Security Engineer - Senior
Own your career as a Security Engineer - Senior at GDIT. Here, you’ll have the opportunity to build strong lines of cyber defense using cutting-edge technologies. Your work in cyber security at GDIT will have an impact on securing our clients’ missions and ensuring we anticipate the threats of tomorrow.
At GDIT, people are our differentiator. As a Security Engineer - Senior you will help ensure today is safe and tomorrow is smarter.
HOW A CYBER ENGINEER SR ADVISOR WILL MAKE AN IMPACT
● Designs and evaluates end-to-end systems through their entire life cycle. Ensures products and systems comply with requirements and customer information assurance and cyber security standards and practices through formal verification methods with specific emphasis on network operations and cyber warfare tactics.
● Conducts software and systems engineering and software systems research to develop new capabilities, ensuring cybersecurity is fully integrated. Conducts comprehensive technology research to evaluate potential vulnerabilities in cyberspace systems
● Designs, develops, tests, and evaluates information system security throughout the systems development life cycle - Tests, implements, deploys, maintains, and administers the infrastructure hardware and software
● Conducts risk assessment and provides recommendations for application design - Responsible for a wide range of security issues including architectures, firewalls, electronic data traffic, and network access
● Uses encryption technology, penetration and vulnerability analysis of various security technologies, and information technology security research
● Designs and develops new systems, applications, and solutions for external customer enterprise-wide cyber systems and networks
● Ensures the logical and systematic conversion of customer or product requirements into total systems solutions that acknowledge technical, schedule, and cost constraints
● Integrate new architectural features into existing infrastructures, designs cybersecurity architectural artifacts, provides architectural analysis and relates existing system to future needs and trends, embeds advanced forensic tools and techniques for attack reconstruction, provides engineering recommendations, and resolves integration/testing issues
● Builds and maintains trusted relationships with customers
● May coach and provide guidance to less-experienced professionals
● May serve as a team or task lead
Minimum Requirements:
Bachelor’s degree in business related field, engineering, or a related scientific or technical discipline with at least 15+ years of experienceMust have one of the following: CISSP, CISM, CGRC, Security+Must have 5+ years of progressive experience managing security remediation and configurationMust have 5+ years in managing network/system/application vulnerability scanning and security patching to support Continuous Readiness in Information Security Program or similar information readiness in another Government organization of similar size, tasking and complexityMust have experience supporting a Government agency, preferably Veterans AffairsMust demonstrate critical thinking skills to resolve stakeholder conflictsMust have outstanding written and verbal communication skills with the ability to present business leadersMust be able to obtain a Position of Trust and successfully pass a thorough Government background screening process requiring the completion of detailed forms and fingerprintingLocation: REMOTESecurity Engineer:
Responsible for providing Enterprise IT Services and Support for ASSIST operations and engineering.
Uses security tools to monitor, investigate, and identify anomalous events that are detected by security devices or reported to the Security Operations Center (SOC) from external entities, Government leads, system administrators, and the user community.
Responds to Intrusion Detection System (IDS)/Intrusion Prevention System (IPS) alerts.
Implements custom detection content; applies various antivirus, intrusion detection, and vulnerability assessment tools, techniques, and procedures including maintaining policy signature enforcement, custom signature, signature modification, performance profiling, and sensor deployment.
Performs and documents risk assessment analysis for access requests, along with analyzing Information System Security (ISS) reports.
Performs work under supervision, as necessary.
GDIT IS YOUR PLACE:
● Full-flex work week to own your priorities at work and at home
● 401K with company match
● Comprehensive health and wellness packages
● Internal mobility team dedicated to helping you own your career
● Professional growth opportunities including paid education and certifications
● Cutting-edge technology you can learn from
● Rest and recharge with paid vacation and holidays