Systems Engineer- Mid

  • Full-time
  • Clearance Required: Secret

Company Description

MindPoint Group delivers industry-leading cybersecurity solutions, services, and products. We are the trusted cybersecurity advisors to key government and commercial decision-makers and support security operations for some of the most security-conscious organizations globally. We design and implement innovative security solutions to identify and defend against today’s risks and tomorrow’s attacks.  

We believe that helping organizations operate from the best security posture possible requires automation.  Empowering our employees to excel and providing them with the means to do so enables us to consistently exceed our clients’ expectations. 

Unlike many IT consultancies, we’re not a body shop. Our client engagements are challenging and growth-oriented. Our relationship with you is for the long run because, in this business, your success is our success. That’s why we treat investments in employees as investments in the company itself, which is why we offer fantastic benefits (healthcare, generous PTO, paid maternity and paternity leave, and tuition reimbursement, to name a few). 

But you’ll want to work here for reasons that can’t be written into an offer letter—the challenge, growth opportunities, and most important: the culture of a company that cares about you. 

We are an established, profitable, and growing company that promises you the following: 

  • A diverse organization. 
  • A safe workplace with zero tolerance for discrimination and harassment of any kind. 
  • A balanced work life. Seriously. 
  • Potential of a flexible schedule, depending on the specific customer. 
  • A leadership team focused on your professional growth and development. 

Job Description

MindPoint Group is seeking an experienced Systems Engineer to support security operations, strategy, planning, architecture, vulnerability assessments, and remediation, and coordination with various government security entities. This includes providing analysis of requirements and design specifications, oversight of ongoing engineering activities and recommendations to fix the problems with various solutions.

The candidate should be familiar with market-leading enterprise IT and/or cybersecurity products including, but not limited to:

  • ForeScout
  • SailPoint
  • IBM BigFix
  • Tenable/Nessus/Security Center
  • Splunk
  • RSA Archer
  • RedHat/CentOS/Ubuntu/*nix
  • Windows Desktop and Server Operating Systems
  • Microsoft System Center Configuration Manager (SCCM)

The candidate will be responsible for updating system software, reviewing and applying content (AV, NIDS) updates, developing custom signatures and content, administration of firewalls, IDS, and other security system rule sets and policies. The candidate will need to have a strong knowledge of the underlying technologies that contribute to the system infrastructure and how they interact. Network, Operating Systems, Applications and Servers, and Security Hardware and Software.

Functional Responsibilities:  The candidate may perform any or all of the following:

  • Develop system security design documentation.
  • Develop network security systems and security operation center knowledge base articles, how-to documents, standard operating procedures, and policies.
  • Provide relevant technical input to the Life Cycle Cost Estimate (LCCE) through cross product team engagements.
  • Review all IT system development plans to ensure designs meet governmental regulatory standards and provide an appropriate level of protection for the client systems and data that interacts with those systems.
  • Conducts analysis of system requirements and components and performs system audits to ensure intended system functionality, operation, and performance requirements are met.
  • Develops programs, scripts, or code segments as necessary to facilitate operation, administration, maintenance, or analysis of data and systems.
  • Experience Developing system security design documentation.
  • Develop network security systems and security operation center knowledge base articles, how-to documents, standard operating procedures, and policies.
  • Design, implement, maintain, administer, and operate network security systems.
  •  Performs evaluation and review of GOTS/COTS software and systems to ensure they meet government regulatory requirements.
  •  Evaluates, installs, configures, tests, and updates network security systems and hardware.
  •  The resource will provide training and knowledge transfer on these technologies to the other operational resources team.
  •  Thorough understanding and knowledge of TCP/IP networking.
  •  Experience with network security tools such as Tenable Nessus/SecurityCenter, ForeScout, IBM BigFix, Splunk, etc.

Qualifications

  • Active Secret clearance required
  • Over 4 years engineering and deploying IT systems
  • 4+ years’ experience with NIST, FISMA, and Security Assessment & Authorization
  • Experience with security tools such as vulnerability management tools (Nessus, Retina), configuration management (Bigfix, SCCM, EPO), endpoint detection (antivirus, ATP), data loss prevention, and intrusion detection software and hardware
  • Familiar with data analysis tools (Excel or PowerBI)
  • Familiar with encryption technologies used in commercial operating systems, including Public Key Infrastructures, symmetric and asymmetric cryptography, certificate trust stores and the use of key escrow for discovery and legal purposes
  • Familiarity with the use of Transport Layer Security (TLS) to secure network communications, code signing certificates and Certificate Authorities (CA) for the administration of encryption trust certificates.
  • Familiar with multi-tiered network applications, common ports and protocols used in those communications, the Common Vulnerability System (CVS) and the exploitation mechanisms of common vulnerability types (e.g. buffer overflows, cross-site-scripting, SQL injection).
  • Ability to perform online research and comprehend attack signatures while comparing them to network traffic to perform proper analysis of detections.
  • Ability to use common tools such as Wireshark to examine network traffic.
  • Familiarity with protocols commonly used in commercial networks, such as Server Message Block (SMB), Remote Procedure Calls (RPC), Hypertext Transfer Protocol (HTTP) and Structured Query Language (SQL).
  • Ability to perform Splunk queries to examine and query log data from the Enterprise Logging as a Service system.

Additional Information

  • All your information will be kept confidential according to EEO guidelines
  • Equal Opportunity Employer Veterans/Disabled