×
Register Here to Apply for Jobs or Post Jobs. X

Lead, Information Systems Security Engineer; Greenville, TX

Job in Greenville, Hunt County, Texas, 75402, USA
Listing for: L3Harris Technologies
Per diem position
Listed on 2025-12-10
Job specializations:
  • IT/Tech
    Cybersecurity, Systems Engineer
  • Engineering
    Cybersecurity, Systems Engineer
Salary/Wage Range or Industry Benchmark: 80000 - 100000 USD Yearly USD 80000.00 100000.00 YEAR
Job Description & How to Apply Below
Position: Lead, Information Systems Security Engineer (Greenville, TX)

Lead, Information Systems Security Engineer (Greenville, TX)

2 days ago Be among the first 25 applicants

Job Title

Lead, Information Systems Security Engineer

Job Code

31728

Location

Greenville, Texas

Schedule

9/80

Job Description

L3

Harris Technologies is the Trusted Disruptor in the defense industry. With customers’ mission‑critical needs always in mind, our employees deliver end‑to‑end technology solutions connecting the space, air, land, sea and cyber domains in the interest of national security.

Apply current systems security engineering methods, practices and technologies to the architecture, design, development, evaluation and integration of systems and networks to maintain system security. Work closely with Government customers to ensure that the security protection needs, concerns and requirements are defined and implemented with appropriate fidelity and rigor, early and in a sustainable manner throughout the life cycle of the system that will allow for the security assessment and authorization of the system of interest.

Work with systems developers or commercial product vendors in the design and evaluation of state‑of‑the‑art secure systems, networks, and database products. Use methods such as encryption technology, vulnerability analysis and security management. Responsible for integration of multiple methods into a cohesive system security boundary and environment and the policies and procedures necessary to continuously monitor and maintain such an environment.

Configure and manage SEIM for high‑profile system in a live/operational environment.

May prepare assessment and authorization documentation, using multiple standards such as Risk Management Framework (RMF), Joint Special Access Implementation Guide (JSIG), DSS Assessment and Authorization Process Manual (DAAPM) and Common Criteria to achieve security authorization of supported systems. Maintain awareness of the most recent system security policies and directives to assist Systems Engineers, Project Engineers, other Information System Security Engineers, and Program Management with the analysis of user and system requirements and constraints.

Represent program system security needs, concerns and requirements at customer meetings.

Essential Functions
  • Design and document application, network, and hardware.
  • Responsible for data analysis and development of test plans and packages.
  • Operate in a SAAS/PAAS environment.
  • Develop test plans based on customer requirements.
  • Develop and review strategies that align compliance requirements with enterprise products and services, networks, and cloud environments.
  • Verify adherence to corporate and industry compliance standards and SLAs.
  • Responsible for integration of multiple methods into a cohesive system security boundary and environment and the policies and procedures necessary to continuously monitor and maintain such an environment.
  • Prepare assessment and authorization documentation, using multiple standards such as Risk Management Framework (RMF) to achieve security authorization of supported systems.
  • Maintain awareness of the most recent system security policies and directives to assist Systems Engineers, Project Engineers, and other System Security Engineers, and Program Management with the analysis of user and system requirements and constraints.
  • Represent program system security needs, concerns and requirements at customer meetings.
  • Perform periodic vulnerability scans of systems to identify security vulnerabilities and provide remediation alternatives and conduct security risk assessments to ensure compliance with corporate security policies and adherence to best practices.
Qualifications
  • Candidate must be willing to work a flexible job schedule to include off‑shift work and occasional overtime.
  • Bachelor’s Degree and minimum 9 years of prior relevant experience. Graduate Degree and a minimum of 7 years of prior related experience. In lieu of a degree, minimum of 13 years of prior related experience.
  • Requires strong knowledge of job area typically obtained through advanced education combined with experience. Typically viewed as having a specialty within discipline. May have broad knowledge of project…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary