Secure Computing Engineer - Atlanta, United States - E-talentnetwork

    Default job background
    Description

    Duration:
    Long termLocation: Atlanta, GA (Atlanta will support Cobb.

    Requires the purchase of a parking pass which is around Summary:
    The Secure Computing Engineer will lead projects and people in addressing enterprise-wide IT and cyber solutions; Conducting IT risk analysis and assessments; Interpreting cybersecurity standards and ensuring they are established and maintained for classified IT systems and operations; Ensuring cybersecurity requirements are defined, systems are hardened, systems are analyzed, and test and evaluation of changes are conducted to ensure changes do not impact risk level


    Position:


    Level 3 Minimum:5 years of related experience with a Bachelor's degree in Information Technology, Computer Science, Computer Engineering, Cybersecurity, or related field3 years of related experience with a Masters' degree in Information Technology, Computer Science, Computer Engineering, Cybersecurity, or related field0 years of related experience with a Ph.

    D.

    in Information Technology, Computer Science, Computer Engineering, Cybersecurity, or related field

    Position:


    Level 4 Minimum:9 years of related experience with a Bachelor's degree in Information Technology, Computer Science, Computer Engineering, Cybersecurity, or related field7 years of related experience with a Masters' degree in Information Technology, Computer Science, Computer Engineering, Cybersecurity, or related field4 years of related experience with a Ph.

    D.

    in Information Technology, Computer Science, Computer Engineering, Cybersecurity, or related fieldKey Responsibilities:

    System Architecture design (compute, hardware/virtual, OS, storage, networking, security)Translate researcher IT needs into robust and scalable IT Solutions/InfrastructureContributor to the development of Continuous Integration and Continuous Development (CICD) processes using DevOps and DevSecOps principles.

    Cross Domain Data Exchange and Systems Integration Implementer of Infrastructure as CodeVirtual machine management.

    Validates security control configuration on systems, ensure all systems are configured to necessary controls, such as STIGS, CMMC, and other similar requirements.

    Actively collaborates with customers and external teams, derives tasks from detailed requirements.
    Provides tasking to other team members, based off of derived tasks.

    Provides software and merge request code reviewsActs as the primary gatekeeper for infrastructure as code mergesEnsures software adheres to coding standards and practices.


    Required Minimum Qualifications:
    Excellent oral and written communication skillsExcellent customer service skillsExcellent troubleshooting and problem solving skills.

    Proficiency in Microsoft Windows operating systems and infrastructure technologies including Active Directory, DHCP, DNS, Group Policy, Hyper-V, WDS, and WSUSAccount Management and working knowledge of LAN and WAN network environments.

    Maintain and utilize SCD Hyper-V Test Environment to include patching, configuration management, and software evaluation.
    Ability to secure operating systems and applications in a STIG environment.
    Ability to work in a mixed
    • OS environment; working knowledge of Networking and LinuxAbility to work in within an accredited DoD closed area.

    Ability to learn and manage security tools such as McAfee ePO, McAfee ENS, ACAS/Nessus, SCAP Compliance Checker, Splunk, STIG Viewer, and other related products.

    Ability to interpret ACAS/Nessus scan results to remediate vulnerabilities.
    Ability to configure and troubleshoot security infrastructure OS, applications, and devices.
    Ability to obtain DoD required certification(s)Willing to pursue professional learning and/or Master's degree.
    Perform other duties as assigned.


    Preferred Qualifications:


    Active participation in professional organizations and developmentPowerShell scriptingSecuring Red Hat systemsDoD encryptionFamiliarity with Cisco equipmentActive Secret ClearanceEducation and Length of Experience:This position vacancy is an open-rank announcement.

    The final job offer will be dependent on candidate qualifications in alignment with Research Faculty Extension Professional ranks as outlined in section 3.2.1 of the Client's Faculty Handbook.5 years of related experience with a bachelor's degree in information technology, Computer Science, Computer Engineering, Cybersecurity, or related field.3 years of related experience with a master's degree in information technology, Computer Science, Computer Engineering, Cybersecurity, or related field.0 years of related experience with a Ph.

    D. in Information Technology, Computer Science, Computer Engineering, Cybersecurity, or related field.

    All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or protected veteran status.

    #J-18808-Ljbffr