Cyber Indications and Warnings Engineer IV (Vinton)

Employment Type

: Full-Time


: Information Technology

  • Cyber Indications and Warnings Engineer IV

    Job Locations US-VA-Westfields Req # 2019-84535 Category IT Operations Telecommute No Clearance Top Secret/SCI w/Poly
  • Business Group Highlights


    The Intelligence group provides high-end systems engineering and integration products and services, data analytics and software development to national and military intelligence customers. Serving federal agencies and the Intelligence Community for more than 50 years, the Intelligence group helps our clients meet their mission needs by providing trusted advisors, leading-edge technologies, and innovative solutions.


    Program Description:
    The program provides Systems Engineering and Technical Assistance (SETA) support in the areas of Cyber Security and Management to improve the Information Assurance (IA) posture of a National customer. The contracts support functions are: IA Management, Federal Information Security Management Act (FISMA coordination and reporting, Risk Management Framework (RMF) application, IA compliance measurements and metrics, Assessment and Authorization (A&A), Vulnerability Management, and Cyber Defense support.

    Position Description:
    The Cyber Indications and Warnings Engineer provides support to the customer in the area of Cyber Security. Daily tasks include, but are not limited to:
    Compiles information to develop the weekly, monthly and annual customer Cyber Snapshot. Reporting metrics on cases and incidents that have happened over the period as well as items of interest on Cyber Security that would be of interest to senior management
    Participate in War Games and exercises to include planning, evaluation, reporting and coordinating among participants
    Participate in customer technical exchange meetings covering IC Cyber Security concerns
    Research current threats and potential threats to the customers enterprise by conducting Open Source and Community research on latest threat landscape
    Investigate and propose enhancements to threat detection processes across the customers enterprise


    o Requires 8 to 10 years with BS/BA or 6 to 8 years with MS/MA or 3 to 5 years with PhD
    o Current U.S. Government Top Secret clearance with SCI eligibility
    o Favorably adjudicated Counter Intelligence Polygraph
    o Bachelors of Science Degree in Science, Technology, Engineering or Mathematics (STEM) or an advanced IA certification
    o DoD 8570 certification in IAT or IAM
    o Experience in security systems engineering involving various computer hardware and software operation systems and application solutions in both stand-alone and LAN/WAN configurations
    o Experience with security features and/or vulnerability of various operating systems as defined by NIST, DISA (STIGs), and USCYBERCOM
    o Experience with networks and systems security administration, operation systems security configuration and account management best practices
    o Solid understanding of network intrusion detection methods and techniques
    o Experience with SIEM technology and applications such as ArcSight or Splunk.
    o Experience with FireEye or experience with an equivalent "endpoint agent" application

    o Experience in responding to detected security incidents
    o Experience implementing RMF Process and NIST 800-53 technical controls, as well as developing and maintaining associated certification and accreditation documentation
    o Self-starter requiring limited direction and supervision
    o Experience with Malware Reverse Engineering
    o Experience working with, tuning, and optimizing IDS and SIEM rules
    o Experience working in a Network Security Operations Center
    o An understanding of satellite communication networks
    o Experience briefing senior customer personnel
    o Ability to organize and prioritize numerous customer requests in a fast pace deadline driven environment
    o Familiarity with Amazon Web Services (AWS)
    o Familiarity with customer's IA processes
    o Experience with IA vulnerability testing, network and system test tools, and cyber security hardware and software (i.e. HBSS, FireEye, Snort, ArcSight, EVSS, ForcePoint firewalls)
    o Familiarity with Cross Domain Systems (CDS)
    o Experience supporting IC or DoD in the Cyber Security Domain

    Associated topics: chief program officer, cpo, manage, manager, management, monitor, product manager, project manager, relationship manager, task

    Launch your career - Create your profile now!

    Create your Profile

    Loading some great jobs for you...