Description
As a Senior Systems Engineer you will be responsible for researching, gathering requirements and developing use cases and building prototype solutions for discovery mission customers with an eye towards corporate services adoption. Familiarity with the customer’s capabilities organization is preferable for this position. Customer relations and use cases will drive the timetable and possibly development efforts in order to transition those users from an R&D environment to corporate services. This position requires an innovative thinking with a knack for developing solutions within the realm of possibility for R&D efforts in a data center environment. The candidate will often require interaction with personnel from various organizations inside and out of Operations. This job is perfect for someone who wants to lead and/or be part of a Focused Effort team that constantly strives to architect/engineer open, component-based technological solutions in a fast paced, highly collaborative, challenging environment for the customer. Candidate must be able to perform Linux Admin and Application installation/config/setup duties in a prototype development and evaluation lab on customer site. The candidate must be a self-starter and be able to work with integrated engineering, software and security teams as well as independently. Must come to the position with solid foundation of current technologies, and be able to learn new HW and SW technologies quickly. Must be able to interface with multiple customer POCs and brief customer leadership.
Basic Qualifications
· Eighteen (18+) years of general experience in computer science, computer engineering, engineering, mathematics, or related discipline.
· At least ten (10) years of experience in engineering and program processes (CM, QA, risk management, reporting) software development methodologies, planning, designing, and analyzing processing and storage retrieval systems on a mid- to large-scale.
· Minimum IAT level I certification
· A bachelor’s degree in electrical engineering, math, computer science, or computer engineering may be substituted for four (4) years of general experience. A master’s degree in computer science, engineering, mathematics, or a related discipline may be substituted for two years of general experience.
Preferred Qualifications
Provide support to senior ISSOs for implementing, and enforcing information systems security policies, standards, and methodologies .
· Assist in the evaluation of security solutions to ensure they meet security requirements for processing classified information
· Assist with the CM for information system security software, hardware, and firmware
· Assist with preparation and maintenance of documentation
· Maintain records on workstations, servers, routers, firewalls, intelligent hubs, network switches, etc. to include system upgrades
· Evaluate security solutions to ensure they meet security requirements for processing classified information
· Propose, coordinate, implement, and enforce information systems security policies, standards, and methodologies
· Maintain operational security posture for an information system or program Provide support to the Information System Security Manager (ISSM) for maintaining the appropriate operational IA posture for a system, program, or enclave
· Develop and maintain documentation for C&A in accordance with ODNI and DoD policies
· Develop and update the system security plan and other IA documentation
· Provide CM for security-relevant information system software, hardware, and firmware Assist with the management of security aspects of the information system and perform day-today security operations of the system
· Develop system security policy and ensures compliance Administer the user identification and authentication mechanism of the Information System (IS)
Desired Skills and Experience (in as many areas as possible)
The ISSO leads a team of ISSOs that provides support for a program, organization, system, or enclave’s information assurance program.
· Provides support for proposing, coordinating, implementing, and enforcing information systems security policies, standards, and methodologies.
· Maintains operational security posture for an information system or program to ensure information systems security policies, standards, and procedures are established and followed.
· Assists with the management of security aspects of the information system and performs day-to-day security operations of the system.
· Evaluate security solutions to ensure they meet security requirements for processing classified information.
· Performs vulnerability/risk assessment analysis to support certification and accreditation. Provides configuration management (CM) for information system security software, hardware, and firmware.
· Manages changes to system and assesses the security impact of those changes. Prepares and reviews documentation to include System Security Plans (SSPs), Risk Assessment Reports, Certification and Accreditation (C&A) packages, and System Requirements Traceability Matrices (SRTMs).
· Provide support for implementing and enforcing information systems security policies, standards, and methodologies.
· Assist in the evaluation of security solutions to ensure they meet security requirements for processing multiple types information.
· Assist with the CM for information system security software, hardware, and firmware. Maintain records on workstations, servers, routers, firewalls, intelligent hubs, network switches, etc. to include system upgrades.
· Evaluate security solutions to ensure they meet security requirements for processing classified information.
· Maintain operational security posture for an information system or program. Provide support to the Information System Security Manager (ISSM) for maintaining the appropriate operational IA posture for a system, program, or enclave.
· Develop and maintain documentation for C&A in accordance with ODNI and DoD policies.
· Develop and update the system security plans and other IA documentation.
· Provide CM for security-relevant information system software, hardware, and firmware.
· Develop system security policy and ensure compliance. Administer the user identification and authentication mechanisms of the Information System (IS).
· Scanning Compliance: Conduct security scans of the ISs under their purview to highlight security weaknesses and maintain record of devices. The ISSO will use the security scans to ensure that patching has been applied to the ISs and use the security scans to prove security compliance.
· STE Compliance: Monitor and evaluate Secure The Enterprise (STE) compliance for the ISs under their purview. Ensure that the IS maintains STE compliance, working with SAs and programmers to fix STE non-compliance items
Pay Range:
Pay Range $118,300.00 - $182,000.00 - $245,700.00The Leidos pay range for this job level is a general guideline only and not a guarantee of compensation or salary. Additional factors considered in extending an offer include (but are not limited to) responsibilities of the job, education, experience, knowledge, skills, and abilities, as well as internal equity, alignment with market data, applicable bargaining agreement (if any), or other law.
About Leidos
Leidos is a Fortune 500® technology, engineering, and science solutions and services leader working to solve the world’s toughest challenges in the defense, intelligence, civil, and health markets. The company’s 45,000 employees support vital missions for government and commercial customers. Headquartered in Reston, Virginia, Leidos reported annual revenues of approximately $14.4 billion for the fiscal year ended December 30, 2022. For more information, visit www.Leidos.com.
Pay and Benefits
Pay and benefits are fundamental to any career decision. That's why we craft compensation packages that reflect the importance of the work we do for our customers. Employment benefits include competitive compensation, Health and Wellness programs, Income Protection, Paid Leave and Retirement. More details are available here.
Securing Your Data
Beware of fake employment opportunities using Leidos’ name. Leidos will never ask you to provide payment-related information during any part of the employment application process (i.e., ask you for money), nor will Leidos ever advance money as part of the hiring process (i.e., send you a check or money order before doing any work). Further, Leidos will only communicate with you through emails that are generated by the Leidos.com automated system – never from free commercial services (e.g., Gmail, Yahoo, Hotmail) or via WhatsApp, Telegram, etc. If you received an email purporting to be from Leidos that asks for payment-related information or any other personal information (e.g., about you or your previous employer), and you are concerned about its legitimacy, please make us aware immediately by emailing us at [email protected].
If you believe you are the victim of a scam, contact your local law enforcement and report the incident to the U.S. Federal Trade Commission.
Commitment to Diversity
All qualified applicants will receive consideration for employment without regard to sex, race, ethnicity, age, national origin, citizenship, religion, physical or mental disability, medical condition, genetic information, pregnancy, family structure, marital status, ancestry, domestic partner status, sexual orientation, gender identity or expression, veteran or military status, or any other basis prohibited by law. Leidos will also consider for employment qualified applicants with criminal histories consistent with relevant laws.