Cyber Security jobs across the world
Copyright 2024 All Rights Reserved by YipCraft
We will contibute 1% of your purchase to remove CO2 from the atmosphere.
Cyber Security jobs across the world
Copyright 2024 All Rights Reserved by YipCraft
We will contibute 1% of your purchase to remove CO2 from the atmosphere.
Key Role:
Conduct and review technical security assessments of computing environments to identify points of vulnerability, non-compliance with established Information Assurance (IA) standards and regulations and recommend mitigation strategies. Validate and verify system security requirement definitions, establishing system security designs. Design, develop, implement, and integrate IA security systems and system components, including those for networking, computing, and enclave environments with multiple enclaves and differing data protection or classification requirements. Build IA into systems deployed to operational environments. Assist architects and systems developers in the identification and implementation of information security functionality to ensure uniform application of security policies and enterprise solutions. Support the building of security architectures. Enforce the design and implementation of trusted relations among external systems and architectures. Plan, implement, manage, monitor, and upgrade security measures to protect data, systems, and networks. Assess and mitigate system security threats and risks throughout the engineering and program life cycle. Contribute to the security planning, assessment, risk analysis, risk management, certification, and awareness activities for system and networking operations. Review certification and accreditation documentation, providing feedback on completeness and compliance of its content. Apply system security engineering expertise in information domain, cross domain solutions, commercial off-the-shelf and government off-the-shelf cryptography, system integration, intrusion detection, contingency planning, configuration control, certification and accreditation process, and principles of IA such as confidentiality, integrity, non-repudiation, availability, and access control. Ensure all IT systems are managed, controlled, and updated in a manner consistent with both Booz Allen and required regulatory policies, procedures, and requirements. Support security authorization activities in compliance with the DoD Risk Management Framework (RMF), NIST Risk Management Framework (RMF) process, and prescribed business processes for security engineering.
Basic Qualifications:
7+ years of experience as an engineer on classified systems, programs, or contracts of similar scope, type, and complexity within the DoD Intelligence Community
Experience providing detailed specifications for proposed technical solutions, including resources, timeline, and scope involved within a transformational program
Experience with vulnerability remediation and security management, including system hardening, log management, and configuration management using Nessus, McAfee, WSUS, Shavlik, Blade Logic, Splunk, ACAS, SCAP, or HBSS
Experience with virtualization platforms such as VMware, Horizon, vSphere, vCenter, vSAN, or Hyper-V
Experience applying ICD 503 and ICD 504 guidelines to classified systems
Knowledge of technology areas such as Active Directory (AD), AD Group Policy, DHCP, DNS, on-prem Exchange, and SharePoint
Ability to conduct proactive research, analyze security weaknesses, assist other Information Technology engineers in creating practical demonstrations of proposed solutions, and present analysis and findings to peers and leadership
TS/SCI clearance with a polygraph
HS diploma or GED and 4+ years of experience as an ISSE, or Bachelor's degree and experience as an ISSE
Ability to obtain IAM Level III Certification, including GSLC, CISM, CISSP, or CCISO Certifications, within 6 months of start date
Additional Qualifications:
Experience collaborating with dispersed teams contributing to global and multi-functional teams
Knowledge of industry standards and frameworks, including NIST, CIS, or CMMC
Knowledge of multiple IT operational and security disciplines
Ability to balance risks in ambiguous and complex situations through prioritization, goal setting, and motivation
Ability to work well under pressure within time and budget constraints to meet objectives
Ability to communicate technical concepts to a broad range of technical and non-technical staff
Ability to influence without authority
Possession of excellent analytical and problem-solving skills
Clearance:
Applicants selected will be subject to a security investigation and may need to meet eligibility requirements for access to classified information; TS/SCI clearance with polygraph is required.
Compensation
At Booz Allen, we celebrate your contributions, provide you with opportunities and choices, and support your total well-being. Our offerings include health, life, disability, financial, and retirement benefits, as well as paid leave, professional development, tuition assistance, work-life programs, and dependent care. Our recognition awards program acknowledges employees for exceptional performance and superior demonstration of our values. Full-time and part-time employees working at least 20 hours a week on a regular basis are eligible to participate in Booz Allen’s benefit programs. Individuals that do not meet the threshold are only eligible for select offerings, not inclusive of health benefits. We encourage you to learn more about our total benefits by visiting the Resource page on our Careers site and reviewing Our Employee Benefits page.
Salary at Booz Allen is determined by various factors, including but not limited to location, the individual’s particular combination of education, knowledge, skills, competencies, and experience, as well as contract-specific affordability and organizational requirements. The projected compensation range for this position is $110,100.00 to $250,000.00 (annualized USD). The estimate displayed represents the typical salary range for this position and is just one component of Booz Allen’s total compensation package for employees. This posting will close within 90 days from the Posting Date.Identity Statement
As part of the application process, you are expected to be on camera during interviews and assessments. We reserve the right to take your picture to verify your identity and prevent fraud.
Work Model
Our people-first culture prioritizes the benefits of flexibility and collaboration, whether that happens in person or remotely.
EEO Commitment
We’re an equal employment opportunity/affirmative action employer that empowers our people to fearlessly drive change – no matter their race, color, ethnicity, religion, sex (including pregnancy, childbirth, lactation, or related medical conditions), national origin, ancestry, age, marital status, sexual orientation, gender identity and expression, disability, veteran status, military or uniformed service member status, genetic information, or any other status protected by applicable federal, state, local, or international law.