KEYW Corporation

  • Information Systems Security Engineer

    Job Locations 4 days ago(11/15/2018 10:53 AM)
    # of Openings
    Posted Date
    Default: Location : Location
    Job Locations
  • Responsibilities

    Oversees the efforts of security staff to design, develop, engineer and implement solutions to security requirements. Responsible for the implementation and development of the customer's IT security. Gathers and organizes technical information about an organization's mission goals and needs, existing security products, and ongoing programs in the MLS arena. Performs risk analyses that also include risk assessment. Provide support to plan, coordinate, and implement the organization’s information security. Provide support for facilitating and helping agencies identify their current security infrastructure and define future programs, design and implementation of security related to IT systems. A working knowledge of several of the following areas is required: understanding of business security practices and procedures; knowledge of current security tools available; hardware/software security implementation; different communication protocols; encryption techniques/tools; familiarity with commercial products, and current Internet/EC technology. Provides daily supervision and direction to staff.

    Operates, manages and monitors the health and status of Record Message Systems and world-wide ***Net communications / hardware and software applications, troubleshoots and performs corrective action on LAN/CAN/WAN/Messaging devices, networks, systems, and related problems/issues, provides technical expertise for the optimal performance of complex large-scale computer integrated networks/messaging systems, to include the processing, management, and monitoring of the distribution of Record and CRITIC Messages throughout the Intelligence Community. Monitors and manages the operation of ***Net networks, and NEWSSTAND, NEWSDEALER, Message Correction System, AVENUE, Defense Global Warning System, AMHS Report and Message Processor Messaging Systems, Messaging Bridge points, JWICS, CAT II, and NGC Detrick and related equipment/tools, (Matrix Switch, Smartgard, etc.). Oversees installation of new services to ensure compliancy with previously established processes and capabilities. Oversees network and messaging operation center. Orchestrates/monitors the maintenance/repair action of networks/systems/outages. Coordinates/corresponds with all responsible users and sites on network and messaging health and status issues.


    The candidate shall be able to: Identify overall security requirements for the proper handling of data, and assist architects and system developers in the identification and implementation of appropriate information security.
    Enforce the design and implementation of trusted relationships among external systems and architectures. Provide PMO interface to Certification and Accreditation (C&A) organization. Provide guidance to development and operational efforts regarding information assurance (IA) functions, particularly those focusing on strategic planning, infrastructure protection, and defensive strategy.Provide guidance to development and operational efforts regarding information assurance (IA) functions, particularly those focusing on strategic planning, infrastructure protection, and defensive strategy. Contribute to the security planning, assessment, risk analysis, risk management, certification and awareness activities for systems and networking operations. Advocate and recommend corporate solutions to resolve security requirements; interact with customers, IT staff and high-level corporate officers to define and achieve required IA objectives for the organization. Contribute in building security architecture; coordinate the integration of legacy systems; contribute to the acquisition/RDT&E environment and build IA into the system deployed to operational environments. Monitor and suggest improvements to policy; review certification and accreditation documentation.                                                                                                                                                        A working knowledge of following is required:
    • System security design process
    • Defense-in-depth/breadth
    • Engineering life cycle
    • Information domains
    • Cross-domain solutions
    • Identification, authentication and authorization
    • System integration
    • DCID 6/3
    • Risk management & contingency planning
    • Intrusion detection & incident handling
    • Configuration control & change management
    • Auditing, Certification and Accreditation (C&A)  process,
    • Principles of IA
    • Security testing.



    Basic Qualifications:

    The selected candidate must meet at least one of the following education requirements:

    • (8) years of relevant experience and a Bachelor’s degree
    • (6) years of relevant experience and a Master’s degree years of relevant experience and a Master’s degree
    • (10) years of experience and an associate’s degreeyears of experience and an associate’s degree 

    Certifications: DoD 8570 IAT Level 2 Certification

    About the Organization

    KeyW is a pure-play national security solutions provider for the Intelligence, Cyber and Counterterrorism Communities' toughest challenges. We support the collection, processing, analysis and dissemination of information across the full spectrum of their missions. We employ and challenge more than 2,000 of the most talented professionals in the industry with solving such complex problems as preventing cyber threats, transforming data into intelligence and combating global terrorism.


    KeyW, together with its direct and indirect subsidiaries, encourages and actively supports a policy of Equal Employment Opportunity and commits to provide equal opportunity to each individual, regardless of race, color, religion, gender, sexual orientation, age, national origin or ancestry, marital status, veteran status, disability or any other classifications protected by Federal, State or local law. In fact, we foster an environment that promotes diversity, balance and fun—because we believe in the importance of having a workplace as unique as the challenges we solve.


    This position requires a Top Secret/SCI security clearance, based on current background investigation (SBI), as well as the favorable completion of polygraph.  Clearance and polygraph processing will be completed by the U.S. Government.



    Sorry the Share function is not working properly at this moment. Please refresh the page and try again later.
    Share to your network!

    Need help finding the right job?

    We can recommend jobs specifically for you! Click here to get started.