Information System Security Engineer

20 Minutes ago • 5 Years +
Cyber Security

Job Description

CAE is seeking an Information System Security Engineer (ISSE) to provide technical expertise and support to CAE programs and Cybersecurity staff in Arlington, TX. This onsite role focuses on managing, implementing, and testing program cybersecurity requirements, advising ISSM and ISSOs, and producing artifacts for ATO. The ISSE will be involved in cyber-related technical decision-making, software/hardware approvals, risk assessment, and defining system architecture and security tools.
Good To Have:
  • Experience with System Administration of Windows and Linux Systems (deployment, configuration per DoD Guidance (STIG’ing), patching, scanning (ACAS/SCAP/E-STIG), scripting (Shell/Powershell/Ansible), documentation (SSP and work instructions), sustainment).
  • Military service or military environment familiarity, customs/protocol experience preferred.
Must Have:
  • Assist in preparing, maintaining, and implementing SSPs, under ISSM oversight, for government approval.
  • Provide technical support to the ISSM and ISSO.
  • Participate in update/management of SCTM.
  • Assist in authoring and updating the Risk Assessment Report (RAR).
  • Author and update the Program Protection Implementation Plan (PPIP).
  • Assist in creating and maintaining System Diagrams, Data Flow Diagrams, Boundary diagrams.
  • Create/Maintain/Update of Ports Protocols and Services.
  • Sanitization Plans and procedures.
  • Assist in POA&M Management.
  • Participate in Creating and executing the Security Assessment Plan/Procedures.
  • Assist in gathering COVs/LOVs and maintaining the sanitization plan.
  • Facilitate Software/Hardware Approvals.
  • Assist in Technical Security Management: Firewalls, Data Protection Controls, Patching, Encryption, Certificates, vulnerability scanning (ACAS/SCAP/E-STIG).
  • Continuous Monitoring · Patch/STIG · Annual ATO Package Review · Peer Reviewing program security documents.
  • Attending and presenting in Design reviews, Program Meetings, Technical Interchange Meetings and IPT meetings.
  • Assist in compliance monitoring. Reviewing, evaluating and updating STIG Checklists.
  • Participate in providing input to Proposal cost and technical volumes.
  • Assist in Cost Account Management.
  • High level system administrator skills under Windows or Linux (prefer both).
  • Experience with system log auditing and analysis (Configuration and Execution).
  • Experience with Software Development.
  • Experience with Configuration Management (version control).
  • B.S. degree in Computer Science, Computer Engineering, Information Technology, Electrical Engineering or other technical equivalent.
  • Minimum of 5 years directly related experience in implementation of DOD security requirements and contractor/government information security.
  • At least one of DoD 8570.01-M Information Assurance Management (IAM) Level II Approved Baseline Certification (CAP, CASP+CE, CISM, CISSP (or Associate), GSLC, or CCISO).
  • Experience with NIST Special Pamphlet (SP) 800-37 Guide for Applying the Risk Management Framework, NIST SP 800-53 Rev. 5 Security and Privacy Controls for Federal Information Systems and Organizations.
  • Experience documenting compliance/non-compliance of security controls in the Enterprise Mission Assurance Support Service (eMASS).
  • Incumbents must hold current or be eligible for DOD Personnel Security Clearance at Top Secret level.
  • Thorough knowledge and experience with the NISPOM, DOD security related instructions and directives, specific services’ security related regulations required.
  • Extensive experience with hardware/software platforms to include MS Windows, Linux, UNIX.
  • Direct experience with classified DoD networks.
  • Experience obtaining and maintaining ATO for classified network.
  • Must maintain IAM required Certification(s).
  • Due to U.S. Government contract requirements, only U.S. citizens are eligible for this role.
Perks:
  • Comprehensive and competitive benefits package and flexibility that promotes work-life balance
  • A work environment where all employees are valued, respected and safe
  • Freedom to succeed by enabling team members to deliver, take initiatives and make decisions
  • Recognition, professional development, advancement and having fun!

Add these skills to join the top 1% applicants for this job

team-management
account-management
communication
risk-management
internal-audit
risk-assessment
game-texts
linux
unix
ansible
powershell
shell

About This Role

Who We Are:

  • CAE Vision: Our vision is to be the worldwide partner of choice in defense and security, civil aviation, and healthcare by revolutionizing our customers’ training and critical operations with digitally immersive solutions to elevate safety, efficiency and readiness.
  • CAE Defense & Security Mission: CAE's Defense and Security business unit focuses on helping prepare military customers to develop and maintain the highest levels of mission readiness.
  • CAE Values: Empowerment, Innovation, Excellence, Integrity and OneCAE make us who we are and we strive to make a difference in the world while helping each other succeed.

What We Have to Offer:

  • Comprehensive and competitive benefits package and flexibility that promotes work-life balance
  • A work environment where all employees are valued, respected and safe
  • Freedom to succeed by enabling team members to deliver, take initiatives and make decisions
  • Recognition, professional development, advancement and having fun!

Summary

CAE is seeking information System Security Engineers (ISSE) for providing technical expertise and support to CAE programs and Cybersecurity staff. This position is NOT Remote. The individual hired for the position will work in-plant. The ISSE’s priority is responsibility for management, implementation and testing of our Program’s Cybersecurity Requirements. The ISSE is involved in most cyber-related technical decision making on programs. The ISSE advises the ISSM and ISSOs. The ISSE is involved in producing artifacts for the ATO’s body of evidence. The ISSE participates with software and hardware approvals assisting with research, providing analysis, assessing risk and making recommendations. The ISSE also works with the ISSM to produce Cybersecurity Impact Evaluations (CIE) to be reviewed/approved by the customer (for system changes). The ISSE has a thorough grasp of the Cyber requirements and system capabilities. The ISSE and the ISSE’s knowledge are required and must be on hand for the Authorization Event. The ISSE understands and helps define system architecture. The ISSE understands the security requirements and the tools required to satisfy those requirements. The ISSE understands how the simulator components interact and communicate.

ESSENTIAL DUTIES AND RESPONSIBILITIES

Reasonable accommodation may be made to enable individuals with disabilities to perform the essential functions.

  • Assist in preparing, maintaining, and implementing SSPs, under ISSM oversight, for government approval.
  • Provide technical support to the ISSM and ISSO.
  • Participate in update/management of SCTM.
  • Assist in authoring and updating the Risk Assessment Report (RAR)
  • Author and update the Program Protection Implementation Plan (PPIP)
  • Assist in creating and maintaining System Diagrams, Data Flow Diagrams, Boundary diagrams.
  • Create/Maintain/Update of Ports Protocols and Services.
  • Sanitization Plans and procedures.
  • Assist in POA&M Management
  • Participate in Creating and executing the Security Assessment Plan/Procedures.
  • Assist in gathering COVs/LOVs and maintaining the sanitization plan.
  • Facilitate Software/Hardware Approvals.
  • Assist in Technical Security Management: Firewalls, Data Protection Controls,
  • Patching, Encryption, Certificates, vulnerability scanning (ACAS/SCAP/E-STIG).
  • Continuous Monitoring · Patch/STIG · Annual ATO Package Review · Peer Reviewing program security documents.
  • Attending and presenting in Design reviews, Program Meetings, Technical Interchange Meetings and IPT meetings.
  • Assist in compliance monitoring. Reviewing, evaluating and updating STIG Checklists.
  • Participate in providing input to Proposal cost and technical volumes.
  • Assist in Cost Account Management.
  • High level system administrator skills under Windows or Linux (prefer both).
  • Experience with system log auditing and analysis (Configuration and Execution).
  • Experience with Software Development.
  • Experience with Configuration Management (version control).
  • Occasional travel will be required.

QUALIFICATIONS AND EDUCATION REQUIREMENTS

  • B.S. degree in Computer Science, Computer Engineering, Information Technology, Electrical Engineering or other technical equivalent.
  • Minimum of 5 years directly related experience in implementation of DOD security requirements and contractor/government information security. Both technical implementation and documentation.
  • At least one of DoD 8570.01-M Information Assurance Management (IAM) Level II Approved Baseline Certification (CAP, CASP+CE, CISM, CISSP (or Associate), GSLC, or CCISO.)
  • Experience with NIST Special Pamphlet (SP) 800-37 Guide for Applying the Risk Management Framework, NIST SP 800-53 Rev. 5 Security and Privacy Controls for Federal Information Systems and Organizations.
  • Experience documenting compliance/non-compliance of security controls in the Enterprise Mission Assurance Support Service (eMASS) ·
  • Incumbents must hold current or be eligible for DOD Personnel Security Clearance at Top Secret level.
  • Thorough knowledge and experience with the NISPOM, DOD security related instructions and directives, specific services’ security related regulations required.
  • Extensive experience with hardware/software platforms to include MS Windows, Linux, UNIX.
  • Military service or military environment familiarity, customs/protocol experience preferred.
  • Ability to communicate, interact and collaborate with management, executive personnel and military personnel including senior officer levels required.
  • Detail oriented; work with minimal supervision, analytical and problem-solving capability.
  • Direct experience with classified DoD networks. ·
  • Experience obtaining and maintaining ATO for classified network. ·
  • Must maintain IAM required Certification(s).
  • Due to U.S. Government contract requirements, only U.S. citizens are eligible for this role.

Preferred Skills:

Experience with System Administration of Windows and Linux Systems is highly desired.

This is to include:

  • deployment
  • configuration per DoD Guidance (STIG’ing)
  • patching
  • scanning (ACAS/SCAP/E-STIG)
  • scripting (Shell/Powershell/Ansible),
  • documentation (SSP and work instructions)
  • sustainment

SECURITY RESPONSIBILITIES:

Must comply with all company security and data protection / usage policies and procedures. Personally responsible for proper marking and handling of all information and materials, in any form. Shall not divulge any information, or afford access, to other employees not having a need-to-know. Shall not divulge information outside company without management approval. All government and proprietary information will be accessed and stored electronically on company provided resources.

  • Incumbent must be eligible for DoD Personal Security Clearance.

Due to U.S. Government contract requirements, only U.S. citizens are eligible for this role

WORK ENVIRONMENT

  • Duties performed in an office environment and manufacturing facility ·
  • Must be able to work overtime, on and off-shifts as required
  • The employee is on call 24x7 for the resolution of problems and issues.

PHYSICAL DEMANDS

The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of this job.

  • Employee is regularly required to sit, talk or hear, in person, in meetings and by telephone
  • Manual dexterity to operate computers or other standard office equipment; and reach with hands and arms
  • Able to support rack mounted equipment (up to 7 feet off the ground)

Salary Range:

The actual compensation rate is subject to the evaluation of the following factors (but not limited to): the candidate's work experience, qualifications, skills, internal equity, and market.

OTHER DUTIES

Please note this job description is not designed to cover or contain a comprehensive listing of activities, duties or responsibilities that are required of the employee for their job. Duties, responsibilities, and activities may change at any time with or without notice.

Set alerts for more jobs like Information System Security Engineer
Set alerts for new jobs by CAE
Set alerts for new Cyber Security jobs in United States
Set alerts for new jobs in United States
Set alerts for Cyber Security (Remote) jobs

Contact Us
hello@outscal.com
Made in INDIA 💛💙