Mission Planning Software Cybersecurity Engineer

Tewksbury, MA, United States

Job Description


Description

The Leidos Systems Engineering and Integration Contract (SEIC) Program has a requirement for a Software Cybersecurity Engineer to provide cybersecurity engineering support to the Airspace Mission Planning Division, Hanscom AFB MA and at primary operating locations in Orlando, FL, and at Eglin AFB FL. The Software Cybersecurity Engineer\xe2\x80\x99s principal responsibility is ensuring the delivery of securely developed and evaluated next-generation Mission Planning software. Next-gen Mission Planning is built, integrated, tested, evaluated, and deployed using Continuous Integration/Continuous Delivery (CI/CD) pipelines employing DevSecOps principles operating at Information Level (IL)5, IL6 and IL6+ on various DoD networks, closed networks, and stand-alone systems. You will be joining an existing, high-performance team that drives real change for the DoD enterprise.

Our ideal candidate will reside near Hanscom AFB (Bedford, Massachusetts) with ability to frequent our Tewksbury office. However, we can accommodate fully remote with travel when needed for the right candidate.

Primary Responsibilities

  • Manage and analyze software development cybersecurity compliance and vulnerability artifacts in support of iterative DevSecOps CI/CD pipeline processes researching trends for vulnerabilities or known flaws to ensure that critical mission software is resilient to cyber exploits and attacks.
  • Monitor and maintain the software product Plan of Action & Milestone (POA&M).
  • Leverage analyses of software composition artifacts, vulnerability remediation efforts, and Security Technical Implementation Guide (STIG) compliance conformance to make recommendations for software development team and enterprise process improvements.
  • Champion and evolve DevSecOps software security development practices including:
  • Software vulnerability research and analysis,
  • Engineering analysis of threats to validate or determine methods of exploitation,
  • Malware research, assessment, and vulnerability mitigation,
  • Research innovative tools and techniques, for vulnerability analysis and remediation.
  • Lead/Assist in the deployment and configuration of security related tools
  • Oversee Defensive Development efforts including:
  • Protection of data, securing software-defined networks, and net-centric capabilities, as well as,
  • Detection of/identification of threats and risks and analyze/assess responses to attacks.
  • Participate in the securing of Development, Integration and Production environments and fielded software through analysis of:
  • Application security architecture research and recommendations,
  • Software security posture evaluations,
  • Web application vulnerability assessments,
  • Penetration testing and fuzzing results.
  • Review security findings for public free open-source software (OSS) packages and repositories used by third party development teams to identify common issues associated with emerging threats and vulnerabilities and provide recommendations for either reducing or rapidly remediating software vulnerabilities.
  • Contribute to source code remediation review discussions with third-party Mission Planning developer teams for determining best methods for eliminating recurring vulnerabilities.
  • Contribute to Cyber architecture plans and the Scaled Agile Framework (SAFe) Program Increment planning activities.
  • Support technical assessments, trade-studies, white-papers, and other technical analysis activities.
  • Provide key inputs into technology evaluation and technology insertion planning activities.
  • Communicate and collaborate technical ideas, concepts, and strategies effectively with engineers from varying technical backgrounds.
  • Contribute to the government program office\xe2\x80\x99s Cybersecurity team with analyses supporting Authorization to Operate (ATO) decisions.
Basic Qualifications

Education: Bachelor\'s degree in Computer Science, Information Security, Electrical Engineering or a related scientific/technical discipline, with Security Engineering or related experience.

Required Skills:
  • Current knowledge of technical changes, advancements, software technologies and improvements in systems design, with the ability to make appropriate recommendations to the chief architect.
  • Understanding of micro services architectures and the role of containerization in deployment.
  • Possess minimum current DoD 8570 IAM Level I certification (e.g.: Security+ CE or equivalent) at time of hire (see
). * Possess a current US DoD Secret clearance with the ability to obtain a Top Secret clearance.
  • Familiarization with NIST SP 800-160, Systems Security Engineering, NIST SP 800-53 Risk Management Framework, NIST SP 800-161, Supply Chain Risk Management Practices for Federal Information Systems and Organizations, and NIST SP 200-18, Secure Software Development Framework (SSDF).
  • Proficiency with MS Office Products (Word, Excel, PowerPoint, Access & Visio).
Preferred Qualifications

Education: Advanced degree preferred (ideally in computer science, engineering or related technical discipline preferred)

Desired Skills:
  • Experience using MS Visual Studio and Java development tools such as NetBeans, Eclipse, or similar.
  • Advanced knowledge of Enterprise Development with the .NET or J2EE frameworks, along with development languages/technologies such as Python, Node.js and server-side JavaScript.
  • Understanding of Web Technology Stacks in Java and .NET.
  • Experience with Service Oriented Architecture enterprise development using cross platform standards-based protocols, such as SOAP, REST, JSON and XML
  • Experience with writing secure code and secure applications including securing REST and SOAP endpoints for authentication and authorization; experience with Code Quality Tools.
  • Experience with prototyping, Object Oriented concepts and Functional Programming.
  • Understanding of cloud technologies and cloud deployment techniques and mechanisms
  • Experience in leading certification and accreditation (C&A) processes in accordance with DoD policy, standards & guidelines.
  • Technical knowledge of computer networking and computer security protocols, and prior hands-on implementation of network and software security controls.
  • Familiarity with vulnerability scanning tools such as HP Fortify, Nessus, and/or ACAS.
  • Experience with Continuous Integration/Delivery tools (Jenkins, TFS, Maven or Nuget)
  • Demonstrated expertise identifying process improvement opportunities and coaching process stakeholders and participants in how best to transition to more effective operational practices.
  • Familiarity with code analysis, conduct code manipulation, and develop/recommend coding solutions tailored to a given area of need.
  • Familiarity with the hardening of applications, and software-defined network infrastructure using Department of Defense Security Requirement Guides (SRGs), STIGs, and Information Assurance Vulnerability Alerts (IAVA).
Pay Range: Pay Range $97,500.00 - $150,000.00 - $202,500.00

The Leidos pay range for this job level is a general guideline only and not a guarantee of compensation or salary. Additional factors considered in extending an offer include (but are not limited to) responsibilities of the job, education, experience, knowledge, skills, and abilities, as well as internal equity, alignment with market data, applicable bargaining agreement (if any), or other law.

#Remote

#Featuredjob

Leidos

Beware of fraud agents! do not pay money to get a job

MNCJobz.com will not be responsible for any payment made to a third-party. All Terms of Use are applicable.


Job Detail

  • Job Id
    JD4313722
  • Industry
    Not mentioned
  • Total Positions
    1
  • Job Type:
    Full Time
  • Salary:
    Not mentioned
  • Employment Status
    Permanent
  • Job Location
    Tewksbury, MA, United States
  • Education
    Not mentioned