Information Systems Security Engineer level 2 at MOSAIC Technologies Group in Annapolis Junction, MDother related Employment listings - Annapolis Junction, MD at Geebo

Information Systems Security Engineer level 2 at MOSAIC Technologies Group in Annapolis Junction, MD

Location:
Annapolis Junction, Maryland, United States MOSAIC is seeking a mid-level Information Systems Security Engineer 2 to support a large program in the Annapolis Junction, MD area. Participate as a security engineering representative on engineering teams for the design, development, implementation and/or integration of secure networking, computing, and enclave environments Participate as a security engineering representative on engineering teams for the design, development, implementation and/or integration of IA architectures, systems, or system components Participate as the primary security engineering representative on engineering teams for the design, development, implementation, evaluation, and/or integration of secure networking, computing, and enclave environments Apply knowledge of IA policy, procedures, and workforce structure to design, develop, and implement secure networking, computing, and enclave environments Interact with the customer and other project team members Participate as the primary security engineering representative on engineering teams for the design, development, implementation, evaluation, and/or integration of IA architectures, systems, or system components Support the Government in the enforcement of the design and implementation of trusted relationships among external systems and architectures Support security planning, assessment, risk analysis, and risk management Identify overall security requirements for the proper handling of Government data. Position Overview:
The Information Systems Security Engineer (ISSE) shall perform, or review, technical security assessments of computing environments to identify points of vulnerability, non-compliance with established Information Assurance (IA) standards and regulations and recommend mitigation strategies. Validates and verifies system security requirements definitions and analysis and establishes system security designs. Designs, develops, implements and/or integrates IA and security systems and system components including those for networking, computing, and enclave environments to include those with multiple enclaves and with differing data protection/classification requirements. Builds IA into systems deployed to operational environments. Assists architects and systems developers in the identification and implementation of appropriate information security functionality to ensure uniform application of customers security policy and enterprise solutions. Supports the building of security architectures. Enforce the design and implementation of trusted relations among external systems and architectures. Assesses and mitigates system security threats/risks throughout the program life cycle. Contributes to the security planning, assessment, risk analysis, risk management, certification and awareness activities for system and networking operations. Reviews certification and accreditation (C&A) documentation, providing feedback on completeness and compliance of its content. Applies system security engineering expertise in one or more of the following to:
system security design process; engineering life cycle; information domain; cross domain solutions; commercial off-the-shelf and government off-the-shelf cryptography; identification; authentication; and authorization; system integration; risk management; intrusion detection; contingency planning; incident handling; configuration control; change management; auditing; certification and accreditation process; principles of IA (confidentiality, integrity, non-repudiation, availability, and access control); and security testing. Support security authorization activities in compliance with customer Information System Certification and Accreditation Process and DoD Risk Management Framework (RMF), the Risk Management Framework (RMF) process, and prescribed DoD business processes for security engineering. Minimum Requirements:
Fourteen (14) years experience as an ISSE on programs and contracts of similar scope, type, and complexity required. Bachelor's degree in Computer Science, Information Assurance, Information Security System Engineering, or related discipline from an accredited college or university is required. Four (4) years of ISSE experience may be substituted for a bachelor's degree for a total of 11 years experience. DoD 8570 compliance with IASAE Level 2 is required. Active TS/SCI with polygraph Full-Time employees have a choice of 3 different medical plans, 1 medical supplement plan, 2 different dental plans and vision coverage. All plans are ala carte, so you can choose what fits for you and your family. Medical, Dental, and Vision Insurance Flexible Spending Accounts (FSA) 401(k) Matching Program 10 Paid Holidays and PTO Short-Term Disability and Long-Term Disability paid for by MOSAIC Term Life Insurance Training and Career Development Reimbursement Opportunities Referral Incentive Program At MOSAIC Technologies Group each team member is a key player. MOSAIC provides consulting and technical services to Government and commercial clients in the areas of management, mission and technology. We know the value of our talent, and we work to provide challenging opportunities for each member that will cultivate careers as well as develop people. Our familial environment, competitive salary and benefits are a few of the ways that we take care of our people. If you believe in supporting your community, growing your career and working with committed colleagues then join us. MOSAIC wants you in the family.
Salary Range:
$200K -- $250K
Minimum Qualification
IT SecurityEstimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.