CGI Federal is looking for a Mid-Level Cyber Security Engineer with experience and the ability to manage and support networks, security and desktop/server environments to lead and manage configuration, implementation, and maintenance of various systems/network, security and desktop/server technologies. Your future duties and responsibilities
Deeply involved in the design, testing, and implementation of state-of-the-art secure operating systems, networks, and database products. Conducts risk assessment and provide recommendations for application design.
Deeply involved in a wide range of security issues including architectures, firewalls, electronic data traffic, and network access.
Analyses are performed at all levels of total system product to include: concept, design, fabrication, test, installation, operation, maintenance, and disposal.
Uses encryption technology, penetration and vulnerability analysis of various security technologies, and information technology security research.
Deeply involved in the design and development of new systems, applications, and solutions for external customer enterprise-wide cyber systems and networks.
Provides analysis, evaluation, and recommendations designed to promote economy, efficiency, and effectiveness in the customer's security program.
Supports the logical and systematic conversion of customer or product requirements into total systems solutions that acknowledge technical, schedule, and cost constraints.
Integrates new architectural features into existing infrastructures, designs cyber security architectural artifacts, provides architectural analysis and relates existing system to future needs and trends, embeds advanced forensic tools and techniques for attack reconstruction, provides engineering recommendations, and resolves integration/testing issues. May interface with external entities including law enforcement, and intelligence/government agencies.
Conducts risk assessments and provide recommendations for application design. Experience in a wide range of security issues including architectures, firewalls, electronic data traffic, and network access. Analyses are performed at all levels of total system product to include: concept, design, fabrication, test, installation, operation, maintenance, and disposal.
Provides support for cross-agency security initiatives such as Trusted Internet Connection (TIC) compliance, Information Security Continuous Monitoring Mitigation (ISCM), Identity, Credential, and Access Management (ICAM), Anti-Phishing & malware defense (APMD), and Continuous Diagnostics and Mitigation (CDM).
Perform protocol analysis and possesses knowledge of LAN and WAN data communications protocols (TCP/IP, IPv6, MPLS).
Conducts risk assessment and provides recommendations for application design. Can manage and support a wide range of security issues including architectures, firewalls, electronic data traffic, and network access. Analyses are performed at all levels of total system product to include: concept, design, fabrication, test, installation, operation, maintenance, and disposal. Uses encryption technology, penetration and vulnerability analysis of various security technologies, and information technology security research.
Provides consultation for recommendations for new equipment and services to purchase and works with various vendors for procurement. Required qualifications to be successful in this role
Bachelor's Degree is required plus 2-5 years of experience in computer security or network management and engineering including implementing and deploying a variety of security measures, technologies, and tools to protect and manage networks and systems. Responsible for integration and implementation of the computer system security solution.
Possesses superior oral and written communications skills to clearly and effectively convey issues, reports, and other deliverables to SSA counterparts.
Possesses expert knowledge of Federal laws and regulations, directives, instructions, policy, standards, and guidance, so that requirements support security and privacy compliance. Possesses expert knowledge of FedRAMP requirements and guidance.
Possesses expert knowledge of the Federal Cybersecurity Strategy and Implementation Plan (CSIP) (refer to OMB M-16-04) and related OMB and DHS cyber security initiatives to align business process and requirements with cross-Agency goals. Possesses expert knowledge of IT and Financial Management laws and OMB circulars, and the Federal Information System Controls Audit Manual (FISCAM).
Experienced of network/security engineering with experience in managing networks or security in large national organizations with large user populations.
Experience and the ability to support a large scale LAN /MAN/WAN, voice and telecommunications development, engineering, operations and maintenance. Including but not limited to topologies, configurations, network/security analyses, operations and maintenance, routing, switch management, configuration, traffic analysis, etc.
Experience with the administration of the network infrastructure to include desktop PCs; servers; network equipment, including DASD; and software applications.
Experience identifying, assessing, and recommending appropriate solutions related to SSA systems/network technologies.
Possesses experience with Windows XP/VISTA/2003 Server platforms with an emphasis on Active Directory (AD); strong background in Exchange 2003/2007 messaging system; and Windows scripting skills.
Has expertise in Windows XP/VISTA/2003 Server platforms and AD; strong background in Exchange 2003/2007 messaging system; and Windows scripting skills necessary to support network and desktop environments.
Possesses solid knowledge of LAN/MAN/WAN configurations, to include experience with Cisco routers and switches, Internet firewalls, Load Balancers, Network Access Control, and wireless technologies. Experience setting up and managing database systems, such as SQL Server.
Experience with unified communications systems, can consult on enterprise options and Quality of Service (QOS) schemes.
Experience leading teams to manage security environment and perform intrusion detection, vulnerability and risk analysis, and assisting or participating in a variety of computer security penetration studies during all phases of the SDLC.
Experience in leading teams to engineer, and manage all facets of network development, management, security, operations including fault management, configuration control, performance monitoring, de and activations, back-ups, and provide service (re)starts.
Experience in providing advice in support of network or security analyses, briefings, reports, consultations, problem resolution, user assistance, and preparing white papers and other research.
Experience and the ability to support and/or direct the work of specialists engaged in total Direct Access Storage Device (DASD) operations, management of batch production DASD pools, DASD backup/ error recovery maintenance responsibilities, and batch production program and procedural library updates and maintenance. Also, supports developing, maintaining, and monitoring procedures for server backups.
Experience and can lead/support a large organization's desktop and network environments including the planning, design, documentation, and deployment of various systems to manage desktop PC's, servers, network equipment, and software applications. Also provides support for monitoring, planning, and coordinating the distribution of client/server software and service packs. Can provide on-call support or emergency on-site support and resolution activities related to desktop, security and network O&M.
Experience and ability to support or administer network, security and desktop/server infrastructure to include desktop PCs; servers; network equipment, including DASD; and software applications.
Ability and experience to design, test, and perform implementation of state-of-the-art secure operating systems, networks, and database products.
Experience and ability to support and advise on securing information resources and/or providing business continuity assurance for the Agency.Desired Certifications: Certified Authorization Professional (CAP), Certified Cyber Forensics Professional (CCFP), Certified Cloud Security Professional (CCSP), Certified Information Systems Security Professional (CISSP), Certified Secure Software Lifecycle Professional (CSSLP), HealthCare Information Security and Privacy Practitioner (HCISPP), or Systems Security Certified Practitioner (SSCP), or networking certifications from Cisco or other organizations (CCNP, CCIE, JNCIE-ENT, CompTIA Network+, WCNA, etc.) Build your career with us.
It is an extraordinary time to be in business. As digital transformation continues to accelerate, CGI is at the center of this change--supporting our clients' digital journeys and offering our professionals exciting career opportunities.
At CGI, our success comes from the talent and commitment of our professionals. As one team, we share the challenges and rewards that come from growing our company, which reinforces our culture of ownership. All of our professionals benefit from the value we collectively create.
Be part of building one of the largest independent technology and business services firms in the world.
Learn more about CGI at www.cgi.com.
No unsolicited agency referrals please.
CGI is an equal opportunity employer.
Qualified applicants will receive consideration for employment without regard to their race, color, religion, sex, gender Identity, sexual orientation, national origin, age, disability, veteran status, pregnancy, or other status protected by law. CGI will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. However, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by the employer, or (c) consistent with CGI's legal duty to furnish information.