec, etc.
  • Have exposure to the DoD classified processes including Authority to Operate (ATO), continuous monitoring, POA&Ms, Security Authorizations (SA), NIST 800-37, NIST 800-53 Rev4/ Rev5
  • Experience with Compliance Check and Security Technical Implementation Guidance
  • Work well with team members, good written and verbal communication skills
  • Active TS clearance with ability to obtain SCI

Desired Skills/Qualifications

  • Have working experience performing Information System Security Officer duties
  • Have experience with installing, configuring and using virtualization technologies
  • Have experience with ACAS, Nessus, and/or other vulnerability scanners
  • Have working experience configuring switches and routers

 

 

Peraton Overview

Peraton is a next-generation national security company that drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world’s leading mission capability integrator and transformative enterprise IT provider, we deliver trusted, highly differentiated solutions and technologies to protect our nation and allies. Peraton operates at the critical nexus between traditional and nontraditional threats across all domains: land, sea, space, air, and cyberspace. The company serves as a valued partner to essential government agencies and supports every branch of the U.S. armed forces. Each day, our employees do the can’t be done by solving the most daunting challenges facing our customers. Visit peraton.com to learn how we’re keeping people around the world safe and secure.

Target Salary Range

$86,000 - $138,000. This represents the typical salary range for this position based on experience and other factors.

Tags: ACAS Clearance Compliance Computer Science DAAPM DNS DoD DoDD 8570 Incident response ISSE Linux Monitoring Nessus NIST NIST 800-53 PhD SSH TCP/IP TLS Ubuntu Vulnerabilities Windows

Perks/benefits: Team events

Region: North America
Country: United States
Job stats:  12  0  0

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.