Id: 178892 Location: Atlanta, GA Job Type: Contract to Hire Secure Infrastructure Support Engineer
Our client, a leader in software and hardware solutions, is searching for a knowledgeable, motivated and hardworking Cyber Security professional to join their team. This individual will integrate and deploy sponsored project systems and support networks. They will also provide unit level support in the installation, operation and maintenance of computer systems. This professional will be expected to utilize a set of derived system specifications to implement secure, compliant systems in support of multiple sponsored research projects, as well as address a wide variety of applications that involve highly complex issues. They will also be expected to perform full system documentation under RMF, securing and updating systems using Security Technical Implementation Guides, and deploying system updates to hardware and software.
Performing basic networking and switching configurations.
Creating specifications and security profiles for secure IT systems based on customer, DoD, and GTRI requirements, with a forward focus of automating via scripting
Interpreting technical controls from the DAAPM and JSIG, providing IT solutions to security requirements.
Implementing secure IT systems based on the above criterion.
Utilize PowerShell or other scripting languages to perform automation.
Installing, maintaining and upgrading workstation and peripheral hardware and software within a secure space.
Performing flaw remediation under RMF Continuous Monitoring requirements, including scanning, remediation, and validation.
Analyzing and resolving complex workstation, application and server related problems.
Providing users with assistance in working in specific applications.
Participating in the development of standard operating procedures.
Performing other related duties as assigned.
Education & Length of Experience
Research Engineer/Scientist/Technologist/Associate I
A Bachelor's degree in Information Technology, Computer Science, Information Security, or Information Assurance.
Research Engineer/Scientist/Technologist/Associate II
A Master's degree in Information Technology, Computer Science, Information Security, or Information Assurance and three (3) years of relevant full-time experience after completion of that degree,
A Master's degree in Information Technology, Computer Science, Information Security, or Information Assurance and five (5) years of relevant full-time experience after completion of a Bachelor's degree, or
A Doctoral degree in Information Technology, Computer Science, Information Security, or Information Assurance.
Required Minimum Qualifications
Candidates currently enrolled in an accredited Bachelor's degree program relevant to this position will be considered. Candidate must have a graduation date of no later than December, 2019
Education : Bachelor's degree or equivalent combination of education and experience
Work Experience : 1-2 years job related experience
Certifications : Must be willing to obtain Security+ or CISSP within 6 months of hire
Skills : Candidate must have experience working in and creating virtual machine environments, experience implementing Security Technical Implementation Guidelines, and performing Security Control Automation Protocol scans for systems under RMF approval. This job requires advanced knowledge of and skill in the installation and maintenance of information technology hardware and software, requiring a full understanding of industry practices and campus policies and procedures. Included are skills in problem solving, decision making, customer service, system documentation and communications.
Education: Bachelor's degree in Information Technology or equivalent combination of education and experience
Work Experience: 2-3 years job related experience.
Certifications: Security+ or CISSP, Amazon Web Services Certified Solutions Architect
Skills: Experience with cloud computing such as Amazon Web Services, experience with Windows Server 2016, Red Hat Enterprise, Microsoft Hyper-V; Enterprise Antivirus tools; Nessus or other vulnerability scanning tools; ITSM tools to include service desk, work-flow management, and wiki documentation
Secret or Top Secret clearance.