Information Security Engineer (DCGS-A Integration)

All applicants must possess a current Top Secret/SCI security clearance.
Semper Valens is looking for HBSS, IAVA, and IA Subject Matter Experts (SMEs) to support our government customer.
The Information Security Engineer job duties may include:
oIASAE Level II positions responsible for design, development, implementation, and/or integration of a DoD IA architecture, system, or system component for use within the NE.
oIncumbents ensure that IA related IS will be functional and secure within the Network Environment and consequently the System of Systems environment. DoD 8570.01-M spells out the tasks and duties in detail and the DFARS stipulates compliance with the DoD 8570.01-M.
oIdentify information protection needs for the NE. Define NE security requirements in accordance with applicable IA requirements.
oProvide system related input on IA security requirements to be included in statements of work and other appropriate procurement documents.
oDesign security architectures for use within the NE. Design and develop IA or IA-enabled products for use within a NE.
oDevelop and implement security designs for new or existing network system(s).
oEnsure that the design of hardware, operating systems, and software applications adequately address IA security requirements for the NE.
oDesign, develop, and implement network security measures that provide confidentiality, integrity, availability, authentication, and non-repudiation.
oDevelop IA architectures and designs for DoD IS with medium integrity and availability requirements, to include MAC II systems with a medium Level-of-Concern for availability or integrity IASAE Level II Functions in DoD 8570.01-M.
o5 plus years of experience is required
oBachelors Degree
oDegree with concentration in Information Security or Cyber Security preferred.
oIA Trained/Certified
All applicants must possess a current Top Secret/SCI security clearance.

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.

More Jobs

Training/DCGS-A MI Systems Maintainer/Integrat...
Engine Mechanic I - A-10
Tucson, AZ DynCorp International LLC.
Network Administrator: F-35 Autonomic Logistic...
Glendale, AZ BAE Systems
Tucson, AZ Air National Guard Units
Supervisor, Field Service Engineer
Phoenix, AZ Thermo Fisher Scientific
Tucson, AZ Air National Guard Units