Job Information
Insight Global Secret Sr. Information Assurance Engineer in Reston, Virginia
Job Description
The IA Engineer will perform cybersecurity authorization services, including acting as a main point of contact for cybersecurity
authorization related aspects to the assigned information systems, ensuring systems are maintained per security policies and
procedures and maintaining compliance and ongoing reporting to management. Responsibilities include:
· Serve as a primary information system security engineer (ISSE) for Authorization to Operate (ATO) packages under the
Risk Management Framework (RMF)
· Assist in the development and review of ATO submissions and coordinate all updates and corrections to assessment and
authorization (A&A) artifacts
· Evaluate software and hardware during pre-acquisition phases to determine its ability to meet minimum security
requirements based on NIST SP 800-53 Rev4 security controls.
· Author, review, coordinate and submit cybersecurity authorization required artifacts to eMASS (including change requests)
to achieve milestones such as Interim Authority to Test (IATT) and ATO in accordance with the project schedule.
· Support conducting cybersecurity authorization activities to comply with all current Cybersecurity and IA manuals,
instructions, and guides within the DoDI 8500.01, DON 5239, and Marine Corps ECSMs.
· Continuously monitor system resources through automated scanning and implement automated reporting feeds to support
cybersecurity authorizations
· Verify patch compliance using the approved technical solution (i.e., Assured Compliance Assessment Solution (ACAS)),
Information Assurance Vulnerability Alert (IAVA) compliance dashboards, and Microsoft Defender for Endpoints.
· Coordinate with local administrators to troubleshoot and elevate patching issues in a timely manner in order to meet patch
compliance timelines.
· Assist with the implementation of security procedures, and verify information system security requirements, including
coordinating the execution, review, and disposition of Security Technical Implementation Guide (STIG) checklists for
systems, applications, developed code and other components.
· Independently develop and maintain system security documentation, including drafting, reviewing, editing and
recommending guidance for Standard Operating Procedures (SOP), Tactics, Techniques, & Procedures (TTP), Plan of
Action and Milestones (POA&M) and Federal Information Security Management Act (FISMA) Score Card.
· Participate in regular briefings with the customer on cybersecurity statuses, including preparing briefing materials. Work
closely with government Cyber team to support ATO conditions and requirements
· Support site visits / audits, including System Readiness Reviews (SRR)
· Ensure secure, effective and efficient operation of network systems, architecture, and topology
· Assist with the development and application of business processes to ensure they have the appropriate level of security
· Participate in strategic network, security, and operations new technology planning
· As a cybersecurity authorization services security expert, assist the engineering managers in employing approved
defense-in-depth principles and practices (e.g., defense-in-multiple places, layered defenses, and security robustness)
Compensation: $60hr to $70hr. - Exact compensation may vary based on several factors, including skills, experience, and education.
We are a company committed to creating diverse and inclusive environments where people can bring their full, authentic selves to work every day. We are an equal opportunity/affirmative action employer that believes everyone matters. Qualified candidates will receive consideration for employment regardless of their race, color, ethnicity, religion, sex (including pregnancy), sexual orientation, gender identity and expression, marital status, national origin, ancestry, genetic factors, age, disability, protected veteran status, military or uniformed service member status, or any other status or characteristic protected by applicable laws, regulations, and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application or recruiting process, please send a request to HR@insightglobal.com .
To learn more about how we collect, keep, and process your private information, please review Insight Global's Workforce Privacy Policy: https://insightglobal.com/workforce-privacy-policy/ .
Skills and Requirements
BS degree and 8-12 years of prior relevant experience or Masters with 6-10 years of prior relevant experience in Cybersecurity, Information Security, IT, EE, Network Engineering, Computer Science, or related field.
· DoD Secret Clearance8570 IAT level III or higher · Must have complete understanding of the RMF steps, especially Steps 4 through Steps 7
· Ability to identify upon review of a system authorization boundary and its components to identify all applicable STIGs
· Ability to decompose a security control/security check and ensure the provided artifact and test result satisfies said control/AP/check
· Understanding of techniques and tactics used to exploit systems (MITRE ATTACK) to determine risk and possible mitigations
· Ability to understand technical mitigations/know resources to identify proper mitigating factors (i.e. https://attack.mitre.org/mitigations/enterprise/)
· Experience with eMASS to include control inheritance, TR Import, and POAM import functionality.
· Support conducting cybersecurity authorization activities to comply with all current Cybersecurity and IA
· Verify patch compliance using the approved technical solution (i.e., Assured Compliance Assessment Solution (ACAS)), Information Assurance Vulnerability Alert (IAVA) compliance dashboards, and Microsoft Defender for Endpoints.
· Assist with the implementation of security procedures, and verify information system security requirements, including coordinating the execution, review, and disposition of Security Technical Implementation Guide (STIG) checklists for systems, applications, developed code and other components.
· Independently develop and maintain system security documentation, including drafting, reviewing, editing and recommending guidance for Standard Operating Procedures (SOP), Tactics, Techniques, & Procedures (TTP), Plan of Action and Milestones (POA&M) and Federal Information Security Management Act (FISMA) Score Card.
· Assist with the development and application of business processes to ensure they have the appropriate level of security
· Discuss and document the Ports, Protocols and Services (PPS)
· Hands-on experience with a variety of cybersecurity tools.
· Hands-on experience in working with DoD networks.
· Experience in FISMA and other information assurance assurance-related compliance reporting.
· Attention to detail is a must
· Ability to multi-task, self-assign work in a dynamic, fast-paced environment.
· Analytical, communication and troubleshooting skills that enable proactive and effective collaboration with a virtual team, including the ability to clearly articulate status and present to both customers and program leadership.
· Experience in one of the following areas: cybersecurity assessment, vulnerability scanning, integration and testing, data analytics or security operations.
· Experience leading cybersecurity tasks and collaborate with customers, stakeholders, and team members
· Knowledge of cybersecurity assessment and authorization (A&A) and associated processes, procedures, and activities in accordance with DoDID 8500.01, DoDI 8551.01, and other applicable NIST instructions, guidelines.
· Experience supporting the formal Cybersecurity/IA testing required by government accrediting authorities and preparing System Security Plans.
· Communication abilities, both verbal and written, including business writing on complex topics. Able to reach out across different teams and disciplines to include internal/external stakeholders
· Understanding of supporting security initiatives, conducting security monitoring, reporting and maintaining security compliance following security regulations and policies.
· Knowledge of Security Engineering and Architecture, Assessment and Authorization, Vulnerability Assessment, Incident Management, Vulnerability Management, Security Operations, and Policy and Program Development
· Motivated self-starter with ability to lead and work in a matrix organization and communicate effectively with peers and program leadership · Hands-on experience in working with Cloud Authorizations
· Hands-on experience in working with NMCI and/or MCEN authorizations
· Experience with ITIL processes and/or ITIL Foundation V4 certification
· An entrepreneurial spirit with the ability to drive innovation independently; have a passion to improve at every opportunity
· Proven ability to credibly coordinate between technical teams and business stakeholders
· Willing to perform shift work null
We are a company committed to creating diverse and inclusive environments where people can bring their full, authentic selves to work every day. We are an equal employment opportunity/affirmative action employer that believes everyone matters. Qualified candidates will receive consideration for employment without regard to race, color, ethnicity, religion,sex (including pregnancy), sexual orientation, gender identity and expression, marital status, national origin, ancestry, genetic factors, age, disability, protected veteran status, military oruniformed service member status, or any other status or characteristic protected by applicable laws, regulations, andordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application or the recruiting process, please send a request to HR@insightglobal.com.
Insight Global
- Insight Global Jobs