Cybersecurity Systems Engineer
Listed on 2026-01-02
-
IT/Tech
Cybersecurity, Systems Engineer
Position:
Cybersecurity Systems Engineer
Location:McLean, VA
Description:Candidate will work closely with a diverse client project team responsible for cybersecurity engineering, development of technical guidance, information assurance functions, and/or achieving Authorizations to Operate. These functions will be applied to specific client IT programs or across a large enterprise of federated programs developed by different organizations. Depending on current team needs, the candidate will be responsible for leading or supporting one or more of the following security-focused disciplines: cybersecurity strategy, policy, and technical guidance;
enterprise security risk management and governance; IT security engineering and data protection requirements; enterprise and solution security architectures; and security assessment and authorization. Technical capability areas of focus include: large enterprise networks; cloud security services; data security tagging and curation; cross-domain solutions; enterprise audit; identity, credentials, access management, computer network defense, and incident response.
Cleared Solutions is a national security-focused, small business platform for highly skilled IT consultants and strategic advisers specializing in transforming legacy technical environments into modern, agile, and secure IT enterprises. Our expertise in Data/Information, IT Services/Applications, Cybersecurity/Information Assurance, and Counterintelligence/Insider Threats enables us to effectively operate from the C-Suite to the Dev-Suite working with partners and clients to solve the most difficult challenges.
We drive towards rapid decision making and high-quality, trusted, and comprehensive deliverables. Our consultants thrive in integrated contractor teams where collaboration with our corporate and government partners yield targeted, measurable, and mission-oriented results. We have multiple national security clients in the Washington Metro Area across multiple contract vehicles in need of top-notch talent.
- Clearance: Positions require U.S. Citizenship and active TS/SCI security clearance with polygraph.
- Degree: Bachelor’s, Master’s, or Doctorate Degree in Computer Engineering, Computer Science, Electrical Engineering, Information Systems, Information Technology, or a closely-related Engineering or IT discipline.
- Certifications: Prefer at least one certification in the cybersecurity field (e.g., CISSP, CEH, CHFI, Security +, CND-IR, GLSC, or SANS GSEC).
- Experience: Minimum 10 years (with minimum 5 years in the IC) developing, securing, integrating, deploying, maintaining, and evaluating systems.
- Large enterprise networks; cloud security services; data security tagging and curation; cross-domain solutions; enterprise audit; or identity, credentials, and access management.
- Security architectures, engineering requirements, specifications, and data protection and information assurance requirements for complex IT enterprise architectures and solutions.
- End-to-end life-cycle software development, to include test engineering or quality assurance.
- National security-related cybersecurity guidance (e.g., ICD 503, IC 503-03, IC 502, IC 502-1, IC 502-2, IC 502-04, IC 503-04, IC 500-27; TDF, EDH and ISM XML specifications; CNSS 1253; NIST SPs 800-30, 800-37, 800-39, 800-53, and 800-53a).
- Procedures and protocols required by the Federal Information Security Management Act of 2002; IA best practices; and IT enterprise standards and protocols within IT enterprise architectures.
- Assessment and authorization procedures, processes, and evaluations for IC IT systems (to include: networking systems, penetration testing, protocols, and vulnerability assessments).
- Security Body of Evidence, System Security Plans, and associated security risk management documentation.
- Collaboration with Subject Matter Experts (SMEs) to develop authorization packages in support of achieving Authority to Operate (ATO).
- Computer network defense procedures, processes, and protocols for IT enterprise architectures.
- Exploits, attacks, and tools used by skilled hackers, insider threat…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).