TO BE CONSIDERED FOR THIS POSITION YOU MUST HAVE AN ACTIVE TS/SCI W/ FULL SCOPE POLYGRAPH SECURITY CLEARANCE (U.S. CITIZENSHIP REQUIRED)
Analyzes requirements, concept of operations documents, and high-level system architectures to develop system requirements specifications. Analyzes system requirements and leads design and development activities. Guides users in formulating requirements, advises alternative approaches, and conducts feasibility studies. Provides technical leadership for the integration of requirements, design, and technology. Incorporates new plans, designs and systems into ongoing operations. Present briefings and demonstrations to stakeholdersQualifying certs are:CAPCASP+ CECISMCISSP (or Associate)GSLCCCISOHCISPPFourteen (14) years experience as an ISSE on programs and contracts of similar scope, type, and complexity is required. Bachelor’s degree in Computer Science, Information Assurance, Information Security System Engineering, or related discipline from an accredited college or university is required. Four (4) years of ISSE experience may be substituted for a bachelor’s degree. - Qualifications - Participate as a security engineering representative on engineering teams for the design, development, implementation and/or integration of secure networking, computing, and enclave environments - Participate as a security engineering representative on engineering teams for the design, development, implementation and/or integration of IA architectures, systems, or system components - Participate as the primary security engineering representative on engineering teams for the design, development, implementation, evaluation, and/or integration of secure networking, computing, and enclave environments -Participate as the primary security engineering representative on engineering teams for the design, development, implementation, evaluation, and/or integration of IA architectures, systems, or system components -Support the Government in the enforcement of the design and implementation of trusted relationships among external systems and architectures - Apply knowledge of IA policy, procedures, and workforce structure to design, develop, and implement secure networking, computing, and enclave environments -Support security planning, assessment, risk analysis, and risk management -Identify overall security requirements for the proper handling of Government data - Interact with the customer and other project team members - Perform system or network designs that encompass multiple enclaves, to include those with differing data protection/classification requirements -Provide security planning, assessment, risk analysis, and risk management - Recommend system-level solutions to resolve security requirements -Support the Government in the enforcement of the design and implementation of trusted relationships among external systems and architectures