logo

View all jobs

Cyber Systems Engineer (Engineer or Principal Level)

San Diego, Ca

Performs technical planning, system integration, verification and validation, cost and risk, and supportability and effectiveness analyses for total systems. Analyses are performed at all levels of total system product to include: concept, design, fabrication, test, installation, operation, maintenance and disposal. Ensures the logical and systematic conversion of customer or product requirements into total systems solutions that acknowledge technical, schedule, and cost constraints. Performs functional analysis, timeline analysis, detail trade studies, requirements allocation and interface definition studies to translate customer requirements into hardware and software specifications.

Tasking will include review of security alerts from CISCO, Windows, IAVMs and making recommendation to harden the MQ-8C system.  Candidate will be expected to support SW Static Code Analysis and disposition results.  In addition, the candidate will support execution of SE tasking thru the entire DoD development lifecycle.  Comfortable with and knowledge of SW, Systems Engineering methodology, and Cyber engineering would be helpful in this position.  Previous experience with requirements, architectures, integration, & application of Cyber

mitigations in DoD programs would also be helpful to the candidate. 

This role can be filled at either the Engineer or Principal Engineer Level.


Basic Qualifications for Engineer Level:

  • Bachelor’s in Science degree in a STEM discipline (Science, Technology, Engineering, Math) with 2 years of engineering experience OR Master’s in Science/Engineering with 0 years of engineering experience


Basic Qualifications for Principal Engineer Level:

  • Bachelor’s in Science degree in a STEM discipline (Science, Technology, Engineering, Math) with 5 years of engineering experience OR Master’s in Science/Engineering with 3 years of engineering experience OR a PhD with 1 year of relevant experience

Preferred Qualifications

  • Current DoD Top Secret clearance and the ability to obtain and maintain Special Program Access within a reasonable period of time in order to meet business needs
  • Experience with ACAS, SCAP and STIG verification on information systems
  • Systems Engineering and Integration experience including requirements definition, implementation, and integration.
  • Ability to travel up to 25% CONUS (although travel will most likely be up to 15% most years)
  • DoD 8570 IASAE Level III certification (e.g. CISSP) or ability to achieve in short term
  • Experience with the concepts of technical security controls and the RMF process as defined in NIST SP 800-53 and NIST SP 800-37
  • Current PAR (Program Access)
  • DoD 8570 IASAE Level III certification (e.g. CISSP)
  • Proficiency performing ACAS/SCAP scans on DoD weapon systems
  • Working knowledge of technical security controls and the RMF process as defined in NIST SP 800-53 and NIST SP 800-37 respectively  
  • Working knowledge of programming/scripting languages (e.g. C, C++, Python)
  • Proficiency with commercial Operating System (OS) system administration
  • Prior experience working on weapon and PIT systems
  • Experience remediating, mitigating, and documenting cybersecurity vulnerabilities; experience maintaining or supporting POA&M documentation
  • Experience defining software requirements and reviewing or developing verification tests.
  • Experience planning, proposing, and driving inclusion of engineering into Integrated Functional Capabilities (IFCs)
#cj

Share This Job

Powered by