Annapolis Junction, MD, 20701, USA
24 hours ago
Cyber Engineer 4 - Annapolis Junction, MD
Overview **Your Future at M.C. Dean** We're seeking people driven to excellence and inspired to have a meaningful impact powering, automating, integrating, and securing the world’s most critical infrastructure and facilities. This translates into fulfilling opportunities for employees driven to excel in a meaningful career. As an employee at M.C. Dean, you will join forces with more than 5,800 professionals who engineer and deploy automated, secure and resilient power and technology systems; and deliver the management platforms essential for long-term system sustainability. Together, we transform the way complex, large-scale systems are designed, delivered, and sustained–enhancing client outcomes, improving lives, and changing the world for the better. Seeking a **Cyber Engineer 4** that is able to work with a dynamic team of system engineers and administrators responsible for design, implementation, operations & maintenance, and cybersecurity for large complex resilient hardware and virtualized infrastructure. This position will perform Cybersecurity / Information Assurance for all customer managed systems, applications, and hardware. Responsibilities + Design, implement, and maintain Department of Defense provided Security and Vulnerability tools including Host Based Security System (HBSS), Splunk, and Microsoft Defender for Endpoints. + Support authorization/reauthorization efforts in alignment with the Department of Defense Risk Management Framework (RMF), NIST 800-53 (e.g. develop and apply Active Directory Group Policy Objects, develop deployment packages, etc.). + Analyze new security requirements, define courses of action, and design enterprise solutions, coordinating with engineering and operations teams to implement within the environment. + Formalize and execute a process for communicating vulnerability results in a manner understood by technical and non-technical stakeholders based on risk tolerance and impact to the environment. + Leverage vulnerability database sources to understand each weakness, its probability and remediation options, including vendor-supplied fixes and workarounds. + Design, implement, and maintain, scripts used in asset discovery and vulnerability status. + Conduct continuous independent discovery and vulnerability scans/security assessments of enterprise-wide assets and proactive control testing. + Set up and execute Nessus scans; establish automated reporting. + Document, prioritize, and formally report asset and vulnerability state, along with remediation recommendations and validation. + Coordinate with system owners and system administrators/technical points of contact to identify system vulnerabilities, conduct vulnerability analysis, and formulate remediation strategies. + Develop packages for complex remediation efforts and coordinate with vulnerability remediation specialists for deployment. + Support and monitor patch management compliance across the infrastructure to align to audit requirements. + Identify and apply DISA Security Technical Implementation Guide (STIG) benchmarks. + Conduct manual STIG reviews. + Support preparation of Plan of Action & Milestones (POAM) development to support compliance and authorization/reauthorization activities. + Prepare and disseminate regular Cyber Compliance/vulnerability reporting; interact with the customer to explain results and address issues. + Contribute to the development of Standard Operating Procedures, Work Instructions, User Guides, and checklists. + Work as a team to consistently learn and share advanced skills and foster team excellence. + Actively collaborate with the ISSO to develop, maintain, and enhance cyber security controls. + Collaborate with security groups such as red teams, threat intelligence and risk management to form a holistic team dedicated to thwarting attackers and reducing attack surface. Qualifications **Clearance/Citizen Type:** Applicants selected will be subject to a government security investigation and may meet eligibility requirements, including U.S. Citizenship, for access to classified information; **ACTIVE TS/SCI w/ Poly clearance REQUIRED.** **Education:** + Bachelor's Degree in IT, Cybersecurity, Systems Engineering, Engineering, or a related discipline with 7+ Years of progressive experience. + DoD 8750 IAT Level II Certification (CCNA Security, CySA+, GICSP, GSEC, Security+ CE, CND, or SSCP). + Experience operating and maintaining a Nessus environment. + Comply with DOD 8140.01 "Cyberspace Workforce Management" and maintain an appropriate and current IA certification to perform IA functions in accordance with Department of Defense (DoD) 8570.01-M, "Information Assurance Workforce Improvement Program". + Experience developing and implementing hardware and software solutions for data center and virtual infrastructure technologies. + Strong MS Excel, Word, PowerPoint, and Visio Skills. **Travel:** + ability to travel 15% **What we offer:** + A collaborative team inspired by the way engineering and innovation enhance customer outcomes, improve lives, and change the world for the better. We are driven by our core values of agility, expertise, and trust. + An opportunity to lead and build a business with the support of an industry-leading firm that has been in business for 75 years. + Investment in your skills and expertise through a combination of professional and technical training programs, including leadership training and tuition reimbursement. + Open and transparent communication with senior leadership as well as local office management. **We offer an excellent benefits package including:** + A competitive salary + Medical, dental, vision, life, and disability insurance + Paid time off + Tuition reimbursement + 401k Retirement Plan + Military Reserve pay offset + Paid maternity leave **Pay Range:** 124,880 - $187,320 **Abilities:** + Exposure to computer screens for an extended period of time. + Sitting for extended periods of time. + Reach by extending hands or arms in any direction. + Have finger dexterity in order to manipulate objects with fingers rather than whole hands or arms, for example, using a keyboard. + Listen to and understand information and ideas presented through spoken words and sentences. + Communicate information and ideas in speaking so others will understand. + Read and understand information and ideas presented in writing. + Apply general rules to specific problems to produce answers that make sense. + Identify and understand the speech of another person.
Confirm your E-mail: Send Email