SUMMARY:
The Systems Security Engineer is responsible for the day-to-day operations of existing information security solutions. This work includes identifying, investigating, and resolving potential security breaches detected by those systems. The Systems Security Engineer also has the responsibility to be involved with the planning, configuration, implementation, operation (e.g. performance and health monitoring) and maintenance (e.g. patching, upgrading and routine) of new security solutions, participation in the creation and or maintenance of policies, standards, baselines, guidelines and procedures as well as conducting vulnerability audits and assessments. The Systems Security Engineer is expected to be fully aware of the organization's security goals as established by its stated policies, procedures, and guidelines and to actively work towards upholding those goals.
DUTIES & RESPONSIBILITIES:
- Monitor IT Security systems, appliance and technologies performance and health
- Configure, maintain, and operate security technologies
- Assist with the research and planning of new IT Security technologies through the SDLC.
- Assist the security architect with security strategy and roadmap with current, future state, and solution for optimal security maturity levels
- Assist with client Zero Trust strategy and implementation plan
- Experience with a depth and breadth of IT Security tools and technologies, examples of technologies used are as follows:
- CoreImpact
- Tenable Nessus
- Splunk
- MicroFocus Fortify WebInspect
- RSA Archer Governance Risk & Compliance
- Carbon Black
- Burp Suite
- Prisma Cloud Access Security Broker (CASB)
- Data Loss Prevention (DLP) Solutions
- Palo Alto NGFW
- Prisma Cloud
- RSA Netwitness
- FireEye suite (CMS, NX, EX, HX, AX, FX, PX)
- Update and develop appropriate documentation (e.g. Standard Operating Procedures [SOPs], configuration management [CM], Hardening Guides [HG], backup procedures).
- Monitor and respond to any incidents or issues regarding IT Security technologies performing as intended.
- Conduct vulnerability and compliance scans of client environment using the above listed tools
- Initiate protective or corrective measures if a security problem is discovered.
- Self-starter who can drive project level tasks into technical objectives and execute according to client and project priorities and ConOps
QUALIFICATIONS:
- 5 years' experience in information security administration, with relevant IT Security technologies, applications and tools; or an equivalent experience with Firewalls, VPN appliances, URL filters, e-mail filtering and anti-virus software;
- Working technical knowledge of network and host-based intrusion detection and prevention systems.
- Experience with vulnerability scanning tools, and security information and event management (SIEM) and correlation tools
- A strong understanding of the vulnerabilities associated with network and application protocols and vulnerabilities effecting the Microsoft Windows operating system.
- Displays technical experience with conducting research and providing review recommendations on software and technologies for vulnerabilities.
- Hands on experience with developing system and technologies documentation through the SDLC.
- Experience with NIST Special Publications and guidance.
- Strong problem solving and analysis skills, self-motivated, and able to work and communicate in a team environment.
- Excellent communication (written and verbal) skills
CERTIFICATIONS:
- A minimum of at least one (1) certification must be active relating to information security such as:
- Certified Information Systems Security Professional (CISSP);
- GIAC security certification (e.g. GCIH, GWAPT, GPEN, GSLC, etc.)
- CompTIA Security +
- CEH
- Other vendor specific certifications aligned to above tools
EDUCATION:
- Bachelor's degree or higher in computer science, Information Technology, Information Security, or similar fields. Relevant experience may be taken in lieu of degree.
CLEARANCE:
- Minimum Background Investigation (MBI) will be conducted
LOCATION:
- Remote (Initial onboarding in Arlington, VA). Minimal travel to the Washington, D.C. Metro Area may be required if requested by the client.
HOURS:
- Ability to pass a minimum background investigation.