Information Systems Security Engineer

Experience w NESSUS in a complex network environment as well as Security Center version 4 5 Strong understanding of vulnerability assessment and penetration testing Experience tailoring Scan Policy NESSUS Security Center Experience with both compliance and vulnerability scanning Knowledge of cloud computing platforms Scripting and coding experience a plus Requirements - Must have an ACTIVE security clearance TS SCI with Polygraph REQUIRED - Shall have three (3) years of direct experience with an intelligence community or signals intelligence activity - Shall have eight (8) years experience integrating information assurance disciplines into the system design development integration and implementation. - Shall have two (2) years experience identifying Information Protection needs and define System Security Requirements designing System Security Architecture developing detailed Security Designs (including system security certifications and project evaluations). - Shall have two (2) years experience with Defense in Depth principles and technology including access control authorization identification and authentication public key infrastructure network and enterprise security architecture. - Shall have four (4) years experience developing security plans for employing enterprise-wide security architecture. - Shall have four (4) years experience assessing and auditing network penetration testing antivirus planning assistance risk analysis and incident response. - Shall have four (4) years experience applying security risk assessment methodology to system development including threat model development vulnerability assessments and resulting security risk analysis. - Shall have four (4) years experience with the NSA Certification and Accreditation process (NISCAP). - Shall have three (3) years experience enforcing the design and implementation of trusted relationships among external agency systems and architectures. - Shall have two (2) years experience in the implementation of cross domain solutions e.g. an information assurance solution that provides the ability to manually and or automatically access and or transfer between two or more differing security domains. - Shall have two (2) years experience developing systems that process information with different classifications and categories that simultaneously permits access by users with different security clearances and denies access to users who lack authorization. - Shall have two (2) years experience in network security certifications. - Shall have two (2) years experience in system certifications. - Shall have five (5) years experience applying of Federal NSA intelligence community and DoD Information Security regulations publications and policy - Shall have at least one Information Security related certification (Security CISSP CISM). - Shall have a Bachelor s degree in a related field (e.g. Business Management Computer Science Electrical Engineering Information Management Program Management etc) or two (2) years of additional relevant experience above all experience requirements listed in lieu of a Bachelor s degree. Application QuestionsDo you have a Public Trust Clearance (Y N) Do you have a Secret Clearance (Y N) Do you have a Top Secret Clearance (Y N) Do you have a Top Secret Clearance with SCI (Sensitive Compartmented Information) Do you have a TS (Top secret) TSI with Counter intelligence polygraph Do you have a TS SCI w Full scope polygraph

Share:

Important!

There are a lot of advertisers on Advertigo. We cannot check them one by one.

You work hard for your money and you want a company you can rely on when you are buying or selling things. That’s why we want to help you protect yourself from fraud. In this section, you’ll find informative tips and other useful material to stay informed and help reduce your chances of falling victim to scammers.

Please understand that Advertigo.net is a free service to help buyers and sellers (and etc.) find one another. Advertigo.net is not involved in any transactions and can not police the actions of our many users.