- Expertini Resume Scoring: Our Semantic Matching Algorithm evaluates your CV/Résumé before you apply for this job role: Information System Security Engineer (ISSE).
Urgent! Information System Security Engineer (ISSE) Job Opening In Dayton – Now Hiring Applied Research Solutions
**Description**
ARS is currently looking for an Information System Security Engineer (ISSE).
Our desire is to build a team of highly qualified professionals that will provide expertise in Cybersecurity, Cloud, and Systems Engineering, who will support the development and sustainment of unique secure enclaves at the edge, that provide enterprise services and cyber network defense capabilities to customers across the DoD.
This team will provide engineering expertise using technologies such as ePO, Splunk, ACAS, Azure Automation, STIG/SCAP, and other enterprise capabilities.
The Information Systems Security Engineer (ISSE) shall perform, or review, technical security assessments of computing environments to identify points of vulnerability, non-compliance with established Information Assurance (IA) standards and regulations and recommend mitigation strategies.
**Why Work with us?**
Applied Research Solutions (ARS) is respected as a world-class provider of technically integrated solutions as we deliver premier talent and technology across our focused markets for unparalleled, continuous mission support.
Awarded a Best Places to Work nominee since 2020, ARS recognizes that without our career- driven, loyal professionals, we would not be able to deliver state-of-the-art results for our mission partners.
We firmly believe that prioritizing our employees is of the upmost importance.
We provide a culture where our employees are challenged to meet their career goals and aspirations, while still obtaining a work/life balance.
ARS employees are motivated through our industry competitive benefits package, our awards and recognition program, and personalized attention from ARS Senior Managers.
**Responsibilities:**
+ Engineer unique solutions to support ongoing Cyber Threat and Cyber Defensive Operations.
+ Automate threat assessment and reporting activities.
+ Analyze and report system and organizational security posture trends to the ISSM/ISSO.
+ Provide cybersecurity recommendations to the ISSM based on significant threats and vulnerabilities.
+ Implement system security measures in accordance with established procedures to ensure confidentiality, integrity, availability, authentication, and non-repudiation.
+ Plan and recommend modifications or adjustments based on exercise results.
+ Mitigate or correct security deficiencies identified during security and certification testing and/or recommend risk acceptance to the ISSM
+ Audit support responsibilities
+ Analyze and report organizational security posture trends to the ISSM/ISSO
+ Analyze and report system security posture trends to the ISSM/ISSO
+ Apply security policies to meet security objectives of the system to the ISSM/ISSO
+ Assess adequate access controls based on principles of least privilege and need-to-know and reports findings to the ISSM/ISSO
+ Assess all the configuration management (change configuration/release management) processes and reports findings to the ISSM/ISSO
+ Assess the effectiveness of security controls and reports findings to the ISSM
+ Be able to develop procedures and test fail-over for system operations transfer to an alternate site based on system availability requirements
+ Ensure all systems security operations and maintenance activities are properly documented and updated as necessary
+ Ensure cybersecurity-enabled products or other compensating security control technologies reduce identified risk to an acceptable level and reports findings to the ISSM
+ Implement security measures to resolve vulnerabilities, mitigate risks and recommend security changes to system or system components as needed
+ Implement system security measures in accordance with established procedures to ensure confidentiality, integrity, availability, authentication, and non-repudiation
+ Mitigate/correct security deficiencies identified during security/certification testing and/or recommend risk acceptance to the ISSM
+ Plan and recommend modifications or adjustments based on exercise results or system environment
+ Properly document all systems security implementation, operations and maintenance activities and updates necessary
+ Provides cybersecurity recommendations to the ISSM based on significant threats and vulnerabilities
+ Verify and update security documentation reflecting the application/system security design features
+ Verify minimum security requirements are in place for all applications
+ Assists the ISSM/ISSO in identifying the security requirements for the system, including the confidentiality, integrity, and availability of data
+ Assists the ISSM/ISSO in describing and documenting the security controls that will be implemented to meet the security requirements
+ Assists the ISSM/ISSO in describing and documenting the procedures that will be used to manage security risks and incidents
+ Assists the ISSM/ISSO in describing and documenting how the security controls will be monitored and tested to ensure that they are effective
+ Assists the ISSM/ISSO in describing and documenting how changes to the system will be managed to minimize security risks
+ Assists the ISSM/ISSO in describing and documenting how the system will be recovered in the event of a security incident
+ Assists the ISSM/ISSO in the collection and organization of supporting documentation and diagrams needed for an Authority to Operate Package
+ Assists the ISSM/ISSO with conducting a security assessment of the system.
This includes identifying the system's assets, threats, vulnerabilities, and risks.
+ Assists the ISSM/ISSO with developing a risk management plan.
This plan identifies the security controls that will be implemented to mitigate the risks to the system.
+ Assists the ISSM/ISSO in writing the System Security Plan or updating a System Security Plan Addendum
+ Assists the ISSM/ISSO in reviewing and updating the System Security Plan or Addendum
+ Assists the ISSM/ISSO in ensuring that the SSP is compliant with applicable DoD security policies and procedures
+ Monitors and investigates security breaches
+ Educates employees or clients about security procedures and programs
+ Other duties as assigned
**Requirements:**
+ Must be a US citizen
+ Advanced technical competency and experience in one or more of the following areas: Active Directory Domain Services, Active Directory Federated Services, Active Directory Certificate Services, Windows Server Update Services, ePO, Splunk, STIG/SCAP, YUM, ACAS Automation, and Azure Monitor / Log Analytics.
+ Security+ Certification
+ 5+ years related experience in SCI/SAP environments.
+ Bachelor’s degree in computer science, Engineering, Finance, Business, or related field AND 3+ years leadership experience in relevant area of business OR equivalent experience.
+ 8-12 years demonstrated performance in related technology.
Minimum Security Clearance Required
+ Top Secret w/ SCI eligibility
Additional or Preferred Qualifications
+ 5+ years leadership experience in relevant area of business.
+ Technical certifications in Azure
All positions at Applied Research Solutions are subject to background investigations.
Employment is contingent upon successful completion of a background investigation including criminal history and identity check.
This contractor and subcontractor shall abide by the requirements of 41 CFR 60-741.5(a).
This regulation prohibits discrimination against qualified individuals on the basis of disability, and requires affirmative action by covered prime contractors and subcontractors to employ and advance in employment qualified individuals with disabilities.
This contractor and subcontractor shall abide by the requirements of 41 CFR 60-300.5(a).
This regulation prohibits discrimination against qualified protected veterans, and requires affirmative action by covered contractors and subcontractors to employ and advance in employment qualified protected veterans.
Equal Opportunity Employer/Protected Veterans/Individuals with Disabilities
This employer is required to notify all applicants of their rights pursuant to federal employment laws.
For further information, please review the Know Your Rights (https://www.eeoc.gov/poster) notice from the Department of Labor.
✨ Smart • Intelligent • Private • Secure
Practice for Any Interview Q&A (AI Enabled)
Predict interview Q&A (AI Supported)
Mock interview trainer (AI Supported)
Ace behavioral interviews (AI Powered)
Record interview questions (Confidential)
Master your interviews
Track your answers (Confidential)
Schedule your applications (Confidential)
Create perfect cover letters (AI Supported)
Analyze your resume (NLP Supported)
ATS compatibility check (AI Supported)
Optimize your applications (AI Supported)
O*NET Supported
O*NET Supported
O*NET Supported
O*NET Supported
O*NET Supported
European Union Recommended
Institution Recommended
Institution Recommended
Researcher Recommended
IT Savvy Recommended
Trades Recommended
O*NET Supported
Artist Recommended
Researchers Recommended
Create your account
Access your account
Create your professional profile
Preview your profile
Your saved opportunities
Reviews you've given
Companies you follow
Discover employers
O*NET Supported
Common questions answered
Help for job seekers
How matching works
Customized job suggestions
Fast application process
Manage alert settings
Understanding alerts
How we match resumes
Professional branding guide
Increase your visibility
Get verified status
Learn about our AI
How ATS ranks you
AI-powered matching
Join thousands of professionals who've advanced their careers with our platform
Unlock Your Information System Potential: Insight & Career Growth Guide
Real-time Information System Jobs Trends in Dayton, United States (Graphical Representation)
Explore profound insights with Expertini's real-time, in-depth analysis, showcased through the graph below. This graph displays the job market trends for Information System in Dayton, United States using a bar chart to represent the number of jobs available and a trend line to illustrate the trend over time. Specifically, the graph shows 13459 jobs in United States and 23 jobs in Dayton. This comprehensive analysis highlights market share and opportunities for professionals in Information System roles. These dynamic trends provide a better understanding of the job market landscape in these regions.
Great news! Applied Research Solutions is currently hiring and seeking a Information System Security Engineer (ISSE) to join their team. Feel free to download the job details.
Wait no longer! Are you also interested in exploring similar jobs? Search now: Information System Security Engineer (ISSE) Jobs Dayton.
An organization's rules and standards set how people should be treated in the office and how different situations should be handled. The work culture at Applied Research Solutions adheres to the cultural norms as outlined by Expertini.
The fundamental ethical values are:The average salary range for a Information System Security Engineer (ISSE) Jobs United States varies, but the pay scale is rated "Standard" in Dayton. Salary levels may vary depending on your industry, experience, and skills. It's essential to research and negotiate effectively. We advise reading the full job specification before proceeding with the application to understand the salary package.
Key qualifications for Information System Security Engineer (ISSE) typically include Other General and a list of qualifications and expertise as mentioned in the job specification. Be sure to check the specific job listing for detailed requirements and qualifications.
To improve your chances of getting hired for Information System Security Engineer (ISSE), consider enhancing your skills. Check your CV/Résumé Score with our free Resume Scoring Tool. We have an in-built Resume Scoring tool that gives you the matching score for each job based on your CV/Résumé once it is uploaded. This can help you align your CV/Résumé according to the job requirements and enhance your skills if needed.
Here are some tips to help you prepare for and ace your job interview:
Before the Interview:To prepare for your Information System Security Engineer (ISSE) interview at Applied Research Solutions, research the company, understand the job requirements, and practice common interview questions.
Highlight your leadership skills, achievements, and strategic thinking abilities. Be prepared to discuss your experience with HR, including your approach to meeting targets as a team player. Additionally, review the Applied Research Solutions's products or services and be prepared to discuss how you can contribute to their success.
By following these tips, you can increase your chances of making a positive impression and landing the job!
Setting up job alerts for Information System Security Engineer (ISSE) is easy with United States Jobs Expertini. Simply visit our job alerts page here, enter your preferred job title and location, and choose how often you want to receive notifications. You'll get the latest job openings sent directly to your email for FREE!