What are the responsibilities and job description for the CYBERSECURITY ENGINEER (CI POLYGRAPH REQUIRED) position at NorthHill Technology?
NorthHill Technology Resources has a need for a Cybersecurity Engineer to support a Federal Program in Chantilly, VA. This is a direct-hire role with our client, a fast-growing Federal Integrator. Due to the nature of the work, an active TS/SCI Clearance and current CI Polygraph are required.
Cybersecurity Engineer
Cybersecurity Engineer
- Coordinating, developing and maintaining required Body of Evidence (BoE).
- Tracking and executing RMF actions to obtain / maintain valid authorizations to include:
- IATT / ATO w/PoAM submissions
- Stakeholder collaboration
- Workflow / tracking tool updates
- Executing all ConMon activities within documented timelines.
- Coordinating and collaborating across Technical and Security Services functional areas and agency stakeholders as directed / required.
- Evaluating system change requests and assessing changes to determine system and organizational risk.
- Providing recommendations for implementation of security controls and, when necessary, counter-measures or mitigating controls.
- Conducting regular / recurring reviews of system state and security posture to ensure that systems are being operated securely, and information systems security policies and procedures are being implemented as defined in security plans.
- Responding to all queries and requests for applicable security information and reports.
- Supporting investigations of computer security violations and incidents, reporting as necessary to management.
- Researching, evaluating, testing, recommending, communicating and implementing security software or devices.
- Implementing, enforcing, communicating and supporting development of security policies or plans for data, software applications, hardware, and telecommunications.
- Developing materials for computer security education/awareness programs.
- Providing recommendations to stakeholders on information assurance engineering standards, implementation dependencies, and changing information assurance related technologies.
- Engagement with and use of Enterprise Security Services tool (e.g. HBSS, ACAS, Splunk) and coordination with both Security Services and Cyber Engineering stakeholders for prioritization and remediation actions of vulnerability and compliance deficiencies.