Cybersecurity Engineer Engineering - Washington, DC at Geebo

Cybersecurity Engineer

Transforming the Business of GovernmentInquisIT is a high-energy, forward-thinking, advanced technology company that provides our customers with an impressive array of System Engineering, Enterprise Infrastructure, Cyber Security, Software and Management services and solutions. We demonstrate a new brand of leadership--one that fosters trust, integrity, and excellence--by giving customers something different. This has afforded us high degrees of success and loyalty among our employees and customers. We embrace the belief that by providing the best service possible to government, we ultimately provide the best service to our nation.At InquisIT, we build our culture on a foundation of honesty, mutual trust, collaboration, and innovation. Our team members live our culture by being passionate thinkers, communicators and team players dedicated to our shared vision and to making people's lives better and safer. We know that you are our most important asset. Come bring your passion!____________________________________________________________________________________Position
Summary:
InquisIT is seeking a Cybersecurity Engineer to join us in Washington, DC.This role will have responsibilities that encompass Security Operations and Engineer skill sets to help secure customer cloud computing, data center, and on-premise environments. The successful candidate will help set up, operate, and manage/maintain a variety of security solutions including vulnerability management, endpoint security, security information and event management, and governance/risk/compliance. The candidate will also help develop and maintain security policy and procedures, perform incident response and business continuity testing, work with the NIST Cybersecurity Framework and CIS Benchmarks, and assist with security audits as needed. At various times, production security operations tasks such as analysis of security issues and responding to security incidents will be required. The successful candidate should be a team player with a dynamic personality that can work effectively with end users and management for resolution of security incidents.Primary Job
Responsibilities:
Ensures adherence to security standards Acts as the point of contact responsible for the planning, development, test, and implementation of IT security controls Maintains an understanding and documentation of system security baselines Develops and executes information security plans and policies Develop strategies and procedures to respond to, recover, and investigate security breach(es) Develop or implement open-source/third-party tools to assist in detection, prevention and analysis of security threats Installs, configures, and updates firewalls, data encryption, and other security products to facilitate a secure posture Conduct periodic network scans to identify and remediate vulnerabilities Monitor networks and systems for security breaches through the use of software that detects intrusions and anomalous system behavior Experience and
Qualifications:
6-10 years of industry experience in an Information Security function Bachelor's degree or equivalent experience Experience with Palo Alto (preferred) or Cisco firewall, network security appliance administration and cloud security Experience with vulnerability scanners and management, including Tenable Nessus and Qualys Possess fundamental knowledge of Windows and Linux operating systems, and the ability to analyze network traffic and security events Demonstrated experience with RMF, A&A, IV&V, and continuous monitoring Demonstrated experience implementing and assess compliance with security baseline and controls (CIS Benchmark, DISA STIG, NIST 800-53 rev. 5) Experience with Log aggregation/SIEM tools such as Splunk or similar Ability to support and provide artifacts for annual audits and ATO review process (FISMA, FISCAM, etc) Ability to maintain up-to-date knowledge with modern adversarial techniques and incident response procedures Technical knowledge of network operations, server architectures, storage solutions, and desktop hardware and software Demonstrated ability to communicate in a clear, thorough, and timely manner using appropriate and effective tools and techniques with peers, supervisors, and members of senior leadership Demonstrated ability to make decisions by assessing the situation to determine the importance, urgency, and risks, and making clear decisions which are timely and in the best interest of the organization Targeted Certifications:
CISSP CISA PCNSE ____________________________________________________________________________________InquisIT provides equal employment opportunities (EEO) to all employees and applicants for employment without regard to race, color, religion, sex, national origin, age, disability or genetics. In addition to federal law requirements, InquisIT complies with applicable state and local laws governing nondiscrimination in employment in every location in which the company has facilities. This policy applies to all terms and conditions of employment, including recruiting, hiring, placement, promotion, termination, layoff, recall, transfer, leaves of absence, compensation and training.The above statements are intended to describe the general nature and level of work being performed by the individual(s) assigned to this position. They are not intended to be an exhaustive list of all duties, responsibilities, and skills required. Management reserves the right to modify, add, or remove duties and to assign other duties as necessary. Recommended Skills Administration Auditing Certified Information Security Manager Certified Information Systems Security Professional Cisco Cloud Computing Apply to this job. Think you're the perfect candidate? Apply on company site $(document).ready( function() $(#ads-desktop-placeholder).html(
n
n
n Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.