VIEW
SAVED
JOBS

Cyber Security Engineer 3 with RMF/ATO Expertise

2024-144062
Cyber Security
Top Secret/SCI

Location:

Virginia Beach
,
VA

Secondary Location:

,
,

Telecommute Options:

No remote/telework allowed
Join Our Team
Apply now
right arrow
Share on your newsfeed or with a friend
About Peraton

Peraton is a next-generation national security company that drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world’s leading mission capability integrator and transformative enterprise IT provider, we deliver trusted, highly differentiated solutions and technologies to protect our nation and allies. Peraton operates at the critical nexus between traditional and nontraditional threats across all domains: land, sea, space, air, and cyberspace. The company serves as a valued partner to essential government agencies and supports every branch of the U.S. armed forces. Each day, our employees do the can’t be done by solving the most daunting challenges facing our customers. Visit peraton.com to learn how we’re keeping people around the world safe and secure.

Responsibilities

Peraton is seeking qualified individuals to join our team to provide engineering support for Cyber Situational Awareness (SA), Cyber Command and Control (C2), Mission Assurance, and Homeland Defense in Virginia Beach, Virginia. This includes conducting Agile software engineering in a Development, Security, and Operations (DevSecOps) environment, performing Cloud architectural design, operation, and administration functions, and cyber security and Risk Management Framework (RMF) support. Also included are rapid design, development, test, deployment, maintenance and operation of specific software and hardware capabilities to meet current Cyber Defensive needs.

 

Peraton has an opportunity for Cybersecurity Engineer 3 with RMF/ATO Expertise

  • Responsible for the Security Posture of the application/system via Verification
    • Performing SCAP (Evaluate STIG, Tenable Nessus, etc.)
    • NSWC IHD is not responsible for scanning via SCAP
    • Performing manual reviews via DISA STIGs/SRGs, etc. (completing the finding details/comments section)
    • Writing mitigations for open Vulnerabilities
    • Remediating open Vulnerabilities
    • Assessing the SAs with Security solutions to remediate Vulnerabilities
    • Updating/Creating POA&M/RAR
    • Creating/Updating the Authorization Boundary, Architectural Diagram, and Information Flow Diagram (NQV will leverage this information when completing the SAP)
    • Completing the Hardware and Software List (NQV will leverage this information when completing the SAP)
    • Updating Implementation Plan, Security Controls/APs/CCIs and anything WRT the RMF/RMF AO package
    • Ensuring the verbiage for the responses addresses the Security Controls/APs/CCIs.
    • If referencing documentation, ensure the document, page number, section, etc. is mentioned
  • Technical planning and systems engineering to ensure IA compliance and the cyber posture with respect to availability, integrity, authentication, confidentiality, and non-repudiation of critical system information.
  • Provide ACAS scanning and STIG compliance checks on various standalone and networked systems.
  • Apply software patches and patch sets and upgrade software to network systems, and perform regression testing to ensure upgrades and patches have not corrupted the system.
  • Technical and Network Engineering services across systems life cycle.
  • Provide decision analysis, evaluation of alternatives and design and test support.
  • Technical engineering services, implementing disciplined and rigorous System Engineering and Network Engineering processes.
  • Day-to-day cybersecurity operations and maintenance of information technology (IT) resources including network support, server support, and policy development and enforcement.
  • Conduct DoD mandated cybersecurity scans and compliance checks on various networks/systems.
    • Defense Information System Agency (DISA) Assured Compliance Assessment Solution (ACAS) scans.
    • DISA Security Technical Implementation Guide (STIG) compliance checks.
  • Conduct Security Content Automation Protocol (SCAP) scans for automated STIG checks as required for validation of compliance for Navy Authorizing Official (NAO).
  • Perform software updates to systems.
    • Apply software patches and patch sets during maintenance windows.
      • Includes operating system (OS) patches released from DISA and available ton DISA’s patch repository website.
    • Upgrade software.
    • Conduct regression testing to ensure upgrades/patches have not corrupted the system.
  • Provide analytical and technical security recommendations to other team members.
  • Report any breaches of cybersecurity policies to the Information System Security Manager (ISSM) and director of the facility (i.e. unauthorized devices).
  • Track security baselines and attend configuration control board (CCB) meetings dealing with infrastructure/network upgrades, including major and minor hardware/software that will potentially affect the baseline that is approved.
  • Develop documentation to support ongoing system security operations, maintenance and specific problem resolution.
  • Develop and update Plan of Actions and Milestones (POA&M) based off of the ACAS, SCAP and STIG artifacts for continuous monitoring assessments.
Qualifications

Required Degree/Certification:

  • 5 years with BS/BA; 3 years with MS/MA; 0 years with PhD
    • Minimum certification as 541 (or similar as required by the Technical Instruction) at the Intermediate level per DoDD 8140.01, or successor.
    • All persons performing as Privileged Users are required to have and maintain a final adjudicated Tier 5 security investigation with an IT level-1 designation in Joint Personnel Adjudication System (JPAS) and/or Defense Information System for Security (DISS).
  • Required Experience:
    • Shall have a minimum of five (5) years of cybersecurity experience in performing system hardening.
    • Shall have demonstrated experience with performing STIG implementation.
    • Shall have demonstrated experience performing vulnerability assessments with the Assured Compliance Assessment Solution tool.
    • Shall have demonstrated experience remediating vulnerability findings to include implementing vendor patches on both Linux and Windows Operating systems.
  • Must have an active TS/SCI
  • Travel up to 25%
  • Work is onsite in Dam Neck (Virginia Beach, VA).

Target Salary Range

$86,000 - $138,000. This represents the typical salary range for this position based on experience and other factors.
SCA / Union / Intern Rate or Range

EEO

An Equal Opportunity Employer including Disability/Veteran.

Our Values

Benefits

At Peraton, our benefits are designed to help keep you at your best beyond the work you do with us daily. We’re fully committed to the growth of our employees. From fully comprehensive medical plans to tuition reimbursement, tuition assistance, and fertility treatment, we are there to support you all the way.

  • Paid Time-Off and Holidays
  • Retirement
  • Life & Disability Insurance
  • Career Development
  • Tuition Assistance and Student Loan Financing
  • Paid Parental Leave
  • Additional Benefits
  • Medical, Dental, & Vision Care
Happy man with his two children