drjobs Senior Information Systems Security Engineer العربية

Senior Information Systems Security Engineer

Employer Active

The job posting is outdated and position may be filled
drjobs

Job Alert

You will be updated with latest job alerts via email
Valid email field required
Send jobs
Send me jobs like this
drjobs

Job Alert

You will be updated with latest job alerts via email

Valid email field required
Send jobs
Jobs by Experience drjobs

Internshipyears

Job Location drjobs

Pocatello - USA

Monthly Salary drjobs

Not Disclosed

drjobs

Salary Not Disclosed

Job Description

The ISSE will be responsible for verifying compliance with Federal Information Security Management Act (FISMA), National Institute of Standards and Technology (NIST), DISA Security Technical Implementation Guide (STIG), Federal Information Processing Standards (FIPS), National Information Processing Standards (NIPS), and other regulatory security compliance articles associated with data center infrastructure and platform design, deployment, testing, certification, patching, addressing or mitigating computer security issues, for all infrastructure and system components.
 
  • Shall be responsible for the secure design, analysis, and test of information security systems and products.
  • Shall serve as the subject matter expert (SME) for data center system environments and performs standard project tasks to analyze IT security compliance requirements, translate those into security designs, implements these designs, and tests effectiveness.
  • Shall functionally server as a SME with working knowledge of information security products including firewalls, monitoring and intrusion detection systems, anti-virus systems, vulnerability testing, and security analysis tools.
  • Shall create and update security test plans for detecting and mitigating risk to information systems. Shall engineer and perform tests and test plans to satisfy audits. Shall provide solutions for mitigating information systems findings or risks.
  • Shall evaluate, improve, and maintain the information security throughout the infrastructure.
  • Shall monitor and correct information system issues and create recovery processes for failures and vulnerabilities and track vulnerabilities until they are resolved or mitigated to the satisfaction of the government Accrediting Authority (AO).
  • Shall proactively ensure the highest levels of systems and infrastructure availability
  • Shall monitor and test application performance for potential bottlenecks, identify possible solutions, and work with engineers to implement those fixes.
  • Shall maintain security, compliance, and reduce risk strategies for information systems. Works with other security entities for certification and accreditation and authority to operate for new platforms or services to include cloud services and platforms.
  • Shall write and maintain custom scripts to increase system efficiency and lower the human intervention time on any tasks, such as automated scanning of systems and auditing, and data spill clean ups.
  • Shall participate in the design of information and operational support systems
  • Shall configure scanning tools to function without impacting the users or the system.
  • Shall configure and support TLS and PKI encrypted connections
  • Shall provide 4th level support
  • Shall liaise with vendors and other IT personnel for problem resolution
  • Shall ensure technical documentation exists for all systems and is kept up to date to include system security plans, business impact analyses, continuity of operations plans, mitigations, authorized software lists, authorized hardware lists, and elevated user access list and roles.
  • Shall ensure technical documentation exists for all systems and is kept up to date to include inventory and patch levels of all systems to include hostnames, property numbers, IP addresses, enclave, number of cores, number of processors, admin passwords, certificates, and service accounts on a monthly interval.
  • Shall provide real time alerts and dashboard information on security performance and availability.
  • Shall document system configurations to include passwords, access controls, version number, and revision numbers, patch levels, and inventory to include hostnames, TCP/IP addresses, number of processors, and number of cores, memory, and license keys.
  • Shall continually transition knowledge to the government staff through training and assistance on how to use the technology using industry best practices.
  • Shall write Engineering Documents as requested this includes the Business Impact Analysis (BIA) and the Information System Contingency Plan (ISCP).
  • Shall interface with other security teams within the FBI and its partners and consult to ensure deliverables meet all security requirements.
  • The Engineer Shall implement and monitor security measures for the protection of computer systems, networks and information.
  • Shall identify and define system security requirements.
  • Shall design computer security architecture and develop detailed security designs.
  • Shall prepare and document standard operating procedures and protocols.
  • Shall configure and troubleshoot security infrastructure devices.
  • Shall develop technical solutions and new security tools to help mitigate security vulnerabilities and automate repeatable tasks.
  • Shall report any security issues or incidents to management and provide a detailed explanation in both oral and written form.
  • Shall produce comprehensive reports including assessment-based findings, outcomes, and propositions for further system security enhancement.
Required Skills:
  • Clearance: Top Secret
  • Certified Information Systems Security Professional (CISSP) with an emphasis in security assessment and testing, and operations.
  • 10 years of relevant experience is required
  • Possess a bachelor’s degree preferred

Employment Type

Full Time

About Company

0-50 employees
Report This Job
Disclaimer: Drjobpro.com is only a platform that connects job seekers and employers. Applicants are advised to conduct their own independent research into the credentials of the prospective employer.We always make certain that our clients do not endorse any request for money payments, thus we advise against sharing any personal or bank-related information with any third party. If you suspect fraud or malpractice, please contact us via contact us page.