• Senior Cyber Security Engineer (SCA-V)

    Job ID 2018-2670
    Job Locations
    US-TX-Fort Sam Houston
    Category
    IT: Information Assurance / Quality / Cyber Security
    Type
    Regular Full-Time
  • Overview

    NCI is a leading provider of enterprise solutions and services to U.S. defense, intelligence, health and civilian government agencies. Coupled with a refined focus on strategic partnerships, we are successfully bridging the gap between commercial best practices and mission-critical government processes. Core competencies include:

    • Artificial intelligence
    • Agile digital transformation
    • Advanced analytics
    • Hyperconverged infrastructure solutions
    • Cyber security and information assurance
    • Fraud, waste and abuse
    • Engineering and logistics

    MF18

    NCI has been designated a 2018 Military Friendly Employer by MilitaryFriendly.com 

     

    Headquartered in Reston, Virginia, NCI has approximately 2,000 employees operating at more than 100 locations worldwide.

    Responsibilities

    NCI: As a Senior Cyber Security Engineer (Security Engineer IV), you will provide Security Engineering and Security Control Assessor-Validator (SCA-V) support services to the 7th Signal Command-Theater located at Joint Base San Antonio, TX (106th Signal Brigade). This support includes Risk Management Framework (RMF) validation testing (also referred to under the RMF as “assessment”) support to the Security Control Assessor (SCA). This includes supporting the Government in conducting validation preparation activities such as onsite staff assistance visits (SAVs) and other validation activities, and generating RMF scorecards. You will also provide annual assessments for installations in accordance to Federal Information Security Modernization Act (FISMA) standards and requirements. This position requires 50% travel, as our SCA-V team will be deployed to all supported stateside Network Enterprise Commands (NECs) and Regional Cyber Centers to perform cyber security assessments and updates. In assuming this position, you will be a critical contributor to meeting NCI's mission: To deliver innovative, cost-effective solutions and services that enable our customers to rapidly adapt to dynamic environments. 

     

     

    Highlights of Responsibilities:

    • Assesses DoD Information Systems against the RMF security controls (IAW) Department of Defense (DoD) Instructions 8500.01 and 8510.01, NIST SP 800-37, 800-53, and 800-53A, Army Regulation 25-1 and 25‐2, US Army Best Business Practices (BBPs) and applicable NETCOM Tactics, Techniques & Procedures (TTPs).
    • Effectively performs interviews of technical Subject Matter Experts (SMEs) as well as non-technical management personnel to ascertain the security posture of an IT system
    • Identifies mitigating factors for identified risks and proposes additional mitigation strategies for identified vulnerabilities
    • Evaluates a wide array of IT devices for Security Technical Implementation Guide (STIG) compliance using ACAS/ Nessus, SCAP Compliance Checker, and manual checklist reviews.  This includes Windows, Solaris, and Red Hat Linux servers and desktops, routers, switches, firewalls, IDS, etc. 
    • Submit findings input into the Enterprise Mission Assurance Support Services (eMASS) system or other Army approved tracking database

    Qualifications

    Requirements:

    • Bachelor's degree in Computer Science, Information Technology, or a similar field with at least seven (7) years of related experience in the fields of security engineering, cyber security, or information assurance; two (2) years of hands-on SCA-V experience may be substituted in lieu of a degree
    • Current Information Assurance (IA) certification (required at performance start date): DoD 8570 IAM Level II (CAP, CISSP (or Associate), CASP CE, CISM, GSLC), or higher
    • Current Computing Environment (CE) certification (required at performance start date): MCITP, MCSE, MCP, CCNA-Security, CEH, etc.
    • Clearance (required at performance start date): active Secret clearance with valid SSBI/Tier 5 Background Investigation
    • Willingness and ability to travel up to 50%, depending on site validation schedule.
    • Experience with eMASS and a strong understanding of the CNSSI 1253 CCIs
    • Experience with Security Content Default Protocols (SCAP) Compliance Checker (SCC), NESSUS (ACAS), Information Assurance Vulnerability Management (IAVM) scanners (that is, tools utilized to meet DoD Security Configuration Compliance Validation.

     

     

    Preferred Education and Experience:

    • CISSP and CCSP preferred
    • Army-approved Network Operating Systems such as Microsoft Server Active Directory, Windows Server 2008, Windows Server 2012.
    • Army-approved Client Operating Systems such as Microsoft Windows 7, Windows 10 and non- Microsoft Client Operating Systems, and their use in a Microsoft Active Directory Environment
    • Army-approved patching utilities such as Microsoft System Center Configuration Manager (SCCM)/Microsoft Windows Server Update Services (WSUS), or any other DoD patching tools that will be used to implement Security Remediation Compliance.
    • Army-approved network and boundary defense mechanisms such as routers, switches, firewalls and intrusion detection/intrusion prevention systems such as those made by Cisco, Juniper, or other network and boundary defense equipment and software vendors
    • Army-approved Virtual Private Network (VPN) hardware- and software-based systems
    • Army-approved Proxy Server such as Bluecoat Proxy
    • Army-approved Data at Rest applications such as Microsoft BitLocker, or Microsoft EFS
    • Army-approved mobile devices, such as laptops, personal digital assistants (PDAs), and handheld smart devices such as Blackberry-like devices
    • Army Common Access Card (CAC)/Public Key Infrastructure and alternate smart-card requirements
    • Wireless tools, technology, and Wireless Intrusion Detection requirements and tools (Flying Squirrel)
    • RMF (or RMF) requirements for McAfee ePolicy Orchestrator and Host-Based Security
    • System (HBSS) Video Teleconference (VTC) equipment
    • Army-approved email solutions such as Microsoft Exchange
    • Any other Army approved tools or technology that would be found on most ICANs.

     

    Physical Requirements: 

     

    This position requires the ability to perform the below essential functions:

    • Sitting for long periods
    • Ambulate throughout an office
    • Ambulate between several buildings
    • Travel by land or air transportation up to 50% (CONUS only)

    Options

    Sorry the Share function is not working properly at this moment. Please refresh the page and try again later.
    Share on your newsfeed

    Connect With Us!

    Not ready to apply? Connect with us for general consideration.