Full Time Employee Contractor
Senior Cyber Security Engineer
CGI is looking for a Senior Cyber Security Engineer with expert knowledge and experience in computer security or network management and engineering including implementing and deploying a variety of security measures, technologies, and tools to protect and manage networks and systems. You will be responsible for integration and implementation of the computer system security solution.
Deeply involved in a wide range of security issues including architectures, firewalls, electronic data traffic, and network access.
Analyses are performed at all levels of total system product to include: concept, design, fabrication, test, installation, operation, maintenance, and disposal.
Uses encryption technology, penetration and vulnerability analysis of various security technologies, and information technology security research.
Deeply involved in the design and development of new systems, applications, and solutions for external customer enterprise-wide cyber systems and networks.
Provides analysis, evaluation, and recommendations designed to promote economy, efficiency, and effectiveness in the customer's security program.
Supports the logical and systematic conversion of customer or product requirements into total systems solutions that acknowledge technical, schedule, and cost constraints.
Integrates new architectural features into existing infrastructures, designs cyber security architectural artifacts, provides architectural analysis and relates existing system to future needs and trends, embeds advanced forensic tools and techniques for attack reconstruction, provides engineering recommendations, and resolves integration/testing issues. May interface with external entities including law enforcement, and intelligence/government agencies.
Provides support for cross-agency security initiatives such as Trusted Internet Connection (TIC) compliance, Information Security Continuous Monitoring Mitigation (ISCM), Identity, Credential, and Access Management (ICAM), Anti-Phishing & malware defense (APMD), and Continuous Diagnostics and Mitigation (CDM).
Perform protocol analysis and possesses knowledge of LAN and WAN data communications protocols (TCP/IP, IPv6, MPLS).
Provides support for monitoring, planning, and coordinating the distribution of client/server software and service packs. Can provide on-call support or emergency on-site support and resolution activities related to desktop, security and network O&M.
Provides consultation for recommendations for new equipment and services to purchase and works with various vendors for procurement.
Conducts risk assessments and provide recommendations for application design. Experience in a wide range of security issues including architectures, firewalls, electronic data traffic, and network access. Analyses are performed at all levels of total system product to include: concept, design, fabrication, test, installation, operation, maintenance, and disposal.
Provides consultations, briefings, training, and white papers as required.
Possesses superior oral and written communications skills to clearly and effectively convey issues, reports, and other deliverables to SSA counterparts.
Possesses expert knowledge of Federal laws and regulations, directives, instructions, policy, standards, and guidance, so that requirements support security and privacy compliance. Possesses expert knowledge of FedRAMP requirements and guidance.
Possesses expert knowledge of the Federal Cybersecurity Strategy and Implementation Plan (CSIP) (refer to OMB M-16-04) and related OMB and DHS cyber security initiatives to align business process and requirements with cross-Agency goals.
Possesses expert knowledge of IT and Financial Management laws and OMB circulars, and the Federal Information System Controls Audit Manual (FISCAM).
Experienced expert of network/security engineering with experience in managing networks or security in large national organizations with large user populations.
Experience in large scale LAN /MAN/WAN, voice and telecommunications development, engineering, operations and maintenance. Including but not limited to topologies, configurations, network/security analyses, operations and maintenance, routing, switch management, configuration, traffic analysis, etc.
Experience with the administration of the network infrastructure to include desktop PCs; servers; network equipment, including DASD; and software applications.
Experience identifying, assessing, and recommending appropriate solutions related to SSA systems/network technologies.
Possesses experience with Windows XP/VISTA/2003 Server platforms with an emphasis on Active Directory (AD); strong background in Exchange 2003/2007 messaging system; and Windows scripting skills.
Possesses solid knowledge of LAN/MAN/WAN configurations, to include experience with Cisco routers and switches, Internet firewalls, Load Balancers, Network Access Control, and wireless technologies. Experience setting up and managing database systems, such as SQL Server. Experience with unified communications systems, can consult on enterprise options and Quality of Service (QOS) schemes.
Experience leading teams to manage security environment and perform intrusion detection, vulnerability and risk analysis, and assisting or participating in a variety of computer security penetration studies during all phases of the SDLC.
Experience in leading teams to engineer, and manage all facets of network development, management, security, operations including fault management, configuration control, performance monitoring, de and activations, back-ups, and provide service (re)starts. Experience in providing advice in support of network or security analyses, briefings, reports, consultations, problem resolution, user assistance, and preparing white papers and other research.
Expert and experienced supporting and/or directing the work of specialists engaged in total Direct Access Storage Device (DASD) operations, management of batch production DASD pools, DASD backup/ error recovery maintenance responsibilities, and batch production program and procedural library updates and maintenance. Also, supports developing, maintaining, and monitoring procedures for server backups.Desired Certifications: Certified Authorization Professional (CAP), Certified Cyber Forensics Professional (CCFP), Certified Cloud Security Professional (CCSP), Certified Information Systems Security Professional (CISSP), Certified Secure Software Lifecycle Professional (CSSLP), HealthCare Information Security and Privacy Practitioner (HCISPP), or Systems Security Certified Practitioner (SSCP), or networking certifications from Cisco or other organizations (CCNP, CCIE, JNCIE-ENT, CompTIA Network+, WCNA, etc.)
This is a great opportunity to join a winning team. CGI offers a competitive compensation package with opportunities for growth and professional development. Benefits for full-time, permanent members start on the first day of employment and include a paid time-off program and profit participation and stock purchase plans.
We wish to thank all applicants for their interest and effort in applying for this position, however, only candidates selected for interviews will be contacted.
No unsolicited agency referrals please.
All CGI offers of employment in the U.S. are contingent upon the ability to successfully complete a background investigation. Background investigation components can vary depending upon specific assignment, or upon any US government security clearance if required. Qualified applicants will receive consideration for employment without regard to their race, color, religion, sex, gender Identity, sexual orientation, national origin, age, disability, veteran status, pregnancy, or other status protected by law. CGI will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. However, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by the employer, or (c) consistent with CGI?s legal duty to furnish information.