Information Assurance Security Engineer (I)

  • Full-time

Company Description

We provide our federal customers with an exciting variety of IT and Intelligence services. In order to achieve our company growth goals, continually surpass our customer’s expectations and provide new opportunity for our employees, Metronome must attract the most professional and qualified employees.

Metronome believes in a strong company culture rooted in its core values and belief in our overall mission. We believe in supporting one another, exceeding our customer’s expectations, executing with passion and celebrating all successes. We work hard and encourage one another to have fun doing it.

Metronome is looking for individuals who also believe in these core set of values, those who yearn to support our nation’s vital projects and those who desire to work for a fast growing small business that appreciates each employees’ contributions and trusts them to make decisions while representing Metronome…those who Keep Projects Pulsing.

All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, pregnancy, sexual orientation, gender identity, national origin, age, protected veteran status, or disability status.

Metronome is committed to providing reasonable accommodations to employees and applicants for employment, to assure that individuals with disabilities enjoy full access to equal employment opportunity (EEO). Metronome shall provide reasonable accommodations for the known physical or mental limitations of qualified employees and applicants with disabilities, unless Metronome can demonstrate that a particular accommodation would impose an undue hardship on business operations. Applicants requesting a reasonable accommodation may make a request.

Job Description

The IA Security Engineer provides expert technical services on all aspects of Information Security and is responsible for writing information security policy drafts, writing and reviewing Memoranda of Agreement and coordinating and managing all aspects of Certification and Accreditation. The successful candidate will advise and assess system design/architecture and define, design and evaluate information security systems. Tasking includes incident response, system access approval, audit log reviews, Configuration Control Boards and daily consultations/consulting on a wide variety of security issues.

DUTIES

  • Manages multi-agency information sharing and integration security
  • Maintains affiliations with high-level personnel, at multiple agencies and organizations involved in Information Security
  • Reports, documents and investigates all security-related incidents
  • Assists with the development and implementation of corrective measures
  • Performs all procedures necessary to ensure the safety of information systems assets, and to protect systems from intentional or inadvertent access or destruction
  • Performs Computer Security Incident Response activities for a large organization and coordinates with other government agencies to record and report incidents
  • Monitors and analyzes Intrusion Detection Systems (IDS), to identify security issues for remediation
  • Recognizes potential, successful, and unsuccessful intrusion attempts and compromises, thorough reviews and analyses of relevant event details and summary information
  • Evaluates firewall change requests and assesses organizational risk
  • Communicates alerts to agencies, regarding intrusions and compromises to their network infrastructure, applications and operating systems
  • Assists with the implementation of counter-measures and mitigating controls
  • Ensures the integrity and protection of networks, systems, and applications through the technical enforcement of organizational security policies and monitoring vulnerability scanning devices
  • Performs periodic and on-demand system audits and vulnerability assessments, including user accounts, application access and file system and external Web integrity scans to determine compliance
  • Prepares incident reports of analysis methodology and results
  • Serves as a technical team or task leader
  • Maintains current knowledge of relevant technology as assigned and participates in special projects as required
  • Defines, plans, designs, and evaluates information security systems
  • Assesses architecture and current hardware limitations, and defines and designs system specifications, input/output processes and working parameters for hardware/software compatibility
  • Performs a variety of complex tasks associated with information security, ranging from the design of security components to complex architectures
  • Supervises the work of other engineers, performing a variety of information security tasks
  • Acts as the representative of the Information System Security Manager, ensuring compliance with IS security procedures
  • Supports efforts to operate, maintain, and dispose of information system materials, in accordance with security directives, policies and practices, and as annotated in Systems Security Plans
  • Generates and implements the requisite security training, ensuring user security awareness of responsibilities prior to system access
  • Initiates protective and corrective measures, when incidents or vulnerabilities are discovered
  • Ensures that IA hardware and software complies with security configuration guides
  • Implements and enforces IA policies and procedures, as defined by A&A documentation
  • Ensures that users are aware of their IA responsibilities
  • Performs Operations & Sustainment (O&S) functions for the network security infrastructure (firewalls, web gateways, mail gateways, ids, load balancers, performance monitoring tools, management systems, etc.)
  • Performs maintenance and/or advanced configurations of equipment, to protect the network from emerging cyber threats
  • Conducts forensic traffic/log analyses, to isolate issues or respond to analyst alerts
  • Responds to escalated troubleshooting requests
  • Maintains and administers network infrastructure standards, documentation and fault tolerance
  • Presents Monitoring/Test Results and Reports as required
  • Performs/supports integration testing and participates in special projects as required
  • Executes remediation processes, to implement technical solutions to address vulnerability findings, via ACAS security scan
  • Works with developers, system engineers, project managers, and users, to identify the level of protection systems will need
  • Understands and identifies what group or process will satisfy security requirements

Qualifications

  • Government clearance required
  • Bachelor’s Degree in Computer Science or a related technical discipline, or the equivalent combination of education, professional training or work experience
  • 10-15 years of related experience in data security administration
  • Candidate must have knowledge of and experience with ICD 503 and be familiar with Cloud Infrastructure/AWS-based solutions
  • Candidate must possess IAM II certification to start, in accordance with DOD 8570.1M. This position is defined as in 8570.1M chapter 4, page 35. Candidate is required to understand how our customer's RMF process works and how systems security requirements will be met
  • Candidate will work with all IT groups, to build IT systems with security planned from the start
  • Ability to work on multiple projects/tasks at once, and operates in a dynamic, fast-paced, team-oriented environment
  • Ability to review Plan of Action and Milestones (POA&Ms) and conduct a technical decomposition categorization, remediation, and lien resolution
  • Experience installing, hardening, deploying, documenting, and troubleshooting network perimeter security technologies
  • Experience with Cloud Infrastructure/AWS-based technology
  • Experience using security tools such as ACAS, HBSS, Carbon Black, Tanium, RedSeal, and EMET
  • Experience and scripting ability on Unix and/or RHEL OS
  • Experienced with complex Microsoft macros and PowerShell scripts
  • Basic understanding of Windows Enterprise AD architecture and VMware Virtualization
  • Must be proficient in network routing/vLAN technology
  • CISSP certification or equivalent (CAP, GSLC, CISM) desired
  • System administration and network engineering experience desired
  • System design and development experience desired

Additional Information

Core Values

Passion - We believe.  We execute with all we have.
Improving - We surpass our best efforts.
Teammates - We respect and support one another.
Mission - We align with our customers’ objectives.
Celebrate Success - We reward all achievements.