PRIMARY FUNCTION Responsible for ensuring IT systems maintain the appropriate security posture in accordance with NIST and FBI policy/guidance. Analyze and define security requirements for on-premises and cloud environment IT systems. Designs, develops, engineers, and implements solutions that meet security requirements. Responsible for the integration and implementation of IT system security solutions under the guidance of the ISSO and Government personnel. Performs risk analyses of IT systems and applications during all phases of the system development life cycle and during mandated security reviews. Collaborates with other engineers, administrators, and other technical experts in the identification and implementation of appropriate information security functionality to ensure uniformity, standardization, and compliance with security policies. Responsible for participating as a security engineering representative on engineering teams for the design, development, implementation and/or integration of IA architectures, systems, or system components. ESSENTIAL FUNCTIONS Assist in designing and implementing security architectures to protect information systems and networks, ensuring they align with regulations and best practices. Perform risk assessments to identify potential security threats and vulnerabilities. Develop and implement strategies to mitigate identified risks, ensuring the security of the organization’s information systems. Ensure all information systems comply with relevant security standards and regulations such as FISMA, NIST, and other applicable federal guidelines. Assist in managing certification and accreditation processes to maintain authorized status. Participate in the response to security incidents, including coordinating investigations, documenting findings, and implementing corrective actions. Ensure incidents are resolved efficiently and in accordance with organizational protocols. Provide guidance and mentorship to junior security engineers. Conduct training sessions to enhance the team’s skills and knowledge in cybersecurity best practices and emerging threats. Oversee the deployment and management of security technologies such as firewalls, intrusion detection/prevention systems (IDS/IPS), and encryption solutions. Ensure these technologies are effectively integrated into the organization's infrastructure. Assist in developing and implementing continuous monitoring programs to regularly assess the security posture of information systems. Use insights from monitoring activities to recommend and implement improvements in security controls, policies, and procedures.
Stand Out From the Crowd
Upload your resume and get instant feedback on how well it matches this job.
Job Type
Full-time
Career Level
Mid Level