Information Systems Security Engineer
: Job Details :


Information Systems Security Engineer

Take2 Consulting LLC

Location: Dayton,OH, USA

Date: 2024-12-12T13:18:58Z

Job Description:

Take2 has proven experience bridging the intersection of technology and people solutions. As a proven, trusted provider for our Federal and commercial clients, we provide the right solutions, at the right time through trusted partnerships, customized to solve our client's unique business challenges. Take2 invests time, discipline, and rigor into our technology and people solutions, as well as utilizes our proprietary People Cloud. Whether we are bridging the gap between IT talent and our customers' business challenges, Take2 will work as a partner to best resolve client needs.

Take2 is seeking an Information Systems Security Engineer. This onsite role in Dayton, OH.

Opportunity:

Take2 is searching for an Information Systems Security Engineer (ISSE) to join our dynamic team in Dayton, Ohio. In this role, you will provide expertise in cybersecurity engineering with the following skills and responsibilities using technologies such as ePO, Splunk, ACAS, WSUS, Active Directory GPO's and STIG/SCAP:

  • Audit support responsibilities
  • Analyze and report organizational security posture trends to the ISSM/ISSO.
  • Analyze and report system security posture trends to the ISSM/ISSO.
  • Apply security policies to meet security objectives of the system to the ISSM/ISSO.
  • Assess adequate access controls based on principles of least privilege and need-to-know and report findings to the ISSM/ISSO.
  • Assess all the configuration management (change configuration/release management) processes and report findings to the ISSM/ISSO.
  • Assess the effectiveness of security controls and report findings to the ISSM.
  • Develop procedures and test fail-over for system operations transfer to an alternate site based on system availability requirements.
  • Ensure all systems security operations and maintenance activities are properly documented and updated as necessary.
  • Ensure cybersecurity-enabled products or other compensating security control technologies reduce identified risk to an acceptable level and report findings to the ISSM.
  • Implement security measures to resolve vulnerabilities, mitigate risks, and recommend security changes to system or system components as needed.
  • Implement system security measures by established procedures to ensure confidentiality, integrity, availability, authentication, and non-repudiation.
  • Mitigate/correct security deficiencies identified during security/certification testing and/or recommend risk acceptance to the ISSM.
  • Plan and recommend modifications or adjustments based on exercise results or system environment.
  • Properly document all systems security implementation, operations, and maintenance activities and updates necessary.
  • Provides cybersecurity recommendations to the ISSM based on significant threats and vulnerabilities.
  • Verify and update security documentation reflecting the application/system security design features.
  • Verify minimum security requirements are in place for all applications.
  • Assists the ISSM/ISSO in identifying the security requirements for the system, including the confidentiality, integrity, and availability of data.
  • Assists the ISSM/ISSO in describing and documenting the security controls that will be implemented to meet the security requirements.
  • Assists the ISSM/ISSO in describing and documenting the procedures that will be used to manage security risks and incidents.
  • Assists the ISSM/ISSO in describing and documenting how the security controls will be monitored and tested to ensure that they are effective.
  • Assists the ISSM/ISSO in describing and documenting how changes to the system will be managed to minimize security risks.
  • Assists the ISSM/ISSO in describing and documenting how the system will be recovered in the event of a security incident.
  • Assists the ISSM/ISSO in the collection and organization of supporting documentation and diagrams needed for an Authority to Operate Package.
  • Assists the ISSM/ISSO with conducting a security assessment of the system. This includes identifying the system's assets, threats, vulnerabilities, and risks.
  • Assists the ISSM/ISSO with developing a risk management plan. This plan identifies the security controls that will be implemented to mitigate the risks to the system.
  • Assists the ISSM/ISSO in writing the System Security Plan.
  • Assists the ISSM/ISSO in reviewing and updating the System Security Plan.
  • Assists the ISSM/ISSO in ensuring that the SSP is compliant with applicable DoD security policies and procedures.
  • Monitors and investigates security breaches.
  • Educates employees or clients about security procedures and programs.

Minimum Qualifications:

  • Bachelor's degree in Computer Science, Engineering, Business, or a related field
  • 5 - 8 years of demonstrated performance in related technology
  • Top Secret Security Clearance required
  • Expertise in Cybersecurity Engineering
  • Experience using technologies such as ePO, Splunk, ACAS, WSUS, Active Directory GPO and STIG/SCAP

Requirements

  • Must be within driving distance of Dayton, Ohio, OR willing to relocate there
  • Must be willing to work onsite
  • Must be willing and able to travel frequently
  • Must possess an active Top Secret Security Clearance with SCI eligibility or above
  • Please note that under a government contract, this specific position requires U.S. citizenship status

Take2 is an Equal Opportunity and Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, pregnancy, sexual orientation, gender identity, national origin, age, protected veteran status, or disability status.

Apply Now!

Similar Jobs (0)