×
Register Here to Apply for Jobs or Post Jobs. X

Cyber Engineer - Annapolis Junction, MD Security Clearance

Job in Clinton, Prince George's County, Maryland, 20735, USA
Listing for: Unofficial M.C. Dean
Full Time position
Listed on 2026-02-12
Job specializations:
  • IT/Tech
    Cybersecurity, Systems Engineer
  • Engineering
    Cybersecurity, Systems Engineer
Salary/Wage Range or Industry Benchmark: 80000 - 100000 USD Yearly USD 80000.00 100000.00 YEAR
Job Description & How to Apply Below
Position: Cyber Engineer 4 - Annapolis Junction, MD with Security Clearance

Overview

About M.C. Dean M.C. Dean is Building Intelligence. We design, build, operate, and maintain cyber-physical solutions for the nation's mission-critical facilities, secure environments, complex infrastructure, and global enterprises. With over 7,000 employees, our capabilities span electrical, electronic security, telecommunications, life safety, automation and controls, audiovisual, and IT systems. Headquarters in Tysons, Virginia, M.C. Dean delivers resilient, secure, and innovative power and technology solutions through engineering expertise and smart systems integration.

Why Join Us? Our people are passionate about engineering innovation that improves lives and drives impactful change. Guided by our core values—agility, expertise, and trust—we foster a collaborative and forward-thinking work environment. At M.C. Dean, we are committed to building the next generation of technical leaders in electrical, engineering, and cybersecurity industries. Seeking a Cyber Engineer 4 that is able to work with a dynamic team of system engineers and administrators responsible for design, implementation, operations & maintenance, and cybersecurity for large complex resilient hardware and virtualized infrastructure.

This position will perform Cybersecurity / Information Assurance for all customer managed systems, applications, and hardware.

Responsibilities
  • Design, implement, and maintain Department of Defense provided Security and Vulnerability tools including Host Based Security System (HBSS), Splunk, and Microsoft Defender for Endpoints.
  • Support authorization/reauthorization efforts in alignment with the Department of Defense Risk Management Framework (RMF), NIST 800-53 (e.g. develop and apply Active Directory Group Policy Objects, develop deployment packages, etc.).
  • Analyze new security requirements, define courses of action, and design enterprise solutions, coordinating with engineering and operations teams to implement within the environment.
  • Formalize and execute a process for communicating vulnerability results in a manner understood by technical and non-technical stakeholders based on risk tolerance and impact to the environment.
  • Leverage vulnerability database sources to understand each weakness, its probability and remediation options, including vendor-supplied fixes and workarounds.
  • Design, implement, and maintain scripts used in asset discovery and vulnerability status.
  • Conduct continuous independent discovery and vulnerability scans/security assessments of enterprise-wide assets and proactive control testing.
  • Set up and execute Nessus scans; establish automated reporting.
  • Document, prioritize, and formally report asset and vulnerability state, along with remediation recommendations and validation.
  • Coordinate with system owners and system administrators/technical points of contact to identify system vulnerabilities, conduct vulnerability analysis, and formulate remediation strategies.
  • Develop packages for complex remediation efforts and coordinate with vulnerability remediation specialists for deployment.
  • Support and monitor patch management compliance across the infrastructure to align to audit requirements.
  • Identify and apply DISA Security Technical Implementation Guide (STIG) benchmarks.
  • Conduct manual STIG reviews.
  • Support preparation of Plan of Action & Milestones (POAM) development to support compliance and authorization/reauthorization activities.
  • Prepare and disseminate regular Cyber Compliance/vulnerability reporting; interact with the customer to explain results and address issues.
  • Contribute to the development of Standard Operating Procedures, Work Instructions, User Guides, and checklists.
  • Work as a team to consistently learn and share advanced skills and foster team excellence.
  • Actively collaborate with the ISSO to develop, maintain, and enhance cyber security controls.
  • Collaborate with security groups such as red teams, threat intelligence and risk management to form a holistic team dedicated to thwarting attackers and reducing attack surface.
Qualifications
  • Clearance/Citizenship:
    Applicants selected will be subject to a government security investigation and may meet eligibility requirements,…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary