Back
Job   USA   VA   Woodbridge Area   Project Engineer   J5 Consulting -

Cybersecurity Project Engineer | Project Engineer in Computer & Software Job Job at J5 Consult1

This listing was posted on The Resumator.

Cybersecurity Project Engineer

Location:
Chantilly, VA
Description:

J5 Consulting is a Maryland based company established in 2006 to provide computing and consulting services for government and commercial entities. Our services improve Information System networking performance and compliance and protect electronic assets from loss and compromise. We welcome your application to receive consideration for the following position. This position is available immediately . Job Overview: The Customer supports a diverse set of corporate goals across the organization by conducting technical risk assessments and providing technical risk mitigation guidance on the use of various enabling technologies. The Customer requires subject matter expertise in technical risk analysis of enterprise and mission systems, IT systems and networks, mobile and wireless networks, cloud-based computing, network management platforms, communication protocols, scripting or programming products, configuration scripts, and IT hardware and software products in support of Customer’s technical risk assessment activities. This position will: Perform technical risk assessments and provide technical risk mitigation guidance on the use of various enabling technologies. Gather Body of Evidence (BOE) and assess artifacts, such as CONOPS, use cases, detailed network diagrams, technical design details, procurement methods, and System Security Plan (SSP) to get a holistic view of the interworking parts of a given technology implementation being evaluated, from which real insights can be derived to inform risk assessor’s judgement. Apply consistent and systematic investigative practices to comprehensively assess risks, identify and characterize threats and vulnerabilities. Evaluate system or network operations using network management platforms, network scanning tools, auditing functions, PCAP captures, and log reviews. Analyze system, network, or cloud configurations for mis-configured settings, configurations not required for deployment, removal of test scripts to minimize the configuration to fulfill the specific deployment. Analyze hardware and software used in a system or network for origin of manufacturer, known vulnerabilities, outdated hardware or software. Remain current with existing and future technologies to assist the Customer with identifying associated risks of implementing proposed technologies. Provide guidance of potential cyber threats, attacks, and exploitations and advise decision-makers of the inherent risks and mitigation to the Customer’s equities. Ensure appropriate risk mitigation considerations are baked in early in the development cycle, and risks and vulnerabilities are well understood and appropriately mitigated. Organize and schedule work to effectively manage a case load Track, document, and communicate progress status updates and weekly status updates on all technical risk assessment reports, cases describing potential security concerns and mitigations to enhance security posture . Contractor shall have the following required skills, certifications and demonstrated experience: Demonstrated experience analyzing IT systems for cyber security vulnerabilities. Demonstrated experience developing IT system or network architecture design, conducting IP data flow analysis, encryption configuration, and vulnerability analysis using both open-source and commercial tools, such as Nmap, Wireshark, Metasploit, Canvas, Kismet, or BackTrack. Demonstrated experience analyzing IT network configurations of devices such as firewalls, routers, switches, VPNs, or Intrusion Detection/Prevention Systems for cyber security vulnerabilities. Demonstrated experience with communications protocols such as IP, TCP, UDP, HTTP, HTTPS, MPLS, OSPF, IGRP, BGP, SIP, H.232. Demonstrated experience with multiple OS’s, including Windows, Linux, and OSX. Demonstrated experience with Microsoft Windows ver.; 7, 8, 10, 2008R2, 2012, 2012R2, or 2016. Demonstrated experience with cloud computing technology and hypervisors such as HyperV, VMWare ESX, or Virtual Box. Demonstrated experience with transitioning security domains and use of cross domain appliances. Demonstrated experience with network management systems, network storage, backup systems, and disaster recovery (DR) architectures. Demonstrated experience performing technical risk assessments and providing technical risk mitigation guidance. Demonstrated experience ensuring appropriate risk mitigation considerations, risks and vulnerabilities are well understood and appropriately mitigated. Demonstrated experience analyzing procurement processes of hardware, software and services to comply with cyber security and operational needs. Demonstrated experience creating concise and well-structured written assessments. Certifications CISSP Certification Highly desired skills and demonstrated experience: Skills and demonstrated experiences that are highly desired but not required to perform the work include: Demonstrated experience with the Customer’s IT review boards. Demonstrated experience with providing recommendations to IT architecture and design reviews. Demonstrated experience with the Customer’s security policies and regulations. Demonstrated experience providing recommendations in technical standards, security standards, and operational assurance. Demonstrated experience with USG standards such as Intelligence Community Directive (ICD) 503, Federal Information Processing Standards (FIPS), National Institute of Standards and Technology (NIST) Special Publication (SP) 800-37, SP 800-39, SP 800-53, SP 800-53A, SP 800-60. Certifications: Certified Information Security Manager (CISM), Certified Ethical Hacker. ____________________________________________________________________ US Citizenship: This position requires US Citizenship. Verification of US Citizenship to meet federal government security requirements will be confirmed. Security Clearance: The successful candidate must have an active U.S. Government Top Secret Security Clearance with a Full Scope Polygraph. Clearance Verification: This position requires successful verification of the stated security clearance to meet federal government customer requirements. You will be asked to provide clearance verification information prior to an offer of employment. Travel: This position is expected to be onsite. The position will be located within the Washington Metropolitan Area (WMA). Local travel/POV will be on an as needed basis, within the local place of performance. Temporary Duty (TDY) travel is anticipated within the Continental United States (CONUS). ______________________________________________ This position is available immediately . J5 Consulting offers excellent benefits and compensation packages . We are an Equal Opportunity Employer committed to providing fair and equal employment opportunities to all employees and applicants without regard to race, color, religion, gender, pregnancy, sexual orientation, national origin, age, disability, genetic information, veteran or military status, or any other characteristic protected by applicable laws.Powered by JazzHR
Company:
J5 Consulting
Posted:
April 10 on The Resumator
Visit Our Partner Website
This listing was posted on another website. Click here to open: Go to The Resumator
Important Safety Tips
  • Always meet the employer in person.
  • Avoid sharing sensitive personal and financial information.
  • Avoid employment offers that require a deposit or investment.

To learn more, visit the Safety Center or click here to report this listing.

More About this Listing: Cybersecurity Project Engineer
Cybersecurity Project Engineer is a Computer & Software Jobs Project Engineer Job at J5 Consulting located in Chantilly VA. Find other listings like Cybersecurity Project Engineer by searching Oodle for Computer & Software Jobs Project Engineer Jobs.