Description
ARS is currently looking for an Information System Security Engineer (ISSE). Our desire is to build a team of highly qualified professionals that will provide expertise in Cybersecurity, Cloud, and Systems Engineering, who will support the development and sustainment of unique secure enclaves at the edge, that provide enterprise services and cyber network defense capabilities to customers across the DoD. This team will provide engineering expertise using technologies such as ePO, Splunk, ACAS, Azure Automation, STIG/SCAP, and other enterprise capabilities. The Information Systems Security Engineer (ISSE) shall perform, or review, technical security assessments of computing environments to identify points of vulnerability, non-compliance with established Information Assurance (IA) standards and regulations and recommend mitigation strategies.
Why Work with us? ?
?Applied Research Solutions (ARS) is respected as a world-class provider of technically integrated solutions as we deliver premier talent and technology across our focused markets for unparalleled, continuous mission support.?Awarded a Best Places to Work nominee since 2020, ARS recognizes that without our career- driven, loyal professionals, we would not be able to deliver state-of-the-art results for our mission partners. We firmly believe that prioritizing our employees is of the upmost importance. We provide a culture where our employees are challenged to meet their career goals and aspirations, while still obtaining a work/life balance. ARS employees are motivated through our industry competitive benefits package, our awards and recognition program, and personalized attention from ARS Senior Managers.??
Responsibilities:
Engineer unique solutions to support ongoing Cyber Threat and Cyber Defensive Operations.
Automate threat assessment and reporting activities.
Analyze and report system and organizational security posture trends to the ISSM/ISSO.
Provide cybersecurity recommendations to the ISSM based on significant threats and vulnerabilities.
Implement system security measures in accordance with established procedures to ensure confidentiality, integrity, availability, authentication, and non-repudiation.
Plan and recommend modifications or adjustments based on exercise results.
Mitigate or correct security deficiencies identified during security and certification testing and/or recommend risk acceptance to the ISSM
Audit support responsibilities
Analyze and report organizational security posture trends to the ISSM/ISSO
Analyze and report system security posture trends to the ISSM/ISSO
Apply security policies to meet security objectives of the system to the ISSM/ISSO
Assess adequate access controls based on principles of least privilege and need-to-know and reports findings to the ISSM/ISSO
Assess all the configuration management (change configuration/release management) processes and reports findings to the ISSM/ISSO
Assess the effectiveness of security controls and reports findings to the ISSM
Be able to develop procedures and test fail-over for system operations transfer to an alternate site based on system availability requirements
Ensure all systems security operations and maintenance activities are properly documented and updated as necessary
Ensure cybersecurity-enabled products or other compensating security control technologies reduce identified risk to an acceptable level and reports findings to the ISSM
Implement security measures to resolve vulnerabilities, mitigate risks and recommend security changes to system or system components as needed
Implement system security measures in accordance with established procedures to ensure confidentiality, integrity, availability, authentication, and non-repudiation
Mitigate/correct security deficiencies identified during security/certification testing and/or recommend risk acceptance to the ISSM
Plan and recommend modifications or adjustments based on exercise results or system environment
Properly document all systems security implementation, operations and maintenance activities and updates necessary
Provides cybersecurity recommendations to the ISSM based on significant threats and vulnerabilities
Verify and update security documentation reflecting the application/system security design features
Verify minimum security requirements are in place for all applications
Assists the ISSM/ISSO in identifying the security requirements for the system, including the confidentiality, integrity, and availability of data
Assists the ISSM/ISSO in describing and documenting the security controls that will be implemented to meet the security requirements
Assists the ISSM/ISSO in describing and documenting the procedures that will be used to manage security risks and incidents
Assists the ISSM/ISSO in describing and documenting how the security controls will be monitored and tested to ensure that they are effective
Assists the ISSM/ISSO in describing and documenting how changes to the system will be managed to minimize security risks
Assists the ISSM/ISSO in describing and documenting how the system will be recovered in the event of a security incident
Assists the ISSM/ISSO in the collection and organization of supporting documentation and diagrams needed for an Authority to Operate Package
Assists the ISSM/ISSO with conducting a security assessment of the system. This includes identifying the system's assets, threats, vulnerabilities, and risks.
Assists the ISSM/ISSO with developing a risk management plan. This plan identifies the security controls that will be implemented to mitigate the risks to the system.
Assists the ISSM/ISSO in writing the System Security Plan or updating a System Security Plan Addendum
Assists the ISSM/ISSO in reviewing and updating the System Security Plan or Addendum
Assists the ISSM/ISSO in ensuring that the SSP is compliant with applicable DoD security policies and procedures
Monitors and investigates security breaches
Educates employees or clients about security procedures and programs
Requirements:
Must be a US citizen
Advanced technical competency and experience in one or more of the following areas: Active Directory Domain Services, Active Directory Federated Services, Active Directory Certificate Services, Windows Server Update Services, ePO, Splunk, STIG/SCAP, YUM, ACAS Automation, and Azure Monitor / Log Analytics.
Security+ Certification
5+ years related experience in SCI/SAP environments.
Bachelor's degree in computer science, Engineering, Finance, Business, or related field AND 3+ years leadership experience in relevant area of business OR equivalent experience.
8-12 years demonstrated performance in related technology.
Minimum Security Clearance Required
Top Secret w/ SCI eligibility
Travel
Up to 100%
Additional or Preferred Qualifications
5+ years leadership experience in relevant area of business.
Technical certifications in Azure
All positions at Applied Research Solutions are subject to background investigations. Employment is contingent upon successful completion of a background investigation including criminal history and identity check.
This contractor and subcontractor shall abide by the requirements of 41 CFR 60-741.5(a). This regulation prohibits discrimination against qualified individuals on the basis of disability, and requires affirmative action by covered prime contractors and subcontractors to employ and advance in employment qualified individuals with disabilities.
This contractor and subcontractor shall abide by the requirements of 41 CFR 60-300.5(a). This regulation prohibits discrimination against qualified protected veterans, and requires affirmative action by covered contractors and subcontractors to employ and advance in employment qualified protected veterans.
Equal Opportunity Employer/Protected Veterans/Individuals with Disabilities
This employer is required to notify all applicants of their rights pursuant to federal employment laws.
For further information, please review the Know Your Rights (https://www.eeoc.gov/poster) notice from the Department of Labor.