Leidos is looking for a Senior Security Engineer (ISSE) to join a high performing agile team using the Scaled Agile Framework (SAFe) methodology to support a nationally significant and fast-paced program. Program execution follows DEVOPS best practices and employs robust development, test and production environments. Our team of security engineers support enhancements to system security architecture and cyber security capabilities; manage multiple system security plans for development, test and production systems at multiple classification levels following the Risk Management Framework (RMF); manage cross domain capabilities; and support Security Verification Testing (SVT) of relevant Type 1 devices. Leidos is the prime contractor providing system engineering, development, test, integration and operational support. This new program is focused on injecting new technology and adding advanced capabilities while continuing to support an on-going mission and operational system.
A Senior Security Engineer is needed to provide support for adding new capabilities to a complex system with exacting interface, performance and security requirements. The selected individual will become part of a team of Security Engineers working on solving challenging issues on a large, significant program. The position requires a solid understanding of security practices and policies as well as hands-on vulnerability testing experience. The program makes heavy use Public Key Infrastructure (PKI), cryptographic technologies, and cross domain solutions. The selected individual will collaborate with other engineers and technical experts in providing improvements to our operational, test, integration, and development systems.
The selected candidate will have numerous responsibilities from day to day drawn from a wide array of activities. The strongest candidates will have experience working in these areas:
- Validating and verifying system security requirements and establishing system security designs for large-scale systems, major system elements, and interfacing systems that are part of a large complex network environment with geographically distributed components.
- Identifying and implementing appropriate information security architectures and functionality to ensure uniform application of security policy and enterprise solutions.
- Recommending and developing technical solutions, products, and standards based on current and desired system security architecture.
- Assessing and mitigating system security threats and risks throughout the program life cycle.
- Leading and/or contributing to the security planning, assessment, risk analysis, risk management, certification and awareness activities for various system and networking operations.
- Effectively collaborating with other internal technical experts on a day-to-day basis.
- Communicating with Program Managers and POCs from customer organizations when necessary regarding Security issues of significant importance.
- Participating in program increment planning and related agile team activities.
- Working closely with System Engineering, Test Engineering, and Integration teams to ensure that the hardware and software architecture and implementation meets the security requirements for processing classified information.
- Analyzing and assessing system implementation against multiple security compliance policies and recommending and implementing enhancements.
- Evaluating the impact of new development on the operational security posture of the system.
- Evaluating, reviewing, and testing security-critical software.
- Proposing, assessing, coordinating, implementing, and enforcing information systems security policies, standards, and methodologies.
- Auditing and assessing system security configuration settings using common methodologies and tools.
- Managing and enforcing security strategies and policies that effect various components of the geographically distributed systems.
- Evaluating security solutions to ensure they meet customer specified requirements for processing classified information.
- Providing configuration management for security-relevant information system software.
- Serving as a subject matter expert in security architecture to include providing advice to Program Managers, Customer technical experts, and internal program teams.
- Formulating security compliance requirements for new system features.
- Identifying and remediating security issues throughout the system.
- Supporting risk assessment, risk management, security control assessment, continuous monitoring, service design, and other IA program support functions.
- Working with development teams to enrich team-wide understanding of different types of vulnerabilities, attack vectors and remediation approaches.
- Planning and conducting security verification testing of relevant type 1 devices.
Security Clearance Requirement:
- Candidates must possess an active TS/SCI with Polygraph to be considered for this role.
- Bachelor’s degree in Computer Science, Information Assurance, Information Security System Engineering, or related discipline and at least 12 years of relevant experience. Additional experience may be substituted for a Degree..
- Must have experience applying Risk Management Framework.
- Must have demonstrated knowledge of and experience with common security tools, such as Nessus, NMAP and Wireshark hardware/software security implementation, communication protocol, encryption techniques/tools, and web services.
- Must have experience with secure configurations of commonly used desktop and server operating systems.
- Must be comfortable working on multiple systems and components simultaneously in various configurations.
- Must have strong verbal and written communications skills.
- Must be committed to adopting and adhering to best practices.
- Must be able to effectively plan and prioritize tasking and communicate clearly regarding technical options and trade-offs.
- Must be capable of performing high quality work both independently and with a team in a fast-moving environment.
- Five (5) years of experience with Defense in Depth Principals/technology (including access control, authorization, identification and authentication, public key infrastructure, network and enterprise security architecture) and applying risk assessment methodology to system development.
- DoD 8570 compliance with IASAE Level 2 or 3.
- Information Systems Security Engineering Professional (ISSEP) Certification.
- Computer Information Systems Security Professional (CISSP) Certification.
- Experience developing/implementing integrated security services management processes, such as assessing and auditing network penetration testing, anti-virus planning assistance, risk analysis, and incident response.
- Experience providing information assurance support for application development that includes system security certifications and project evaluations for firewalls that encompass the development, design, and implementation.
- Experience with penetration testing tools.
- Experience with scripting languages.
Pay Range:Pay Range $118,300.00 - $182,000.00 - $245,700.00
The Leidos pay range for this job level is a general guideline only and not a guarantee of compensation or salary. Additional factors considered in extending an offer include (but are not limited to) responsibilities of the job, education, experience, knowledge, skills, and abilities, as well as internal equity, alignment with market data, applicable bargaining agreement (if any), or other law.
Leidos is a Fortune 500® technology, engineering, and science solutions and services leader working to solve the world’s toughest challenges in the defense, intelligence, civil, and health markets. The company’s 46,000 employees support vital missions for government and commercial customers. Headquartered in Reston, Virginia, Leidos reported annual revenues of approximately $14.4 billion for the fiscal year ended December 30, 2022. For more information, visit www.Leidos.com.
Pay and Benefits
Pay and benefits are fundamental to any career decision. That's why we craft compensation packages that reflect the importance of the work we do for our customers. Employment benefits include competitive compensation, Health and Wellness programs, Income Protection, Paid Leave and Retirement. More details are available here.
Securing Your Data
Beware of fake employment opportunities using Leidos’ name. Leidos will never ask you to provide payment-related information during any part of the employment application process (i.e., ask you for money), nor will Leidos ever advance money as part of the hiring process (i.e., send you a check or money order before doing any work). Further, Leidos will only communicate with you through emails that are generated by the Leidos.com automated system – never from free commercial services (e.g., Gmail, Yahoo, Hotmail) or via WhatsApp, Telegram, etc. If you received an email purporting to be from Leidos that asks for payment-related information or any other personal information (e.g., about you or your previous employer), and you are concerned about its legitimacy, please make us aware immediately by emailing us at [email protected].
If you believe you are the victim of a scam, contact your local law enforcement and report the incident to the U.S. Federal Trade Commission.
Commitment to Diversity
All qualified applicants will receive consideration for employment without regard to sex, race, ethnicity, age, national origin, citizenship, religion, physical or mental disability, medical condition, genetic information, pregnancy, family structure, marital status, ancestry, domestic partner status, sexual orientation, gender identity or expression, veteran or military status, or any other basis prohibited by law. Leidos will also consider for employment qualified applicants with criminal histories consistent with relevant laws.