Information System Security Engineer (ISSE)

United States-Virginia-Warrenton-20362-WTC

Amentum

Explore Amentum's commitment to global government and private-sector solutions. Learn about our global mission to drive mission success.

View all jobs at Amentum

Apply now Apply later

Information System Security Engineer (ISSE) - (CIS0003IG) 

Your Impact:

 

The mission of the Lone Wolf program is to support, operate, and maintain the Distributed Continuity Integrated Network – Top Secret Enterprise Services (DCIN-TS ES) which is a DoD-provided, TS/SCI, integrated voice, video, and data, global communications network that facilitates collaboration among senior leaders and key staff. The Lone Wolf program boasts a professional workforce comprised of specialists throughout the Information Technology lifecycle and who contribute to a positive work environment.  

The Lone Wolf Team is Mission Focused, Customer Oriented, Process Guided, and Solutions Driven. Candidates interested in joining the team must be critical thinkers, have a strong work ethic, and be able to work independently or as a member of a team in a dynamic environment that supports a critical and rewarding mission. We value candidates who are detail-oriented while also being able to think and react quickly to emerging and unique problem sets. To be successful, you must be able to rapidly adapt and learn how to operate the front and back end of new products and processes. The Team is expected to grow and is looking for people who can apply disciplined processes and provide imaginative solutions that enable the adoption of innovation and emerging technologies that create opportunities for transformative change. 

Responsibilities: 
The duties and responsibilities of the Information System Security Engineer (ISSE) include, but are not limited to, the following:

  • Experience creating custom dashboards, writing queries, building, and generating reports, and setting up alerts and notifications using all the Cyber tools (Splunk, Tenable, Trellix).
  • Demonstrated proficiency with recognizing and onboarding new data sources into the cyber tools and analyzing the data for anomalies and trends.
  • Primarily responsible for maintaining the test and operational environments to include all cybersecurity tool sets and collaborating with systems and network engineers.
  • Use knowledge, skills, and ability to conduct research for designing, integrating, and implementing security controls into current and future products/systems thus ensuring these systems can be accredited based on compliance with the Joint Special Access Program Implementation Guide (JSIG).
  • Recommend the components to implement system security requirements using intimate knowledge of security design best practices for information systems. throughout the system development life cycle to support the generation of the security engineering products.
  • Assist with the design, deployment, and administration of a multi-site, distributed Splunk environment. Including Multi-site Clustering, Search Head Clustering, Universal Forwarders, Deployer, and Deployment Server.
  • Configure, operate, and maintain Trellix and its components (ePolicy Orchestrator, Trellix Agent, Data Loss Prevention, Host Intrusion Prevention System, Policy Auditor, Asset Baseline Monitor, and Virus Scan Enterprise) on Windows and Linux creating exceptions to allow essential processes to continue uninterrupted.
  • Administration/operation of information security compliance tools/platforms with a special concentration in managing Tenable Security Center and NESSUS.
  • Provide Tier 1, 2, and 3 maintenance support for deployed cyber security technologies.
  • Assist with periodic and regular security assessments.
  • Assist with the development and maintenance of information security policies, standards, and control procedures to enable compliance with RMF.
  • Assist with POA&M management, mitigation statement formulation, and interfacing with system administrators to resolve open findings of high and at-risk systems.
  • Perform security assessments on hardware/software products to include physical, virtual, boundary, and security appliances.
  • Implement continuous monitoring tools and processes, development of improvements to security assessments regarding accuracy and efficiency as well as integration of new techniques to improve the confidentiality – integrity – availability of network/operational systems at multiple classifications levels.
 

Here's What You'll Need:

 

Requirements: 

  • Must be able to work a 40-hour work week, normally Monday through Friday. 
  • Ability to work overtime during critical peaks and be available to meet last minute requests for overtime if needed. 
  • Ability to travel (5-10%) primarily within 75 miles.
  • Familiarity with MS Office applications such as Excel, Word, Outlook, SharePoint, Project, and Visio.    
  • Exceptional attention to detail; excellent verbal and written communication skills; strong critical thinking, organizational, time-management, and problem-solving skills.      
  • Ability to work both independently and as part of a team in a dynamic environment.   

Clearance Required: 

  • Must have active Top-Secret clearance with SCI or TS with the ability to acquire SCI  

Minimum Education: 

  • High School Diploma

Minimum Years of Experience: 

  • 5 years of relevant experience
  • 2 years of experience in a Splunk role while working in a Splunk Clustered Environment
  • 2 years of knowledge and experience with NESSUS/ACAS and Trellix administration

Required Certifications:

  • Ability to meet or exceed DODD 8140/8570 IAM Level 3 Requirements, to include CE certification
  • At least one of the following certifications are required:
    • Splunk Core Certified Advanced Power User
    • Splunk Enterprise Certified Administrator
    • Splunk Enterprise Certified Architect
    • Splunk Core Certified Consultant

Preferred: 

  • Bachelor’s degree in IT related field

#javelin

 Amentum is proud to be an Equal Opportunity Employer. Our hiring practices provide equal opportunity for employment without regard to race, religion, color, sex, gender, national origin, age, United States military veteran’s status, ancestry, sexual orientation, gender identity, marital status, family structure, medical condition including genetic characteristics or information, veteran status, or mental or physical disability so long as the essential functions of the job can be performed with or without reasonable accommodation, or any other protected category under federal, state, or local law. Learn more about your rights under Federal EEO laws and supplemental language at EEO including Disability/Protected Veterans  and Labor Laws Posters

Primary Location

: United States-Virginia-Warrenton-20362-WTC

Job Posting

: Mar 20, 2025, 12:09:31 PM

Job

: Information Technology

Organization

: CMS

Job Type

: ExperiencedJob Classification: Fulltime-Regular

Work Locations

: 20362-WTC ..  Warrenton 20186-7628Capabilities: Cyber
Apply now Apply later

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  0  0  0

Tags: ACAS Clearance Clearance Required Compliance DoD DoDD 8140 DoDD 8570 IAM Intrusion prevention ISSE Linux Monitoring Nessus POA&M RMF Security assessment SharePoint Splunk Top Secret Travel TS/SCI Windows

Perks/benefits: Career development

Region: North America
Country: United States

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.