Cybersecurity Configuration Engineer

Clearance Level
Interim Secret
Category
Configuration
Location
Rosslyn, Virginia

REQ#: RQ70662

Travel Required: None
Requisition Type: Regular

Project Overview:

Are you highly organized and able to support multiple priority efforts at the same time?  Do you thrive in fast-paced programs?  Can you prioritize tasks in order to allow your executive leadership team to focus on what’s hot? Will the risk of not delivering top-quality products on-time keep you up at night?  Then GDIT is looking for you to fill an essential Cyber Security Configuration Engineer role supporting our cybersecurity program.

The Cyber Security Configuration Engineer will provide technical expertise for evaluating a wide array of new and emerging technologies, and developing recommendations for security configuration baselines. The engineer will be responsible for developing security configuration standards that implement Departmental policy, technical security countermeasures, and industry best practices.

The Cyber Security Configuration Engineer will also evaluate various technical and policy questions, providing written responses to a wide range of audiences.

The ideal candidate will have base knowledge of cyber security principles and best practices, familiarity with Defense Information System Agency (DISA) Security Technical Implementation Guides (STIGs), a foundational knowledge of Windows and Linux server operating systems, and experience managing Active Directory.

Key Personality traits that will do well in this environment

  • Inquisitive by nature; you know where to look to find answers
  • You enjoy collaboration and sharing information with other highly technical people.

Environment you will work in

  • The intersection of Cybersecurity and data. No better place to be.
  • Highly technical and fast pace environment.
  • No remote work / no travel

Daily Responsibilities:

  • Promote awareness of security issues among management and ensure sound security principles are reflected in organizations’ visions and goals.
  • Research security threat vectors and participate in government and industry conferences and training that impact existing standards and/or principles and provide information to customer on potential impact
  • Create bulletins, alerts, and/or advisories related to published or developmental standards and/or principle documents
  • Ensure that rigorous application of information security/information assurance policies, principles, and practices are implemented in the delivery of all IT services.
  • Evaluate a wide array of existing, new, modified, and/or emerging technologies and develop recommended security configuration baselines documents that implement Departmental policy, technical security solutions, and industry best practices in alignment with Defense Information Systems Agency (DISA) Security Technical Implementation Guide (STIG) as much as possible
  • Actively participate in respective change review and control boards, providing written and verbal recommendations
  • Respond to various technical and policy questions from a wide range of customers/users with guidance and clarifications
  • Promote awareness of cybersecurity standards and principles among the customer stakeholders, coworkers, and the Department users
  • Collaborate with fellow team members and various internal and external stakeholders to share information and knowledge to establish and maintain a productive line of communication
  • Streamline processes to improve efficiency of Mission goals
  • Manage information and updates in SharePoint repositories
  • Keep awareness of items involving fellow team members to provide back up support and coverage as needed

To fit into our environment you must have these core skills:

  • US Citizenship and clearance at the Secret level
  • Excellent verbal and written communication skills
  • Knowledge of cybersecurity and privacy principles
  • Knowledge of Cyber Security National Policies, Directives, and Laws
  • Knowledge of basic system, network, and OS hardening techniques
  • Knowledge in interpreting functional requirements for projects and proposal 
  • 1-3 years’ experience developing and executing research plans
  • 2-3 years’ experience working with Windows Server on an enterprise level
  • 1-3 years’ experience managing Active Directory in a multi-domain environment.

Highly desired skills

  • 2-3 years’ experience working with server/application virtualization on an enterprise level
  • 2-3 years’ experience working with Red Hat Enterprise Linux servers on an enterprise level
  • 2-3 years’ experience engineering/maintaining database infrastructure including SQL and Oracle
  • 1-3 years’ experience working with Active Directory Federation Services (ADFS), Azure Active Directory
  • 1-3 years’ experience developing and managing virtualized IT systems
  • 1-3 years’ experience with networking technologies
  • 1-3 years’ experience with configuration and/or administrating enterprise mobile device deployments

Project Overview:

Are you highly organized and able to support multiple priority efforts at the same time?  Do you thrive in fast-paced programs?  Can you prioritize tasks in order to allow your executive leadership team to focus on what’s hot? Will the risk of not delivering top-quality products on-time keep you up at night?  Then GDIT is looking for you to fill an essential Cyber Security Configuration Engineer role supporting our cybersecurity program.

The Cyber Security Configuration Engineer will provide technical expertise for evaluating a wide array of new and emerging technologies, and developing recommendations for security configuration baselines. The engineer will be responsible for developing security configuration standards that implement Departmental policy, technical security countermeasures, and industry best practices.

The Cyber Security Configuration Engineer will also evaluate various technical and policy questions, providing written responses to a wide range of audiences.

The ideal candidate will have base knowledge of cyber security principles and best practices, familiarity with Defense Information System Agency (DISA) Security Technical Implementation Guides (STIGs), a foundational knowledge of Windows and Linux server operating systems, and experience managing Active Directory.

Key Personality traits that will do well in this environment

  • Inquisitive by nature; you know where to look to find answers
  • You enjoy collaboration and sharing information with other highly technical people.

Environment you will work in

  • The intersection of Cybersecurity and data. No better place to be.
  • Highly technical and fast pace environment.
  • No remote work / no travel

Daily Responsibilities:

  • Promote awareness of security issues among management and ensure sound security principles are reflected in organizations’ visions and goals.
  • Research security threat vectors and participate in government and industry conferences and training that impact existing standards and/or principles and provide information to customer on potential impact
  • Create bulletins, alerts, and/or advisories related to published or developmental standards and/or principle documents
  • Ensure that rigorous application of information security/information assurance policies, principles, and practices are implemented in the delivery of all IT services.
  • Evaluate a wide array of existing, new, modified, and/or emerging technologies and develop recommended security configuration baselines documents that implement Departmental policy, technical security solutions, and industry best practices in alignment with Defense Information Systems Agency (DISA) Security Technical Implementation Guide (STIG) as much as possible
  • Actively participate in respective change review and control boards, providing written and verbal recommendations
  • Respond to various technical and policy questions from a wide range of customers/users with guidance and clarifications
  • Promote awareness of cybersecurity standards and principles among the customer stakeholders, coworkers, and the Department users
  • Collaborate with fellow team members and various internal and external stakeholders to share information and knowledge to establish and maintain a productive line of communication
  • Streamline processes to improve efficiency of Mission goals
  • Manage information and updates in SharePoint repositories
  • Keep awareness of items involving fellow team members to provide back up support and coverage as needed

To fit into our environment you must have these core skills:

  • US Citizenship and clearance at the Secret level
  • Excellent verbal and written communication skills
  • Knowledge of cybersecurity and privacy principles
  • Knowledge of Cyber Security National Policies, Directives, and Laws
  • Knowledge of basic system, network, and OS hardening techniques
  • Knowledge in interpreting functional requirements for projects and proposal 
  • 1-3 years’ experience developing and executing research plans
  • 2-3 years’ experience working with Windows Server on an enterprise level
  • 1-3 years’ experience managing Active Directory in a multi-domain environment.

Highly desired skills

  • 2-3 years’ experience working with server/application virtualization on an enterprise level
  • 2-3 years’ experience working with Red Hat Enterprise Linux servers on an enterprise level
  • 2-3 years’ experience engineering/maintaining database infrastructure including SQL and Oracle
  • 1-3 years’ experience working with Active Directory Federation Services (ADFS), Azure Active Directory
  • 1-3 years’ experience developing and managing virtualized IT systems
  • 1-3 years’ experience with networking technologies
  • 1-3 years’ experience with configuration and/or administrating enterprise mobile device deployments
We are GDIT. The people supporting some of the most complex government, defense, and intelligence projects across the country. We deliver. Bringing the expertise needed to understand and advance critical missions. We transform. Shifting the ways clients invest in, integrate, and innovate technology solutions. We ensure today is safe and tomorrow is smarter. We are there. On the ground, beside our clients, in the lab, and everywhere in between. Offering the technology transformations, strategy, and mission services needed to get the job done.

GDIT is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status, or any other protected class.