Information System Security Engineer - Senior
Listed on 2026-01-02
-
IT/Tech
Cybersecurity, Systems Engineer
Job Description - Information System Security Engineer - Senior (CIS
0003ZB)
Your Impact:
Are you interested in using your skills to help shape the Cyber, Security, & Intel space? If so, look no further. Amentum is seeking a Senior Information System Security Engineer (ISSE) to join our team of passionate individuals in Warrenton, VA. In this role you will support challenging, mission‑critical projects that make a direct impact on the Nation’s security and intelligence mission.
The mission of the Lone Wolf program is to support, operate, and maintain the Distributed Continuity Integrated Network – Top Secret Enterprise Services (DCIN‑TS ES) which is a DoD‑provided, TS/SCI, integrated voice, video, and data, global communications network that facilitates collaboration among senior leaders and key staff. The Lone Wolf program boasts a professional workforce comprised of specialists throughout the Information Technology lifecycle and who contribute to a positive work environment.
The Lone Wolf Team is Mission Focused, Customer Oriented, Process Guided, and Solutions Driven. Candidates interested in joining the team must be critical thinkers, have a strong work ethic, and be able to work independently or as a member of a team in a dynamic environment that supports a critical and rewarding mission. We value candidates who are detail‑oriented while also being able to think and react quickly to emerging and unique problem sets.
To be successful, you must be able to rapidly adapt and learn how to operate the front and back end of new products and processes. The Team is expected to grow and is looking for people who can apply disciplined processes and provide imaginative solutions that enable the adoption of innovation and emerging technologies that create opportunities for transformative change.
- Experience creating custom dashboards, writing queries, building, and generating reports, and setting up alerts and notifications using all the Cyber tools (Splunk, Tenable, Trellix).
- Demonstrated proficiency with recognizing and onboarding new data sources into the cyber tools and analyzing the data for anomalies and trends.
- Primarily responsible for maintaining the test and operational environments to include all cybersecurity tool sets and collaborating with systems and network engineers.
- Use knowledge, skills, and ability to conduct research for designing, integrating, and implementing security controls into current and future products/systems thus ensuring these systems can be accredited based on compliance with the Joint Special Access Program Implementation Guide (JSIG).
- Recommend the components to implement system security requirements using intimate knowledge of security design best practices for information systems. throughout the system development life cycle to support the generation of the security engineering products.
- Assist with the design, deployment, and administration of a multi‑site, distributed Splunk environment. Including Multi‑site Clustering, Search Head Clustering, Universal Forwarders, Deployer, and Deployment Server.
- Configure, operate, and maintain Trellix and its components (ePolicy Orchestrator, Trellix Agent, Data Loss Prevention, Host Intrusion Prevention System, Policy Auditor, Asset Baseline Monitor, and Virus Scan Enterprise) on Windows and Linux creating exceptions to allow essential processes to continue uninterrupted.
- Administration/operation of information security compliance tools/platforms with a special concentration in managing Tenable Security Center and NESSUS.
- Provide Tier 1, 2, and 3 maintenance support for deployed cyber security technologies.
- Assist with periodic and regular security assessments.
- Assist with the development and maintenance of information security policies, standards, and control procedures to enable compliance with RMF.
- Assist with POA&M management, mitigation statement formulation, and interfacing with system administrators to resolve open findings of high and at‑risk systems.
- Perform security assessments on hardware/software products to include physical, virtual, boundary, and security appliances.
- Implement continuous monitoring tools and…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).