Information System Security Engineer (mid) with Security Clearance Engineering - Washington, DC at Geebo

Information System Security Engineer (mid) with Security Clearance

Open Systems Technologies Corporation is a leader in the government contracting marketplace, providing Enterprise Security and Cloud Computing solutions to support large organizationsOur capabilities include supplying federal government entities and private businesses with software development, scientific and engineering technical assistance, systems integration and enterprise securitySince its founding in 1996, OST has been committed to delivering high-quality, best-in class results that bring added value to our clients, while investing in our employees' futures by providing exciting projects to work on, and robust benefits to include technical training and certifications, relocation assistance and a 401K match with immediate vestingOpen Systems Technologies Corporation is looking for an Information System Security Engineer to provide support for the FBIInformation System Security Engineer (ISSE) activities shall include at a minimum:
o Identify information protection needs for an IS and Network Environmento Define IS and Network Environment security requirements in accordance with applicable cybersecurity requirementso Design security architectures for use within the IS and Network Environmento Design and develop cybersecurity-enabled products for use within an IS and Network Environmento Integrate and/or implement security with Cross Domain Solutions (CDS) for use within an IS and Network Environmento Develop and implement security designs for new or existing network system(s)Ensure that the design of hardware, operating systems, and software applications adequately address cybersecurity requirements for the IS and Network Environmento Design, develop, and implement network security measures that provide confidentiality, integrity, availability, authentication, and non-repudiationo Design, develop, and implement specific cybersecurity countermeasures for the IS and Network Environmento Develop interface specifications for the IS and Network Environmento Develop approaches to mitigate IS and Network Environment vulnerabilities and recommend changes to network or network system components as neededo Ensure that network system(s) designs support the incorporation of FBI directed cybersecurity vulnerability solutions Qualifications :
o CLEARANCE:
Top Secret required; SCI eligibility preferredo Ba chelor's and advanced degree in Computer Science, Cybersecurity, or other cyber discipline is preferred ; plus minimum 5 years' experience, or equivalent education/experience; Doctorate plus 3 years; Master's plus 4 years; Associates plus 7 years; or H.
S.
/GED plus 10 years.
o Familiarity with the use and operation of security tools including Tenable Nessus and/or Security Center, IBM Guardium, HP Weblnspect, Network Mapper (NMAP), and/or similar applications.
o Hold at least one of the following certifications:
One of the following certifications is required to meet the category/level ISSE-2 (DOD 8570) requirement for this position:
CASP
CE, CISSP (or Associate), CSSLP, CISSP-ISSAP, CISSP-ISSEP, or CCSP BENEFITS OST has been operating since 1996 and has various contracts with Government agenciesWe offer a comprehensive benefits package that includes 3 weeks paid time off, 11 Federal Holidays, medical/dental coverage, STD, LTD, Life Insurance, AD&D, 401k with up to 4% match, and end-of-year profit sharing#monster Recommended Skills Certified Information Systems Security Professional Cloud Computing Confidentiality Government Contracting Hardworking And Dedicated Information Systems Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.