Senior Information Security Engineer at SAIC

| San Diego, CA
Sorry, this job was removed at 4:14 p.m. (CST) on Friday, March 18, 2022
Find out who's hiring in San Diego, CA.
See all Developer + Engineer jobs in San Diego, CA
Apply Now
By clicking continue you agree to Built In’s Privacy Policy and Terms of Use.
Description

SAIC is seeking an Information Security Engineer to support the NIWC Pacific's Information Operations Division, Code 756 is involved in evaluating and validating new technology, conducting exploratory research, documenting procedures for implementation as projects go into production, and a wide variety of research and communications requirements. Code 756 has a requirement for Information Security Engineer to support the operation and maintenance of an RDT&E communication network; a complex network of computing and communications systems and software supporting a scientific user community that relies on available and stable access to timely information. Included in the overall RDT&E network environment is SWAN, which provides local secure (SECRET) network connectivity. The RDT&E network allows customers to utilize Navy computers and network infrastructure to develop, test, and certify new systems that are either directly in support of Navy initiatives or support internal or external customer requirements. The Command Information System Security Manager (C-ISSM) is tasked command-wide to implement the Cybersecurity Program (CSP) and ensure compliance with cybersecurity policies at NIWC Pacific.

Specific IT support responsibilities will be with the; Network coordination; IT Operations and Maintenance

Primary Responsibilities
  • Perform tasks to ensure Navy applications, systems, and networks satisfy Federal/DoD/DON/Navy cybersecurity requirements.
  • Ensure that no production systems are operational on any RDT&E network.
  • Migrate all Navy Ashore production systems to the NMCI environment where available.
  • Work with government personnel to ensure compliance with all current Navy IT & cybersecurity policies, including those pertaining to Cyber Asset Reduction and Security (CARS).
  • Follow SECNAVINST 5239.3B & DoDI 8510.01 prior to integration and implementation of IT solutions or systems.
  • Responsible for identifying, tracking and reporting cybersecurity personnel, also known as Cybersecurity Workforce (CSWF) and Cyber IT workforce personnel.
  • Ensure any equipment/system installed or integrated into Navy platform will meet the cybersecurity requirements as specified under DoDI 8500.01.
  • Ensure that any design change, integration change, configuration change, or installation of hardware and software is in accordance with established DoD/DON/Navy cyber directives and does not violate the terms and conditions of the accreditation/authorization issued by the appropriate Accreditation/Authorization official.
  • Create, provision, add or remove storage to/from computer systems, install, configure, and manage SAN switches, storage system monitoring templates, backup environments, and configure Redundant Array of Independent Disks (RAID), Logical Unit Numbers (LUNs), and storage groups.
    • These services apply to the following requirements:
      • The coordination and configuration of the NMCI Network coordination
      • IT Laboratory Services and Administration
      • Voice Over IP (VIOP) configuration and coordination
      • The coordination and configuration of Research, Development, Test, and Evaluation (RDT&E) classified and unclassified networks IT
  • The coordination and configuration of the Secret Wide Area Network (SWAN) on approved on software that is managed in the DON Application and Database Management System (DADMS) application and is Functional Area Manager (FAM) approved.
  • Ensure that all databases that use database management systems (DBMS) designed, implemented, and/or hosted on servers and/or mainframes supporting Navy applications and systems be registered in DADMS.
  • Must be able to work within the Operations Security (OPSEC) five-step analytical process and adhere to the policies.
  • Participate in NAVWAR/NIWC Atlantic/NIWC Pacific OPSEC program briefings and working meetings, and complete any required OPSEC survey or data.
  • Administer Host-based Security System (HBSS) to include installation, configuration, policy development, troubleshooting, and administration.
  • Register any contractor-owned or contractor-maintained IT systems utilized on contract in the Department of Defense IT Portfolio Registry (DITPR)-DON.
  • Ensure that all software recommended, procured, and/or developed is compliant.
  • Ensure IT tools developed to automate NIWC Pacific business processes will be delivered with full documentation and source code, as specified at the task order level, to allow non-proprietary operation and maintenance by any source.
  • Ensure all programs are submitted with proof of completed DEV/MOD certification approval from the appropriate authority in accordance with DON policy.
  • Disseminate CUI and unclassified DoD information within the scope of assigned duties and with a clear expectation that confidentiality is preserved
Key Requirements
  • DODI 8570-1M Cybersecurity Workforce IAT Level II
  • Familiarity with NIST 800-171 Rev 2
  • Be able to create and maintain a System Security Plan (SSP) to include technical architectures and all Commercial and Government Entity (CAGE) code(s) associated with information systems addressed by the SSP.
  • Microsoft Windows client certification (minimum Windows 7) - or recent equivalent
  • Microsoft Windows Server certification (minimum Windows Server 2008) - or recent equivalent
  • DITPR-DON/DADMS experience
  • Minimum of 1 year experience with virtual environments including VMware ESX and Microsoft Hyper-V to support installation and configuration of HBSS and Assured Compliance Assessment Solution (ACAS) for Navy Integrated Shipboard Network System (ISNS).
  • Minimum of 1 year experience with computer networking to troubleshoot HBSS and ACAS integration issues.
  • Automated vulnerability scanning tools
    • DISA Security Content Automation Protocol (SCAP) Compliance Checker (SCC)
    • Vulnerator
  • Minimum of 1 year experience with executing ACAS scans/ Tenable Nessus & SecurityCenter
  • Minimum of 1 year experience with Linux Red Hat and Linux System Administration
  • Must be a US Citizen
  • Must be able to pass a background investigation with a favorable adjudication
Desired Experience & Skills
  • CISSP or equivalent IAT Level III
  • Navy FQV
  • Minimum BS degree + 3 years of IA experience with Host-based Security System (HBSS) to include installation, configuration, policy development, troubleshooting, and administration.
  • Formal degree requirement may be evaluated and waived if applicant provides 4 years of IA experience with Host-based Security System (HBSS).
Travel Required
  • None
Security Clearance
  • Top Secret - SCI clearance

Qualifications

Required Education, Clearance, and Certifications:
  • Bachelor's degree and two (2) years or more experience
    • Formal degree requirement may be evaluated and waived if applicant provides 4 (four) years of IA experience with Host-based Security System (HBSS).
  • DOD 8570-1M Cybersecurity Workforce IAT Level II (i.e. Security+ CE, or others)
  • Microsoft Windows client certification (minimum Windows 7) - or recent equivalent
  • Microsoft Windows Server certification (minimum Windows Server 2008) - or recent equivalent
  • Must be a US Citizen
  • Must have an active Top Secret - SCI clearance
Required Experience:
  • Familiarity with NIST 800-171 Rev 2
  • Ability to create and maintain a System Security Plan (SSP) to include technical architectures and all Commercial and Government Entity (CAGE) code(s) associated with information systems addressed by the SSP.
  • DITPR-DON/DADMS experience
  • Minimum of 1 year experience with virtual environments including VMware ESX and Microsoft Hyper-V to support installation and configuration of HBSS and Assured Compliance Assessment Solution (ACAS) for Navy Integrated Shipboard Network System (ISNS).
  • Minimum of 1 year experience with computer networking to troubleshoot HBSS and ACAS integration issues.
  • Automated vulnerability scanning tools
    • DISA Security Content Automation Protocol (SCAP) Compliance Checker (SCC)
    • Vulnerator
  • Minimum of 1 year experience with executing ACAS scans/ Tenable Nessus & SecurityCenter
  • Minimum of 1 year experience with Linux Red Hat and Linux System Administration
Desired Experience & Skills:
  • CISSP or equivalent IAT Level III
  • Navy FQV
  • Minimum BS degree + 3 years of IA experience with Host-based Security System (HBSS) to include installation, configuration, policy development, troubleshooting, and administration.
Travel Required:
  • None

COVID Policy: Prospective and/or new employees are required to adhere with SAIC's vaccination policy. All SAIC employees must be fully vaccinated and they must submit proof of vaccination on their first day of employment. Prospective or new employees may seek an exemption to the vaccination requirement at Contact Us and must have an approved exemption prior to the start of their employment. Where work is performed strictly at a customer site, customer site vaccination requirements preempt SAIC's vaccination policy.
More Information on SAIC
SAIC operates in the Information Technology industry. The company is located in Reston, VA. SAIC was founded in 2013. It has 34621 total employees. It offers perks and benefits such as Flexible Spending Account (FSA), Disability Insurance, Dental Benefits, Vision Benefits, Health Insurance Benefits and Life Insurance. To see all 706 open jobs at SAIC, click here.
Read Full Job Description
Apply Now
By clicking continue you agree to Built In’s Privacy Policy and Terms of Use.

Similar Jobs

Apply Now
By clicking continue you agree to Built In’s Privacy Policy and Terms of Use.
Save jobView SAIC's full profileFind similar jobs