
Engineer, Cybersecurity II
Work Location: NIWC PAC, Point Loma, CA
Work Schedule: Full-time, onsite
Security Clearance: Secret
Requisition: ECS2-001-SD
Job Summary:
The Engineer, Cybersecurity II will support the Naval Information Warfare Center Pacific (NIWC PAC) and provide In-Service-Engineering-Activity (ISEA) functions for tactical data links and related systems sponsored by PEO-C4I. The support will include the following areas of expertise: Technical Assistance, Fleet In-Service Engineering Support, Maintenance Support, In-Service Risk Management, Integrated Logistics Support, Technical Oversight of commercial/non-governmental In-Service engineering activities, Configuration Management, Readiness and Life Cycle Analysis, Technical Documentation Development and Reliability/Availability and Maintainability (RAM) reporting and metrics.
Requirements:
- Three to five years of notable experience preparing, implementing, and ensuring compliance with cybersecurity policy, to include Assessment and Authorization requirements. Experience may include plan, implement, upgrade, and/or monitor cybersecurity measures to improve cyber defense and maintain a cyber-resilient network; assess cybersecurity vulnerabilities for risks and propose and implement remediation actions or risk mitigation strategies; ensure appropriate security controls are in place that will safeguard digital files and electronic infrastructure; and respond to computer security breaches to re-establish protections and make required reports. Typical experience includes demonstrating competency in Cybersecurity, Engineering, Test & Evaluation (T&E) or Assessment & Authorization (A&A)/ Certification & Accreditation (C&A) related field. Individual shall demonstrate a working knowledge of the Risk Management Framework (RMF) process and/or include prior experience with the Defense Information Assurance & Certification Accreditation Process (DIACAP). Individual shall have experience working with Information Assurance tools such as DISA Enterprise Mission Assurance Support Service (eMASS), Assured Compliance Assessment Solution (ACAS) and may be required to hold an Interim Security Control Assessor qualification. Individual shall be familiar with security policies & guidance documents to assist with the preparation and maintenance of process artifacts, traceability documents purposed for compliance with Authority to Operate (ATO) requirements.
- Knowledge of the following data and communications link equipment and related systems: Communication Data Link System (CDLS), Network Tactical Common Data Link (NTCDL), Tactical Common Data Link (TCDL), Maritime Surface Terminal (MST), Intelligence Carry-On Program (ICOP) systems, Naval Tactical Command Support System (NTCSS), and current or future Link related systems.
- Experience in one or more of the two areas below:
- Infrastructure:
- Microsoft Windows Server installation, configuration, administration, and testing
- Microsoft Active Directory enterprise engineering, implementation, and testing
- Microsoft Exchange engineering, implementation, and testing
- Virtualization (VMware, Hyper-V, Citrix)
- Virtual Desktop environment (VDI) engineering and design
- OpenShift, Docker and Kubernetes administration and engineering
- RHEL server administration and engineering
- Microsoft SQL Server design
- Microsoft IIS design
- Backup and storage solution (NetApp, Nutanix, Veeam) engineering, design, and implementation
- Routing (OSPF, BGP, route-maps)
- Firewalls (ACLs, Policy management)
- Switching (vlans, trunking)
- Virtualization technologies and Software Define Networking (VMware, Citrix, etc.) design and implementation
- Platform/Applications:
- Proficiency with PowerShell scripting
- Scripting using BASH, PERL, Python, or similar language
- Enterprise PKI/DoD CAC and Enterprise level Access, Authentication, and Authorization (AAA) Solutions design
- Storage and backup technologies (NetApp, Nutanix, Veeam) design and implementation
- Server and application monitoring using tools such as SolarWinds and Splunk
- Microsoft WSUS design
- Microsoft OS and application installation, configuration, administration, and testing
- RHEL OS and application administration and engineering
- OpenShift, Docker and Kubernetes administration and engineering
- Bachelor’s Degree in Cybersecurity Engineering, Computer Engineering, Software Engineering, Computer Science, or Mathematics with a concentration in computer science or equivalent. (Depending on PWS tasking, individual shall be certified as Information Assurance Management (IAM) or Information Assurance Technical (IAT) or Information Assurance System Architect and Engineer (IASAE) Level I (position-based) per DoD 8570.1M.).
Salary: $100,000 – $125,000