Specialist, Info Security Systems Engineer Secret - Boulder
Listed on 2025-12-02
-
IT/Tech
Cybersecurity, Systems Engineer, Network Security
Location: Broomfield
Specialist, Info Security Systems Engineer Secret - Boulder, CO
Join to apply for the Specialist, Info Security Systems Engineer Secret - Boulder, CO role at L3
Harris Technologies.
Get AI-powered advice on this job and more exclusive features.
L3
Harris is dedicated to recruiting and developing high-performing talent who are passionate about what they do. Our employees are unified in a shared dedication to our customers’ mission and quest for professional growth. L3
Harris provides an inclusive, engaging environment designed to empower employees and promote work-life success. Our culture is built on unwavering focus on values, dedication to our communities, and commitment to excellence in everything we do.
L3
Harris Technologies is the trusted disruptor in the defense industry. With customers’ mission-critical needs in mind, our employees deliver end-to-end technology solutions that connect the space, air, land, sea, and cyber domains for national security.
Job Title:
Specialist, Information Security Systems Engineer
Job Code: 31060
Job Location:
Boulder/North Denver, CO
Job Schedule:
9/80
Job Description:
Applies current systems security engineering methods, practices, and technologies to architecture, design, development, evaluation, and integration of systems and networks to maintain system security. Works closely with government customers to ensure security protection needs, concerns, and requirements are defined and implemented with appropriate fidelity and rigor early and sustainably throughout the life cycle, allowing system authorization. Works with systems developers or commercial product vendors to design and evaluate state-of-the-art secure systems, networks, and database products.
Uses methods such as encryption technology, vulnerability analysis, and security management. Responsible for integrating multiple methods into a cohesive security perimeter and environment and the policies and procedures needed to monitor and maintain such an environment. Prepares certification and accreditation documentation using multiple standards to achieve security authorization of supported systems. Represents program security needs, concerns, and requirements at customer meetings.
Functions
- Familiarity with RMF body of evidence documents (e.g., System Security Plan, Security Compliance Traceability Matrix, Risk Assessment Report, Continuous Monitoring Plan, Security Assessment Plans and Procedures).
- Familiarity with A&A package processing in eMASS and Xacta.
- Familiarity with DoD software selection and approval processes for COTS, GOTS and FOSS.
- Experience in applying DISA SRGs and STIGs.
- Experience in implementing and using cybersecurity tools (ACAS, SCAP, etc.).
- Support security engineering activities, including testing, configuration management, and maintenance of information systems and data.
- Assist program security in developing policies and procedures for emerging security technologies.
- Knowledge of security requirements, documentation, and risk mitigation strategies.
- Understanding of AWS cloud—including architecture, design, deployment, and management of cloud security technologies.
- Familiarity with Linux.
- Familiarity with security-related tools—SIEM, malware, HIPS, etc.
- Identify security risks, threats, and vulnerabilities of networks, systems, applications, and new technology initiatives (hardware, software, cross-domain solutions, cryptographic devices, firewalls, intrusion detection systems, anti-virus systems, and software deployment tools).
- Support vulnerability assessment activities as required.
- Support evaluation, qualification, testing, and delivery of security architecture improvement, obsolescence replacement, and vulnerability response projects.
- Ability to work individually or as part of a cybersecurity team; must lead and provide direction based on program and customer requirements and compliance.
- Possess excellent speaking abilities and skills to brief leadership and customers.
- Possess ability to conduct research on security and other applicable topics as needed as the cybersecurity lead.
- Must be a self-starter able to understand requirements, develop plans, and articulate needs to meet compliance…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).