FIND PERSONALIZED JOBS
Sign up to Zippia and discover your career options with your personalized career search.
Sorry, we can't find that. Please try a different city or state.

Information Assurance Engineer

This job has expired and is no longer available.
APPLY NOW
Apply Now
×
FIND
PERSONALIZED JOBS

Sorry, we can't find that. Please try a different city or state.

CONTENT HAS
BEEN UNLOCKED
Close this window to view unlocked content
or
find interesting jobs in

Log In

Log In to Save

Sign Up to Save

Sign Up to Dismiss

Sign Up

SIGN UP TO UNLOCK CONTENT

or

The email and password you specified are invalid. Please, try again.

Email and password are mandatory

Forgot Password?

Don't have an account? Sign Up

reset password

Enter your email address and we will send you a link to reset your password.

Back to Log In

Log In

Log In to Save

Sign Up to Save

Sign Up to Dismiss

Sign up to save the job and get personalized job recommendations.

Sign up to dismiss the job and get personalized job recommendations.

or

The email and password you specified are invalid. Please, try again.

Email and password are mandatory

Already have an account? Log in

reset password

Enter your email address and we will send you a link to reset your password.

Back to Log In

Company Saved

Answer a few questions and view jobs at that match your preferences.

Where do you want to work?

Job Saved

See your Saved Jobs now

or

find more interesting jobs in

Job Dismissed

Find better matching jobs in

Your search has been saved!

Top 50 Information Assurance Engineer Skills

Below we've compiled a list of the most important skills for an Information Assurance Engineer. We ranked the top skills based on the percentage of Information Assurance Engineer resumes they appeared on. For example, 7.2% of Information Assurance Engineer resumes contained Vulnerability Assessments as a skill. Let's find out what skills an Information Assurance Engineer actually needs in order to be successful in the workplace.

These are the most important skills for an Information Assurance Engineer:

1. Vulnerability Assessments

demand arrow
high Demand
Here's how Vulnerability Assessments is used in Information Assurance Engineer jobs:
  • Run retina scans based on the latest patch updates to produce vulnerability assessments and remediation reports for system security analysis.
  • Performed vulnerability assessments, determine residual security risks, prepare certification test findings reports, and provide formal accreditation recommendations
  • Developed framework for proper vulnerability assessment of target systems, creating a repeatable process for vulnerability assessments.
  • Perform complex security related testing and vulnerability assessments, utilizing open source and industry specific tools.
  • Conduct risk and vulnerability assessments of planned and installed information systems to identify protection needs.
  • Conduct network vulnerability assessments, tests and reviews as required by applicable security directives.
  • Initiated network vulnerability assessments acting as on-site liaison for Defense Information Systems Agency.
  • Conducted risk and vulnerability assessments of planned and existing information systems.
  • Performed vulnerability assessments on a variety of unmanned and military systems.
  • Planned monthly vulnerability assessments in coordination with business operations.
  • Performed vulnerability assessments and produced risk mitigation plans.
  • Conduct vulnerability assessments for supported contracts.
  • Perform composite risk analysis of systems, vulnerability assessments, and penetration testing to ensure systems are as secure as possible.
  • Performed vulnerability assessments using Retina Scanner for the Fort Hood NIPR/SIPR networks.
  • Review risk and vulnerability assessments of IT systems.

Show More

22 Vulnerability Assessments Jobs

No jobs at selected location

2. Information Technology

demand arrow
high Demand
Here's how Information Technology is used in Information Assurance Engineer jobs:
  • Facilitate the accreditation of DoD and Federal Information technology systems and utilize technical skills to assess and implement required system controls.
  • Certified and accredited DoS information technology systems, classified and unclassified, in compliance with Department and National directives.
  • Experience with information technology infrastructure, applying DoD policy, direction and guidance to customer environments.
  • Utilized penetration and vulnerability analysis of various security technologies, and information technology security research.
  • Reviewed and analyzed existing, new, and updates to information technology related documentation.
  • Acted as Information Assurance Specialist in the Fort Riley information technology security section.
  • Acted as local information technology installation manager for main interior building.
  • Evaluated proposals for the acquisition of Information Technology products and services.
  • Assisted with proposal development regarding information technology and existing contract responsibilities.
  • Coordinate with maintenance, Contract specialists and Information Technology personnel.
  • Attend bi-weekly meetings with contractor representatives regarding information technology and address any information assurance (IA) issues that may arise.
  • Support Information Technology Infrastructure Library (ITIL) methodology by monitoring Service Level Agreement (SLA) management and analysis.
  • Established the plans and requirements for an Information Technology System used to capture calibration data throughout the Marine Corps.
  • Provided leadership to other employees on information technology operating systems, platforms, vulnerabilities, devices and tools.
  • Manage and conduct training for groups of 8-16 students on various information technology networking concepts and theory.
  • Have primary focus on opportunities in Information Assurance and Information Technology in the Huntsville area.
  • Developed supporting document files to support IA from the Information Technology and Budget perspectives.
  • Reviewed information technology investments and security practices to ensure that appropriate levels of information security practices are maintained.

Show More

18 Information Technology Jobs

No jobs at selected location

3. Ensure Compliance

demand arrow
high Demand
Here's how Ensure Compliance is used in Information Assurance Engineer jobs:
  • Create and review DIACAP documentation and system security certification activities to ensure compliance with security requirements.
  • Monitored the unit security program to ensure compliance with security requirements.
  • Helped develop, implement and ensure compliance to a Marine Corps wide Quality Manual based on internationally accepted standards.
  • Oversee one other scanner and system administrators running scans to ensure compliance with proper scanning processes is followed.
  • Analyzed, designed, and implemented business processes and requirements to ensure compliance with security policies and procedures.
  • Work with support and security coordination team to ensure compliance with security processes and controls.
  • Performed Information Assurance (IA) testing to ensure compliance with DoDI 8510.2.
  • Coordinate with users and their requirements and to ensure compliance with the network.
  • Assist in network architectural designs to ensure compliance within the DIACAP boundary.
  • Performed IA configuration inspections to ensure compliance with policies and guidelines.
  • Provided technical support to ensure compliance with DODI 8500.2 IA Controls.

Show More

1 Ensure Compliance Jobs

No jobs at selected location

4. DOD

demand arrow
high Demand
Here's how DOD is used in Information Assurance Engineer jobs:
  • Managed the DoD Information Assurance requirements for maintaining training records, security checks, accreditation records, and vulnerability assessments.
  • Briefed site commanders on findings and recommended compliance actions and types of escalations needed depending on DoD vulnerability severity.
  • Coordinated and supported Department of Defense Intelligence Information System (DoDIIS) Certification.
  • Implemented Snort signatures into SiteProtector system for custom DoD detection requirements.
  • Ensured compliance with national, DOD and Air Force directives governing physical, operational, computer, and communications security.
  • Traveled to remote sites (Hawaii, Virginia) to conduct IA activities in support of DoD accreditation processes.
  • Spearheaded campaign to gain membership into the DoD's Defense Industrial Base (DIB), information exchange program.
  • Developed and published Information Security policies, procedures, standards, and guidelines based on NIST and DoD guidelines.
  • Determined IA protection required for AIS systems and networks processing sensitive and classified information on DOD resources.
  • Gained proficiency in creating and maintaining assets in DoD's Vulnerability Management System (VMS).
  • Tracked DoD Information Assurance Certification and Accreditation Process (DIACAP) for SPAWAR sponsored systems.
  • Worked on Certification and Accreditation (C&A) projects for DoD clients.
  • Interacted with other DoD and Civilian representatives on the NCSLI Standards Writing Committee.
  • Attend IA forums discussing new security technologies and procedures adapted by the DoD.
  • Ensured site adherence to the DoD Directive 8570 for their Information Security Personnel.
  • Provided DoD Information Assurance for Defense Information Systems Agency (DISA/CIO/IAB).
  • Gained and maintained working knowledge of DIACAP and DoDI 8500.2 security controls.
  • Result: Improved security posture to align with DoDi 8500 series standards.
  • Implement and enforce all DoD information system IA policies and procedures.
  • Instructed Network Walkthrough class to train personnel how to perform Network Device security audits as per DoD guidance.

Show More

81 DOD Jobs

No jobs at selected location

5. Acas

demand arrow
high Demand
Here's how Acas is used in Information Assurance Engineer jobs:
  • Performed Assured Compliance Assessment Solution (ACAS), Scans Performed Security Compliance Automation Protocol Scans.
  • Served as primary on the ACAS tool and analyzed scans to determine risk.
  • Scan, analyze and document system vulnerabilities in ACAS or Retina.
  • Loaded, configured, and administered ACAS on Linux OS.
  • Trained to use ACAS for scanning duties.
  • Support monthly ACAS scans and ad hoc scans to support test events at the AFGPSF.
  • Provided ACAS System Administration, and management for the AFJWICS Western Conus ESC.
  • Implement ACAS site solution Maintain security software.

Show More

8 Acas Jobs

No jobs at selected location

Job type you want
Full Time
Part Time
Internship
Temporary

6. Disa

demand arrow
high Demand
Here's how Disa is used in Information Assurance Engineer jobs:
  • Studied disaster recovery processes and requirements, mitigation, and resumption strategies necessary for continuation of businesses during and post-incident.
  • Developed supporting security documents, training plans, implemented DISA security requirements, validated configurations.
  • Perform data backups and disaster recovery operations.
  • Developed a DISA level standard IV&V hardening guide to validate the EA provided hardening guides (checklist).
  • Served as the technical representative for the DISA integration of the Cross Domain Enterprise Solution (CDES).
  • Book Boss supervising team to develop GMD Disaster Recovery and Continuity of Operations Plan (DRCOOP).
  • Work includes development of a DISA Regional Computer Emergency Response Team (R-CERT).
  • Review all STIG drafts released by DISA for professional input prior to official release.
  • Developed certification package per DITSCAP, DIACAP, MHS/TMA and DISA security policies.
  • Worked with DISA to plan and design new circuits for DISN customers.
  • Design and configuration of secure ATM video-telephone systems at DISA-Europe.
  • Assist in creating Disaster Recovery and Contingency Plan.
  • Provided cyber security training in software development, social engineering, and disaster recovery.
  • Conducted DC and Reston LAN disaster recovery exercises and preparation of exercise reports summary.
  • Converted and integrated all applicable DISA STIGs and checklists into a database providing a repository of over 2,000 security controls.
  • Selected security controls based on system s classification and created baseline using DISA STIGs and NIST 800-53.
  • Participate in Disaster Recovery (DR)/Business Continuity Planning/DR Walk Thru Tests and Exercises.
  • Conducted IA configuration validation using SCAP and STIGs to maintain compliance with DISA.
  • Configure Solaris server to required security standards as define by the Defense Information System Agency (DISA).
  • Performed DIACAP/NIST Validation Testingof DISA STIGs utilizing ACAS/eMASS/SCAP tools on Docked Navy ships & vessels.

Show More

14 Disa Jobs

No jobs at selected location

7. System Security Plan

demand arrow
high Demand
Here's how System Security Plan is used in Information Assurance Engineer jobs:
  • Maintained and updated information system security documentation for 96 Center system security plans.
  • Create System Security Plans and supporting accreditation documentation for compliance with customer requirements (NISPOM, JAFAN, RMF JSIG).
  • Prepare, maintain and implement System Security Plans that accurately depict the customer's contractual requirements.
  • Oversee general policy support for hardware and software security by updating the system security plan.
  • Assisted in authoring, testing, certification and accreditation of system security plans.
  • Developed method to maintain an up-to-date System Security Plan (SSP).
  • Prepare and review system security plans prior to submission for accreditation.
  • Review DOE Headquarters system security plans and provide feedback.
  • Conduct review of assessment artifacts (Assessment Test Plans, System Security Plans, Security Requirements Traceability Matrix, etc.)
  • Review and, as required, prepare the system security plans and diagrams supporting the accreditation process through the Xacta database.

Show More

7 System Security Plan Jobs

No jobs at selected location

8. Retina

demand arrow
high Demand
Here's how Retina is used in Information Assurance Engineer jobs:
  • Perform, interpret, and report finding of vulnerability assessments using Retina Network Security Scanner tool.
  • Performed regular security and vulnerability audits using Retina and DISA Gold Disk scanning.
  • Used multiple vulnerability scanning and assessment tools such as E-eye Retina, SRR's, Tenable, manual checks, etc.
  • Configured Retina settings such as the Audit ID, commercial audits, and custom audits, etc.
  • Developed policy and procedures for the conduction of Retina and SCAP scans to include manual checks.
  • Reviewed Retina scans, DISA STIG and SRR results for compliance with security policies and practices.
  • Used Retina to perform vulnerability scans and assessment on all three networks in IC.
  • Analyzed data from Retina Scans.
  • Have expertise using the required tools including SECSCAN, WASSP, RETINA, and ACAS (NESSUS) DISA STIGS.
  • Assist with vulnerability detection and remediation process using eEye Retina network scanning and Tenable SecurityCenter Compliance Monitoring.
  • Performed network vulnerability assessments using Nessus, WebInspect, and Retina and various other security tools.
  • Run all retina scans for all the servers at Ft. Belvoir that are on the network for ISM and RFMSS systems.
  • Trained individuals in the use of ISS - Internet Security Scanner and eEye Retina Scanner.
  • Perform vulnerability assessments utilizing eEye Retina, DISA Gold Disk and other DOD approved tools.
  • Performed risk assessments and security test evaluations using DoD Gold Disk and eEye Retina Scans.
  • Audited vulnerability scan results from GoldDisk, eEye Retina and manual checklists.
  • Utilized Eeye Retina and Hercules to ensure compliance of over 150 systems.
  • Well-versed with eEye Retina network scanner.
  • Install and configure applications such as Windows OS, Retina, McAfee HBSS, and Symantec Antivirus, and Juniper NMS/firewall.
  • Performed vulnerability assessments, analysis and penetration testing using various tools including Nessus, Retina, NetScout, Nmap and Wireshark.

Show More

7 Retina Jobs

No jobs at selected location

9. Information Security

demand arrow
high Demand
Here's how Information Security is used in Information Assurance Engineer jobs:
  • Developed and maintained an information security program that identified security architecture, security requirements, objectives, policies and procedures.
  • Achieved visibility into business/mission information security programs before critical/sensitive communications begin, defined acceptable levels of security risks mitigation.
  • Audit information security controls and procedures required by government regulations to ensure they have been properly implemented.
  • Participate in architecture reviews with federal client to ensure adherence to information security architecture.
  • Researched information security policies based on risk-mitigating solutions to develop System Impact Assessments.
  • Developed process documentation for IT operations and information security function.
  • Researched new and emerging network and information security technologies.
  • Document reviews with respect to information security issues.
  • Applied leading-edge technology to enhance information security posture.
  • Ensured information security efforts are implemented to reduce risks, respond to incidents and limit exposure to liability and risk.
  • Prepared, distributed, and maintained plans, instructions, guidance, and standard operational procedures concerning Information Security.
  • Provided best practices, compiled metrics and reporting requirements annual Federal Information Security Management Act (FISMA).
  • Job Duties Provide security designs and implementation for Information Assurance and Information Security (InfoSec) Engineering.
  • Assist with writing Information Security Policies, Standards, Guidelines, and Blueprints for the Corporation.
  • Provided information security subject matter expertise for U.S. Army Logistics Information Systems (LIS).
  • Comply and provide input to customers' information security policies, standards and procedures.
  • Provide Information Security Support for Marine Corps programs.
  • Performed risk-management and information security controls evaluation and technical testing to bolster AFMS' security posture.
  • Monitored information security intelligence threats , relevant events, and all related developments.
  • Tracked, tested, and validated hundreds of information security issues through JIRA and Kanban.

Show More

19 Information Security Jobs

No jobs at selected location

10. POA

demand arrow
high Demand
Here's how POA is used in Information Assurance Engineer jobs:
  • Create POAM to document vulnerabilities and incorporate mitigation processes of the vulnerabilities identified.
  • Determined and documented security findings and gaps into a plan of action & milestone (POA&M) report.
  • Review and approve submitted POAM mitigation resolutions, and ensure that the artifacts supplied mitigate those risks.
  • Develop detailed reports of open vulnerabilities and document findings in POA&M to track mitigation efforts.
  • Conduct POA&M review and analysis on a weekly basis prior to IA submission.
  • Assist in the development of Plan of Action and Milestones (PoAM) documents.
  • Tracked POA&M milestone completion and continuous monitoring consistent w/DHS & FISMA.
  • Produce weekly POA&M status reports to government officials.
  • Developed and implemented security features and solutions (POAM).
  • Assisted with the development of the CAMEO DIACAP Plan of Action and Milestones (POA&M).
  • Track and monitor POA&Ms to ensure that weaknesses are addressed and planed for remediation.
  • Created (POA&Ms), documenting system weaknesses and corrective action plans.
  • Assist in review and implementations of POA&Ms after review determines non-compliance.
  • Maintained, tracked, and updated POA&Ms during continuous monitoring.
  • Coordinate C&A activities, scheduling & POA&Ms.
  • Demonstrate to Project/System owners how to use ACAS to generate vulnerability reports and POAMs to be submitted into eMass system.
  • Participated in a NAS risk assessment and provided documentation to remediate POAMs related to the system.
  • Point of Contact (POC) for POAMs and STIGs.
  • Reviewed and assessed Assessment and Authorization packages including SSPs, CPs, POA&Ms, and Risk Assessments.
  • Managed the POA&Ms for both NIPRNet and SIPRnet.

Show More

9 POA Jobs

No jobs at selected location

11. Risk Assessments

demand arrow
high Demand
Here's how Risk Assessments is used in Information Assurance Engineer jobs:
  • Analyzed system software architecture, security policies, and risk assessments to determine their eligibility for security certification and accreditation.
  • Conducted system analysis/risk assessments, established the scope of system certification and prepared detailed certification documentation in timely manner.
  • Perform information security risk assessments and assist with the internal auditing of information security processes.
  • Developed verification procedures used in risk assessments and security tests and evaluations.
  • Conduct risk assessments and vulnerability scans using manual and automated tools.
  • Risk Assessments, and C&A's for the Department of Energy major applications and general support systems.
  • Conducted risk assessments, security evaluations, and reviews of information systems and technologies throughout the system life cycle.
  • Conducted client interviews and risk assessments to increase the understanding of the audited areas.
  • Participated in IA risk assessments during the A&A process.
  • Performed risk assessments on client's classified & unclassified systems.
  • Prepare risk assessments for known and emerging vulnerabilities.
  • Conduct Risk assessments at client sites as recommended.
  • Conduct Networthiness risk assessments and prepare correspondence certifying ISs to be fielded throughout the Army Enterprise.

Show More

12. Cyber

demand arrow
high Demand
Here's how Cyber is used in Information Assurance Engineer jobs:
  • Developed and distributed monthly Cyber-Security newsletters and training materials for internal employees and external government customers.
  • Refined procedures/process for classified write waiver requests per USCYBERCOM Communications Tasking Order.
  • Initiate response and tracking compliance to directives issued by USCYBERCOM.
  • Develop requirements for technical capabilities for cyber incident management in accordance to NIST standards.
  • Developed and managed corporate-wide Cyber Security Awareness Training for over 5,000 employees.
  • Performed vulnerability management and provided Cyber Security guidance in the information system.
  • Participate in response to verified cyber-attacks.
  • Recommend configuration changes to improve the performance, usability, and value of cyber security monitoring and event detection tools.
  • Provided daily status to client on pending cyber incidents and communicate solutions to all levels of management.
  • Administered and managed JIRA project inputs, Sprint updates, tasking, and Cybersecurity related defects.
  • Achieved the DNI's cyber security vision through the enforcement of established National Security directives.
  • Assisted with the agency Command Cyber Readiness inspection (CCRI) performed by DISA.
  • Designed the cyber defense policies and procedures, which identify proper security practices.
  • Coordinated project meetings, schedules and agendas for corporate Cyber Security team.
  • Prepared and edited PowerPoint presentations for USARC Cybersecurity Line of Effort Briefs.
  • Provide SME support for all facets of Information and Cyber Security.
  • Served as the sole principal cyber defense engineer for the command.
  • Comply with DISA, Cyber Command, a
  • Prepare and brief CCRI compliance reports to senior leadership of Army Cyber Command, NETCOM and U.S. Cyber Command.
  • Developed all RTMs with readable sentence "shall" statements for all NIST SP 800-53 Revision 4 cybersecurity controls requirements.

Show More

41 Cyber Jobs

No jobs at selected location

13. Security Requirements

demand arrow
high Demand
Here's how Security Requirements is used in Information Assurance Engineer jobs:
  • Validated system security requirements definition/analysis.
  • Evaluate Security Certification and Accreditation (C&A) documentations for technical accuracy and compliance with applicable security requirements.
  • Provide information assurance expertise to ensure that new systems are designed with security requirements incorporated into the system.
  • Managed and verified security requirements while performing system certification and accreditation planning and testing activities with DIA.
  • Performed TEMPEST/Emissions Security and Red/Black verification to validate that equipment and sites met necessary security requirements.
  • Witness functional testing and conduct additional security-relevant testing to verify the implementation of security requirements.
  • Evaluate security solutions to ensure they meet security requirements for processing classified information.
  • Develop guidelines for implementation of current and emerging Database security requirements.
  • Applied functional needs into technical security requirements based on security policies.
  • Evaluated engineering designs for compliance with security requirements.
  • Identify and Document the Information Security Requirements (DCID 6/3, ICD 503, and NSSI 1253) for all assignments.
  • Supported IA testing of new and modified systems to include network and network components, ensuring compliance with applicable security requirements.
  • Installed IAVA software patches on client workstations to comply with Department of Defense security requirements and enforce C&A policy.
  • Author of the aircraft Security Requirements Traceability Matrix and Systems Security Authorization Agreement (SSAA).
  • Performed analyses to validate established security requirements & recommended additional requirements & safeguards.
  • Provide security requirements throughout acquisition lifecycle process.
  • Reviewed existing government doctrines for areas of legacy policies that need to be aligned to current cyber security requirements.
  • Tracked all NIST baseline and additional PII security requirements within Rational Requirements Composer (RRC).
  • Support research of emerging technology and requisite security requirements and emerging threats and develop ways forward to meet organizational goals.
  • Developed cybersecurity requirements traceability matrices (RTMs) of DIACAP IT security requirements versus RMF A&A requirements.

Show More

50 Security Requirements Jobs

No jobs at selected location

14. Scap

demand arrow
high Demand
Here's how Scap is used in Information Assurance Engineer jobs:
  • Assisted application and system sites with the creation of DITSCAP and DIACAP Certification and Accreditation (C&A) packages.
  • Analyze vulnerability scans and security configuration audits (SCAP, Retina, SRR, Gold Disk, etc.).
  • Perform Phase III and Annual Testing, per DoD 8500 directives, and generate supporting DITSCAP/DIACAP documentation and test reports.
  • Reviewed and tracked C&A documentation to ensure that DITSCAP/DIACAP documentation complies with IA policy directives and instructions.
  • Drafted and implemented templates, policies, procedures for DITSCAP to DIACAP Transition.
  • Facilitated DITSCAP program, integrated DIACAP processes and interpreted retina scan results.
  • Used SCAP to run benchmarks on all migrated Windows 10 device.
  • Assisted Contractor sites with transitioning from DITSCAP to DIACAP.
  • Conducted C&A on DOD systems according to the DITSCAP/DIACAP process.
  • Conduct SCAP scans to ensure all systems on the USARC enterprise network of 64,000+ workstations are compliant with DOD Cybersecurity regulations.
  • Performed C&A tasks based on the DITSCAP 8500.2 for NMCI and other Government projects.

Show More

28 Scap Jobs

No jobs at selected location

15. Accreditation Process

demand arrow
average Demand
Here's how Accreditation Process is used in Information Assurance Engineer jobs:
  • Collect and create Department of Defense Information Assurance Certification and Accreditation Process (DICAP) documentation to support system accreditation.
  • Prepared detailed security certification and accreditation documentation following DoD Information Technology Security Certification and Accreditation Process (DITSCAP).
  • Perform DIACAP (DoD Information Assurance Certification and Accreditation Process) on government owned contractor operated information systems.
  • Conduct Verification Testing as identified in the DOD Information Technology Security Certification and Accreditation Process (DITSCAP).
  • Have conducted independently researched and drafted DoD Information Assurance Certification and Accreditation Process IA control documentation.
  • Performed DoD Information Technology Security Certification and Accreditation Process (DITSCAP).
  • Update required established documents in the certification and accreditation process.
  • Supported Defense Information Assurance Certification and Accreditation Process (DIACAP) package preparation for Agents of the Certification Agent's review.
  • Supported the Defense Information Assurance Certification and Accreditation Process (DIACAP) activities for SECDEF Communications and Operations Security.
  • Provide information security C&A support and technical security guidance in all phases of system accreditation process.
  • Managed Risk Management Framework (RMF) accreditation process for the Joint Mission System's Service Pack 9.
  • Stay current on changes to the Department of Defense Information Assurance Certification and Accreditation Process (DIACAP).
  • Led the Defense Information Assurance Certification and Accreditation Process (DIACAP) activities for WHS ICE System.
  • Addressed matters on DOD technology, security, certification and accreditation processes with 3,000+ computers.
  • Developed the SSAA documentation suite to support the system throughout the certification and accreditation process.
  • Work with the system owner and government to ease the certification and accreditation process.
  • Maintained, reviewed, and coordinated the accreditation process for assigned sites.
  • Maintained all paperwork for labs throughout the approval and accreditation process.
  • Supported the accreditation process through the analysis of scanning results.

Show More

42 Accreditation Process Jobs

No jobs at selected location

16. Nist Security Policies

demand arrow
average Demand

17. Assurance

demand arrow
average Demand
Here's how Assurance is used in Information Assurance Engineer jobs:
  • Provide internal and external consultation to executive leadership on risk management strategies and the implementation of cost effective Information Assurance Controls.
  • Interpreted government directives and agency supporting policies that involve implementation and management of Information Assurance programs.
  • Make sure information assurance security awareness and required annual training is completed by all personnel.
  • Defined and monitored mission assurance program specifications and processes.
  • Manage project daily Information Assurance operational plans and tasking.
  • Resolve single phase flow assurance/pipeline hydraulics related issues.
  • Identify, categorize and document SWFLANT Platform IT (PIT) and Business Systems, Information Assurance (IA) requirements.
  • Promoted as Deputy Team Lead of the Security Response Team for the Directory of Information Management Information Assurance Department.
  • Participated in DCGS-A Software Development and Systems Integration meetings to present Information Assurance (IA) risk status.
  • Planned risk reduction activities with Information Assurance Officer (IAO) and Information Assurance Manager (IAM).
  • Assist in documenting Information Assurance policies and procedures as well as enforcing policies to the information system users.
  • Conducted staff visits ensuring compliance with Information Assurance Assessment and Assistance Program (IAAP) requirements.
  • Serve as an Information Assurance Engineer for the Directorate of Information Management, Information Assurance Division.
  • Acted as liaison with senior government officials on emerging information assurance issues.
  • Performed Defense Information Assurance Certification and Accreditation Process accreditation and implement DISA Security Technical Implementation Guides (STIGs).
  • Managed and mentored information assurance intern to provide training and guidance in cyber-security and information security principles.
  • Assess the weekly Information Assurance Vulnerability alerts (IAVA) and bulletins released from Cyber Command.
  • Tested and documented IA controls in Enterprise Mission Assurance Support Service (eMASS).
  • Fort Washington, MD Information Assurance Specialist Served as the Information Security Advisor to multiple contractors and government program managers.
  • Experience in documenting systems Information Assurance status on the Enterprise Mission Assurance Support System (eMASS).

Show More

130 Assurance Jobs

No jobs at selected location

18. Disk

demand arrow
average Demand
Here's how Disk is used in Information Assurance Engineer jobs:
  • Utilize DISA tools (Eye Retina, DISA Gold Disk) and perform self-assessment security readiness reviews as required.
  • Conducted IA reviews of Retina and Gold Disk vulnerability scans and STIG compliance for network server system upgrades.
  • Train ship IT and LAN Admin personnel various IA procedures regarding retina scanning and patch disk updating.
  • Run automated scripts and other utilities to test compliance, including DISA SRR and Gold Disk.
  • Load computer tapes and disks, and install software and printer paper or forms.
  • Used Gold Disk to ensure the security posture of servers.
  • Performed system scans using Gold Disk and Retina tools.
  • Work with DOD approved security tools (DISA Gold Disk, STIGS, SRR Scripts, and Retina).
  • Performed eRetina vulnerability scans and mitigated vulnerabilities utilizing DISA gold disk software hardening at the Platinum level.
  • Used COTS "Gold disk" to detect server errors and needed updates.

Show More

19. Security Posture

demand arrow
average Demand
Here's how Security Posture is used in Information Assurance Engineer jobs:
  • Conduct risk assessment via regular network vulnerability scanning and assessments evaluating the security posture of systems.
  • Authored several matrix tools to capture risk analysis intelligence and current state of security posture.
  • Secure and maintain appropriate security posture of operational and developmental GCSS family of systems.
  • Validated information assurance controls for multiple projects Utilized Government standards to recommend security posture
  • Closed security holes discovered by scans to ensure security posture was maintained.
  • Analyzed information systems to assess their security posture and vulnerabilities.
  • Maintained system security posture of operating systems.
  • Conduct ship site visits to evaluate security posture and validate if IA controls are implemented and systems are being patched accordingly.
  • Installed, configured, and managing ACAS deployments to assess the current vulnerabilities and security posture for classified networks.
  • Preserved the functionality of the system while providing expertise to strengthen the overall security posture of the system.
  • Evaluate the current security posture of the system and recommend current security solutions to support customers' requirements.
  • Provide vetted countermeasures to address areas of weaknesses to enhance the general security posture of the program.
  • Monitor and maintain security posture of multiple systems using DISA Vulnerability Management System (VMS).
  • Prepare authorization letters capturing the security posture of systems for the approval of the authorizing official.
  • Prioritize and task fellow employees, in order to maintain each labs separate security posture.
  • Created weekly reports with a high level overview of the security posture of each assigned system
  • Ensured IS security posture at acceptable risk level for Marine Corps West Coast.
  • Increased the security posture of the network through control validation.
  • Applied secure technical implementation guides (STIGs) to achieve the best possible security posture and comply with higher authority.
  • Maintain highest physical security posture using NISPOM standards for guidance.

Show More

25 Security Posture Jobs

No jobs at selected location

20. Fisma

demand arrow
average Demand
Here's how Fisma is used in Information Assurance Engineer jobs:
  • Initiated and completed Certification & Accreditation awarding an Authority to Operator Accreditation using FISMA guidelines.
  • Researched DIACAP-FISMA-NIST transition methodology and process.
  • Well versed in NIST, FISMA, DIACAP and several other laws, regulations, and standards.
  • Reviewed and wrote policies and procedures in accordance with DHS 4300, FISMA and NIST standards.
  • Reviewed NIST, OMB and FISMA documentation on a regular basis for reference.
  • Responded to IAVA's and provided results to senior management for FISMA compliance.
  • Lead operational teams to resolve critical incidents based on FISMA/DHS/TSA regulations.
  • Performed Data Center FISMA Security Assessments for the Federal Reserve Bank.
  • Performed Application Level FISMA Security Assessments for the Federal Reserve Bank.
  • Implement the DITSCAP, FISMA, DISA STIGS, NIST and DIACAP process and IA controls.
  • Managed the DIACAP, NIST, and FISMA activities of the ISSO team.
  • Managed and monitors FISMA compliance for command accreditations, conducts annual security and IA control testing and reviews.
  • Generate FISMA reports for management and the CISOs review.
  • Create Annual Assessment Reports (ASARs) to be entered and tracked via Trusted Agent FISMA (TA).

Show More

22 Fisma Jobs

No jobs at selected location

21. Network Security

demand arrow
average Demand
Here's how Network Security is used in Information Assurance Engineer jobs:
  • Monitor Network Security, Communication Security, and Information Systems Security for the Fort Bragg installation.
  • Monitored network security devices and logs on operational networks within JFCOM and multinational experimentation networks.
  • Apply engineering methods of network security toward technology integration into Army systems.
  • Trained in Retina Network Security Scanner and Hercules Automated Vulnerability Remediation software.
  • Provided DIACAP documentation and training in Information Assurance and Network Security.
  • Identified, reported and resolved network security violations.
  • Established network security policies and mitigated vulnerabilities.
  • Implemented network security and protection.
  • Conduct network security monitoring and intrusion detection analysis using the Air Force's selected intrusion detection tool; ArcSight ESM 4.0.
  • Tested network security vulnerability design using DISA STIG and SNAC Security Inspection Checklist to include DISA Hardening and Router/Switch Hardening Guide.
  • Plan, coordinate, and implement network security measures in order to protect data, software, and hardware.
  • Researched, reviewed, and recommended tools and applications to clients for efficient monitoring of their network security posture.
  • Lead contact for training in network security for Okinawa's entire network enterprise center to accomplish 100% compliance.
  • Experience with generating ACAS reports as needed to verify network security posture and reporting into VRAM.
  • Compile and report daily data on Network Security Violations (NSV).
  • Maintain McAfee Network Security Manager (NSM) and Top Layer.
  • Network Security Technician Fairchild AFB WA Responsible for the Base Information Protection Suite protecting an over 30 Million dollar MAN.
  • Managed IDS, VPN, Firewall, and antivirus applications to maintain network security.
  • Performed network scans and vulnerability audits using NESSUS, ISS, NMAP, eEye Retnia, and other network security tools.
  • Use DISA analysis tools STIGs, SCAP and eEye Retina to assess evaluate network security configuration.

Show More

16 Network Security Jobs

No jobs at selected location

22. ATO

demand arrow
average Demand
Here's how ATO is used in Information Assurance Engineer jobs:
  • Evaluated and reviewed security of new and existing systems by enforcing regulatory policies and procedures and providing alternate course of actions.
  • Verified security requirements; performed system certification and accreditation planning, testing, and liaison activities resulting in an ATO.
  • Established and administrated database to track laboratory planning reducing risk of misplaced planning and improving internal and external customer satisfaction.
  • Worked closely with site administrators and customer personnel on situations requiring corrective action.
  • Result: Achieved regulatory compliance which lead to system certification and accreditation.
  • Strengthened communication between production work centers and test/research laboratories.
  • Assigned mitigation or remediation duties to System Administrators.
  • Provide information security support to System Administrators.
  • Prepare security reports to regulatory agencies.
  • Develop and provide technical training system administrators to ensure awareness of, and follow, information system policies and procedures.
  • Conducted a Six Sigma project as a Green Belt coordinator, saving the program about $80K per year.
  • Utilize the Risk Management Framework (RMF) to acquire system Authority to Operate (ATO) status.
  • Result: Certified FASFAC/SCORE network as (.mil), awarded Authorization to Operate (ATO).
  • Enforced DoD, DA and NETCOM IA regulatory requirements and policies over existing IT resources within CONUS.
  • Developed InfoCON presentations from an administrator's and manager's perspective for training purposes.
  • Approve or deny POAM s or DRA s sent to management from system administrators.
  • Conduct yearly training on DoD Information Assurance Awareness for the entire laboratory.
  • Trained operators on maintaining scans.
  • Document and report IV&V results and make IATO and ATO recommendations to the AF DAA.
  • Developed IA procedures for system administrators and application development, and created cyber-security compliance guidelines for DoN audit techniques and procedures.

Show More

12 ATO Jobs

No jobs at selected location

23. Nessus

demand arrow
average Demand
Here's how Nessus is used in Information Assurance Engineer jobs:
  • Use of scanning tool results (NESSUS) leading to vulnerability identification and remediation.
  • Reviewed Nessus vulnerability assessment reports.
  • Mitigated Retina, Nessus and DISA Gold scanner results on Windows XP, 7, Server 2003-2008 operating systems.
  • Perform scheduled ACAS (Nessus) and SCAP scanning of systems to identify security vulnerabilities.
  • Utilized ACAS, NESSUS, SCAP & STIG utilities to determine system vulnerabilities and weaknesses.
  • Use Nessus scanner for stand-alone and non-network connected devices to collect findings.
  • Performed Tenable Nessus daily Scans analysis, and looked any threats.
  • Interpreted Nessus scanning results to look for anomalies and compliance.
  • Implemented ACAS installations and performed scans using Nessus.
  • Applied knowledge of assessment tools (STIGs, Nessus, Retina, MBSA) to assess DoD Systems.
  • Performed controls validation testing using eEye Retina and Nessus ACAS scanners to determine security posture of MDA systems.
  • Perform system audits, schedule lockdowns, scan for vulnerabilities using Nessus and ACAS security for G6 lab.
  • Perform vulnerability assessments using tools such as eEye Retina, SCC SCAP, DISA Gold Disk and Nessus.
  • Utilized ACAS/NESSUS utilities to perform compliance scans to determine legitimacy of submitted tasking responses.
  • Experience included development of Nessus Audit files to replace use of STIGs.
  • Experienced with Scanning tools eEye Retina, SCAP, NESSUS,STIG and STIG viewer.
  • Skilled with: VMware, SecurityCenter (Nessus), SCAP, and SPLUNK.
  • Used SecurityCenter and Nessus (a combination known as "ACAS") to scan servers.
  • Perform vulnerability scanning using Nexpose, Nessus & Acunetix.

Show More

18 Nessus Jobs

No jobs at selected location

24. Hbss

demand arrow
average Demand
Here's how Hbss is used in Information Assurance Engineer jobs:
  • Perform HBSS policy development and management.
  • Support COOP/Disaster Recovery plans by backing up and modifying McAfee HBSS policies and performing certification of Information Systems and Networks.
  • Involved in the installation, configuration and deployment of HBSS (Host Based System Security) on our legacy network.
  • Lead for Host Based Security System (HBSS) implementation for Defense Message System (DMS).
  • Managed, deployed, maintained, and configured enterprise-wide Host Based Security System (HBSS).
  • Utilized HBSS to monitor client health, identify any abnormalities, and reduce vulnerabilities.
  • Ensured that HBSS policies were updated and fine-tuned to allow blocked events if required.
  • Managed the Host Based Security System (HBSS) ensuring 4500 systems operated efficiently.
  • Manage modules and software updates of other HBSS products on the host system.
  • Developed security test procedures for Host Based Security System (HBSS).
  • Enable the installation, management, and configuration of the HBSS components.
  • Reviewed HBSS Threat Event and HIPS IPS Logs for malicious events.
  • Host Based Security System (HBSS) /Anti-virus Support.
  • Install Host Base Security System (HBSS) software.
  • Ensured all networked machines had HBSS installed.
  • Help Configure the HBSS QRT exercises with three zones.
  • Managed the command Host Based Security System (HBSS) ePO server.
  • Provide customer support related to HBSS and antivirus issues.
  • Configured HBSS Policies that controlled: HIPS, virus scan, anti-spyware, DLP, roque system detector and policy auditor.
  • Used tools such as Ciscoworks, Netflow, HBSS and Site Protector, Wireshark.

Show More

13 Hbss Jobs

No jobs at selected location

25. Defense Information

demand arrow
average Demand
Here's how Defense Information is used in Information Assurance Engineer jobs:
  • Submitted vulnerability assessment reports to Department of Defense Information Action Officers for approval.
  • Managed software patches sent by Defense Information Systems Agency and other Department of Navy approved third party vendors.
  • Supported the Lockheed Martin Corporation/Defense Information School at Fort Meade, MD.
  • Implement Defense Information Systems Agency (DISA) STIGs to provide an effective security strategy for the HBSS project.

Show More

7 Defense Information Jobs

No jobs at selected location

26. Incident Response

demand arrow
average Demand
Here's how Incident Response is used in Information Assurance Engineer jobs:
  • Perform in-depth analysis in support of Network Monitoring and Incident Response operations supporting multiple Cabinet-Level Federal Agencies.
  • Ensured technology employed by the incident response team compliments operational processes.
  • Mitigated vulnerabilities and initiated incident response and remediation processes.
  • Created incident response evaluation and escalation criteria.
  • Reviewed Computer Security Incident Response reports.
  • Audit and assess incident response activities in the IA remedy queue for all USARCENT SWA and provide feedback to military leadership.
  • Worked directly with the Army and Regional Computer Response Team (ACERT and RCERT) for incident response and implementation.
  • Work with system owners to develop, test, and train on contingency plans and incident response plans.
  • Provide vulnerability management support for FISMA and non-FISMA systems, scanning, remediation and incident response.
  • Worked with Incident Response Team Management to resolve advanced persistent threats and vulnerabilities affecting the network.
  • Developed enclave incident response plans and held a leadership role on the security incident response team.
  • Assist the Agency's CIRT in incident responses, mitigation, and analysis.
  • Tracked and resolved incident response tasks via Remedy ITSM.
  • Perfomed incident response, analysis, handling and forensics for events on J9 networks.
  • Provided CND subject matter expertise to Computer Incident Response Team (CIRT) activations.
  • Conduct incident response activities for virus and malware infections.
  • Provide onsite/offsite incident response to various alerts and notification * Identify basic various network connectivity / infrastructure issues.

Show More

16 Incident Response Jobs

No jobs at selected location

27. Assurance Vulnerability Alerts

demand arrow
average Demand
Here's how Assurance Vulnerability Alerts is used in Information Assurance Engineer jobs:
  • Assess and DoD Information Assurance Vulnerability Alerts, INFOCONs, monitoring requirements and other IA related information.

Show More

3 Assurance Vulnerability Alerts Jobs

No jobs at selected location

28. Iava

demand arrow
average Demand
Here's how Iava is used in Information Assurance Engineer jobs:
  • Implemented DoD-approved security patches to verify Information Assurance Vulnerability Alert (IAVA) compliance.
  • Required to research IAVA and implement alternative when mitigation is unsuccessful.
  • Monitor that the enclaves are IAVA (Information Assurance Vulnerability Alert) compliant and that all security measures are being met.
  • Assisted Lead Engineer in Information Assurance Vulnerability Alerts (IAVA) testing and deployment to upgrade system compliance.
  • Track Information Assurance Vulnerability Alert (IAVA) in Online Compliance Reporting System (OCRS).
  • Maintained IAVA process for both DECGS and Prophet systems keeping systems compliant with Government mandates.
  • Performed Information Assurance Vulnerability Assessments (IAVA) testing, proposed hardware and software changes.
  • Managed Information Assurance Vulnerability Alerts (IAVA) tasking for all departments assigned to NETPDTC.
  • Tracked Information Assurance Vulnerability Alerts (IAVA) and patch implementation on classified systems.
  • Developed an automated script to distribute update to streamline the distribution of IAVA policies.
  • Drafted PMW120 Vulnerability Management Plan for IAVA and INFOCON notification and compliance.
  • Perform GCCS-A server and client software integration test after every IAVA install.
  • Applied Gold Disk standards and IAVA's to simulated network.
  • Created weekly and monthly reports of outstanding IAVA's.
  • Enforce Information Assurance Vulnerability Alert (IAVA) patches.
  • Worked with server administrators to manage IA Vulnerabilities, Retina IAVA fixes and implements STIGs (Security Technical Implementation Guide).
  • Participate in Engineering Review Board, AF Cyber Summit, ACAS Working Group, Weekly IA IAVA/TCNO meetings.
  • Build an automated task assignment system for reporting IAVAs on the SharePoint Portal.
  • Updated IAVA/IAVB webpage links and created support tickets for weekly IAVA releases.
  • Train IMOs and IASOs on fixing and understanding IAVA vulnerabilities.

Show More

10 Iava Jobs

No jobs at selected location

29. Linux

demand arrow
average Demand
Here's how Linux is used in Information Assurance Engineer jobs:
  • Configured and hardened/accredited Linux and application software.
  • Create Linux and Windows lab environment for duplication and proof of concept (POC) test of products and processes.
  • Work mostly with Windows based servers and workstations with a small amount of Linux workstations placed in some labs.
  • Implemented DOT/FAA security requirements on Windows 2008 Server, Linux Enterprise Server 6, and Windows 7 systems.
  • Support the organizational wide Microsoft network domain environment including LINUX clients in a virtual and physical scenario.
  • Secured the Linux machines using the RHEL STIGS.
  • Managed Data Center with 88 servers using multiple OS to include Windows, Sun Solaris, Linux, and HP-UX.
  • Research and implement security fixes on Windows, Linux, and Solaris operating systems.
  • Assisted system administration personnel in vulnerability mitigation and patching of Windows, RedHat Enterprise Linux, VMware and Solaris systems.
  • Analyzed malware via malware reconstruction using Linux to determine direct threats to client organization.

Show More

2 Linux Jobs

No jobs at selected location

30. Management System

demand arrow
low Demand
Here's how Management System is used in Information Assurance Engineer jobs:
  • Developed and update application documentation within the Consular Affairs Certification and Accreditation Management System (CACAMS).
  • Update vulnerability status in Vulnerability Management System (VMS).
  • Experience using NOVADIGM Vulnerability Management System in maintaining network compliance.
  • Support and maintain identity and access management system.
  • Utilize DISA Vulnerability Management System (VMS) to monitor for new required patches and security requirements, and report status.
  • Verify all network software using DON Application and Database Management System (DADMS) prior to installation on the network.
  • Managed the Army Portfolio Management System and the Army Training and Certification Tracking System for over 500 users.
  • Update and monitor the military justice case management system (CMS), LOTUS, and administrative databases.
  • Generated and maintained CAP and EAC for the project using Earn Value Management System (EVMS).
  • Maintain tracking reports and central repository of data call artifacts within the FDA Enterprise Content Management System.
  • Manage and support Vulnerability Management System (VMS) on assets in internal and external environment.
  • Compiled and maintained 12 personnel records in a database management system for the organization.
  • Install and configure other IA management systems as needed.
  • Controlled and oversaw System Administration of the Risk Management System (RMS) eGRC tool for all JSC directorates.
  • Worked to ISO [ ] Quality Management System.

Show More

31. Intrusion Detection

demand arrow
low Demand
Here's how Intrusion Detection is used in Information Assurance Engineer jobs:
  • Perform information systems security assessments, virus prevention, vulnerability assessments, and intrusion detection.
  • Provided Intrusion Detection Security monitoring, and event analysis for customers supported by OSB.
  • Maintained eight Gauntlet firewalls and over twenty intrusion detection servers.
  • Provide ongoing monitoring of intrusion detection systems.
  • Investigate Intrusion Detection Systems Incidents.
  • Participated in the deployment and configuration of new network analysis tools, Intrusion Detection Sensors, and hard-drive encryption software.
  • Monitor and audit Intrusion Detection systems, Investigate security related issues and incidents, provided corrective actions as needed.
  • Perform daily security monitoring to identify any possible intrusions through the Intrusion Detection Systems (IDS).
  • Managed Cisco WDS, Fast Secure Roaming, Radio Management, and Wireless Intrusion Detection Service.
  • Performed research and analysis of CND events generated by EMOC intrusion detection systems.
  • Provided incident analysis & support to the Pentagon Intrusion Detection Team and PENTCIRT.
  • Created custom snort rules to fine tune the intrusion detection process.
  • Deployed the Navy Surface Warfare Center's Shadow intrusion detection system.
  • Identify and evaluate intrusion detection alerts, netflow, web security gateway logs, and firewall policy configuration changes.

Show More

6 Intrusion Detection Jobs

No jobs at selected location

32. Security Engineering

demand arrow
low Demand
Here's how Security Engineering is used in Information Assurance Engineer jobs:
  • Provide security engineering designs and implementation in all aspects of Information Assurance and Information Security (InfoSec) Engineering.
  • Attended weekly meetings with the customer to provide system security engineering and assessments recommendations.
  • Mentored systems IA/IS engineers in computing system security engineering processes.
  • Provided security engineering and integration services to internal customers.
  • Assisted with computer security engineering for classified networks.
  • Provided Information Systems Security Engineering (ISSE) services for program execution and new business pursuits on DoD Net-Centric communication systems.
  • Performed Information Assurance Security Engineering and Certification efforts for the C4 Tech Control Facilities throughout Afghanistan supporting the war fighter.
  • Functioned as Cost Account Manager (CAM) for DRIS 2010 Security Engineering team closeout effort.
  • Support Government lead in preparing for the Annual Security Engineering Assessment (ASEA) visit.
  • Document and implement processes for doing Systems Security Engineering and Proofs- of-Concept.
  • Managed 6 IA analyst in conducting Vulnerability Management, Security Engineering, Certification and Accreditation, and Computer Network Defense activities.
  • Analyzed incidents/events and updated APT indicators Provided Information Assurance and Security Engineering for DARPA cloud computing and data mining program.
  • Performed Security Engineering used DOD DITSCAP/DIACAP/JAFAN 6/3 directives completed Certifications and Accreditations of computer networks.

Show More

31 Security Engineering Jobs

No jobs at selected location

33. Mcafee

demand arrow
low Demand
Here's how Mcafee is used in Information Assurance Engineer jobs:
  • Configure, conduct and manage vulnerability scans utilizing McAfee Vulnerability Management software.
  • Managed and monitored McAfee Network Security Manager to detection network intrusions and took action to protect the network.
  • Completed 40 hour training course for McAfee Host Based Security System Administration
  • Configured and deployed SiteAdvisor Enterprise and McAfee Host Intrusion Prevention.
  • Upgraded Endpoint Encryption For PC from version 5.2.5 to McAfee Drive Encryption 7.1.3.
  • Managed McAfee ePolicy Orchestrator for centralized security of systems, networks, data, and compliance.
  • Deployed and troubleshoot anti-virus systems like Trend Micro Titanium v21/2013 and McAfee ePO 5.1.0.X.
  • Worked with AD Group Policies, Linux/CENTOS, Red Hat, McAfee, eMass, DADMs, and Symantec.

Show More

1 Mcafee Jobs

No jobs at selected location

34. RMF

demand arrow
low Demand
Here's how RMF is used in Information Assurance Engineer jobs:
  • Provided assistance with Risk Management Framework (RMF) transition from DIACAP by performing security control testing, implementation and evaluation.
  • Assist in converting DIACAP documentation to RMF and NIST 800-53 standards covering systems in differing security enclaves.
  • Assist in the creation, review, and submission of DIACAP/NIST RMF packages and assist teams as needed
  • Performed map and gap analysis on DIACAP IA Controls to NIST Security Controls for RMF transition.
  • Provided assistance in re-accreditation of DoN Systems in accordance with DIACAP prior to RMF implementation.
  • Conducted DIACAP/RMF technical assessments at the Brigade and Battalion level utilizing the SCAP and ACAS.
  • Act as alternate for the Information Assurance role on the DIACAP/RMF team for each baseline.
  • Supported the transition of accreditation from DIACAP to RMF through use of EMASS.
  • Use NIST guidance and RMF to Provide the appropriate IA control for testing.
  • Develop transition strategies for conversion of DoN DIACAP documentation to RMF standards.
  • Stayed abreast with NIST RMF, Navy and DoD policies and regulations.
  • Register the systems to make sure that they are FISMA compliant and support the RMF process for C&A.
  • Received training SCAP, RMF, CISSP
  • Conducted application vulnerability scans, crystal box pentesting, and RMF security control assessments.
  • Enhanced existing C&A and Change processes by beginning the transition to RMF, ACAS and eMASS.
  • Interpret and adhere to DIACAP and RMF guidelines to ensure a secure computingenvironment.
  • Create and maintain Wiki pages for support and dissemination of critical NIST RMF workflow and Xacta product information.

Show More

35. ST

demand arrow
low Demand
Here's how ST is used in Information Assurance Engineer jobs:
  • Ensured integrity and availability of communications systems utilized by U.S. Armed Forces.
  • Enforce security guidelines established by the Department of Defense and federal government.
  • Provide recommendations resulting from system vulnerability scan reports and hardening guide documentation.
  • Develop subsystem-level hardware & software functional design and interfaces.
  • Participated in both certification and systems test evaluation activities.
  • Write subsystem specifications for vehicle electronics.
  • Author Attestation Statement for assignments.
  • Author of technical Test Plans, Test Reports, White Papers, and PowerPoint slides as requested by the client.
  • Supported the Department of Homeland Security (DHS) Systems Engineering and Integration (SE&I) Program.
  • Supported the creation and maintenance of DICAP and related documentation for both unclassified and classified information systems and networks.
  • Provide support in developing/Improving Standard Operating Procedures to include ITIL (v3) framework integration and Governance.
  • Performed various security audits, educated the client about the risks, and provided mitigation strategies.
  • Assist in acquiring software security test tools, to include HP Fortify and IBM AppScan.
  • Conduct security audits and ensure that the audit records are archived for various systems.
  • Create and review policies and procedures governing divisional test and integration lab.
  • Approve user requests to access hosted RDT&E systems.
  • Develop and document test plans & procedures.
  • Create and execute security tests.
  • Conduct Computer Security Briefings Enforce security policies and safeguards on all personnel having access to customer systems.
  • Performed network patch instillations and WSUS updates weekly to ensure all network equipment and client workstations are compliant with TCNOs.

Show More

3 ST Jobs

No jobs at selected location

36. Configuration Management

demand arrow
low Demand
Here's how Configuration Management is used in Information Assurance Engineer jobs:
  • Provided configuration management support ensuring that the agency maintained data integrity.
  • Developed, launched & maintained collaborative work area portals for data retention and configuration management (SHAREPOINT and PLM).
  • Perform system audits, Anti-Virus Management, System Upgrades, Configuration Management, Account Provisioning, and Log Monitoring.
  • Initiated Risk Forms and Ship Change Documents for Configuration Management purposes in the Navy Data Environment website.
  • Determine impacts and submit results to the Configuration Management Board.
  • Lead in creating recommendations for management on approaching the Configuration Management process Research Configuration Management Products and network monitoring software.
  • Drafted Security Analysis Memoranda for Configuration Management (CM) and System Integration (SI).
  • Log Auditing, Configuration Management, Document Control Software and Hardware testing in controlled sandbox / SCIF environments.
  • Support Serena and Auto-trol Konfig, a web and client based Configuration Management solution.

Show More

37. Independent Verification

demand arrow
low Demand
Here's how Independent Verification is used in Information Assurance Engineer jobs:
  • Conducted Independent Verification and Validation (IV&V) for maintaining certification and accreditation (C&A).
  • Perform on-site Independent Verification and Validation (IV&V) testing of unclassified computer systems.
  • Performed Independent Verification and Validation (IV&V) of Information Technology products.
  • Perform Independent Verification and Validation (IV&V) of third party ST&Es.

Show More

38. Iavm

demand arrow
low Demand
Here's how Iavm is used in Information Assurance Engineer jobs:
  • Assisted unit System Administrators in maintaining Information Assurance Vulnerability Management (IAVM) compliance and mitigation.
  • Managed Information Assurance Vulnerability Management (IAVM) program.
  • Maintained the Information Assurance Vulnerability Management (IAVM) along with Asset and Vulnerability Tracking Resource (A&VTR).
  • Developed the IAVM process for the command and published as prescribed by the IAM.
  • Research applicability of IAVM findings through Vulnerability Management System (VMS).
  • Managed IA personnel in the performance of IAVM tasks.
  • Completed the IAVM Plan for USAFRICOM.
  • Performed Risk Management duties Published IAVM Reports and briefed superiors on Vulnerability and Risk Management posture.
  • Engineer for Cybersecurity Division Host Based Security System (HBSS) and Program Managed Systems and individual STIG/IAVM CCRI validation efforts.
  • Maintain and update the DISA Vulnerability Management System (VMS) for asset vulnerability tracking and acknowledgement of IAVM and TASKORDS.
  • Performed LAN Retina scans &Gold Disk assessments to discover vulnerabilities, performed risk assessments and validate IAVM compliance.
  • Created the process for managing IAVMs and tracking mitigation status within ITA-Mark Center
  • Monitored compliance with STIGs as well as IAVMs to maintain a compliant environment.

Show More

6 Iavm Jobs

No jobs at selected location

39. Security Documentation

demand arrow
low Demand
Here's how Security Documentation is used in Information Assurance Engineer jobs:
  • Develop security documentation that includes security, configuration management and contingency plans in compliance with Information Assurance policy.
  • Developed security documentation, including eleven security plans, and contingency plans in compliance with IA policy.
  • Leveraged existing security policies and procedures to identify needed changes for the development of security documentation.
  • Created standard operating procedures, security documentation, risk assessments, and asset accountability.
  • Conducted reviews of existing and previous certification packages while reviewing and developing security documentation.
  • Worked with current system owners to collect system information and all required security documentation.
  • Participate in developing security Risk Assessment and evaluation security documentation completeness.
  • Developed security documentation including SSAA, SSP, COOP plans, procedural guidance and ST&E plans.
  • Assist customer in development and completion of security documentation as specified by DIAPCAP and NIST.
  • Ensured that security documentation was provided by the Security Analyst and uploaded into CSAM.
  • Amended and updated more than 20 pieces Security documentation.
  • Assist in the development of system security documentation 6.
  • Developed System Security Program Plans, Security CONOPs and other security documentation in accordance with DoD policies.
  • Performed Security documentation reviews and maintenance of Information Assurance policies and procedures for PM Biometrics.

Show More

40. Computer System

demand arrow
low Demand
Here's how Computer System is used in Information Assurance Engineer jobs:
  • Conducted vulnerability/risk analyses of computer systems and applications during all phases of the system development life cycle.
  • Conducted security risk management studies on new computer systems before installation and deployment.
  • Provide computer Systems security requirements analysis and testing support to Government networks.
  • Analyzed complex computer systems to assess vulnerability and risk.
  • Conduct vulnerability analyses to identify weaknesses between computer systems.
  • Perform manual Security Technical Implementation Guide (STIG) reviews of computer systems to verify compliance with DoD standards and requirements.
  • Perform Computer Systems Security compliance duties, as prescribed in the Intelligence Community Directive (ICD) 503.
  • Submitted change request to have patches applied to vulnerable computer systems utilizing Remedy Ticket Tracking System.
  • Managed Communication-Computer Systems (C-CS) security and information protection (IP) programs.
  • Adhere to DoD policies and procedures in keeping the computer systems secure and operational.
  • Tracked and controlled the flow of information resources between Air Force computer systems.
  • Support customers in the maintenance of ICFS computer systems and implementation of policies.
  • Manage security vulnerabilities of multiple computer systems, and systems of systems.
  • Acted as the lead investigator of used abuse of DoS computer systems.
  • Translated specific objectives and needs into computer system requirements while effectivelyproducing extensive analysis of computer systems vulnerabilities.

Show More

13 Computer System Jobs

No jobs at selected location

41. IDS

demand arrow
low Demand
Here's how IDS is used in Information Assurance Engineer jobs:
  • Provide IDS monitoring, incident response, information assurance, computer security, system hardening and vulnerability management.
  • Represented Davidson Technologies at various industry trade shows.
  • Provide security expertise including Firewalls, IDS, IPS, Security Logging, Vulnerability Management, and Security Incident Response.
  • Maintained IBM SiteProtector, Cisco WLC Based WIDS, and Aruba WIDS systems across a diverse architecture.
  • Analyze system logs and firewall logs and IDS/IPS alarms using ArcSight for low level analysis.
  • Designed and performed experiments to determine the cause of off-gassing resulting in propellant voids.
  • Monitored and logged all activities picked up by various IDS sensors and firewalls.
  • Review IDS/IPS and Firewall logs to ensure infrastructure security posture is maintained.
  • Assisted in tech refresh of entire NIDS architecture to single source platform.
  • Determine the need for new air navigation aids to improve operational capabilities.
  • Performed and maintained back-ups of all firewalls and IDS configurations.
  • Verified ArcSight logging was maintained on all NIDS/WIDS systems.
  • Monitor IDS console for active alerts and determine priority.
  • Review all incoming IDS alerts and document all issues.
  • Provided guidance for placement and calibration of IDS/IPS sensors.
  • Promoted Implemented intrusion detection (IDS), Intrusion prevention (IPS) within an enclave LAN/WAN environment.
  • Monitor Nitro Security IDS, NetForensics logs and Firewall logs for IA Network Defense Team.
  • Study and use air navigational aids to solve flight safety problems and improve operational capabilities.
  • Used IDS systems to track internal and external activities regarding the Redstone Network.
  • Created DIDs documents, SVD, IRS, IDD and SDD.

Show More

1 IDS Jobs

No jobs at selected location

42. VMS

demand arrow
low Demand
Here's how VMS is used in Information Assurance Engineer jobs:
  • Performed validation and resolution effort of open VMS requirements tickets.
  • Conducted vulnerability scans and patch management, utilizing tools such as Retina and VMS.
  • Run vulnerability scans using SCCVI updates and loading them into VMS.
  • Use scripts to grab VMS data on remote servers.
  • Provide Plans of Action & Milestones (POA&M) activities add, and closure using the VMS tool.
  • Added assets and Plans of Action & Milestones (POA&M) in VMS.
  • Tested all mitigations for the vulnerability, and upon applying the mitigation to the system, report compliance in the VMS.

Show More

43. Active Directory

demand arrow
low Demand
Here's how Active Directory is used in Information Assurance Engineer jobs:
  • Executed migration strategy to combine both two different Active Directory domains and two separate Anti-Virus management consoles.
  • Audited Active Directory and local workstations for unauthorized accounts, and unapproved elevated privileges.
  • Performed Active Directory Domain User and group administration.
  • Engineer, Support and Implement Application in an Active Directory server 2003 enterprise services environment.
  • Installed Windows Server 2008 and administer active directory domain services.
  • Utilize Enterprise Active Directory to input/ delete computer assets.
  • Designed Active Directory and DNS systems for three domains.
  • Create User accounts and mailboxes utilizing Active Directory and Exchange

Show More

44. Dcid

demand arrow
low Demand
Here's how Dcid is used in Information Assurance Engineer jobs:
  • Provide support in vulnerability assessment and continuous monitoring of the organization's information systems following DCID 6/3 and ICD 503 standards.
  • Ensured system and documentation compliance with DCID 6/3.
  • Consult and interpret DCID 6/3, AR 25-2, NIST SP 800-53, and other standards publications

Show More

1 Dcid Jobs

No jobs at selected location

45. Internet

demand arrow
low Demand
Here's how Internet is used in Information Assurance Engineer jobs:
  • Secured hundreds of thousands of high-risk network vulnerabilities and intruder hacker attempts utilizing Internet Security Scanner (ISS) vulnerability software.
  • Maintained Internet Security Scanner and System Management servers.
  • Configured laptops for remote access connectivity, outlook access, and Internet access.
  • Managed Internet security, using scanner to identify and mitigate risks.
  • Maintained live websites on both the intranet and Internet.
  • Led 4 teams to analyze and define security requirements for the Navy/Marine Corps Internet [ ] users).

Show More

46. Test Cases

demand arrow
low Demand
Here's how Test Cases is used in Information Assurance Engineer jobs:
  • Executed Scrum team test cases to ensure operational accuracy during the various phases of the SDLC product release.
  • Worked closely with QA to develop use cases, review test cases and track feature bugs.
  • Managed the Creation and execution of security Test Cases and Test Scripts.
  • Created and reviewed Test Cases for different Government Projects.
  • Create and develop test plans and test cases.
  • Developed test cases in Rational Quality Manager (RQM) for future automated testing efforts.

Show More

47. Security Certification

demand arrow
low Demand
Here's how Security Certification is used in Information Assurance Engineer jobs:
  • Coordinated the requirements of the Government Information Security Reform Act by facilitating security certification and accreditation of IT projects.

Show More

48. DAA

demand arrow
low Demand
Here's how DAA is used in Information Assurance Engineer jobs:
  • Assessed risks, identified mitigation requirements, and developed accreditation recommendations for the Designated Approving Authority (DAA).
  • Develop / update / review / submit DIACAP packages to the Joint Forces Command (JFCOM) ODAA for accreditation.
  • Worked with POC's to insure tracking and status of DAA approval packages for the CONUS ICAN.
  • Supported the completion of ST&E and required documentation for DAA certification.
  • Create and compile system documentation for ODAA review and designation as Platform IT.
  • Participate in all collaborations meetings and meetings with the CA and ODAA.
  • Create and compile system documentation for ODAA review and determination.
  • Participate in multiple collaboration meetings with customers and the ODAA.
  • Prepared recommendations for the DAA.
  • Charged as the Subject Matter Expert in Cyber Security to the Designated Approving Authority (DAA) of the USMC.

Show More

49. Unix

demand arrow
low Demand
Here's how Unix is used in Information Assurance Engineer jobs:
  • Perform traffic captures in UNIX based log server (Einstein) to provide additional intelligence for ongoing incidents.
  • Review of PowerBroker root user logs on SOX UNIX systems.
  • Developed software in C/C++ with HTML and PRO*C and UNIX (HP-UX and AIX) scripts for UNIX systems.
  • Provided secondary support for Solaris Unix 8 and 9 as well as Red Hat Linux servers.

Show More

2 Unix Jobs

No jobs at selected location

50. Security Issues

demand arrow
low Demand
Here's how Security Issues is used in Information Assurance Engineer jobs:
  • Guided application programmers and network administrators in testing of Information Assurance controls and provided solutions to security issues and ensured compliance.
  • Reviewed information systems security environments to include all aspects of physical, technical, and administrative security issues.
  • Involved in security issues including architectures, electronic data transmission, and access control/operations security monitoring.
  • Served as focal point for communication-computer security issues involving the Air Combat Command Enterprise Network.
  • Engineered new solutions after completing security requirement analyses for Multi-Level Security issues.
  • Participate in change review process to ensure risk analyses of changes are conducted and no security issues exist with upcoming changes.
  • Support the software development team, system engineers, and maintenance staff in determining security issues and impacts.
  • Involved in a wide range of security issues including architectures, firewalls, and electronic data traffic.
  • Assess threats, risks, and vulnerabilities from emerging security issues and also identify mitigation requirements.
  • Briefed the IAPM on IA and CyberSecurity issues; provided IA expertise as vulnerabilities/questions arise.
  • Trained DoS employees on IT security issues and inspected embassies for COMPUSEC compliance.
  • Consulted with and advised Nova Datacom and USACE Senior Management regarding Information Assurance and Security issues.

Show More

12 Security Issues Jobs

No jobs at selected location

Information Assurance Engineer Jobs

NO RESULTS

Aw snap, no jobs found.

20 Most Common Skills For An Information Assurance Engineer

Vulnerability Assessments

10.5%

Information Technology

10.4%

Ensure Compliance

9.9%

DOD

8.5%

Acas

7.9%

Disa

5.8%

System Security Plan

5.5%

Retina

4.8%

Information Security

4.3%

POA

4.1%

Risk Assessments

3.8%

Cyber

3.2%

Security Requirements

3.0%

Scap

2.9%

Accreditation Process

2.8%

Nist Security Policies

2.8%

Assurance

2.5%

Disk

2.5%

Security Posture

2.5%

Fisma

2.4%
Show More

Typical Skill-Sets Required For An Information Assurance Engineer

Rank Skill
1 Vulnerability Assessments 7.2%
2 Information Technology 7.1%
3 Ensure Compliance 6.8%
4 DOD 5.8%
5 Acas 5.4%
6 Disa 4.0%
7 System Security Plan 3.7%
8 Retina 3.3%
9 Information Security 3.0%
10 POA 2.8%
11 Risk Assessments 2.6%
12 Cyber 2.2%
13 Security Requirements 2.1%
14 Scap 2.0%
15 Accreditation Process 1.9%
16 Nist Security Policies 1.9%
17 Assurance 1.7%
18 Disk 1.7%
19 Security Posture 1.7%
20 Fisma 1.7%
21 Network Security 1.6%
22 ATO 1.6%
23 Nessus 1.6%
24 Hbss 1.5%
25 Defense Information 1.4%
26 Incident Response 1.3%
27 Assurance Vulnerability Alerts 1.3%
28 Iava 1.3%
29 Linux 1.2%
30 Management System 1.2%
31 Intrusion Detection 1.2%
32 Security Engineering 1.2%
33 Mcafee 1.1%
34 RMF 1.1%
35 ST 1.1%
36 Configuration Management 1.1%
37 Independent Verification 0.9%
38 Iavm 0.9%
39 Security Documentation 0.8%
40 Computer System 0.8%
41 IDS 0.8%
42 VMS 0.8%
43 Active Directory 0.8%
44 Dcid 0.8%
45 Internet 0.7%
46 Test Cases 0.7%
47 Security Certification 0.7%
48 DAA 0.7%
49 Unix 0.7%
50 Security Issues 0.7%
{[{skill.rank}]} {[{skill.name}]} {[{skill.percentageDisplay}]}%
Show More

18,923 Information Assurance Engineer Jobs

Where do you want to work?

To get started, tell us where you'd like to work.
Sorry, we can't find that. Please try a different city or state.