Job Details

Principal Cyber Security Engineer

Advertiser
SAIC
Location
San Diego, California, United States
Rate
-
Description SAIC is seeking Principal Cyber Security Engineer to support PEO C4I PMW 160 CANES ADNS code. Candidate should have a broad understanding of cyber security engineering services to conceptualize, design and build secure technical solutions, including applications, systems, architectures and infrastructure, that are operationally viable and efficient. Temporarily remote due to COVID-19 Duties Works with engineers to design and document secure implementation of NIST RMF 800-53, CYBERSAFE and other applicable overlay controls. Information Assurance Technical Authority (IATA) Defense in Depth Functional Implementation Architecture (DFIA) Standard, IATA Implementation Standards and NAVWAR Systems Command DFIA Implementation and Execution guidance, develop and document risks for controls or standards not being met, and develop mitigations that minimize impact, likelihood, or risk. Analyze emerging technologies and design, build and integrate architectures and solutions to enable secure implementation of new technologies. May provide work leadership for lower level employees. Work with engineers and cybersecurity leads to design and document secure implementation of NIST 800-53, CYBERSAFE, System Security Plan (SSP), System Level Continuous Monitoring Plan (SLCMP), System Level Configuration Management Plan (SCM), Incident Response Plan (IRP), Contingency Plan (CP), and Privacy Impact Analysis (PIA) Maintain system information in Enterprise Mission Assurance Support Service (eMASS) and Department of the Navy Applications and Database Management System (DADMS) and Department of Defense Information Technology Portfolio Repository-Department of the Navy (DITPR-DON) registrations. Validate cybersecurity engineering best practices in information systems including applications, systems, architectures, and infrastructure that are operationally viable and efficient updating Risk Assessment Report (RAR) and Security Assessment Report (SAR) as needed. Verify adherence of cybersecurity requirements for all applicable systems within the enclave in accordance with RMF. Support performing ongoing cybersecurity developmental testing and assessments to identify vulnerabilities and compliance issues, develop mitigations for reducing impact, likelihood, or risk of identified vulnerabilities, and write appropriate mitigation statements. Provide subject matter expert insight into Assessment and Authorization (AA) schedules in support of Interim Authorization to Test (IATT) packages. Coordinate with Critical Design Agent (CDA), Information Security Manager (ISSM), Security Control Assessor (SCA) and Security Control Validator (SCV) to clarify any security findings. Coordinate with SCV to support updatingcompletion of RARs and SARs. Ability to analyze user needs and current security regulations and guidelines to determine Information Assurance (IA) functional requirements. Participation in ad hoc cybersecurity data calls. Support coordinating system allocation recommendations across platform designs with other applicable Enclave Managers. Qualifications Required Education and Experience bull Bachelors degree in Cyber-security, Information systems, or engineering and nine (9) years or more experience Masters and seven (7) years or more experience PhD or JD and four (4) years or more experience. Required Qualifications bull At least (9) years of demonstrated experience working in the Information Assurance Career field, preferably performing and leading security assessments for complex Navy systems. bull 2+ years experience with implementing all steps of RMF throughout the appropriate phases of the System Development Lifecycle bull 2+ years of experience with Cybersecurity testing, Cyber risk assessment, vulnerability remediation, and software engineering bull 2+ years of experience with automated vulnerability assessment tools, including Nessus and Assured Compliance Assessment Solution (ACAS) and Security Content Automation Protocol (SCAP) and reviewing manual testing procedures using DoD STIGs, SRGs, and checklists collaborations. bull 1+ year experience coordinating lab security assessment events, coordinating with SCA to conduct assessments security baseline, collecting assessment body of evidence (BOE) bull 1+ year experience with Enterprise Mission Assurance Support Service (eMASS) bull Experience with Department of the Navy Applications and Database Management System (DADMS) and Department of Defense Information Technology Portfolio Repository-Department of the Navy (DITPR-DON) registrations bull Experience with formulas, tables and advanced features in Excel bull Active Secret clearance bull Security+ Certification Desired Qualifications bull MA or MS degree in an IT, Cyber, or Engineering field bull CISSP Certification bull Ports, Protocols and Services Management (PPSM) experience bull IA Workforce 8570 Certification bull Other technical certifications

Send application

Mail this job to me so I can apply later

Apply With CV

You are not logged in. If you have an account, log in to your account. If you do not have an account, why not sign up? It only takes a minute!

latest videos

Upcoming Events