Cyber Engineer

Colorado Springs, CO

Full Time Entry-level / Junior Clearance required USD 75K - 80K
Apply now Apply later

MKS2 Technologies, LLC, an award-winning high growth small business, creates innovative and customer-centric technology solutions in the areas of Cyber Security, Instructional Design and Training, Software Engineering and IT Support Services to improve the security and well-being of our clients. Our commitment to excellence and our “Mission First” orientation has resulted in steady growth and an expanding client base across government agencies. We have employees nationwide and for the past three consecutive years were named one of the fastest growing Veteran-owned companies in the nation. Please take a moment to browse through our website and learn more about what it means to serve with MKS2.

 

The successful candidate will be expected to communicate and work closely with Operational ISSOs in direct support of the Operational eMASS packages managed by the A&A team. Additionally, a qualified candidate will need to work closely with System owners, Cyber peers, Program Office technical/management staff, and other C2BMC Functional Areas to ensure the fielded system attains and maintains appropriate Authorization for Connection, Test, and Operational purposes. The selected candidate is expected to assist with Cyber Products analysis, Vulnerability mitigation, and POA&M Management to assist the team in the successful delivery of eMASS Packages and Ports Protocols, and Services (PPS) in accordance with contract schedules. Primary focus for the qualified candidate will rotate and blend technical documentation, surge support for authorization packages in eMASS, assessing vulnerabilities, engineering responses for system POA&Ms, proposal support, and conducting risk analysis for Risk Acceptance Requests (RARs).

Experience Required

· The position requires a strong working knowledge of Cyber capabilities such as patch management, multi-factor authentication, host-based security, intrusion detection, security event management, active/passive system scanning, and defense-in-depth. Recent experience and familiarity with creating/updating Assessment and Authorization (A&A) packages for RMF Authority to Operate (ATOs) is required. Application experience hardening Windows and Linux servers and workstations in accordance with GPOs, IAVMs, and STIGs is desired. Network design and software engineering backgrounds are a plus. IAT Level 2 certification required at start.

Technical Skills Required

· The position requires security engineering skills with a working knowledge of Information Assurance (IA) technology, NIST standards, DoDI 8500.2, and Risk Management Framework (RMF) Security Controls. The successful candidate must have experience in the Agile Development Lifecycle to include generating requirements, architecture design, configuring Cyber audit tools, conducting verification, and performing Cyber vulnerability, and Cyber configuration activities. Leadership experience and effective interpersonal skills are required with a demonstrated ability to support complex organizational relationships. Excellent technical document preparation and verbal communication skills are required for presentation of technical Cyber issues and reports to the Government, Program Management, and other C2BMC Functional Areas.

· Recent hands-on experience with Agile execution, tools, and methodologies is highly preferred.

 

Highly Desired:

· Experience with using Scripting Languages such as Python and PowerShell to solve complex data analysis problems along with in depth cyber vulnerability analysis experience is highly desired. Familiarity with vulnerability scanning and analysis tools such as ACAS (Tenable.sc / Nessus Vulnerability scanner), Evaluate-STIG, STIG Manager, and Trivy are also highly desirable.

Education Required

· Entry-level to experienced, but still a learner typically with an advanced degree and 0 years experience or bachelors degree and 0-2+ years experience or equivalent; some use and/or application of technical principles, theories, and concepts; develops solutions to problems of limited to moderate scope and complexity; work may be closely supervised while following specific, detailed instructions or under general supervision; failure to achieve results may result in the allocation of additional resources and cause delays in program schedules; contacts are primarily with immediate supervisor, project leaders and internal to company or group with infrequent customer contacts. May also include non-exempt personnel involved in technical work with appropriate education and/or specialized training and 0 to 7+ years experience or equivalent.

· Secret clearance required

· IAT Level II Required

$75,000-$80,000

 

 

Diversity creates a healthier atmosphere: MKS2 Technologies is proud to be an Equal Employment Opportunity / Affirmative Action employer, and all qualified applicants will receive consideration for employment without regard to race, color, religion, sex, age, national origin, protected veteran status, disability status, sexual orientation, gender identity or expression, marital status, genetic information, or any other characteristic protected by law.

Apply now Apply later
Job stats:  3  1  0

Tags: ACAS Agile Clearance Clearance Required eMASS Intrusion detection Linux Nessus NIST POA&M PowerShell Python Risk analysis Risk Assessment Report Risk management RMF Scripting STIGs Vulnerabilities Windows

Perks/benefits: Startup environment

Region: North America
Country: United States

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.