Skip to content

Cyber Lead Engineer
Company | KBR |
---|
Location | El Segundo, CA, USA |
---|
Salary | $160000 – $195000 |
---|
Type | Full-Time |
---|
Degrees | Bachelor’s |
---|
Experience Level | Expert or higher |
---|
Requirements
- Must have an active TS/SCI clearance to be considered for this position
- Bachelor’s degree in Cybersecurity, Engineering, or a related scientific or technical discipline
- Key developer of system security plans, Security Assessment Plans/Reports, Risk Assessment Plan/Report, Plan of Action and Milestones (POA&M), and associated cybersecurity artifacts
- Experience working in a system program office fielding a new capability
- Ability to translate cybersecurity related policies and guidance into system requirements
- Coordinate with customer to determine priorities and lead solution development for customer approval
- Ability to clearly articulate complex cybersecurity concepts in coherent, logical format to secure customer approval and support execution
- Mentor Jr team members to increase System Security Engineering capabilities and improve customer support
- Familiarity with cybersecurity assessment and authorization processes such as the Risk Management Framework
- Familiarity with mission based risk assessment methodologies used by the DoD
- Understanding of common vulnerabilities and application of compensating controls or mitigation strategies
- Familiarity with cybersecurity policy and processes, architectures, testing and evaluation procedures
- Articulate complicated security concepts in cross-functional planning, coordination and task execution across the spectrum of systems engineering and integration activities
- Ability to sort through complex issues, prioritize them accordingly, and elevate to management as necessary
- Strong written and verbal communications skills
- Understanding of risk management principles and their application within an information system
- Familiarity with key management and cryptographic concepts
- Experience with system integration and system test and evaluation activities required by the DoD acquisition framework
Responsibilities
- Lead IT architecture design reviews to assess and ensure compliance with cybersecurity requirements
- Ensure cybersecurity principles are embedded in systems engineering efforts for ground and space systems
- Integrate the Risk Management Framework throughout the system acquisition lifecycle
- Develop, coordinate, and implement cybersecurity strategies as a sub-component of the Program Protection Plan
- Create, review, and assess RMF related artifacts for acceptable implementation of cybersecurity principles
- Evaluate and apply government cybersecurity (DoD, NIST, FIPS, and CNSS) policies and instructions as necessary
- Conduct program and technical risk assessments to determine necessary cybersecurity protection measures
- Consult with customer and developers to implement System Security Engineering principles to develop appropriate cybersecurity architectures
- Interface with other government organizations during security evaluation of engineering design solutions
- Provide technical security evaluation support to the SCA during contractor assessment and authorization activities
- Integrate cybersecurity assessments into developmental and operational testing and evaluation plans
- Evaluate the continued effectiveness of implemented protection measures within the authorization boundary
- Plan and facilitate missing based cyber risk assessments to assess the security of the system to provide resilient capability to the warfighter
Preferred Qualifications
- 10+ years of work experience in Information Assurance/Cybersecurity
- Master’s Degree in Cybersecurity, Engineering, or a related scientific or technical discipline
- Cybersecurity certification (IAM Level III) in accordance with DoD 8570.01-M guidance
- Previous experience supporting military satellite communications programs such as Milstar, AEHF, GPS, SMART-T
- Effective interpersonal and team-building skills, to engage at both the engineer and management levels to build confidence and collaboration between team members
- Understanding and experience in the acquisition life cycle for information systems
- Experience in security control evaluation, testing, and assessment in complex system environments
- Experience with NSA cryptography solutions and key management processes