TIAG is now hiring a Sr. Cyber Security Engineer to join our team supporting the Naval Information Warfare Center (NIWC). This position requires an active Secret clearance to be considered.
The Sr. Cyber Security Engineer will support project execution of the Cyber Security Division mission at locations throughout the Continental United States (CONUS) and Outside the Continental United States (OCONUS). This includes support to all DoD MHS sites, which vary in size from 1,500 to over 60,000 server and workstation assets and support as many as 430 Programs of Record Systems of varying size, architecture and operating systems.
Support project execution of the Cyber Security Division mission at locations throughout the Continental United States (CONUS) and Outside the Continental United States (OCONUS). This includes support to all DoD MHS sites, which vary in size from 1,500 to over 60,000 server and workstation assets and support as many as 430 Programs of Record Systems of varying size, architecture and operating systems.
Coordination among multiple stakeholders, e.g., Security Engineers, Network Administrators, System Administrators, Information Assurance Managers (IAMs) / Information Systems Security Managers (ISSMs), certification authorities (and representatives), accreditation authorities (and representatives), program managers, vendors, etc., necessary to properly identify, document, mitigate, and manage risk attributed to the target system, network, and/or application
Provide continuous risk management support.
Provide Enterprise notification of Compliance activities that impact services to and/or
within a site of service and/ or system.
Provide guidance and technical expertise in the mitigation and remediation of CS vulnerabilities in accordance with Federal, DoD, and DHA policy and directives.
Conduct initial remediation actions on security controls based on the findings and recommendations of the security assessment report and reassess remediated control(s), as appropriate
Perform analysis and identify threats, vulnerabilities, or changes to the level of risk associated with continued operations.
Assess a selected subset of the technical, management, and operational security controls employed within and inherited by information systems in accordance with the organization defined monitoring strategy.
Knowledge of and ability to use applicable compliance and accreditation reporting environments (e.g., eMASS, CMRS) to document the progress of the A&A effort.
Provide technical recommendations and support for Enterprise Cyber Incident Response and Analysis teams, including on-site incident response activities.
Experience with cybersecurity (CS) Tools, including Assured Compliance Assessment Solution (ACAS), Host Based Security System (HBSS), System Center Configuration Manager (SCCM), Data at Rest (DAR), Application Whitelisting, Enhanced Mitigation Experience Toolkit (EMET), Group Policy Objects (GPO), and Centralized Logging.
Experience with various technologies and the STIGs for them
Experience with remediation of vulnerabilities.
Other tasking as necessary
BS degree in Engineering, Physical Science, Physics, Network Security, or Computer Science.
Experience: Fifteen (15) years of experience in Engineering, Systems Analysis, Medical Systems, Cybersecurity, Web Development, or Engineering Management, to include: Technology Analysis and Assessment, Design Definition, Development of Systems Specification, Systems Analysis, Systems Architecture, Systems/Equipment Integration, Test & Evaluation Criteria, and Logistics support of C4ISR requirements. Must have managerial or supervisory experience in the information technology arena. Note: Experience may be concurrent. Advanced degrees in appropriate area substitute for experience as follows: Ph.D. (or equivalent terminal degree) five (5) years of experience; MS or ME in appropriate area two (2) years of experience