Information Systems Security Engineer Job Description

Information Systems Security Engineer Job Description Template

Our company is looking for a Information Systems Security Engineer to join our team.

Responsibilities:

  • Deployment, implementation and strategy of tools and related Network Security Management Systems;
  • Provide strategies and establish processes to assist programs in establishing certification and accreditation necessary to operate network systems;
  • Provide regular status reporting of security strategic projects to senior management and customers;
  • Responsible for senior level incident investigation and remediation to address customer and executive level actions;
  • Interact externally as a consultant to customers;
  • Build, monitor, and manage the cloud infrastructure;
  • Ensure security is integrated into all cloud services;
  • Monitor and optimize cloud workloads and performance;
  • Establish implementation standards and methods such as configuration and change management;
  • Participate in deep architectural discussions to ensure solutions are designed for successful deployment in the cloud;
  • Develop roadmaps for current and future deployments;
  • Review current and future AWS implementations with the sectors in ISD and suggest ways to improve and standardize the cloud offerings.

Requirements:

  • Top Secret Clearance;
  • Detailed technical knowledge of database and operating system security;
  • BS in Computer Science, Cyber Security, Computer Engineering, or related discipline;
  • Thorough understanding of the latest security principles, techniques, and protocols;
  • Experience with Windows-based platforms;
  • Current CISSP-ISSEP or CISSP-ISSAP;
  • Strong scripting skills and familiarity with monitoring tools;
  • Evaluate firewall change requests and assess organizational risk;
  • Assist with the implementation of counter-measures or mitigating controls;
  • Communicate alerts to agencies regarding intrusions and compromises to their network infrastructure, applications and operating systems;
  • Experience in building large distributed systems;
  • Deep technical background (operating systems, networking, application performance management, load balancing, security systems, etc.);
  • Prepare incident reports of analysis methodology and results;
  • Demonstrated ability to effectively engage with Sponsor Information System Security Managers (ISSMs) to sensure security compliance of systems;
  • Experience in supporting highly available applications on Linux and Windows virtual environments.