Lead, Information Systems Security Engineer; Greenville, TX
Listed on 2025-12-25
-
IT/Tech
Cybersecurity, Systems Engineer, IT Consultant
L3
Harris is dedicated to recruiting and developing high-performing talent who are passionate about what they do. Our employees are unified in a shared dedication to our customers’ mission and quest for professional growth. L3
Harris provides an inclusive, engaging environment designed to empower employees and promote work-life success. Fundamental to our culture is an unwavering focus on values, dedication to our communities, and commitment to excellence in everything we do.
L3
Harris Technologies is the Trusted Disruptor in the defense industry. With customers’ mission-critical needs always in mind, our employees deliver end-to-end technology solutions connecting the space, air, land, sea and cyber domains in the interest of national security.
Job Title:
Lead, Information Systems Security Engineer
Job Code: 31728
Job Location:
Greenville, Texas
Schedule: 9/80
Job Description:Apply current systems security engineering methods, practices and technologies to the architecture, design, development, evaluation and integration of systems and networks to maintain system security. Works closely with Government customers to ensure that the security protection needs, concerns and requirements are defined and implemented with appropriate fidelity and rigor, early and in a sustainable manner throughout the life cycle of system that will allow for the security assessment and authorization of the system of interest.
Works with systems developers or commercial product vendors in the design and evaluation of state-of-the-art secure systems, networks, and database products. Uses methods such as encryption technology, vulnerability analysis and security management. Responsible for integration of multiple methods into a cohesive system security boundary and environment and the policies and procedures necessary to continuously monitor and maintain such an environment.
Configure and manage SEIM for high profile system in a live/operational environment.
May prepare assessment and authorization documentation, using multiple standards such as Risk Management Framework (RMF), Joint Special Access Implementation Guide (JSIG), DSS Assessment and Authorization Process Manual (DAAPM) and Common Criteria to achieve security authorization of supported systems. Maintains awareness of the most recent system security policies and directives to assist Systems Engineers, Project Engineers, other Information System Security Engineers, and Program Management with the analysis of user and system requirements and constraints.
Represents program system security needs, concerns and requirements at customer meetings.
Essential Functions:- Design and document application, network, and hardware.
- Responsible for data analysis and development of test plans and packages.
- Operate in a SAAS/PAAS environment.
- Develop test plans based on customer requirements.
- Develop and review strategies that align compliance requirements with enterprise products and services, networks, and cloud environments.
- Verify adherence to corporate and industry compliance standards and SLAs.
- Responsible for integration of multiple methods into a cohesive system security boundary and environment and the policies and procedures necessary to continuously monitor and maintain such an environment.
- Prepare assessment and authorization documentation, using multiple standards such as Risk Management Framework (RMF) to achieve security authorization of supported systems.
- Maintains awareness of the most recent system security policies and directives to assist Systems Engineers, Project Engineers, and other System Security Engineers, and Program Management with the analysis of user and system requirements and constraints.
- Represent program system security needs, concerns and requirements at customer meetings.
- Perform periodic vulnerability scans of systems to identify security vulnerabilities and provide remediation alternatives and conduct security risk assessments to ensure compliance with corporate security policies and adherence to best practices.
- Candidate must be willing to work a flexible job schedule to include off-shift work and occasional overtime.
- Bachelor’s Degree and…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).