Satellite Communications Systems Security Engineer, Mid

Booz Allen HamiltonFort Meade, MD
2d$61,900 - $141,000

About The Position

Are you seeking an opportunity to enhance your expertise in satellite communications systems, including devices, implanting security systems, and identifying tools that will support our country and safeguard our nation? As a Satellite Communications Systems Security and Network Security Engineer, you will identify the necessary tools, security systems, devices, and applications required to assess vulnerabilities and recommend optimal solutions and security strategies. Your experience is needed to develop and implement security solutions that protect our military and infrastructure. Join a team of communications and systems engineers supporting engineering, sustainment, and management of communications systems. You’ll perform ongoing system analyst activities for programs, perform risk assessments of systems and equipment, assist engineers with identifying solutions for vulnerabilities, create and map Security Technical Implementation Guides (STIGs), submit change requests for system components, develop a Plan of Action and Milestones (POA&M), create documentation supporting Risk Management Framework (RMF) accreditations, perform vulnerability management using automated systems, and create and submit RMF packages. You’ll brief the technical security posture to client leadership, prepare brief slides and summaries of vulnerabilities, and advise on how to prevent and mitigate future security threats. In this role, you’ll closely impact a national security level communications system that provides vital information to strategic and tactical users of the DoD Teleport system. With mentoring, challenging hands-on problem-solving, and opportunities to learn new tools and skills, we focus on growing as a team to make the best solutions for our customers.

Requirements

  • 3+ years of experience implementing, testing, and validating STIGs, performing system self‑assessments, and creating STIG checklists
  • 3+ years of experience executing IAVM actions, including IAVA alerts, bulletins, and tasking orders, and developing compliant engineering responses
  • 3+ years of experience deploying and validating ESS, ACAS, and CMRS, analyzing ACAS scans, developing remediation strategies, and implementing patches and upgrades
  • 3+ years of experience reviewing cybersecurity and engineering change requests to ensure operational availability and compliance
  • Knowledge of RMF and its application to networks and IT systems, including Cisco routers, switches, Active Directory, and access control
  • Ability to manage users in Windows and Linux and administer VMs in VMware or Hyper‑V
  • Ability to accredit and secure DoD systems using RMF, perform IAVA analysis, document POA&Ms, and prepare security assessment artifacts
  • Top Secret clearance
  • Bachelor’s degree in Science, Technology, or Engineering
  • Security+ Certification

Nice To Haves

  • Possession of excellent verbal and written communication skills
  • CISSP Cybersecurity Certification
  • Certified Ethical Hacker Certification
  • Networking Certification such as Network+ or Cisco Certification

Responsibilities

  • Develop relationships quickly and easily with other teams, communicating the complexities of security with a wide variety of audiences, including senior management.
  • Implement infrastructure and cybersecurity controls, including enhanced detection and vulnerability capabilities and improved event correlation in large enterprises.
  • Perform risk and vulnerability assessments in network, system, and application areas.
  • Leverage big data analytics and traditional security event types to identify advanced threats or indicators of compromise.
  • Participate in the development of test strategies and conduct of testing, validating, and implementing applicable STIG requirements for contemporary or new systems.
  • Conduct periodic self-assessments of systems to ensure STIG compliance.
  • Create STIG checklists to support periodic self-assessments.
  • Perform Information Assurance Vulnerability Management (IAVM) activities such as IA vulnerability alerts, bulletins, and tasking orders.
  • Develop a systematic approach for responses to IAVM issues, to maintain system compliance.

Benefits

  • health, life, disability, financial, and retirement benefits, as well as paid leave, professional development, tuition assistance, work-life programs, and dependent care.
  • recognition awards program acknowledges employees for exceptional performance and superior demonstration of our values.

Stand Out From the Crowd

Upload your resume and get instant feedback on how well it matches this job.

Upload and Match Resume

What This Job Offers

Job Type

Full-time

Career Level

Mid Level

Number of Employees

5,001-10,000 employees

© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service