logo

View all jobs

Cyber Systems Engineer (Principal or Sr. Principal level)

San Diego, Ca

The candidate will perform technical planning, system integration, verification and validation, cost and risk, and supportability and effectiveness analyses for total systems. Analyses are performed at all levels of total system product to include: concept, design, fabrication, test, installation, operation, maintenance and disposal. Ensures the logical and systematic conversion of customer or product requirements into total systems solutions that acknowledge technical, schedule, and cost constraints. Performs functional analysis, timeline analysis, detail trade studies, requirements allocation and interface definition studies to translate customer requirements into hardware and software specifications. Leverage leadership skills to engage their customer counterpart as well as other stakeholders to drive improvements into the weapon system’s cyber security posture. The SSE will report within the Systems Engineering Integration Team (SEIT) organization. Additionally, the SSE will support cyber security and certification/accreditation tasks as defined in DODI 8500.01. The ideal candidate is not only an experienced technical leader with exceptional skills in communication and stakeholder engagement, but they are also a highly motivated self-starter. This role will require up to 25% travel in support of enterprise SSE needs.

RESPONSIBILITIES:

  • Mission-Based Cyber Risk Assessment
  • Identification of risks via vulnerability assessment, attack path analysis, Cyber Table-Top, etc.
  • Development of recommendations for remediation and/or mitigation of vulnerabilities.
  • Direct engagement and planning with all necessary stakeholders (Software Engineering, Systems Engineering, Program Management, etc.) to drive incorporation of recommendations into the weapon system.
  • Support to development cyber scanning events on lab and field assets throughout completion of development program.
  • Completion of STIG checklists to achieve ATO.
  • Create, updating/maintain RMF Packages.
  • Preparation of ATO artifacts to include: IA SOP, SSP, SCTM, RAR, POA&M, SAP.
  • Review of PPSM ports/protocol data against IDD/ICD.


This position can be filled at either the Principal or Sr. Principal Level, based on the qualifications below.

BASIC QUALIFICATIONS

At Principal Level:

  • Bachelor's Degree in STEM discipline plus 5 years of relevant experience OR Master's Degree in STEM discipline with 3 years of relevant experience; OR PhD in STEM discipline with 0 years of relevant experience.

At Sr. Principal Level:

  • Bachelor's Degree in STEM discipline plus 9 years of relevant experience OR Master's Degree in STEM discipline with 7 years of relevant experience; OR PhD in STEM discipline with 5 years of relevant experience.

At Either Level:

  • Current DoD Top Secret clearance and Special Program Access
  • Systems Engineering and Integration experience including requirements definition, implementation, and integration.
  • Ability to travel up to 25% CONUS (although travel will most likely be up to 15% most years).

PREFERRED QUALIFICATIONS AT EITHER LEVEL:

  • DoD 8570 IASAE Level III certification (e.g. CISSP) or ability to achieve in short term.
  • Experience with ACAS, SCAP and STIG verification on information systems.
  • Experience with the concepts of technical security controls and the RMF. process as defined in NIST SP 800-53 and NIST SP 800-37.
  • Current PAR (Program Access).
  • DoD 8570 IASAE Level III certification (e.g. CISSP).
  • Proficiency performing ACAS/SCAP scans on DoD weapon systems.
  • Working knowledge of technical security controls and the RMF process as defined in NIST SP 800-53 and NIST SP 800-37 respectively.  
  • Working knowledge of programming/scripting languages (e.g. C, C++, Python).
  • Proficiency with commercial Operating System (OS) system administration.
  • Prior experience working on weapon and PIT systems.
  • Experience remediating, mitigating, and documenting cyber security vulnerabilities; experience maintaining or supporting POA&M documentation.
  • Experience defining software requirements and reviewing or developing verification tests.
  • Experience planning, proposing, and driving inclusion of engineering into Integrated Functional Capabilities (IFCs).

This position reports to San Diego, CA, USA, however, this position can also be worked from Palmdale, CA, CA, USA.

#cj

Share This Job

Powered by