What are the responsibilities and job description for the Software Systems Engineer position at Cognosante?
What is the position ?As a Software System Engineer / Configuration Manager your duties will include current and new systems at various lifecycle stages, and any future applications / systems not currently identified. DCO services are required to defend against unauthorized activity on all Army assets residing on the NIPRNet, SIPRNet, and CENTRIXS-K. This includes activities from external hackers who may attempt to gain unauthorized access, insider threats attempt for unauthorized access, and policy violations that may impact network security and operations. The System Engineer is required to continue performance during peacetime, crisis, hostilities, and war operations.What will I get to do? You will be required to apply engineering and analytical disciplines to identify, document, and verify the functional, performance, and physical characteristics of systems and associated systems, to control changes and nonconformance, and to track actual configurations of systems and platforms. You will provide content management on web portals and web applications located on NIPRNet, SIPRNet, and CENTRIXS-K. Ensure the information posted is relevant to the current cyberspace operations climate. utilize the web portals to provide cyber situational awareness of evolving network trends and threats, as well as ongoing incident status updates. You will apply engineering and analytical disciplines to identify, document, and verify the functional, performance, and physical characteristics of systems and associated systems, to control changes and nonconformance, and to track actual configurations of systems and platforms. You will have to recognize a cyber security incident, taking appropriate action to report the incident and preserve evidence, mitigating any adverse impact. You will support Disaster Recovery (DR) and Continuity of Operations (COOP) Capability. You will support Cybersecurity Service Provider (CSSP) accreditation. You will conduct monthly training on specific DCO topics derived from previous incident analysis, security testing, lessons learned, and other self-directed research / study.You will synchronize DCO programs with ARCYBER personnel as required via working group participation to develop, research, publish, test, and annually update Deliverables, Standard Operating Procedures and Tools, Tactics, Techniques and Procedures (TTTP) related to Cyber Defense, Live Incident Handling Analysis, Cyber Threat Analysis, Threat Detection, Computer Defense Assistance Program (CDAP), and the Cyber Intrusion Analysis Program (CIAP). You will make recommendations for software tool development or upgrade (may include supported hardware) in support of internal defensive measure to narrow gaps within existing enterprise solutions. You will utilize the Enterprise SIEM to create and / or maintain an Incident Application used to document all incident investigation requirements and facilitate incident reporting through ARCYBER.You will coordinate, de-conflict, and employ internal defensive measures within the DoDIN. You will assess new technologies and devices relevant to DCO and provide situational awareness of evolving network threats trends. You will participate in exercises and assist with the development, planning and support of exercises such as Gaining Cyber Dominance or other cyberspace defense engagements. You will support Cyberspace Operations (CO) and DCO mission planning, mission analysis, and technical analysis. You will provide situational awareness of evolving network threats trends. You will Participate in ARCYBER Cyberspace Operations (CO) meetings, conferences, and working groups. You will analyze and correlate anomalous events identified in, Security Information Event Management (SIEM) systems, Big Data Analytics, and supporting devices / applications.Conduct Change Management activities within the scope of the Change Management Policy, Plan, and SOP. You will make recommendations for software tool development or upgrade (may include supported hardware) in support of internal defensive measure to narrow gaps within existing enterprise solutions. Develop software tools through computer programming and reverse engineer software provided by other sources for possible re-utilization.You will conduct SACM activities within the scope of the RCC SACM Management Policy, Plan, and SOP.You will define and control the infrastructure and maintain accurate configuration information on the historical, planned, and current state of service assets and configuration items.What qualifications do I need?Active DoD TS / SCI clearanceBachelor’s degree or higher from an accredited college or university (Computer Science, Cyber Security, Information Technology, Software Engineering, Information Systems, or Computer Engineering degree; or a degree in a Mathematics or Engineering field).GFACT or CEH or Cloud or CySA or PenTest or SSCP or Security or GSEC certification can be substituted for a Bachelor’s degree.If substituting certification for a Bachelor’s degree, a HS diploma or GED is required in addition to the certification.What additional characteristics will help me thrive? 3-8 years of experienceExperience working independently to solve problems quickly and completely.Experience leading the work of others.What We Offer Our mission is to provide comprehensive and competitive pay, benefits, services, and programs to eligible employees and their dependents that : Ensure optimal health and productivity of our employees Support employee retention and attraction Provide work / life balance to ensure our employees succeed inside and outside of the office Compensation$74,436.56 - $119,096.32
Salary : $74,437 - $119,096