ZipRecruiter - Dulles, VA

posted 19 days ago

Full-time
Dulles, VA

About the position

The Cybersecurity Project Engineer is responsible for conducting technical risk assessments, providing risk mitigation guidance, and analyzing IT systems and networks for vulnerabilities. This role requires an active TS/SCI full scope polygraph clearance and involves evaluating system and network operations, analyzing hardware and software, and staying current with emerging technologies to identify associated risks.

Responsibilities

  • Perform technical risk assessments and provide risk mitigation guidance on enabling technologies.
  • Gather Body of Evidence (BOE) and assess artifacts to inform risk assessors' judgment.
  • Apply consistent and systematic investigative practices to assess risks, threats, and vulnerabilities.
  • Evaluate system or network operations using network management platforms, scanning tools, auditing functions, PCAP captures, and log reviews.
  • Analyze system, network, or cloud configurations for misconfigured settings and outdated hardware or software.
  • Remain current with existing and future technologies to identify associated risks.
  • Provide guidance on potential cyber threats, attacks, and exploitations.
  • Ensure risk mitigation considerations are incorporated early in the development cycle.
  • Organize and schedule work effectively to manage a case load.
  • Track, document, and communicate progress status updates on technical risk assessment reports.

Requirements

  • Demonstrated experience analyzing IT systems for cyber security vulnerabilities.
  • Demonstrated experience developing IT system or network architecture design, conducting IP data flow analysis, encryption configuration, and vulnerability analysis using both open-source and commercial tools, such as Nmap, Wireshark, Metasploit, Canvas, Kismet, or BackTrack.
  • Demonstrated experience analyzing IT network configurations of devices such as firewalls, routers, switches, VPNs, or Intrusion Detection/Prevention Systems for cyber security vulnerabilities.
  • Demonstrated experience with communications protocols such as IP, TCP, UDP, HTTP, HTTPS, MPLS, OSPF, IGRP, BGP, SIP, H.232.
  • Demonstrated experience with multiple OSs, including Windows, Linux, and OSX.
  • Demonstrated experience with Microsoft Windows versions; 7, 8, 10, 2008R2, 2012, 2012R2, or 2016.
  • Demonstrated experience with cloud computing technology and hypervisors such as HyperV, VMWare ESX, or Virtual Box.
  • Demonstrated experience with transitioning security domains and use of cross domain appliances.
  • Demonstrated experience with network management systems, network storage, backup systems, and disaster recovery (DR) architectures.
  • Demonstrated experience performing technical risk assessments and providing technical risk mitigation guidance.
  • Demonstrated experience ensuring appropriate risk mitigation considerations, risks and vulnerabilities are well understood and appropriately mitigated.
  • Demonstrated experience analyzing procurement processes of hardware, software and services to comply with cyber security and operational needs.
  • Demonstrated experience creating concise and well-structured written assessments.
  • CISSP Certification.

Nice-to-haves

  • Demonstrated experience with the Customers IT review boards.
  • Demonstrated experience with providing recommendations to IT architecture and design reviews.
  • Demonstrated experience with the Customers security policies and regulations.
  • Demonstrated experience providing recommendations in technical standards, security standards, and operational assurance.
  • Demonstrated experience with USG standards such as Intelligence Community Directive (ICD) 503, Federal Information Processing Standards (FIPS), Institute of Standards and Technology (NIST) Special Publication (SP) 800-37, SP 800-39, SP 800-53, SP 800-53A, SP 800-60.
  • Certified Information Security Manager (CISM), Certified Ethical Hacker.
Job Description Matching

Match and compare your resume to any job description

Start Matching
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service