SAIC - Burke, VA
posted 2 months ago
SAIC is seeking a proven Senior Cyber Security Cloud Engineer to join the Enterprise Cloud Management Agency (ECMA) Cloud Enterprise Technology Services (CETS) program. This role presents an exciting opportunity to evaluate and potentially re-invent how the Army delivers IT services while leveraging data and analytics to meet mission requirements. The CETS program provides Information Technology services and technical subject matter expertise (SME) for the Army ECMA, supporting the overall strategy and migration to the cARMY environment up to Department of Defense (DoD) Impact Level (IL) 6. As a Senior Cyber Security Cloud Engineer, you will play a crucial role in delivering support to the warfighting mission through cutting-edge cloud application migration and business process refinement for the US Army. This position is contingent upon contract award, which is expected in February 2025. It is a hybrid position, requiring candidates to be local to the Fort Belvoir, VA area, as they must be able to be on-site when needed. Relocation assistance may be provided. The role involves performing Cyber Systems Architecture, Cyber Technology Research Development, Cyber Data Administration, Cyber Knowledge Management, Cyber Network Services, Cyber Systems Administration, Cyber Systems Analysis, and Cybersecurity Defense Infrastructure Support activities as outlined by the National Initiative for Cybersecurity Education (NICE) Framework. The work primarily focuses on Infrastructure Security, encompassing the maintenance, administration, engineering, architecture, development, patching, and upgrades of various toolsets, devices, applications, and systems used for cybersecurity and cyberspace operations. In accordance with enterprise IT change and configuration management policies, you will implement changes to cybersecurity and/or cyberspace operational systems, software, appliances, and devices. This includes system configuration and monitoring changes to enhance effectiveness and efficiency in monitoring and implementing logical access controls to enforce policy. You may also support the development, maintenance, and reporting of cybersecurity and/or cyberspace operations metrics. The role requires designing, developing, documenting, testing, and debugging cybersecurity and/or cyberspace operations application software using secure coding practices. You will provide detailed information for selection and implementation techniques and tools to meet business needs, including capacity requirements, facility requirements, data storage, backup, monitoring, operating systems, directory services, identity management, access management, and automation, ensuring compliance with established standards, policies, and configuration guidelines.