Cybersecurity Engineer, Mid

The Challenge:  

Everyone knows security needs to be “baked in” to a system architecture, but you actually know how to bake it in. You can identify and implement ways to harden systems and reduce their attack surface. What if you could use your Cyber engineering skills to design and build secure systems for a client? We’re looking for an engineering who can help create solutions for the client that will stand up to even the most advanced Cyber threats. 

As a security engineer on our project, you’ll participate in the design, engineering, integration, implementation, testing, deployment, maintenance, review, and administration of the infrastructure, hardware and software required to effectively manage the security and risk posture of the network and resources. You will assist with developing system concepts and apply the systems engineering life cycle (SDLC) to translating strategic Cyber objectives, technology, and environmental conditions into engineering outcomes and solutions. Assist with selecting and applying processes and methodologies to meet Cyber performance objectives and analyze trends and emerging technology for potential program modernization. Finally, you will configure Cyber systems to meet user requirements.

Support the acquisition of hardware and software, as needed. You’ll work with client employees and other contractors to identify the right mix of tools and techniques to translate your customer’s needs and future goals into a plan that will enable secure and effective solutions. We need to come up with the best solution, so you’ll investigate new techniques, break free from the legacy model, and go where the industry is going. As a team, we’ll take a critical approach to network design, providing alternatives and customizing solutions to maintain a balance of security and mission needs. This is a chance to learn from a team of experts as you make a difference in the security of warfighter communications. Your contributions will help customers overcome their most difficult challenges by integrating secure practices like endpoint based detection, identity and access management, etc. You’ll be able to gain experience in orchestration of security events and Cloud-based security while building peace of mind in a critical infrastructure. Join our team as we improve warfighter communications through Cybersecurity. 

Empower change with us. 

Build Your Career: 

Rewarding work, fun challenges, and a ton of investment in our people—that’s Booz Allen Cyber. When you join Booz Allen, we’ll help you develop the career you want. 

Competitions — From programming competitions at our PyNights (Python competition and learning events) to competing in CTFs, we’ve got plenty of chances for you to show off your skills. 

Paid Research — Have an innovative idea to explore or hypothesis to test? You can participate in challenges via our crowdsourcing platform, the Garage, and other programs to be awarded dedicated time and/or funding to advance your skills. 

Cyber University — CyberU has more than 5000 instructor-led and self-paced cyber courses, a free online library that you can access from just about anywhere—including your phone—and certification exam prep guides that include practical assessments to prepare you for your exam. 

Academic Partnerships — In addition to our tuition reimbursement benefit, we’ve partnered with University of Maryland University College to offer two graduate certificate programs in Cybersecurity—fully funded without a tuition cap. 

Maker/Hackerspaces — Race drones, print 3D gadgets, drink coffee from our Wi-Fi coffee maker, and get hands-on training on tools and tech from in-house experts in our dedicated maker and hackerspaces. 

You Have: 

-4+ years of experience with systems engineering of information systems

-3+ years of experience with developing, deploying, and managing a host-based security system (HBSS), including McAfee ePolicy Orchestrator

-Experience with deploying and managing HBSS or McAfee endpoint products, including Endpoint Security (ENS), HIPS, and DLP and their policies

-Experience with Cybersecurity tools used in DoD environments

-Experience with log review and analysis

-Top Secret clearance

-HS diploma or GED

-CISSP or DoD 8570 Baseline IAT Level III Certification

Nice If You Have: 

-Experience with DoD compliance tools, including CMRS, COAMS, or APS

-Experience with Microsoft Windows Server OS and Microsoft SQL Serveer

-Experience with Cybersecurity forensics tools and methodologies

-Experience with network ports and protocols and IDS/IPS

-Knowledge of current and emerging security technologies

-Knowledge of a virtual server environment

-Possession of excellent analytical and collaboration skills

Clearance:
Applicants selected will be subject to a security investigation and may need to meet eligibility requirements for access to classified information; Top Secret clearance is required.

We’re an EOE that empowers our people—no matter their race, color, religion, sex, gender identity, sexual orientation, national origin, disability, veteran status, or other protected characteristic—to fearlessly drive change.

Not ready to apply? Join our talent community and sign up for job alerts.