MITRE Corporation - McLean, VA

posted about 2 months ago

Full-time - Mid Level
McLean, VA
Professional, Scientific, and Technical Services

About the position

The Senior Information Systems Cyber Engineer at MITRE will provide technical support and engineering for classified computing systems, focusing on cybersecurity and information assurance. This role involves working in a collaborative environment to integrate security into engineering projects and acquisition initiatives, ensuring compliance with strict security guidelines. The ideal candidate will have expertise in various cybersecurity topics and strong communication skills to present findings and recommendations to senior government sponsors.

Responsibilities

  • Provide technical support and engineering for classified computing systems.
  • Work with project engineers and security staff to determine requirements for server, workstation, and network configurations/software.
  • Independently plan rollouts, implementations, and maintenance of systems.
  • Setup, installation, and administration of Windows and Linux systems.
  • Setup, install, configure, and optimize tools for monitoring and cybersecurity defense.
  • Identify and recognize systemic system issues and troubleshoot/resolve remediation.
  • Provide end-user support to ensure systems are available and ready for intended use.
  • Assist ISSM/ISSO with coordination between sponsors, MITRE project leaders, and accreditation officials.
  • Develop and maintain infrastructure in a mixed Linux and Windows environment.
  • Research new hardware/software products for life cycle replacements and compliance with government regulations.
  • Apply best practices and RMF/STIG security controls to maintain security of classified information systems.
  • Maintain logs on workstations, servers, routers, firewalls, switches, etc.
  • Update servers, clients, applications, and maintain Active Directory and Continuous Monitoring logging.
  • Design group policies and access control lists according to organizational standards.
  • Develop and document systems administration standard operating procedures.
  • Maintain baseline system security configuration according to organizational policies.
  • Manage accounts, network rights, and access to systems and equipment.
  • Plan, execute, and verify data redundancy and system recovery procedures.
  • Conduct periodic system maintenance including cleaning, disk checks, and routine reboots.
  • Manage system/server resources including performance, capacity, availability, and recoverability.
  • Document and escalate incidents that may impact the environment.
  • Use cyber defense tools for continual monitoring and analysis of system activity.
  • Conduct research, analysis, and correlation across various data sets.
  • Work with stakeholders to resolve computer security incidents and vulnerability compliance.
  • Provide advice for Disaster Recovery and Continuity of Operations Plans.
  • Verify that application software/network/system security postures are implemented as stated.
  • Provide input to the Risk Management Framework process activities and related documentation.
  • Ensure that remediation plans are addressed within established time periods.
  • Assure successful implementation of security requirements and IT policies.
  • Ensure that security design and cybersecurity development activities are properly documented.

Requirements

  • Typically requires a minimum of 5 years of related experience with a Bachelor's degree; or 3 years and a Master's degree; or a PhD with relevant experience; or equivalent combination of education and work experience.
  • Active Top Secret/SCI clearance.
  • Must meet the requirements of an IAT Level II as a condition of employment.

Nice-to-haves

  • Active Top Secret/SCI/Polygraph clearance.
  • Experience installing, configuring, and administering Linux/Windows systems in an enterprise environment.
  • Experience with Windows Active Directory and/or Linux Identity Management environments.
  • Experience with RMF, CNSSI 1253, NIST SP 800-53, and NISPOM.
  • Experience with Security Technical Implementation Guides (STIGs) and Security Content Automation Protocol (SCAP) Compliance Checker (SCC).
  • Knowledge of Information Assurance Vulnerability Alerts (IAVAs).

Benefits

  • Competitive benefits
  • Exceptional professional development opportunities
  • Culture of innovation that embraces diversity, inclusion, flexibility, collaboration, and career growth
Job Description Matching

Match and compare your resume to any job description

Start Matching
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service