Job Details

ID #41098048
State California
City Monterey bay
Job type Permanent
Salary USD TBD TBD
Source Deloitte
Showed 2022-05-18
Date 2022-05-17
Deadline 2022-07-16
Category Security
Create resume

Information System Security Engineer

California, Monterey bay, 93940 Monterey bay USA

Vacancy expired!

Are you looking to elevate your cyber career? Your technical skills? Your opportunity for growth? Deloitte's Government and Public Services Cyber Practice (GPS Cyber Practice) is the place for you! Our GPS Cyber Practice helps organizations create a cyber minded culture and become stronger, faster, and more innovative. You will become part of a team that advises, implements, and manages solutions across five verticals: Strategy, Defense and Response; Identity; Infrastructure; Data; and Application Security. Our dynamic team offers opportunities to work with cutting-edge cyber security tools and grow both vertically and horizontally at an accelerated rate. Join our cyber team and elevate your career.

Work you'll do
  • Support clients with data protection, IoT, and overarching cloud capabilities.
  • Implement core and cloud infrastructure security to manage risks and exposure.
  • Perform cyber reconnaissance to illuminate a potential attack surface area.
  • Provide threat and vulnerability management to federal clients and teams.
  • Analyze tactical network architectures and topologies to assess security risks.
  • Serve as technical authority and SME on information security Risk Management Framework (RMF) for DODIT, and NIST RMF accreditation testing and evaluation.
  • Formulate and implement security certification methods for projects/programs conforming to DOD and Federal Cybersecurity requirements.
  • Perform duties of an ISSE in execution of DoN RMF processes including the completion of RMF process steps in eMASS, the development of RMF artifacts (Security Plan, System Level Continuous Monitoring Plan, Risk Assessment Report, etc.), and the implementation of Security Controls in coordination with development project teams.
  • Leadership in, and execution of, security test and evaluation methods, practices, and techniques associated with the assessment of Navy information systems.
  • Design and development of plans, processes, and procedures for Navy information systems leading to authorization and Approval to Operate (ATO) of complex systems IAW National and DOD requirements
  • Expert evaluation, assessment, and recommendations for project/program policy in support of system design, acquisition, development, deployment and operations in diverse security environments IAW National and DOD requirements.

The team

Deloitte's Government and Public Services (GPS) practice - our people, ideas, technology and outcomes-is designed for impact. Serving federal, state, & local government clients as well as public higher education institutions, our team of more than 15,000 professionals brings fresh perspective to help clients anticipate disruption, reimagine the possible, and fulfill their mission promise

At Deloitte, we believe cyber is about starting things-not stopping them-and enabling the freedom to create a more secure future. Cyber Infrastructure is focused on rethinking how security is integrated across modernized infrastructure as cyber threats become more complex. If you're seeking a career implementing, architecting, and-in select cases-handling next generation controls to manage security risks and exposure, then the Cyber Infrastructure team at Deloitte is for you.

Qualifications

Required:

  • Bachelor's degree required
  • Must be legally authorized to work in the United States without the need for employer sponsorship, now or at any time in the future
  • Must be able to maintain the required clearance for this role

  • Advanced/Expert knowledge of DoD Information Assurance and Cybersecurity policies, procedures and practices including the RMF and NIST SP 800-53
  • Advanced/Expert knowledge of Cybersecurity, Information Technology, Cloud/Network Architecture, and/or related concepts
  • Advanced/Expert knowledge of administrating traditional and non-traditional network systems, components, and other Information Technology associated with military applications
  • Advanced/Expert knowledge of computers, networks, deployment environments (e.g., data center, cloud, etc.), systems and application security threats and vulnerabilities
  • Advanced/Expert knowledge of and skill in using DoD tools and capabilities for vulnerability assessments and compliance reporting (eMASS, ACAS, STIGs, SRGs, SCAP, XCCDF, etc.)
  • Skill implementing mitigation strategies and methods to resolve problems, and to lead re-testing and re-evaluation of affected systems
  • Skill using analytical and critical thinking while conducting audits and assessments of complex technical systems
  • Skill in determining and applying the appropriate rigor while conducting testing and evaluation of complex operating systems (Windows and Linux), networking hardware, and non-traditional equipment
  • Ability to advise team, project, and program leaders on applicable DOD/DON Security policy and guidelines for complex systems
  • Ability to summarize and report vulnerabilities and weaknesses verbally and in writing to the appropriate level of leadership
  • Ability to advise, consult, and interact with technical team leaders and peers, as a team leader/SME
  • Ability to lead a team of analysts and engineers to think logically and dynamically, while leading system security control assessments for certification, authorization, approval, risk analysis, reporting and continuous monitoring
  • Ability to develop RMF artifacts, plan security assessment execution events, and report to cross-functional teams, IPT Leadership, Program Office personnel, and external Stakeholders.Responsibilities may include program development and/or oversight for confidentiality, integrity, and availability of systems, networks, and enhancements for information systems security programs, policies, procedures, and tools.

Preferred:
  • Prior professional services or federal consulting experience
  • Previous Security Operations Center experience
  • Experience in mobile and endpoint security
  • Certifications (e.g., CompTIA Security+, CEH, CISSP)

Vacancy expired!

Subscribe Report job