Sr Lead Information Security Engineer-Federal MB

Employer
Lumen
Location
Herndon, VA
Posted
Nov 18, 2022
Closes
Nov 29, 2022
Ref
718413878
Function
IT
Hours
Full Time
*About Lumen* Lumen is guided by our belief that humanity is at its best when technology advances the way we live and work. With 450,000 route fiber miles serving customers in more than 60 countries, we deliver the fastest, most secure global platform for applications and data to help businesses, government and communities deliver amazing experiences. Learn more about Lumen s network, edge cloud, security and communication and collaboration solutions and our purpose to further human progress through technology at news.lumen.com, LinkedIn: /lumentechnologies, Twitter: @lumentechco, Facebook: /lumentechnologies, Instagram: @lumentechnologies and YouTube: /lumentechnologies. *The Role* The SeniorLead Engineer Security Engineer will work in a challenging, hands-on environment as part of the Lumen PMO in support of the JWAN Contract.Applies advanced engineering and network principles, theories, concepts and technologies to solve unusually complex problems and issues. Leads the development, evaluation and implementation of new and innovative principles, processes and applications. *The Main Responsibilities* Performs forensic analysis of digital information and gathers and handles evidence. Monitor systems and networks for intrusions and proactively identify security flaws and vulnerabilities, and then develop plans of action to remediate security issues. Performs data analysis and evidence collection and assess and mitigate threats, both past present and future. May use programming skills to help reverse engineer malicious code and help create fixes for vulnerable applications or services on the network. Perform security audits, risk analysis, network forensics and penetration testing in order to analyze, develop, and recommend courses of action. Responsible for the full lifecycle of security incidents involving enterprise systems and data including personally identifiable information (PII) breaches Manage and respond to computer security incidents through detection, investigation, analysis, remediation, and reporting of cybersecurity incidents in a timely manner with high quality Help improve the overall security posture through obtaining the knowledge of the enterprise systems, and to ensure the timely dissemination of security information to the appropriate stakeholders Perform analysis of log files from a variety of sources (eg, individual host logs, network traffic logs, firewall logs, and intrusion detection system [IDS] logs) to identify possible threats to network security Respond to cyber incidents, including responding to IR phone calls and emails, and preparing situational awareness reports and escalate incidents as needed Investigate phishing and other user self-identified potential cyber threats Perform cyber defense incident triage, to include determining scope, urgency, and potential impact, identifying the specific vulnerability, and making recommendations that enable expeditious remediation Correlate incident data to identify specific vulnerabilities and make recommendations Ensures the integrity and protection of networks, systems, and applications by technical enforcement of organizational security policies through monitoring of vulnerability scanning devices *What We Look For in a Candidate* Perform day-to-day management of overall contract operations, supporting multiple projects and groups of contractor personnel at multiple locations. Work with the higher-level program manager, if applicable, to provide effective and efficient management of the contractor s effort. Allocate resources (staffing, facilities, and budgets) on assigned contract tasks. Review and provide input to the Integrated Program Baseline (or resource loaded schedule) to the Government. Ensure compliance with all regulatory and administrative requirements imposed by the contract in coordination with the Contractor s contracts staff. Be knowledgeable of the guidelines provided by the Federal Acquisition Regulation (FAR) and Defense Federal Acquisition Regulation Supplement (DFARS), DoD 5000 series, and Intelligence Community Directive (ICD) 801 policies. Conduct and support requirements analysis, resource allocation, project costing, deliverable tracking, schedule and financial data monitoring, and reporting. Must have at least three (3) years of demonstrated experience in the management and control of funds and resources using complex reporting mechanisms such as Earned Value Management and at least five (5) years direct experience in managing multi-task contracts and subcontracts of various types and complexity, as well as experience in leading a multi-vendor environment. Must have a PMP. DAWIA PM III or FAC-P/PM Mid-Level in Program Management Required TS/SCI Poly Requisition #: 318391 *EEO Statement* We are committed to providing equal employment opportunities to all persons regardless of race, color, ancestry, citizenship, national origin, religion, veteran status, disability, genetic characteristic or information, age, gender, sexual orientation, gender identity, marital status, family status, pregnancy, or other legally protected status (collectively, protected statuses ). We do not tolerate unlawful discrimination in any employment decisions, including recruiting, hiring, compensation, promotion, benefits, discipline, termination, job assignments or training. *Disclaimer* The above job definition information has been designed to indicate the general nature and level of work performed by employees within this classification. It is not designed to contain or be interpreted as a comprehensive inventory of all duties, responsibilities, and qualifications required of employees assigned to this job. Job duties and responsibilities are subject to change based on changing business needs and conditions. Salary Range *Salary Min : *100440 *Salary Max : *223680 This information reflects the anticipated base salary range for this position based on current national data. Minimums and maximums may vary based on location. Individual pay is based on skills, experience and other relevant factors. This position is eligible for either short-term incentives or sales compensation. Director and VP positions also are eligible for long-term incentive. To learn more about our bonus structure, you can view additional information[ here.]( We're able to answer any additional questions you may have as you move through the selection process. As part of our comprehensive benefits package, Lumen offers a broad range of Health, Life, Voluntary Lifestyle and other benefits and perks that enhance your physical, mental, emotional and financial wellbeing. You can learn more by clicking[ here.]( Note: For union-represented postings, wage rates and ranges are governed by applicable collective bargaining agreement provisions. Salary Range *Salary Min : *100440 *Salary Max : *223680 This information reflects the base salary pay range for this job based on current national market data. Ranges may vary based on the job's location. We offer competitive pay that varies based on individual experience, qualifications and other relevant factors. We encourage you to apply to positions that you are interested in and for which you believe you are qualified. To learn more, you are welcome to discuss with us as you move through the selection process. The Senior Lead Engineer Security Engineer will work in a challenging, hands-on environment as part of the Lumen PMO in support of the JWAN Contract. Learn more about Lumen s network, edge cloud, security and communication and collaboration solutions and our purpose to further human progress through technology at news.lumen.com, LinkedIn: /lumentechnologies, Twitter: @lumentechco, Facebook: /lumentechnologies, Instagram: @lumentechnologies and YouTube: /lumentechnologies. Applies advanced engineering and network principles, theories, concepts and technologies to solve unusually complex problems and issues. Leads the development, evaluation and implementation of new and innovative principles, processes and applications. Performs forensic analysis of digital information and gathers and handles evidence. Monitor systems and networks for intrusions and proactively identify security flaws and vulnerabilities, and then develop plans of action to remediate security issues. Performs data analysis and evidence collection and assess and mitigate threats, both past present and future. Perform security audits, risk analysis, network forensics and penetration testing in order to analyze, develop, and recommend courses of action. Responsible for the full lifecycle of security incidents involving enterprise systems and data including personally identifiable information (PII) breaches. Manage and respond to computer security incidents through detection, investigation, analysis, remediation, and reporting of cybersecurity incidents in a timely manner with high quality. Help improve the overall security posture through obtaining the knowledge of the enterprise systems, and to ensure the timely dissemination of security information to the appropriate stakeholders. Perform analysis of log files from a variety of sources (eg, individual host logs, network traffic logs, firewall logs, and intrusion detection system [IDS] logs) to identify possible threats to network security. Respond to cyber incidents, including responding to IR phone calls and emails, and preparing situational awareness reports and escalate incidents as needed. Investigate phishing and other user self-identified potential cyber threats. Perform cyber defense incident triage, to include determining scope, urgency, and potential impact, identifying the specific vulnerability, and making recommendations that enable expeditious remediation. Correlate incident data to identify specific vulnerabilities and make recommendations. Ensures the integrity and protection of networks, systems, and applications by technical enforcement of organizational security policies through monitoring of vulnerability scanning devices. Perform day-to-day management of overall contract operations, supporting multiple projects and groups of contractor personnel at multiple locations. Work with the higher-level program manager, if applicable, to provide effective and efficient management of the contractor s effort. Allocate resources (staffing, facilities, and budgets) on assigned contract tasks. Review and provide input to the Integrated Program Baseline (or resource loaded schedule) to the Government. Ensure compliance with all regulatory and administrative requirements imposed by the contract in coordination with the Contractor s contracts staff. Conduct and support requirements analysis, resource allocation, project costing, deliverable tracking, schedule and financial data monitoring, and reporting. operations, analysis, program manager, firewall, enterprise systems, penetration testing, complexity, technology, earned value management, computer security, network forensics, potential, icd, investigation, responsible, dawia, network, impact, financial data, integrity, triage, linkedin, network security, risk analysis, host logs, innovative, pmo, requirements analysis, development, security, cyber defense, multi-task, reporting, applications, forensic analysis, program management, security audits, baseline, organizational, communication, situational awareness, pmp, coordination, implementation, ids, its, resource allocation, visio, data analysis, acquisition, cybersecurity, intrusion detection system, instagram, project costing, pii, management, stakeholders, collaboration solutions, vulnerability scanning, twitter, Lead Information Security Engineer - Federal Practice, Lead Information Security Engineer - FED, Lead Information Security Engineer, Information Security Auditor II, Application Security Analyst, Information Security Specialist, Information Security Consultant, Application Security Architect, Data Security Architect, Information Security Engineer

Similar jobs