Cybersecurity Engineer, Mid

The Challenge:

Everyone knows security needs to be “baked in” to a system architecture, but you actually know how to bake it in. You can identify and implement ways to harden systems and reduce their attack surface. What if you could use your cyber engineering skills to design and build secure systems for the Air Force? We’re looking for an engineer who can help create solutions for our Air Force client that will stand up to even the most advanced cyber threats. As a cyber operations engineer on our project, you’ll enable our client to securely sustain, develop, and deploy current and modern system capabilities to deter attacks, and provide critical information to our warfighters. You’ll work alongside colleagues, developers, operators, and administrators to identify the right mix of tools and techniques to translate your customer’s needs and future goals into a plan that will enable secure and effective solutions.

 

We need to come up with the best solution, so you’ll investigate new techniques, break free from the legacy model, and go where the industry is going. As a team, we’ll take a critical approach to network design, providing alternatives and customizing solutions to maintain a balance of security and mission needs. This is a chance to learn from a team of experts as you make a difference in the security of warfighter communications. Your contributions will help customers overcome their most difficult challenges by integrating secure practices like endpoint-based detection, multi-factor authentication, identity and access management, cross domain solutions and advanced system monitoring. You’ll be able to gain experience in high performance computing, cloud computing, application development, cybersecurity, and IT modernization while building peace of mind in a critical infrastructure. Join our team as we improve warfighter communications through cyber security.

Empower change with us.

You Have:

  • 5+ years of experience with designing, developing, engineering, and implementing cyber best practices according to Risk Management Framework (RMF)

  • Experience in architecting, designing, and securing a technical solution while working with a team in the implementation of the technical design

  • TS/SCI clearance

  • Bachelor’s degree

  • Ability to obtain DoD IAT Level II Certification within 2 months of start date

Nice If You Have:

  • Experience with developing and engineering data workflows to merge disparate data sources and draw data-driven insights

  • Experience with using, configuring, and operating Linux or Unix based operating systems

  • Experience with security tools and devices, including network firewalls, web proxy, intrusion prevention systems, vulnerability scanners, or penetration tools, or object-oriented programming languages, including Java or Python 

  • Knowledge of configuration management tools, including Git, Ansible Mercurial, and Remedy

  • Knowledge of Agile methodologies, including Scrum, XP, Kanban, Lean, or Theory of Constraints

  • Knowledge of Continuous Integration, Continuous Delivery concepts and enabling tools, including Jenkins, Maven, and Ansible

  • Ability to leverage a wide variety of data science capabilities and languages and analyze and resolve critical data issues using various methodologies to safeguard system and data availability, integrity, and confidentiality

  • Bachelor’s degree in Computer Science, Engineering, or IT

Clearance:

Applicants selected will be subject to a security investigation and may need to meet eligibility requirements for access to classified information; TS/SCI clearance is required.

Build Your Career:

Rewarding work, fun challenges, and a ton of investment in our people—that’s Booz Allen cyber. When you join Booz Allen, we’ll help you develop the career you want.

Competitions — From programming competitions at our PyNights (Python competition and learning events) to competing in CTFs, we’ve got plenty of chances for you to show off your skills.

Paid Research — Have an innovative idea to explore or hypothesis to test? You can participate in challenges via our crowdsourcing platform, the Garage, and other programs to be awarded dedicated time and/or funding to advance your skills.

Cyber University — CyberU has more than 5000 instructor-led and self-paced cyber courses, a free online library that you can access from just about anywhere—including your phone—and certification exam prep guides that include practical assessments to prepare you for your exam.

Academic Partnerships — In addition to our tuition reimbursement benefit, we’ve partnered with University of Maryland University College to offer two graduate certificate programs in cybersecurity—fully funded without a tuition cap.

Maker/Hackerspaces — Race drones, print 3D gadgets, drink coffee from our Wi-Fi coffee maker, and get hands-on training on tools and tech from in-house experts in our dedicated maker and hackerspaces.

We’re an equal employment opportunity/affirmative action employer that empowers our people to fearlessly drive change – no matter their race, color, ethnicity, religion, sex (including pregnancy, childbirth, lactation, or related medical conditions), national origin, ancestry, age, marital status, sexual orientation, gender identity and expression, disability, veteran status, military or uniformed service member status, genetic information, or any other status protected by applicable federal, state, local, or international law.

ID15-G

Not ready to apply? Join our talent community and sign up for job alerts.