Cyber Engineer - Annapolis Junction, MD Security Clearance
Listed on 2026-02-12
-
IT/Tech
Cybersecurity, Systems Engineer -
Engineering
Cybersecurity, Systems Engineer
Overview
About M.C. Dean M.C. Dean is Building Intelligence. We design, build, operate, and maintain cyber-physical solutions for the nation's mission-critical facilities, secure environments, complex infrastructure, and global enterprises. With over 7,000 employees, our capabilities span electrical, electronic security, telecommunications, life safety, automation and controls, audiovisual, and IT systems. Headquarters in Tysons, Virginia, M.C. Dean delivers resilient, secure, and innovative power and technology solutions through engineering expertise and smart systems integration.
Why Join Us? Our people are passionate about engineering innovation that improves lives and drives impactful change. Guided by our core values—agility, expertise, and trust—we foster a collaborative and forward-thinking work environment. At M.C. Dean, we are committed to building the next generation of technical leaders in electrical, engineering, and cybersecurity industries. Seeking a Cyber Engineer 4 that is able to work with a dynamic team of system engineers and administrators responsible for design, implementation, operations & maintenance, and cybersecurity for large complex resilient hardware and virtualized infrastructure.
This position will perform Cybersecurity / Information Assurance for all customer managed systems, applications, and hardware.
- Design, implement, and maintain Department of Defense provided Security and Vulnerability tools including Host Based Security System (HBSS), Splunk, and Microsoft Defender for Endpoints.
- Support authorization/reauthorization efforts in alignment with the Department of Defense Risk Management Framework (RMF), NIST 800-53 (e.g. develop and apply Active Directory Group Policy Objects, develop deployment packages, etc.).
- Analyze new security requirements, define courses of action, and design enterprise solutions, coordinating with engineering and operations teams to implement within the environment.
- Formalize and execute a process for communicating vulnerability results in a manner understood by technical and non-technical stakeholders based on risk tolerance and impact to the environment.
- Leverage vulnerability database sources to understand each weakness, its probability and remediation options, including vendor-supplied fixes and workarounds.
- Design, implement, and maintain scripts used in asset discovery and vulnerability status.
- Conduct continuous independent discovery and vulnerability scans/security assessments of enterprise-wide assets and proactive control testing.
- Set up and execute Nessus scans; establish automated reporting.
- Document, prioritize, and formally report asset and vulnerability state, along with remediation recommendations and validation.
- Coordinate with system owners and system administrators/technical points of contact to identify system vulnerabilities, conduct vulnerability analysis, and formulate remediation strategies.
- Develop packages for complex remediation efforts and coordinate with vulnerability remediation specialists for deployment.
- Support and monitor patch management compliance across the infrastructure to align to audit requirements.
- Identify and apply DISA Security Technical Implementation Guide (STIG) benchmarks.
- Conduct manual STIG reviews.
- Support preparation of Plan of Action & Milestones (POAM) development to support compliance and authorization/reauthorization activities.
- Prepare and disseminate regular Cyber Compliance/vulnerability reporting; interact with the customer to explain results and address issues.
- Contribute to the development of Standard Operating Procedures, Work Instructions, User Guides, and checklists.
- Work as a team to consistently learn and share advanced skills and foster team excellence.
- Actively collaborate with the ISSO to develop, maintain, and enhance cyber security controls.
- Collaborate with security groups such as red teams, threat intelligence and risk management to form a holistic team dedicated to thwarting attackers and reducing attack surface.
- Clearance/Citizenship:
Applicants selected will be subject to a government security investigation and may meet eligibility requirements,…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).