What are the responsibilities and job description for the CT Information Systems Security Engineer position at Probity Inc.?
PLEASE NOTE: This position requires an ACTIVE Top Secret/SCI Clearance. To be considered for this position, you MUST have an ACTIVE Clearance Level of Top Secret/SCI
Position Code: 07-SC0326-1
Location: Tysons or Warrenton
JOB DESCRIPTION:
The ISSE will lead and execute security engineering activities across complex, enterprise-scale environments. This role requires deep technical expertise across infrastructure, platforms, and applications, combined with expert-level, hands-on experience implementing the NIST Risk Management Framework (RMF) within federal government environments. The ideal candidate is a technical practitioner, not just an advisor – someone who can design, implement, assess, and secure systems end-to-end while directly supporting system authorization, continuous monitoring, and risk based decision-making. This role also serves as the technical focal point for all security incidents, leading triage, investigation, and resolution efforts in coordination with program and enterprise security teams.
QUALIFICATIONS:
Position Code: 07-SC0326-1
Location: Tysons or Warrenton
JOB DESCRIPTION:
The ISSE will lead and execute security engineering activities across complex, enterprise-scale environments. This role requires deep technical expertise across infrastructure, platforms, and applications, combined with expert-level, hands-on experience implementing the NIST Risk Management Framework (RMF) within federal government environments. The ideal candidate is a technical practitioner, not just an advisor – someone who can design, implement, assess, and secure systems end-to-end while directly supporting system authorization, continuous monitoring, and risk based decision-making. This role also serves as the technical focal point for all security incidents, leading triage, investigation, and resolution efforts in coordination with program and enterprise security teams.
QUALIFICATIONS:
- Bachelor’s Degree in Computer Science, IT, or a related technical discipline, or the equivalent combination of education, technical training, or work/military experience
- Minimum ten (10) years of related cyber security engineering experience
- Proven hands-on Cyber Security Engineer SME, not policy-only or audit-only
- Comfortable working across network, system, platform, and application layers
- Deep understanding of how security controls are actually implemented and validated
- Experience in federal RMF-driven environments
- Able to bridge security, engineering, and compliance effectively
- Experienced in managing security incidents from detection through resolution
- Skilled at balancing immediate incident response needs with long-term security improvements
- Effective collaborator across organizational boundaries during high-pressure security events
- Operate independently as the technical authority for system security engineering
- Demonstrate the ability to provide technical hands-on configuration, validation, and assessment of security controls
- Translate RMF and NIST requirements into real-world technical implementations
- Communicate complex technical security issues clearly to both technical and non-technical stakeholders
- Maintain a strong balance between security compliance and operational practicality
- Lead rapid response to security incidents with minimal guidance
- Demonstrate strong analytical and troubleshooting skills under pressure during active security events
- Effectively communicate incident status, impact, and remediation progress to technical and leadership audiences
- Security & Compliance
- Expert-level experience with NIST Risk Management Framework (RMF) in federal government environments
- Strong knowledge of:
- NIST SP 800-53
- NIST SP 800-37
- NIST SP 800-30
- Direct involvement I ATO packages, control implementation, and assessments
- Hands-on experience with Security Information and Event Management (SIEM) platforms (e.g., Splunk, ELK Stack, ArcSight, QRadar)
- Demonstrated experience in security incident detection, analysis, and response
- Proven ability to triage security alerts and determine criticality and impact
- Infrastructure & Platforms (Hands-On)
- Networking (e.g., routing, switching, firewalls, load balancers, network security controls)
- Operating Systems:
- Windows Server
- Linux (RHEL, CentOS)
- Virtualization and storage platforms
- Databases (SQL and/or NoSQL)
- Data platforms (e.g., HPCC, Hadoop/Cloudera)
- Web services, APIs, and application architectures
- Software development environments and CI/CD pipelines
- Security tooling (e.g., vulnerability scanners, endpoint protection, SIEM)
- Engineering Experience
- Security engineering and system hardening
- Vulnerability discovery and remediation
- Secure system design and architecture reviews
- Technical documentation supporting RMF compliance
- Experience in cloud environments (AWS, Azure, GCP, CI) within federal RMF contexts
- Experience with DevSecOps practices
- Hands-on experience with containerization and orchestration (Docker, Kubernetes)
- Hands-on experience with infrastructure-as-code
- Knowledge of federal overlays (e.g., DoD, FISMA High/Moderate)
- Relevant certifications (preferred, not required):
- CISSP
- CAP
- CISM
- Security
- Cloud Security
- Certified Ethical Hacker
- Experience with guiding and directing junior engineers and information systems security officer (ISSO)
- Experience with security orchestration, automation, and response (SOAR) platforms
- Background in threat hunting and proactive security monitoring
- Relevant incident response certifications
- Serve as the Cyber Security Engineer SME, providing hands-on security engineering across all system layers (infrastructure, platform, and application)
- Engineer, implement, and validate security controls in accordance with NIST SP 800-53 and RMF requirements
- Lead and support RMF lifecycle activities (Categorize, Select, Implement, Assess, Authorize, Monitor)
- Perform security engineering for:
- Network architectures and boundary protections
- Windows and Linux operating systems
- Storage and virtualization platforms
- Databases and data platforms
- Web services, APIs, and application stacks
- Custom and COTS/GOTS software solutions
- Provide technical input to RMF artifacts, including:
- System Security Plans (SSP)
- Security Control Assessments (SCA) support
- POA&Ms
- Risk assessments and security impact analyses
- Collaborate with system owners, architects, developers, ad operations teams to embed security into system design and implementation
- Support ATO, re-authorization, and continuous monitoring activities
- Identify security risks and provide practical, technically sound mitigation strategies
- Participate in security reviews, technical design reviews, and vulnerability remediation efforts
- Serve as technical l point of contact for all security incidents affecting the program
- Lead triage and analysis of new security alerts from SIEM, IDS/IPS, and other security monitoring tools
- Drive remediation efforts for recurring security alerts, identifying root causes and implementing systemic fixes
- Coordinate incident response activities between program stakeholders and enterprise security operations
- Act as primary liaison between program teams and enterprise security for incident escalation, resolution, and reporting
- Perform forensic analysis and technical investigations of security events
- Document security incidents, response actions, and lessons learned
- Develop and maintain runbooks and playbooks for common security incident types