An ideal candidate for this position will have experience with Defense in Depth Principals/technology (including access control, authorization, identification and authentication, public key infrastructure, network, and enterprise security architecture) and applying risk assessment methodology to system development. The selected individual will become part of the Defensive Cyber Operations (DCO) team working on solving challenging issues on a large, significant program. The position requires a solid understanding of security practices and policies as well as hands-on vulnerability testing experience to ensure that systems meet security requirements. The selected individual will collaborate with other engineers and technical experts in providing improvements to our operational, test, integration, and development systems.
Work you'll do
The selected candidate will have several responsibilities from day to day drawn from a wide array of activities and experience working in the following areas:
Validating and verifying system security requirements and establishing system security designs for systems, major system elements, and interfacing systems that are part of a network environment with geographically distributed components.
Identifying and implementing appropriate information security architectures and functionality to ensure uniform application of security policy and enterprise solutions.
Recommending and developing technical solutions, products, and standards based on current and desired system security architecture.
Communicating with Program Managers and POCs from customer organizations when necessary, regarding Security issues of significant importance.
Analyzing and assessing system implementation against multiple security compliance policies and recommending and implementing enhancements
Administration of multiple systems of different architectures (Windows, Linux, Mac, etc)
Supporting risk assessment, risk management, security control assessment, continuous monitoring, service design, and other Information Assurance (IA) program support functions.
Qualifications
Required:
Must have an active Secret Clearance to be considered
Bachelor's Degree in IT/Cybersecurity related field
Minimum of three (3) years of relevant, Information Systems Security Engineering or IT experience in performing system issue analysis, risk management, technical writing, system troubleshooting, and system documentation
Quantified experience in Information Assurance, Information Security System Engineering, or a related discipline
Solid understanding of security practices and policies and hands-on vulnerability testing experience
Strong experience applying Risk Management Framework
Must have experience formulating and assessing IT security policy
Must have demonstrated knowledge of and experience with common security tools, such as Nessus, NMAP and Wireshark hardware/software security implementation, communication protocol, encryption techniques/tools, and web services
Must have experience with secure configurations of commonly used desktop and server operating systems
Must be comfortable working on multiple systems and components simultaneously in various configurations
Must have strong verbal and written communications skills
Must be committed to adopting and adhering to best practices
Must be able to effectively plan and prioritize tasking and communicate clearly regarding technical options and trade-offs
Must be capable of performing high quality work both independently and with a team in a fast-moving environment
Must be legally authorized to work in the United States without the need for employer sponsorship, now or at any time in the future
Preferred:
DoD 8140 compliance through education or certification
Certifications, including CompTIA Security
+ Experience developing/implementing integrated security services management processes, such as assessing and auditing network penetration testing, anti-virus planning assistance, risk analysis, and incident response.
Experience providing information assurance support for application development that includes system security certifications and project evaluations for firewalls that encompass the development, design, and implementation.
Experience in technical documentation and writing
Experience with penetration testing tools
Experience with scripting languages
The wage range for this role takes into account the wide range of factors that are considered in making compensation decisions including but not limited to skill sets; experience and training; licensure and certifications; and other business and organizational needs. The disclosed range estimate has not been adjusted for the applicable geographic differential associated with the location at which the position may be filled. At Deloitte, it is not typical for an individual to be hired at or near the top of the range for their role and compensation decisions are dependent on the facts and circumstances of each case. A reasonable estimate of the current range is $102,750 to $171,250.
You may also be eligible to participate in a discretionary annual incentive program, subject to the rules governing the program, whereby an award, if any, depends on various factors, including, without limitation, individual and organizational performance.
Information for applicants with a need for accommodation: https://www2.deloitte.com/us/en/pages/careers/articles/join-deloitte-assistance-for-disabled-applicants.html
All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability or protected veteran status, or any other legally protected basis, in accordance with applicable law.
All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability or protected veteran status, or any other legally protected basis, in accordance with applicable law.
S:WWSKMED GPSMALLB