Mid-level Infrastructure Security Operations Engineer

Reston, VA
Aug 18, 2022
Aug 20, 2022
Full Time
Description Job Description: Looking for an opportunity to make an impact? Join the Leidos Civil IT (CivIT) team in accelerating cybersecurity in a changing world where we make a difference by protecting critical networks for our government and commercial customers. At Leidos, we deliver innovative solutions through the efforts of our diverse and talented people who are dedicated to our customers' success. We empower our teams, contribute to our communities, and operate sustainable. Everything we do is built on a commitment to do the right thing for our customers, our people, and our community. Our Mission, Vision, and Values guide the way we do business. Are you ready to challenge yourself with an organization that encourage & support career growth on an enterprise-wide scale? Your greatest work is ahead! We are in search of an Infrastructure Security Operations Engineer, Mid to join our National Oceanic and Atmospheric Administration (NOAA) Cyber Security Center (NCSC) Engineering & Operations team. As an Infrastructure Security Operations Engineer, Mid you will play a valuable part in supporting the NCSC's mission to protect NOAA networks, computers, programs and data from cyber-attack damage and unauthorized access. If this sounds like the kind of environment where you can thrive while being challenged, keep reading! Leidos Civil Group helps modernize infrastructure, systems, and security. We are a trusted partner to both government and highly regulated commercial customers looking for transformative solutions in mission IT, security, software, engineering, and operations. We work with our customers including the FAA, DOE, NASA, National Science Foundation, Transportation Security Administration, Custom and Border Protection, airports, and electric utilities to make the world safer, healthier, and more efficient. To explore and learn more about the Leidos Civil Group, click here! Are you ready to make an impact? Begin your journey of a flourishing and meaningful career, share your resume with us today! Primary Responsibilities: Tests, implements, deploys, maintains, and administers the infrastructure hardware and software. Provides support for implementation, troubleshooting and maintenance of Information Technology (IT) systems and security tools to potentially include: SPLUNK, Tenable Security Center, WebInspect Enterprise implementation, FireEye appliances, Archer applications, McAfee applications Provide technical oversight across the NOAA NCSC program to a team of enterprise infrastructure security operations engineers Provide technical services for the NOAA FISMA High system computers and networks used by the NCSC and ESOC to execute against their functions. This includes software patching and NIST 800-53rd high-impact security control configurations Provide guidance, coaching, and development to a cross functional security engineering & operations team Design, develop, and recommend system solutions ensuring proprietary/confidential data and systems are protected (ie, system security upgrades, technical refreshes etc,.) Develop necessary processes, and procedures to maintain and augment the IT systems operations that support the NCSC and the NOAA0100 FISMA High IT infrastructure. Engage the client, where applicable, in the strategic design process to translate security and business requirements into technical designs as it relates to enterprise infrastructure Support the project lifecycle for infrastructure projects Configure and validate secure systems Develop, deliver, and maintain a System Security Plan for systems operations that supports the NCSC and the NOAA0100 FISMA High IT infrastructure Attend team lead sessions and act as a conduit with the program leadership team Provide for critical incident response & problem management including root cause of system problems, such as configuration issues resulting in operational performance degradation or system outages, supporting the Government with information and advice on the necessary correction actions and/or interim workarounds Provide Disaster Recovery recommendations and support for a Primary and Secondary site configuration Assist with enterprise security infrastructure operations and maintenance duties of backups, application maintenance, and OS patching, tuning, and troubleshooting Adhere to Change Management process Must be able to multitask a variety of projects and tasks as set by the Team Lead Develop detailed documentation as it pertains to OS and COTS product deployment, configuration, upgrading, and maintenance for Change Management requests Develop secure standard guidelines on configuration management process to ensure consistent & secure modifications to equipment configurations Develop and maintain technical documentation and diagrams related to the field communications systems equipment & networks Ensure documentation relative operational procedures, services, etc., are written and centrally accessible and updated as necessary Basic Qualifications: Bachelor's degree in technical field or equivalent experience and 4 - 8 years or prior relevant experience 2+ years of design, development, integration, implementation, operation and analysis of cyber security technologies 2+ years administering network appliances, security appliances, Windows or Linux devices Knowledge of security system design tools, methods, and techniques Knowledge of key concepts in security management (eg, Release Management, Patch Management) Knowledge of network design processes, to include understanding of security objectives, operational objectives, and trade-offs Knowledge of new and emerging information technology (IT) and cybersecurity technologies Knowledge of specific operational impacts of cybersecurity lapses Knowledge of system life cycle management principles, including software security and usability Knowledge of auditing and logging procedures (including server-based logging) Knowledge of basic system, network, and OS hardening techniques Knowledge of cyber threats and vulnerabilities Knowledge of cybersecurity and privacy principles Knowledge of file system implementations (eg, New Technology File System [NTFS], File Allocation Table [FAT], File Extension [EXT]) Knowledge of IT system operation, maintenance, and security needed to keep equipment functioning properly Knowledge of measures or indicators of system performance and availability Knowledge of physical computer components and architectures, including the functions of various components and peripherals (eg, CPUs, Network Interface Cards, data storage) Knowledge of security implications of software configurations Knowledge of specific operational impacts of cybersecurity lapses Knowledge of virtualization technologies and virtual machine development and maintenance Skill in troubleshooting and diagnosing cyber defense infrastructure anomalies and work through resolution Skill in conducting system/server planning, management, and maintenance Skill to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation) Skill in identifying measures or indicators of system performance and the actions needed to improve or correct performance, relative to the goals of the system Skill in applying and incorporating information technologies into proposed solutions Skill in developing and applying security system access controls Skill in determining how a security system should work (including its resilience and dependability capabilities) and how changes in conditions, operations, or the environment will affect these outcomes. Skill in independently making configuration updates to ensure system availability requirements Skill in system, network, and OS hardening techniques. (eg, remove unnecessary services, password policies, network segmentation, enable logging, least privilege, etc.) Ability to write and verbally communicate effectively to both technical and non-technical audiences Strong problem-solving and analytical skills and demonstrate poise and ability to act calmly and competently in high-pressure, and high-stress situations Ability and drive to quickly learn new software and IT concepts Understanding of accepted security practices, troubleshooting issues, attack vectors, and customer support Must be able to work collaboratively across multiple functional disciplines Knowledge and skill in: Linux/UNIX, Python/PowerShell/Javascript, vulnerability scanning & patching, firewalls, and networking Knowledge and skill in : Windows, Archer, ThreatConnect, FireEye, Tenable/Nessus, WebInspect, SCCM, VMWare, FreeNAS/Pure/NetApp storage, and PKI certificate management. Preferred Qualifications: Demonstrated experience in cyber security design, engineering and operations Experience with Security Assertion Markup Language, and client-server authentication Experience with System Administration, Network Administration Network Security, Networking Standards, Network Protocols, NIST/FISMA standards and controls, SIEM platforms and security tools, Network Hardware Configurations Cyber Security Training or Certification (ie Securty+, Network+, SPLUNK, FireEye ) Knowledge of NIST SP 800 53 series or ISO 27000 series documents Windows 10 security best practices and configurations Understanding of advanced threat detection in an enterprise environment Understanding of malware families, their types, and the threat they pose Proficiency with Microsoft Windows administrative & troubleshooting tools Demonstrated experience performing cybersecurity analysis from an operations & engineering perspective Experience with Splunk (preferred) or other SIEM platform Clearance: Must be able to obtain and maintain security clearance, specifically DoD/Top Secret Clearance (Interim Secret acceptable to start working on program). US Citizenship is required. Work Location: Fairmont, WV Boulder, CO Remote eligible pending customer approval, however onsite is preferred. Pay Range: Pay Range $74,750.00 - $115,000.00 - $155,250.00 The Leidos pay range for this job level is a general guideline only and not a guarantee of compensation or salary. Additional factors considered in extending an offer include (but are not limited to) responsibilities of the job, education, experience, knowledge, skills, and abilities, as well as internal equity, alignment with market data, applicable bargaining agreement (if any), or other law. #Remote