Security Engineer

General Dynamics IT has an opening for a Security Engineer with strong communication and technical skills that will support the designs and defines enterprise architecture for applications and infrastructure in support of the Department of Commerce Enterprise Security Operations Center (ESOC) and the NOAA Cyber Security Center (NCSC).

The ESOC provides cybersecurity monitoring and situational awareness across the DOC, and in the future will likely expand to provide security services to other agencies in the DOC.

The NCSC provides cybersecurity support across four major functional support groups; the NOAA Security Operations Center (SOC), NOAA Computer Incident Response Team (N-CIRT), System Administration Staff (SAS), and Enterprise Security Solutions (ESS).

The candidate must be a US Citizen and be able to obtain Department of Commerce vetting clearance.

Specific roles & responsibilities for the position include but not limited to the following:

  • Performs Computer Security Incident Response activities for a large organization, coordinates with other government agencies to record and report incidents.

  • Monitor and analyze Intrusion Detection Systems (IDS) to identify security issues for remediation.

  • Recognizes potential, successful, and unsuccessful intrusion attempts and compromises thorough reviews and analyses of relevant event detail and summary information.

  • Evaluate firewall change requests and assess organizational risk.

  • Communicates alerts to agencies regarding intrusions and compromises to their network infrastructure, applications and operating systems.

  • Assists with implementation of counter-measures or mitigating controls.

  • Ensures the integrity and protection of networks, systems, and applications by technical enforcement of organizational security policies, through monitoring of vulnerability scanning devices.

  • Performs periodic and on-demand system audits and vulnerability assessments, including user accounts, application access, file system and external Web integrity scans to determine compliance.

  • Prepares incident reports of analysis methodology and results.

  • Provides guidance and work leadership to less-experienced technical staff members.

  • Maintains current knowledge of relevant technology as assigned.

  • Participates in special projects as required.

Additional experience in the following:

  • Comprehensive knowledge of data security administration principles, methods, and techniques.

  • Certification in one or more specific technologies may be required, depending on job assignment.

  • Requires familiarity with domain structures, user authentication, and digital signatures.

  • Requires understanding of firewall theory and configuration.

  • Requires understanding of DHS/DoD policies and procedures, including FIPS 199, FIPS 200, NIST 800-53, DHS 4300A SSH and other applicable policies.

NIST NICE Cybersecurity Workforce Framework Alignment:

  • Knowledge of the following: computer networking concepts and protocols, and network security methodologies, risk management processes (e.g., methods for assessing and mitigating risk), laws, regulations, policies, and ethics as they relate to cybersecurity and privacy, cybersecurity and privacy principles, cyber threats and vulnerabilities, specific operational impacts of cybersecurity lapses, computer algorithms, encryption algorithms, database systems, organization's enterprise information security architecture, organization's evaluation and validation requirements, electrical engineering as applied to computer architecture (e.g., circuit boards, processors, chips, and computer hardware), resiliency and redundancy, installation, integration, and optimization of system components, human-computer interaction principles, cybersecurity and privacy principles and organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation), information security systems engineering principles (NIST SP 800-160), information technology (IT) security principles and methods (e.g., firewalls, demilitarized zones, encryption), local area and wide area networking principles and concepts including bandwidth management, mathematics (e.g.

    logarithms, trigonometry, linear algebra, calculus, statistics, and operational analysis), microprocessors, network access, identity, and access management (e.g., public key infrastructure, Oauth, OpenID, SAML, SPML), operating systems, how traffic flows across the network (e.g., Transmission Control Protocol [TCP] and Internet Protocol [IP], Open System Interconnection Model [OSI], Information Technology Infrastructure Library, current version [ITIL]), parallel and distributed computing concepts, policy-based and risk adaptive access controls, Privacy Impact Assessments, process engineering concepts, secure configuration management techniques.

    (e.g., Security Technical Implementation Guides (STIGs), cybersecurity best practices on, software development models (e.g., Waterfall Model, Spiral Model), software engineering, structured analysis principles and methods, system design tools, methods, and techniques, including automated systems analysis and design tools, system software and organizational design standards, policies, and authorized approaches (e.g., International Organization for Standardization [ISO] guidelines) relating to system design, system life cycle management principles, including software security and usability, systems testing and evaluation methods, telecommunications concepts (e.g., Communications channel, Systems Link Budgeting, Spectral efficiency, Multiplexing), the systems engineering process, Supply Chain Risk Management Practices (NIST SP 800-161), interpreted and compiled computer languages, information technology (IT) supply chain security and supply chain risk management policies, requirements, and procedures, critical infrastructure systems with information communication technology that were designed without system security considerations, network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth), network systems management principles, models, methods (e.g., end-to-end systems performance monitoring), and tools, service management concepts for networks and related standards (e.g., Information Technology Infrastructure Library, current version [ITIL]), security models (e.g., Bell-LaPadula model, Biba integrity model, Clark-Wilson integrity model), Personally Identifiable Information (PII) data security standards, Payment Card Industry (PCI) data security standards, Personal Health Information (PHI) data security standards, security management, an organization's information classification program and procedures for information compromise, countermeasure design for identified security risks, cryptology, embedded systems, Information Theory (e.g., source coding, channel coding, algorithm complexity theory, and data compression), network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services, network design processes, to include understanding of security objectives, operational objectives, and trade-offs, access authentication methods.

  • Skills such as the following: conducting vulnerability scans and recognizing vulnerabilities in security systems, designing countermeasures to identified security risks, designing security controls based on cybersecurity principles and tenets, designing the integration of hardware and software solutions, developing and applying security system access controls, discerning the protection needs (i.e., security controls) of information systems and networks, evaluating the adequacy of security designs, conducting audits or reviews of technical systems, integrating and applying policies that meet system security objectives, the use of design modeling (e.g., unified modeling language), cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).

  • Abilities such as the following: identify systemic security issues based on the analysis of vulnerability and configuration data, , apply the methods, standards, and approaches for describing, analyzing, and documenting an organization's enterprise information technology (IT) architecture (e.g., Open Group Architecture Framework [TOGAF], Department of Defense Architecture Framework [DoDAF], Federal Enterprise Architecture Framework [FEAF]), ask clarifying questions, communicate complex information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means, conduct vulnerability scans and recognize vulnerabilities in security systems, produce technical documentation analyze test data, translate data and test results into evaluative conclusions, apply network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth), apply secure system design tools, methods and techniques, apply system design tools, methods, and techniques, including automated systems analysis and design tools, ensure security practices are followed throughout the acquisition process, design architectures and frameworks, collaborate effectively with others, function in a collaborative environment, seeking continuous consultation with other analysts and experts—both internal and external to the organization—to leverage analytical and technical expertise, participate as a member of planning teams, coordination groups, and task forces as necessary, understand objectives and effects, understand the basic concepts and issues related to cyber and its organizational impact, apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation), identify critical infrastructure systems with information communication technology that were designed without system security considerations.


  • Bachelor's Degree in Computer Science or a related technical discipline, or the equivalent combination of education, professional training or work experience.

  • 5-8 years of related experience in data security administration.

As a trusted systems integrator for more than 50 years, General Dynamics Information Technology provides information technology (IT), systems engineering, professional services and simulation and training to customers in the defense, federal civilian government, health, homeland security, intelligence, state and local government and commercial sectors.With approximately 32,000 professionals worldwide, the company delivers IT enterprise solutions, manages large-scale, mission-critical IT programs and provides mission support services.GDIT is an Equal Opportunity/Affirmative Action employer.

All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status, or any other protected class.


Apply for this ad Online!

Share Job