This list contains only the countries for which job offers have been published in the selected language (e.g., in the French version, only job offers written in French are displayed, and in the English version, only those in English).
Identify the necessary tools, security systems, devices, and applications required to assess vulnerabilities and recommend optimal solutions and security strategies. Develop and implement security solutions that protect our military and infrastructure. Perform ongoing system analyst activities for programs, perform risk assessments of systems and equipment, assist engineers with identifying solutions for vulnerabilities, create and map Security Technical Implementation Guides (STIGs), submit change requests for system components, develop a Plan of Action and Milestones (POA&M), create documentation supporting Risk Management Framework (RMF) accreditations, perform vulnerability management using automated systems, and create and submit RMF packages. Brief the technical security posture to client leadership, prepare brief slides and summaries of vulnerabilities, and advise on how to prevent and mitigate future security threats.
Job Responsibility:
Develop relationships quickly and easily with other teams, communicating the complexities of security with a wide variety of audiences, including senior management
Implement infrastructure and cybersecurity controls, including enhanced detection and vulnerability capabilities and improved event correlation in large enterprises
Perform risk and vulnerability assessments in network, system, and application areas
Leverage big data analytics and traditional security event types to identify advanced threats or indicators of compromise
Participate in the development of test strategies and conduct of testing, validating, and implementing applicable STIG requirements for current or new systems
Conduct periodic self-assessments of systems to ensure STIG compliance
Create STIG checklists to support periodic self-assessments
Perform Information Assurance Vulnerability Management (IAVM) activities, such as IA vulnerability alerts, bulletins, and tasking orders
Develop a systematic approach for responses to IAVM-related issues, to maintain system compliance
Requirements:
3+ years of experience implementing, testing, and validating STIGs, performing system self‑assessments, and creating STIG checklists
3+ years of experience executing IAVM actions, including IAVA alerts, bulletins, and tasking orders, and developing compliant engineering responses
3+ years of experience deploying and validating ESS, ACAS, and CMRS, analyzing ACAS scans, developing remediation strategies, and implementing patches and upgrades
3+ years of experience reviewing cybersecurity and engineering change requests to ensure operational availability and compliance
Knowledge of RMF and its application to networks and IT systems, including Cisco routers, switches, Active Directory, and access control
Ability to manage users in Windows and Linux and administer VMs in VMware or Hyper‑V
Ability to accredit and secure DoD systems using RMF, perform IAVA analysis, document POA&Ms, and prepare security assessment artifacts
Top Secret clearance
Bachelor’s degree in Science, Technology, or Engineering
Security+ Certification
Nice to have:
Possession of excellent verbal and written communication skills
Cybersecurity Certification, such as CISSP or Certified Ethical Hacker Certification, or Networking Certification, such as Network+ or Cisco Certification
What we offer:
health, life, disability, financial, and retirement benefits, as well as paid leave, professional development, tuition assistance, work-life programs, and dependent care