System Engineer 3
Company: Leidos
Location: Catonsville
Posted on: May 25, 2023
|
|
Job Description:
Description As a Senior Systems Engineer you will be responsible
for researching, gathering requirements and developing use cases
and building prototype solutions for discovery mission customers
with an eye towards corporate services adoption. Familiarity with
the customer's capabilities organization is preferable for this
position. Customer relations and use cases will drive the timetable
and possibly development efforts in order to transition those users
from an R&D environment to corporate services. This position
requires an innovative thinking with a knack for developing
solutions within the realm of possibility for R&D efforts in a
data center environment. The candidate will often require
interaction with personnel from various organizations inside and
out of Operations. This job is perfect for someone who wants to
lead and/or be part of a Focused Effort team that constantly
strives to architect/engineer open, component-based technological
solutions in a fast paced, highly collaborative, challenging
environment for the customer. Candidate must be able to perform
Linux Admin and Application installation/config/setup duties in a
prototype development and evaluation lab on customer site. The
candidate must be a self-starter and be able to work with
integrated engineering, software and security teams as well as
independently. Must come to the position with solid foundation of
current technologies, and be able to learn new HW and SW
technologies quickly. Must be able to interface with multiple
customer POCs and brief customer leadership. -Basic Qualifications
- - - - - - - - - Eighteen (18+) years of general experience in
computer science, computer engineering, engineering, mathematics,
or related discipline. - - - - - - - - At least ten (10) years of
experience in engineering and program processes (CM, QA, risk
management, reporting) software development methodologies,
planning, designing, and analyzing processing and storage retrieval
systems on a mid- to large-scale. - - - - - - - - Minimum IAT level
I certification - - - - - - - - A bachelor's degree in electrical
engineering, math, computer science, or computer engineering may be
substituted for four (4) years of general experience. A master's
degree in computer science, engineering, mathematics, or a related
discipline may be substituted for two years of general experience.
- -Preferred Qualifications -Provide support to senior ISSOs for
implementing, and enforcing information systems security policies,
standards, and methodologies . - - - - - - - - Assist in the
evaluation of security solutions to ensure they meet security
requirements for processing classified information - - - - - - - -
Assist with the CM for information system security software,
hardware, and firmware - - - - - - - - Assist with preparation and
maintenance of documentation - - - - - - - - - Maintain records on
workstations, servers, routers, firewalls, intelligent hubs,
network switches, etc. to include system upgrades - - - - - - - -
Evaluate security solutions to ensure they meet security
requirements for processing classified information - - - - - - - -
Propose, coordinate, implement, and enforce information systems
security policies, standards, and methodologies - - - - - - - -
Maintain operational security posture for an information system or
program Provide support to the Information System Security Manager
(ISSM) for maintaining the appropriate operational IA posture for a
system, program, or enclave - - - - - - - - Develop and maintain
documentation for C&A in accordance with ODNI and DoD policies
- - - - - - - - Develop and update the system security plan and
other IA documentation - - - - - - - - Provide CM for
security-relevant information system software, hardware, and
firmware Assist with the management of security aspects of the
information system and perform day-today security operations of the
system - - - - - - - - Develop system security policy and ensures
compliance Administer the user identification and authentication
mechanism of the Information System (IS) -Desired Skills and
Experience (in as many areas as possible) -The ISSO leads a team of
ISSOs that provides support for a program, organization, system, or
enclave's information assurance program. - - - - - - - - Provides
support for proposing, coordinating, implementing, and enforcing
information systems security policies, standards, and
methodologies. - - - - - - - - Maintains operational security
posture for an information system or program to ensure information
systems security policies, standards, and procedures are
established and followed. - - - - - - - - Assists with the
management of security aspects of the information system and
performs day-to-day security operations of the system. - - - - - -
- - Evaluate security solutions to ensure they meet security
requirements for processing classified information. - - - - - - - -
Performs vulnerability/risk assessment analysis to support
certification and accreditation. Provides configuration management
(CM) for information system security software, hardware, and
firmware. - - - - - - - - Manages changes to system and assesses
the security impact of those changes. Prepares and reviews
documentation to include System Security Plans (SSPs), Risk
Assessment Reports, Certification and Accreditation (C&A)
packages, and System Requirements Traceability Matrices (SRTMs). -
- - - - - - - Provide support for implementing and enforcing
information systems security policies, standards, and
methodologies. - - - - - - - - Assist in the evaluation of security
solutions to ensure they meet security requirements for processing
multiple types information. - - - - - - - - Assist with the CM for
information system security software, hardware, and firmware.
Maintain records on workstations, servers, routers, firewalls,
intelligent hubs, network switches, etc. to include system
upgrades. - - - - - - - - Evaluate security solutions to ensure
they meet security requirements for processing classified
information. - - - - - - - - Maintain operational security posture
for an information system or program. Provide support to the
Information System Security Manager (ISSM) for maintaining the
appropriate operational IA posture for a system, program, or
enclave. - - - - - - - - Develop and maintain documentation for
C&A in accordance with ODNI and DoD policies. - - - - - - - -
Develop and update the system security plans and other IA
documentation. - - - - - - - - Provide CM for security-relevant
information system software, hardware, and firmware. - - - - - - -
- Develop system security policy and ensure compliance. Administer
the user identification and authentication mechanisms of the
Information System (IS). - - - - - - - - Scanning Compliance:
Conduct security scans of the ISs under their purview to highlight
security weaknesses and maintain record of devices. The ISSO will
use the security scans to ensure that patching has been applied to
the ISs and use the security scans to prove security compliance. -
- - - - - - - STE Compliance: Monitor and evaluate Secure The
Enterprise (STE) compliance for the ISs under their purview. Ensure
that the IS maintains STE compliance, working with SAs and
programmers to fix STE non-compliance items -Pay Range:Pay Range
$118,300.00 - $182,000.00 - $245,700.00The Leidos pay range for
this job level is a general guideline only -and not a guarantee of
compensation or salary. Additional factors considered in extending
an offer include (but are not limited to) responsibilities of the
job, education, experience, knowledge, skills, and abilities, as
well as internal equity, alignment with market data, applicable
bargaining agreement (if any), or other law.
Keywords: Leidos, Catonsville , System Engineer 3, Other , Catonsville, Maryland
Click
here to apply!
|