Overview
On Site
Full Time
Skills
Security Clearance
FOCUS
FSA
Insurance
Training
Finance
Legal
Network Design
Data-flow Analysis
Encryption
Vulnerability Assessment
Open Source
Nmap
Wireshark
Metasploit
Kismet
Backtrack
Computer Networking
Firewall
Routers
Switches
Virtual Private Network
Intrusion Detection
Intellectual Property
IP
TCP
UDP
HTTP
HTTPS
MPLS
OSPF
IGRP
Border Gateway Protocol
SIP
Linux
OS X
Microsoft Windows
Cloud Computing
Hypervisor
Hyper-V
VMware
VMware ESXi
VirtualBox
Network Administration
Network
Storage
Backup
Disaster Recovery
IT Risk
IT Risk Management
Risk Management
Procurement
Computer Hardware
CISSP
Cyber Security
IT Architecture
Design Review
Information Security
CISM
Certified Ethical Hacker
Job Details
- Location: Chantilly, Virginia
- Type: Contract
- Job #3508
Title: Cyber Security Engineer
Location: Chantilly, VA
*Clearance: *Active TS/SCI w/ Polygraph needed to apply *
Company Overview:
Cornerstone Defense is the Employer of Choice within the Intelligence, Defense, and Space communities of the U.S. Government. Realizing early on that our most prized assets are our employees, we continually focus our attention on improving the overall work/life experience they have supporting the mission. Our Team is pushed every day to use their industry leading knowledge to provide end-to-end solutions to combat our nation's toughest and most secure problems. If you are looking for a place to not only be professionally challenged, but encouraged and supported by a company that cares, don't look any further than Cornerstone Defense.
Benefits Overview :
Cornerstone Defense offers a very comprehensive benefits package including, but not limited to: Medical, Dental and Vision Plans * Generous PTO Policy * 401(k) * HSA and FSA options * Life and Disability Insurance * Tuition Reimbursement and Training * Perks at Work Discount Program * Referral Program * Leads Generation Program * CollegeAmerica 529 * Fitness Reimbursement Program * Travel Assistance * Norton Lifelock Benefit Solutions * Life Planning Financial & Legal Services *
Required Skills:
1. Cyber Security Support: 2. Demonstrated experience analyzing IT systems for cyber security vulnerabilities. 3. Demonstrated experience developing IT system or network architecture design, conducting IP data flow analysis, encryption configuration, and vulnerability analysis using both open-source and commercial tools, such as Nmap, Wireshark, Metasploit, Canvas, Kismet, or BackTrack. 4. Demonstrated experience analyzing IT network configurations of devices such as firewalls, routers, switches, VPNs, or Intrusion Detection/Prevention Systems for cyber security vulnerabilities. 5. Demonstrated experience with communications protocols such as IP, TCP, UDP, HTTP, HTTPS, MPLS, OSPF, IGRP, BGP, SIP, H.232. 6. Demonstrated experience with multiple OS's, including Windows, Linux, and OSX. 7. Demonstrated experience with Microsoft Windows ver.; 7, 8, 10, 2008R2, 2012, 2012R2, or 2016. 8. Demonstrated experience with cloud computing technology and hypervisors such as HyperV, VMWare ESX, or Virtual Box. 9. Demonstrated experience with transitioning security domains and use of cross domain appliances. 10. Demonstrated experience with network management systems, network storage, backup systems, and disaster recovery (DR) architectures. 11. Demonstrated experience performing technical risk assessments and providing technical risk mitigation guidance. 12. Demonstrated experience ensuring appropriate risk mitigation considerations, risks and vulnerabilities are well understood and appropriately mitigated. 13. Demonstrated experience analyzing procurement processes of hardware, software and services to comply with cyber security and operational needs. 14. Demonstrated experience creating concise and well-structured written assessments. 15. Certifications: CISSP Certification.
Desired Skills:
1. Cyber Security Support 2. Demonstrated experience with the Sponsor's IT review boards. 3. Demonstrated experience with providing recommendations to IT architecture and design reviews. 4. Demonstrated experience with the Sponsor's security policies and regulations. 5. Demonstrated experience providing recommendations in technical standards, security standards, and operational assurance. 6. Certifications: Certified Information Security Manager (CISM), Certified Ethical Hacker.
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.