What are the responsibilities and job description for the CYBER SECURITY ENG III position at Phoenix Defense?
The Cyber Security Engineer will provide critical support to the Joint Land Component Constructive Training Capability (JLCCTC) Cybersecurity team, assisting the Information Systems Security Manager (ISSM) across all cybersecurity domains. This role involves designing and implementing security engineering solutions to ensure compliance with Information Assurance (IA) and Information Security (InfoSec) standards throughout the lifecycle of the program. The selected candidate will be responsible for identifying and mitigating system security threats and risks, validating security requirements, and supporting the development of Risk Management Framework (RMF) assessment and authorization documentation. Additional duties include ensuring the secure operation and maintenance of systems, performing Assessments & Authorizations (A&As) for DoD systems, and working in a fast-paced environment with multiple releases and system baselines.
ESSENTIAL DUTIES / RESPONSIBILITIES:
- Collaborate with the security team to address assigned cybersecurity aspects of the JLCCTC program.
- Design, implement, and assess security solutions in accordance with IA and InfoSec principles.
- Identify, assess, and mitigate security risks throughout the program lifecycle.
- Validate system security requirements and provide input for RMF documentation and processes.
- Support the secure operation and ongoing maintenance of systems.
- Collaborate on A&As on DoD systems and ensure compliance with security standards.
- Work effectively in a fast-paced environment with overlapping releases and multiple system baselines.
MINIMUM QUALIFICATIONS:
- Three or more years of working on a Government system and Risk Management Framework.
- Strong written and verbal communication skills.
- Ability to work with multiple systems in a dynamic and high-demand environment.
- Hands-on experience with either Windows, Linux, or VMware operating systems.
- Familiarity with vulnerability scanning tools such as STIG Viewer, ACAS, and Nessus.
- Knowledge of DISA STIGs and Information Assurance Vulnerability Management (IAVM) processes.
- Valid IAM II or other relevant DoD 8570/8140 certification (IAT II/IAM II) or the ability to obtain within six months of hire.
- Ability to travel to both domestic and overseas (OCONUS) sites.
- Experience leading Cybersecurity Working Groups.
- Ability to acquire TS/SCI security clearance.
- Detailed oriented – focus on accuracy of records, data, and reports
- Ability to work well in a team environment
- Significant experience in MS Office 365 Products (SharePoint, Word, Excel, PowerPoint and Access)
Preferred Qualifications:
- Experience with constructive simulation training environments.
- Experience working with RMF/NIST standards and implementing their requirements.
- Proven ability to manage processes independently with minimal direction.
- Ability to analyze and act on findings from vulnerability scanning tools (e.g., Nessus, SCAP).
- Strong customer interface skills