More jobs:
Information Security Engineer Security Clearance
Job in
Philadelphia, Philadelphia County, Pennsylvania, 19113, USA
Listed on 2025-12-18
Listing for:
Eliassen Group
Full Time
position Listed on 2025-12-18
Job specializations:
-
IT/Tech
Cybersecurity, Systems Engineer
Job Description & How to Apply Below
Responsibilities The ISE will serve as the overall security point of contact for this contract. The ISE's full time duty location will be onsite at Aberdeen Proving Gound, MD. Must have experience in the following:
Writing Configuration Management (CM) Plans and audit software change procedures, software development, software testing, and software documentation to verify compliance with software CM plans and procedures.
Participating in design reviews, configuration audits, and evaluations of software products to ensure proper identification, control, and status accounting of the software baseline for each system.
Configuration Management tools (JIRA, puppet, Confluence, Git Hub etc) and scripting.
Implementing Configuration Management process in DEVSECOPS/ Agile development environment.
Qualifications Bachelor's Degree in Computer Science, or other Engineering or Technical discipline with an Information Security or Cyber Security Concentration. Security Clearance: TOP SECRET SCI.
Seven (7) years' experience within the last 9 years.
Seven years of professional experience, appropriate computing environment certification, and IA SYSTEM ARCHITECT AND ENGINEER (IASAE) SPECIALTY qualified in accordance with standards spelled out in DoD 8570.01-M and the Army Information Assurance (IA) Training and Certification Best Business Practice.
Experience can be substituted for the degree provided the person has BOTH the relevant experience AND is fully Information Assurance (IA) certified in accordance with AR 25-2, Information Assurance, and the associated best business practice for IA Training and certification (IA Training BBP).
Additional notes:
Candidate must have experience with:
Hardening Linux Network Segmentation Zero Trust (principles, etc) Penetration Testing Containerization (Kubernetes, etc) Infrastructure as a code tool/s
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
Search for further Jobs Here:
×