Senior Cyber Security Engineerother related Employment listings - Pittsburgh, PA at Geebo

Senior Cyber Security Engineer

Job Title :
Senior Cyber Security Engineer
Location:
Pittsburgh, PA
Wage Range:
65-72 depending on years of experience and qualifications
Job Number:
24-00794
Job Description:
Our client, a large defense contractor, has an immediate opening for a Senior Cyber Security Engineer to work from their Pittsburgh, PA facility.
Qualifications:
Requires a Bachelor's degree in Engineering, or a related Science or Mathematics field. Also requires 8
years of job-related experience, or a Master's degree plus 6 years of job-related experience.
Clearance Requirements:
Department of Defense TS/SCI security clearance is required at time of hire. Applicants selected will be subject to a U.S. Government security investigation and must meet eligibility requirements for access to classified information. Due to the nature of work performed within our facilities, U.S. citizenship is required.
Knowledge, Skills and Abilities:
Experience with applying NIST Risk Management Framework
Experience with specific RMF overlays
Strong knowledge of cyber security technology and trends
Recognizes and incorporates various security designs and lessons learned
Effective in communicating issues, impacts, and corrective actions as they affect the cyber design and implementation
Strong ability in reporting relevant cyber systems engineering design
Regular contact with senior levels of security work groups
Ability to lead security work groups
Works under limited direction
Contact with project leaders and other professionals within the Engineering department and with project teams
Frequent contact with the external customers' security professionals
Experience with FedRAMP, DoD Impact Levels, and cloud SRG and reference implementations
Strong security and administration skills in Linux and Windows
Familiarity with cloud native environments and tools such as containers and container orchestration (e.g. Kubernetes, Rancher)
Knowledge of standard DoD security tools STIGs, ACAS / Nessus, HBSS / EPO, etc.
Hands-on knowledge with Identity Management systems Active Directory, LDAP/Kerberos, SAML, OAuth, etc.
Strong knowledge of network security:
DNS, TLS, firewalls, NAT, intrusion detection, etc. Software-Defined Networks (SDN) a plus.
Broad understanding of security standards such as CVE, CVSS, various NIST standards, FIPS 140 and 199, etc.
Experience working in a modern software development environment (Agile, CI/CD, DevSecOps)
Strong written and verbal communications skills
Good data analysis skills with, e.g., Word, Excel, Python, or other tools
Good communications skills:
interpersonal, written, and public speaking / presentations
Experience with doc-as-code, markdown, ansible and test automation frameworks
Requires TS//SCI Clearance
Equal Opportunity Employer Veterans/Disabled
While an hourly range is posted for this position, an eventual hourly rate is determined by a comprehensive salary analysis which considers multiple factors including but not limited to:
job-related knowledge, skills and qualifications, education and experience as compared to others in the organization doing substantially similar work, if applicable, and market and business considerations. Benefits offered include medical, dental and vision benefits; dependent care flexible spending account; 401(k) plan; voluntary life/short term disability/whole life/term life/accident and critical illness coverage; employee assistance program; sick leave in accordance with regulation. Benefits may be subject to generally applicable eligibility, waiting period, contribution, and other requirements and conditions.Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.