No more applications are being accepted for this job
- Analyze design constraints, analyze trade-offs and detailed system and security design, and consider life cycle support.
- Apply security policies to applications that interface with one another, such as Business-to-Business (B2B) applications.
- Assess the effectiveness of cybersecurity measures utilized by system(s).
- Assess threats to and vulnerabilities of computer system(s) to develop a security risk profile.
- Build, test, and modify product prototypes using working models or theoretical models.
- Conduct Privacy Impact Assessments (PIAs) of the application's security design for the appropriate security controls, which protect the confidentiality and integrity of Personally Identifiable Information (PII).
- Design and develop cybersecurity or cybersecurity-enabled products.
- Design hardware, operating systems, and software applications to adequately address cybersecurity requirements.
- Design or integrate appropriate data backup capabilities into overall system designs, and ensure that appropriate technical and procedural processes exist for secure system backups and protected storage of backup data.
- Develop and direct system testing and validation procedures and documentation.
- Develop detailed security design documentation for component and interface specifications to support system design and development.
- Develop Disaster Recovery and Continuity of Operations plans for systems under development and ensure testing prior to systems entering a production environment.
- Develop risk mitigation strategies to resolve vulnerabilities and recommend security changes to system or system components as needed.
- Develop specific cybersecurity countermeasures and risk mitigation strategies for systems and/or applications.
- Identify components or elements, allocate security functions to those elements, and describe the relationships between the elements.
- Identify and direct the remediation of technical problems encountered during testing and implementation of new systems (., identify and find workarounds for communication protocols that are not interoperable).
- Designing countermeasures to identified security risks.
- Designing security controls based on cybersecurity principles and tenets.
- Designing the integration of hardware and software solutions.
- Developing and applying security system access controls.
- Discerning the protection needs (., security controls) of information systems and networks.
- Evaluating the adequacy of security designs.
- Conducting audits or reviews of technical systems.
- Integrating and applying policies that meet system security objectives.
- The use of design modeling (., unified modeling language).
- Applying cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).
- Conducting vulnerability scans and recognizing vulnerabilities in security systems.
- Apply the methods, standards, and approaches for describing, analyzing, and documenting an organization's enterprise information technology (IT) architecture (., Open Group Architecture Framework [TOGAF], Department of Defense Architecture Framework [DoDAF], Federal Enterprise Architecture Framework [FEAF]).
- Effectively communicate complex information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means.
- Effectively collaborate with others as a member of planning teams, coordination groups, and task forces as necessary.
- US citizen
- Active Top Secret/Sensitive Compartmented Information (TS/SCI) clearance, eligible for Counterintelligence (CI) Polygraph.
- IAT, IAM, or IASAE Level 3 certification.
- Bachelor's degree or higher from an accredited college or university in Computer Science, Cyber Security, Information Technology, Software Engineering, Information Systems, or Computer Engineering degree; or a degree in a Mathematics or Engineering field.
- Available for possible travel within the Continental United States (CONUS) and Outside CONUS (OCONUS).
Information System Security Developer - St. Louis, United States - CALIBRE Systems
Description
Information System Security Developer
St. Louis, Missouri
Job ID: 4573
CALIBRE Systems Inc., an employee-owned Management Consulting and Digital Transformation Company is seeking a Information System Security Developer (Mid-level) that will design, develop, test, and evaluate information system security throughout the systems development life cycle.
The Information System Security Developer's responsibilities include, but are not limited to, the following:
Required Skills
The Information System Security Developer will have demonstrated experience in the following:
Desired skills for this position include the ability to:
required Experience