Information Security Systems Engineer (I)

  • Full-time

Company Description

We provide our federal customers with an exciting variety of IT and Intelligence services. In order to achieve our company growth goals, continually surpass our customer’s expectations and provide new opportunity for our employees, Metronome must attract the most professional and qualified employees.

Metronome believes in a strong company culture rooted in its core values and belief in our overall mission. We believe in supporting one another, exceeding our customer’s expectations, executing with passion and celebrating all successes. We work hard and encourage one another to have fun doing it.

Metronome is looking for individuals who also believe in these core set of values, those who yearn to support our nation’s vital projects and those who desire to work for a fast growing small business that appreciates each employees’ contributions and trusts them to make decisions while representing Metronome…those who Keep Projects Pulsing.

All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, pregnancy, sexual orientation, gender identity, national origin, age, protected veteran status, or disability status.

Metronome is committed to providing reasonable accommodations to employees and applicants for employment, to assure that individuals with disabilities enjoy full access to equal employment opportunity (EEO). Metronome shall provide reasonable accommodations for the known physical or mental limitations of qualified employees and applicants with disabilities, unless Metronome can demonstrate that a particular accommodation would impose an undue hardship on business operations. Applicants requesting a reasonable accommodation may make a request.

Job Description

The Information Security Systems Engineer performs all procedures necessary to ensure the safety of information systems assets and to protect systems from intentional or inadvertent access or destruction. The candidate will provide recommendations and ensure compliance with IS security procedures for all AIT systems.

DUTIES

  • Completes ITDR plans for approximately 180 systems
  • Coordinates with Engineers to obtain correct information, to complete the ITDR plan within requirements
  • Coordinates with Engineers, to complete ITDR tabletops and after-action reports
  • Engages in Engineering Change Proposal meetings with AIT Engineers and AIT Business Office teams, to ensure that security is being addressed when developing new AIT systems
  • Collaborates with OCIO, regarding any system changes that could introduce potential security vulnerabilities into our environment, to decide the best course of action to proceed in order to both meet our customer's mission by keeping systems operational and meet all security policies and procedures
  • Manages security packages for approximately 180 AIT systems, as they proceed through the certification and accreditation (or authorization and accreditation) process, using XACTA as the documentation repository to maintain all relevant documents with OCIO
  • Provides security control analysis, using a Security Control Traceability Matrix, as required by DNI ICD 503, CNSS, NIST special publications, FISMA, FIPS, OMB, etc. for all AIT managed national security systems during the accreditation process, by performing documentation review (system CONOPS, network diagrams, NCE and OCIO policies), interviewing key organizational personnel, and presenting the findings in XACTA for OCIO review and authorization
  • Composes Body of Evidence required documentation (system security plans, security categorizations, risk assessments, network diagrams, business impact analysis, etc.)
  • Performs Computer Security Incident Response activities for a large organization and coordinates with other government agencies to record and report incidents
  • Monitors and analyzes Intrusion Detection Systems (IDS), to identify security issues for remediation
  • Recognizes potential, successful, and unsuccessful intrusion attempts and compromises, thorough reviews and analyses of relevant event details and summary information
  • Evaluates firewall change requests and assesses organizational risks
  • Communicates alerts to agencies, regarding intrusions and compromises to their network infrastructure, applications and operating systems
  • Assists with the implementation of counter-measures or mitigating controls
  • Ensures the integrity and protection of networks, systems, and applications, through the technical enforcement of organizational security policies and monitoring vulnerability scanning devices
  • Performs periodic and on-demand system audits and vulnerability assessments, including user accounts, application access, file system and external Web integrity scans, to determine compliance
  • Prepares incident reports of analysis methodology and results
  • Provides guidance and work leadership to less-experienced technical staff members, and may have supervisory responsibilities
  • May serve as a technical team or task leader
  • Maintains current knowledge of relevant technology as assigned and participates in special projects as required

Qualifications

  • Government clearance required
  • Bachelor’s Degree in Computer Science or a related technical discipline, or the equivalent combination of education, professional training or work experience
  • 8-10 years of related experience in data security administration
  • 2-4 years with DoD certification and accreditation processes
  • 2-4 years with DOD ITDR, tabletops, Coop, or BCP planning
  • 2-4 years developing and reviewing System Security Plans, Risk Assessment Reports, ST&E (SCTM) Reports, Contingency Plans, Disaster Recovery Plans, Privacy Impact Assessments, IT Security procedures, and other supporting documentation
  • Certified Information System Security Professional (CISSP), Security+ certification, or other DoD 8570.1 Level I or II certification(s)
  • Ability to update and deliver on all DoD IA documentation
  • Ability to conduct audits on systems controls, to determine if standards and annual procedures are being performed to standards
  • Advanced the knowledge of systems engineering principles, methods, and techniques
  • Ability to interface with the customer on a consistent basis, and exercise sound judgment and problem solving
  • Candidate must possess IAM I or II certification to start in accordance with DOD 8570.1M. This position is defined as in 8570.1M chapter 4, page 35. Candidate is required to understand how our customer's DCID 6/3 and ICD 503 process work and how systems security requirements will be met
  • Knowledge of and experience with DCID 6/3 and ICD 503 and the customer's security requirements is desirable, supporting systems going through the system accreditation process
  • Experience with completing ITDR plans and ITDR tabletops is required
  • Ability to support core hours in support of our customers
  • Basic understanding of Windows Enterprise AD architecture and VMware Virtualization
  • CISSP, Security + certification or equivalent (CAP, GSLC, CISM)

Additional Information

Core Values

Passion - We believe.  We execute with all we have.
Improving - We surpass our best efforts.
Teammates - We respect and support one another.
Mission - We align with our customers’ objectives.
Celebrate Success - We reward all achievements.