Pueo is known for bringing the best talent and unique tools to every opportunity. Pueo's Parliament (aka workforce) is composed of professionals who are seeking the opportunity to work in a small business with a flat organization that thrives on career development and independence. In support of mission and professional growth, our Parliament has supported the development of multiple patents, proprietary tools, and applications as well as trademarked processes.Our flat organization emphasizes career development across multiple career environments (at the members own pace) and ensures those who contribute broadly are properly rewarded. Pueo has four career environments where every member of the parliament can participate. Each environment has opportunities available for all levels. Opportunities are framed by an employee's desires and capabilities, and we ensure challenges, growth, and unique experiences are available for employees at all levels.Our Career Environments (Program, Functional, Service, and Leadership) provide numerous opportunities for employees to invest in their personal growth and those things that offer fulfillment. We invest in helping our members create and execute their career development plans. Our Pods (small teams of 5 or less) are comprised of personnel with similar skillsets to ensure mentorship, understanding, and peer support.Role: Pueo has an opportunity for an experienced TS/SCI cleared Infrastructure Virtualization & Storage Technical Reviewer to join our team in Reston, VA. The Infrastructure Virtualization & Storage Security Technical Reviewer is responsible to exercise technical support as a Reviewer during an inspection conducted within the Intelligence Community Integrated Environment (IC IE). This requires a Reviewer to be an expert in their technical area or multiple areas, to remain agile, and diligent in support of a groundbreaking effort to secure and modernize the JWICS environment. ** This is an on-site role****Must be willing to travel up to 30%, including local travel within the National Capital Region (NCR) of Northern Virginia, Maryland, and Washington, DC. **Responsibilities:JCIP Technical Reviewers play a pivotal role in evaluating the cybersecurity posture of enterprise environments across the Intelligence Community (IC). They conduct comprehensive assessments through detailed analysis of vulnerability scans to ensure compliance with Intelligence Community Directives (ICDs), IC Technical Implementation Guides (TIGs), Security Technical Implementation Guides (STIGs), Security Requirement Guides (SRGs), and NIST 800-53 rev 5 security controls. Utilizing automated tools, including Tenable and Splunk, these professionals perform documentation reviews, employ checklists and guides to write report and develop a qualitative risk assessment on target organizations. Their assessments examine the mission owners' critical capabilities and mission impacts if secure operations lack security protections needed to defend their cyber infrastructure and mitigate high-risk vulnerabilities to the enterprise. Beyond inspection duties, Technical Reviewers contribute to maturing organizational processes, training initiatives, and program-wide support through cross-functional collaboration.JCIP Reviewers are integral to conducting inspections of environments across the Intelligence Community (IC). They are responsible for:
- Interacting with leadership and site technical staff in advance of conducting inspections to facilitate scoping, data to support security controls assessment input, and execution of operational inspection plans,
- Responsible for interviewing organizational subject matter experts in conducting STIG, SRG, and IC policy checklists,
- Collect data in support of reviewing a comprehensive Threat Informed Critical Controls List (TICCL), provide written input on review of required security controls, potential vulnerability exploitation, and how MITRE ATT&CK© techniques are plausibly successful based on organizational weaknesses. Ensure inputs link back to security controls,
- Participating in the planning, execution, and reporting of security audits and network vulnerability assessments with minimal supervision,
- Assisting in preparation of assessment deliverables -Security Risk Assessments input, compliance data, STIG data, etc.,
- Communicating on impact of vulnerabilities verbally, through presentations and written deliverables,
- Plan, execute, and report on information technology, privacy, and operational reviews to identify mission, privacy, security, compliance, information technology, and regulatory risks,
- Familiar with a variety of cybersecurity concepts, practices, and procedures. Relies on extensive experience and judgment to plan and accomplish goals.
The Hypervisor/Virtual and Storage reviewer will be responsible for Virtual Machine Compliance and Hardening. The must have knowledge in applying security hardening guidelines for VMs and hypervisors, following standards such as those provided by the Center for Internet Security (CIS).Required QualificationsExperience: At least five (5) years of experience in system administration, specifically with Hypervisor platforms such as ESXi, Hyper-V, Storage Area NetworkS (SAN). A minimum of twelve (8) years of experience in Cyber/Information Assurance, with a comprehensive understanding of cybersecurity disciplines including but not limited to the Risk Management Framework, DevSecOps, and cybersecurity engineering. Demonstrate an understanding of:
- vSphere, vCenter, and vSAN. The reviewer must have a strong understanding of network and storage technologies as they relate to virtualization
- Virtualization Management and Scripting Proficiency: Expertise in managing hypervisor environments (e.g., VMware ESXi, Microsoft Hyper-V, KVM) and automating tasks with scripting languages such as PowerShell, Bash, or Python. This includes the ability to efficiently manage virtual machine (VM) configurations, templates, and snapshots to optimize performance and security
- Hypervisor Security and Configuration Auditing: Skilled in conducting thorough security audits of hypervisor configurations and VM deployments. Knowledgeable in securing hypervisor management interfaces, implementing network segmentation within virtualized environments, and adhering to virtualization-specific security best practices such as securing VM migrations and isolating management networks
- Virtual Network Security and Monitoring: Proficiency in managing and securing virtualized network functions, including virtual switches, firewalls, and routers. Ability to use tools for monitoring virtual network traffic, detecting anomalies, and ensuring the integrity of data flow between VMs and external networks. Familiarity with implementing micro-segmentation to enhance security within the virtual environment
- Resource and Access Control in Virtual Environments: Experience in managing resource allocation to VMs, including CPU, memory, and storage, to prevent resource exhaustion attacks. Expertise in implementing role-based access control (RBAC) for hypervisor management and ensuring that access to virtualization management platforms is securely controlled
- Proficiency in deploying and managing security tools within VMs, including antivirus, intrusion detection systems (IDS), and intrusion prevention systems (IPS), to comply with NIST, ICD, SRG, and industry standards
- Patch Management and Vulnerability Remediation: Demonstrated experience in managing patching processes for both hypervisors and guest operating systems. This includes the ability to automate patch deployment, monitor for new vulnerabilities, and quickly remediate identified security issues to maintain a strong security posture
- Disaster Recovery and Business Continuity Planning: Skills in designing and implementing disaster recovery plans for virtualized environments. This includes knowledge of backup and replication strategies for VMs, testing disaster recovery plans, and ensuring minimal downtime in case of system failures
- Secure Configuration of Virtual Appliances and Services: Ability to securely configure virtual appliances and services running on hypervisors, ensuring that they are deployed with the least privilege and do not introduce additional vulnerabilities into the environment
Storage Area Network experience includes knowledge of deduplication, storage capacity and resilience requirements.Education: Bachelor's degree in a relevant field or an additional 5 years of work experience in lieu of a degree.Certifications: Certification in DoD 8570.01-M Cybersecurity workforce, compliance with DoD Directive 8140 Cyberspace Workforce Management, and IAT Level III.Skills: Strong independent work ethic (auditor mentality), exceptional oral and written communication skills, and the ability to work unsupervised.Preferred QualificationsTechnical Proficiency: Experience in engineering and operations & maintenance of enterprise ESXi, Hyper-V, and Storage technologies. Advanced Skills: Proficiency in using advanced vulnerability assessment and reporting tools such as Tenable, Splunk, and Tableau.Interdivision Collaboration: Demonstrated ability to operate across departments to implement cybersecurity principles effectively.Multitasking and Time Management: Capable of multitasking with efficient time management and possessing a comprehensive understanding of cyber threats, vulnerabilities, and network security methodologies.Pueo is an equal employment opportunity employer and affirmative action employer. All interested individuals will receive consideration and will not be discriminated against on the basis of race, color, religion, sex, national origin, disability, age, sexual orientation, gender identity, genetic information, or protected veteran status. Pueo takes affirmative action in support of its policy to advance diversity and inclusion of individuals who are minorities, women, protected veterans, and individuals with disabilities.