Job Information
Concurrent Technologies Corporation SENIOR PRINCIPAL INFORMATION SYSTEMS SECURITY ENGINEER in Columbia, Maryland
SENIOR PRINCIPAL INFORMATION SYSTEMS SECURITY ENGINEER
Concurrent Technologies Corporation
Client Site - Columbia, MD area
Minimum Clearance Required:
TS/SCI with Fullscope Poly
Clearance Level Must Be Able to Obtain:
TS/SCI with Fullscope Poly
CTC stays ahead of the latest technology advancements so we can help solve our clients toughest challenges. As a part of the Information Technology (IT) Division, you will be strengthening our team of world-class experts aimed at providing our clients with the most effective solutions. Our expertise in achieving missions is unmatched, and we continue to have a major positive impact throughout the Department of Defense (DoD), Intelligence Community (IC), and beyond. Our IT solutions are at work in high-level, high-priority areas of the DoD and U.S. Government agencies. We are leaders in artificial intelligence and machine learning, cloud architecture and security, cross domain solutions, cybersecurity, edge node technology, synthetic environments, and more. We are honored to be a trusted provider of cutting-edge and customized solutions to our clients for decades. Our experts are leading the rapidly evolving IT industry with innovative work in a variety of disciplines, including DevSecOps, which underpins many of our efforts. With CTCs IT Division, you become part of a dedicated team committed to advancing the ever-growing possibilities in IT and meeting our clients challenges with up-to-the-minute, customized, and powerful solutions.
Key Responsibilities:
To protect the interests of national security, cyber incidents must be coordinated among and across DoD organizations and sources outside the Department of Defense, and critical infrastructure and critical infrastructure sector Information Sharing and Analysis Centers (ISACs) via Tier I, Tier II, and Tier III support.
CND response services include the actions taken to report, analyze, coordinate, and respond to any event or cyber incident for the purpose of mitigating any adverse operational or technical impact.
Cyber incident reporting includes a well-defined framework for the timely reporting of any cyber event or incident. The report provides an accurate, meaningful, and complete understanding of the cyber incident from initial detection to analysis and remediation. This information feeds into the User-Defined Operational Picture, which provides local, intermediate, and DoD wide situational awareness of CND actions and their impact.
Cyber incident analysis identifies several critical elements of an incident to determine and characterize its possible effects on DoD information networks, operational missions, and other defense programs. This activity relies on effective acquisition, preservation, and timely reporting of cyber incident data.
Cyber incident response includes the coordinated development and implementation of courses of action (CO As) that focus on containment, eradication, and recovery. At the same time, it ensures the acquisition and preservation of data required for tactical analysis, strategic analysis, and/or LE investigations.
Basic Qualifications:
Bachelors Degree from an accredited college or university in Computer Science or related discipline and 12 years of directly related experience or a Masters degree and 10 years of directly related experience, or a PhD and 8 years of directly related experience.
Fourteen (14) years experience as an ISSE on programs and contracts of similar scope, type, and complexity within the Federal Government is required
The Information Systems Security Engineer shall perform, or review, technical security assessments of computing environments to identify points of vulnerability, non-compliance with established Information Assurance (IA) standards and regulations, and recommend mitigation strategies. Validates and verifies system security requirements definitions and analysis and establishes system security designs. Designs, develops, implements and/or integrates IA and security systems and system components including those for networking, computing, and enclave environments to include those with multiple enclaves and with differing data protection/classification requirem