*Clearance: *Active TS/SCI w/ Polygraph needed to apply *
Cornerstone Defense, in partnership with our military, intelligence, and civil government customers, supports U.S. operations worldwide through the use of many different types of intelligence, satellite, and cyber technologies. Cornerstone’s Intelligence Sector provides solutions to the United States Government for information collection, operations, exploitation and dissemination, and research activities. Our Team specializes in software development, cloud architecture, systems and network engineering, systems integration, agile management, as well as targeting operations and intelligence analysis. Our support to our mission customers includes cyber network operations, exploitation and defense, signals intelligence, human intelligence, and critical missions and networks.
Immediate need for an ISSE responsible for safeguarding networks against unauthorized modification, disclosure, or destruction. Responsibilities include but not limited to:
Engineer, design, implement, and test network intrusion detection system (IDS), network intrusion protection system (IPS), host intrusion protection system (HIPS), web and application protection, enterprise anti-virus suite to protect the following IT components: network, storage, computing, databases, web services, and application.
Apply system security engineering expertise in one or more of the following: system security design process; engineering life cycle; information domain; cross domain solutions; intrusion detection; incident handling; auditing. Experience with security features and/or vulnerability of various operating systems (Red Hat Linux, CentOS, AWS). XACTA, Nessus, WebInspect, AppDetective, ICD-503, FISMA, and RMF/A&AEngineer, design, implement, and test network intrusion detection system (IDS), network intrusion protection system (IPS), host intrusion protection system (HIPS), web and application protection, enterprise anti-virus suite to protect the following IT components: network, storage, computing, databases, web services, and application
Serve as the security subject matter expert for the A&A and Continuous Monitoring processes
Work closely with architects, engineers, and developers in the identification and implementation of appropriate information security functionality to ensure uniform application of security policy and enterprise solutions
Provide security requirements to architects, engineers, and developers
Assess and mitigate system security threats/risks throughout the program life cycle
Demonstrated on-the-job knowledge and experience with Information Assurance/Cyber Engineering requirements, design and implementation to include systems engineering principles, requirements analysis, system development (software and hardware), network security architecture concepts (topology, protocols, components), and/or IT security principles and methods (firewalls, demilitarized zones, encryption).
Demonstrated on-the-job knowledge and experience with developing and reviewing security concept of operations, systems security plans, security control assessments, contingency plans, configuration management plans, incident response plans, plan of actions and milestones, risk management plans, vulnerability scanning, and/or vulnerability management plans.
Demonstrated on-the-job knowledge and experience cloud security design, requirements analysis, control implementation, and mitigation.
Demonstrated experience with ICD-503, FISMA and RMF/A&A processes, NIST SP (800-27, 30, 37, 53, 60, 137, 144,145), FIPS (199, 200), and CNNSSI 1253 technical controls and developing and maintaining associated certification and accreditation documentation.
Demonstrated experience with cyber security toolset including anti-virus, Vulnerability Assessment, HIDS and NIDS.
Demonstrated experience with performing security system scans for network, platform, database, and web services using different security tools (e.g., Nessus, WebInspect, AppDetective).