FIND PERSONALIZED JOBS
Sign up to Zippia and discover your career options with your personalized career search.
Sorry, we can't find that. Please try a different city or state.

Security System Engineer

This job has expired and is no longer available.
APPLY NOW
Apply Now
×
FIND
PERSONALIZED JOBS

Sorry, we can't find that. Please try a different city or state.

CONTENT HAS
BEEN UNLOCKED
Close this window to view unlocked content
or
find interesting jobs in

Log In

Log In to Save

Sign Up to Save

Sign Up to Dismiss

Sign Up

SIGN UP TO UNLOCK CONTENT

or

The email and password you specified are invalid. Please, try again.

Email and password are mandatory

Forgot Password?

Don't have an account? Sign Up

reset password

Enter your email address and we will send you a link to reset your password.

Back to Log In

Log In

Log In to Save

Sign Up to Save

Sign Up to Dismiss

Sign up to save the job and get personalized job recommendations.

Sign up to dismiss the job and get personalized job recommendations.

or

The email and password you specified are invalid. Please, try again.

Email and password are mandatory

Already have an account? Log in

reset password

Enter your email address and we will send you a link to reset your password.

Back to Log In

Company Saved

Answer a few questions and view jobs at that match your preferences.

Where do you want to work?

Job Saved

See your Saved Jobs now

or

find more interesting jobs in

Job Dismissed

Find better matching jobs in

Your search has been saved!

Top 50 Security System Engineer Skills

Below we've compiled a list of the most important skills for a Security System Engineer. We ranked the top skills based on the percentage of Security System Engineer resumes they appeared on. For example, 5.8% of Security System Engineer resumes contained Vulnerability Assessments as a skill. Let's find out what skills a Security System Engineer actually needs in order to be successful in the workplace.

These are the most important skills for a Security System Engineer:

1. Vulnerability Assessments

demand arrow
high Demand
Here's how Vulnerability Assessments is used in Security System Engineer jobs:
  • Performed security vulnerability assessments, penetration testing and security assessments of network infrastructure, systems and applications.
  • Performed security risk and vulnerability assessments for the certification and accreditation of a major military program.
  • Conduct vulnerability assessments to assist with threat & vulnerability prioritization and severity.
  • Provided metrics on vulnerability assessments reporting standards and recommended remediation activities.
  • Created procedures for system security audits, vulnerability assessments.
  • Perform periodic vulnerability assessments on networks and systems.
  • Subject Matter Expert (SME) for vulnerability assessments and penetration testing.
  • Create vulnerability assessments to present to management to assist with prioritization in regards to the company's security posture.
  • Conduct vulnerability assessments, risk management, detection, prevention and analysis of cyber incidents.
  • Used the following tools daily in conducting non-intrusive vulnerability assessments: NMAP, Nessus, ISS, Metasploit and Retina.
  • Conduct vulnerability assessments using Nessus, Metasploit, Kali Linux and Paros for security web applications and network appliances.

Show More

12 Vulnerability Assessments Jobs

No jobs at selected location

2. Firewall

demand arrow
high Demand
Here's how Firewall is used in Security System Engineer jobs:
  • Performed firewall rule approvals and responsible for integrating security best practices into projects.
  • Conducted evaluation of intranets and firewalls on a regular basis.
  • Installed and configured Microsoft Server 2003 computers, SQL databases, Cisco router, switch, and firewall (ASA5500x).
  • Managed, configured, and maintained all servers within the environments, including Cisco network routers, switches, and firewalls.
  • Support troubleshooting application issues related to network security (SIEM, firewalls, network data collection and storage).
  • Work directly with clients to review, recommend and implement a secure, redundant firewall and network configuration.
  • Identify from the Load-Balancer (switch) which proxies or firewall is being used when working with customers.
  • Reviewed, documented, recommended firewall, encryption, security products for local and remote site usage.
  • Created, edited, and tested Host Intrusion Prevention firewall rules within the US Army environment.
  • Team Leader responsible for the daily running of the Firewall Network Support Center.
  • Configured and managed Cisco PIX 515E Series Firewalls and Cisco 2600/2800 Series Routers.
  • Provided tier 3 support for Check Point Firewall-1 software to support customers.
  • Achieved SANS GIAC Certified Firewall Analyst Certification during employment at IAF.
  • Maintain firewall ACL for downstream WSUS servers to synchronize.
  • Configured Palo Alto firewalls in HA (High Availability) in active/passive and active/active modes.
  • Installed Palo Alto Firewalls in Enterprise level data centers.
  • Configured and maintained URL filtering on Palo Alto Firewalls.
  • Manage Fortinet firewalls and wireless Access Points.
  • Configure Palo Alto Firewall models as well as a CMS (Panorama) to manage large scale firewall deployments.
  • Implemented Zone Based Firewalling and Security Rules on the Palo Alto Firewall.

Show More

16 Firewall Jobs

No jobs at selected location

3. Windows XP

demand arrow
high Demand
Here's how Windows XP is used in Security System Engineer jobs:
  • Performed a DISA STIG (Security Technical Implementation Guide) assessment during build of the Windows XP machine.
  • Experience with supporting Windows 2000, Windows XP and Windows 7 operating system in an enterprise.
  • Implement and maintain security configuration for over 5000 Windows XP and Vista systems using Active Directory Group Policy.

Show More

4. Information Technology

demand arrow
high Demand
Here's how Information Technology is used in Security System Engineer jobs:
  • Provided subject matter expertise on computer forensics, and information technology initiatives from a security perceptive.
  • Acted as a Security Engineer for the Information Technology and Communications Continuity program.
  • Provided technical presentations of Information Technology Concepts.

Show More

15 Information Technology Jobs

No jobs at selected location

5. Security Policies

demand arrow
high Demand
Here's how Security Policies is used in Security System Engineer jobs:
  • Document several network security policies that are used world-wide.
  • Followed DOD Government guidelines to apply network security policies and procedures to Windows 2000/2003 Servers GPO.
  • Revamped the IT security policies for site based on CAG, FISMA, NIST and business practices.

Show More

15 Security Policies Jobs

No jobs at selected location

Job type you want
Full Time
Part Time
Internship
Temporary

6. Assurance

demand arrow
high Demand
Here's how Assurance is used in Security System Engineer jobs:
  • Employed systems and Information Assurance engineering expertise to lead the acquisition, development, and implementation of secure communications programs.
  • Provided information assurance and computer security, testing, requirements mapping, and web application construction and functionality testing.
  • Innovated solutions that advanced the state-of-the-art in Information Assurance technologies and techniques to support the development of intellectual property.
  • Established a Quality Assurance and Control program that supported an extremely limited number of senior key government officials.
  • Reviewed and made recommendations for information assurance solutions based on knowledge of networks and existing application performance.
  • Produced detailed technical documentation and drawings describing how security standards and Information Assurance controls are implemented.
  • Produced security assessment and accreditation packages for the information assurance of classified government systems and networks.
  • Instituted Systems Engineering methodologies into an Information Assurance section to ensure milestones were implemented and met.
  • Assessed information assurance vulnerability alerts and bulletins for applicability to deployed systems.
  • Provide security management support for Information Assurance and Computer Network Defense.
  • Provide Information Assurance, Security Engineering, Computer Network Defense and Program Protection support for the GMD Systems Product Team.
  • Interact regularly with the Information Assurance Manager (IAM) to: o Report status concerning IAO work efforts.
  • Assisted with Information Assurance (IA) team members to standardize the Information Assurance (IA) control program.
  • Conduct Information Assurance (IA) scans using NESSUS scanner on standalone classified and unclassified systems.
  • Created standard processes for Information Assurance activities for government systems.
  • Revised and completed technical documentation to produce vital end-item Information Assurance deliverables.
  • Managed Enterprise Mission Assurance Support System (eMASS) records and phases.
  • Experienced with Interoperability Assurance using PKI, and Meta Directories.
  • Reviewed and validated all information assurance technical documentation for the Joint Strike Fighter multi-level security-enhanced ground and airborne communications infrastructure.
  • Applied numerous "Defense in Depth" strategies to meet information assurance standards.

Show More

36 Assurance Jobs

No jobs at selected location

7. Disa

demand arrow
high Demand
Here's how Disa is used in Security System Engineer jobs:
  • Created and maintained DISA security implementation guidance based on analysis of and guidance provided by the National Security Agency.
  • Created and presented DISA security requirement implementation training to Field Security Operations personnel.
  • Developed and documented Backup and Disaster Recovery procedures for enterprise security solution.
  • Participated in business continuity and disaster recovery planning and implementation activities.
  • Lead project for Business Continuity Planning, Disaster recovery.
  • Prepare documentation for the following areas, disaster recovery, user support, security and password and security policy.
  • Coordinated the transportation of data backup tapes to an off-site location as part of the disaster recovery procedure.
  • Design, develop and implement proper backup procedures to follow in accordance with the disaster preparedness guidelines.
  • Support the development and deployment to alternate token keys for DISA employees and contractors.
  • Update ACAS plugins weekly or when updates became available on the DISA provided website.
  • Perform system hardening to servers per DISA and organizational guidelines.
  • Risk analysis, SSP, STEP, and disaster recovery.
  • Maintained Datacenter, Including Redundancy techniques, Climate Control & Disaster Recovery.
  • Adhered to ITIL and DISA best practices and procedures in a high security environment.

Show More

13 Disa Jobs

No jobs at selected location

8. DOD

demand arrow
high Demand
Here's how DOD is used in Security System Engineer jobs:
  • Tested and evaluated applications against system patches and upgrades to ensure compatibility with DoD and commercial networks.
  • Ensured that Information systems was secured, operated at the highest level of security, and to Army and DOD standards.
  • Support the research and analysis of DoD and DA policies to mitigate implementation problems that may impact the ACAS implementation.
  • Provide and maintain an effective security awareness and training program in accordance with Federal and DoD policies and standards.
  • Supported the Enterprise Security Management (ESM) Framework to relate to GIG IA and DoD communities.
  • Mitigated security vulnerabilities, for the DoD's server systems, using the DISA Gold Disk.
  • Supported Information Assurance (IA) group on architectural matters for platforms interfacing with DoD systems.
  • Provided support for the DoD Navy and Marine Corps Intranet (NMCI) project.
  • Identify security impacts to the DoD Army network, throughout the entire PAC-TNOSC.
  • Configured Network to comply by NISPOM standards as required by DoD.
  • Assessed DoD commercial data center and wrote a technical report.
  • Engineer for over 3000 nodes running on DoD SIPRNET.
  • Implemented security measures as dictated by DOD policy.
  • Level 3 Network (DoD/SAT/SIPR/SWAN).
  • Managed network security operations and audit team, revamped the DoD Joint Technical/Tactical Data Integration (JTDI) cyber security.
  • Conducted DoD Information Assurance Process (DIACAP) Lifecycle work, implementing and validating assigned IA Controls.
  • Provided operational implementation guidance of NIPRNet PKI RAW and compliance with DoD guidelines and standards.
  • Developed and updated Security Classification Guides IAW NISPOM and DODi 8500.2.
  • Performed and security audits and researched DOD/DISA/DITSCAP/NIPRNET STIGs guidelines.
  • Developed OS build books IAW DoD Directives 8000.1 and 8500.1.

Show More

65 DOD Jobs

No jobs at selected location

9. System Security Plan

demand arrow
high Demand
Here's how System Security Plan is used in Security System Engineer jobs:
  • Developed System security plans (SSP) and data privacy documentation for the C&A package.
  • Participated in development and reviewed System Security Plans (SSP).
  • Updated and maintained System Security Plans SSP and Security Concept of Operations (SECONOPs).

Show More

9 System Security Plan Jobs

No jobs at selected location

10. Architecture

demand arrow
high Demand
Here's how Architecture is used in Security System Engineer jobs:
  • Reviewed and evaluated systems' security architecture COTS/GOTS products to determine the level of protection required to develop security implementations.
  • Interfaced with Hardware/Software Engineers to develop system security architectures as directed by NSA and CERT guidelines.
  • Provide systems architecture/design of secure networks for daily operations and provide security projects support.
  • Analyzed and interpret network data flows, infrastructure configurations and architectures of target networks.
  • Performed Enterprise Architecture for network discovery and provided a gap analysis.
  • Coordinated integration of new DC into existing Domain Network Architecture.
  • Performed Security Architecture reviews and analyzed proposed designs.
  • Developed and engineered Delta's Virus protection architecture/infrastructure.
  • Designed security architecture's and performed Certification and Accreditation (C&A) activities utilizing DIACAP and NIST requirements.
  • Supported global Tier III escalation strategy of the secure Top Level Architecture (TLA).
  • Provide mentoring, support and project back-up to IA Architecture and Engineering Team members.
  • Enforce the design and implementation of trusted relations among external systems and architectures.
  • Designed and implemented the network architecture for Microsoft's SharePoint Server.
  • Designed a flexible architecture with full traceability to customer requirements while incorporating commercial off the shelf products to reduce cost.
  • Engineered, assessed, and reviewed future antivirus architecture solutions and implemented life-cycle maintenance processes.
  • Supported multi-million dollar projects involving the Information Assurance Security Architecture Design.
  • Engaged in Risk Management Framework (RMF) architecture/planning Participated in Baseline and IV&V activities for JTF Capital Medical systems
  • Use cases were developed in order to ensure that he system architecture would be able to meet all of the requirements.
  • Participated in the planning, building, upgrading and maintenance of Windows, Exchange, ISA and Citrix architecture.
  • Provide cost effective solutions for systems architecture, including WAN and LAN equipment and local IT support solutions.

Show More

63 Architecture Jobs

No jobs at selected location

11. Linux

demand arrow
high Demand
Here's how Linux is used in Security System Engineer jobs:
  • Administer network and computing devices/systems that enforce security policies and audit controls in Windows and Linux environment.
  • Provided install, maintain and oversee operation and software/network security of UNIX/ Linux/Windows servers.
  • Hardened Linux servers to prevent potential security vulnerabilities.
  • Project Management for various UNIX/Linux/Windows system integration projects.
  • Configured custom scripts using BASH Shell on Red Hat Enterprise Linux * Designed and configured HP MSA and HP EVA SAN.
  • Experience with importing secure SSL cert into IIS web server and Apache Tomcat web server on Linux Red Hat OS.
  • Set up a standardized process and implement business continuity for over 30 mission critical servers of various flavors of Unix/Linux.
  • Deployed Linux cluster employing Beowulf to replace Win NT infrastructure for Houston, TX based plant device control mechanisms.
  • Created Kick-start image for Red Hat Linux Client and configured new Linux and Windows Work Stations.
  • Develop Windows and UNIX/ Linux Red Hat SCA Test Plans, collection forms and readiness checklists.
  • Integrate LDAP running on Linux with Active Directory Services on Windows.
  • Worked on managing, configuring Linux servers and Security appliances.
  • Help maintain several Windows & Linux servers.
  • Assist with mitigating/justifying security findings on secured Linux servers Assist with building and deploying Remote Access Console Linux servers
  • Manage large physical and virtual servers of over 5,000 UNIX distributed servers using QAS with Solaris, Linux and AIX Servers.
  • Supported multiple Linux high performance computation clusters, SGI big iron systems, and SUN Solaris servers.
  • Coded Perl, shell scripts for securely distributing IPtables rules updates to these 16 Linux firewalls.
  • Configured dynamic DNS on BIND with journaling and configured DHCP pools on Red Hat Enterprise Linux.
  • Developed Python scripts over SUSE Linux for SAP and VMWare automation.
  • Work on call with Migration team, to migrate Linux, and Solaris servers including LDAP servers with telechek applications.

Show More

4 Linux Jobs

No jobs at selected location

12. Stig

demand arrow
high Demand
Here's how Stig is used in Security System Engineer jobs:
  • Conducted incident investigations, prepared documentation, and resolved trouble tickets for the FAA regarding all network anomalies and suspicious activity.
  • Coordinated with Forensic Investigations Team in managing BlueCoat Proxy appliance configuration and NPC's proxy appliance administration.
  • Performed investigations of security incidents, anomalies and events and the development of incident reports procedure.
  • Investigated and resolved Computer Security Incidents Internet Security.
  • Investigate and escalate security violations.
  • Worked directly with the Office of Inspector General (OIG) on legal issues related to information security incidents and investigations.
  • Provided expert-level TCP/IP packet analysis in security incident investigations and as member of the Incident Response Team (IRT).
  • Investigated and researched reported intrusions and provided courses of action to the ISSO for remediation or eradication.
  • Provide guidance on TEMPEST / DISA STIG requirements in relation to information assurance.
  • Investigate, document, and report on information security issues and emerging trends.
  • Analyzed system logs using SPLUNK as wells as investigating security events.
  • Configured, harden (STIG), and deploy WES 7 builds.
  • Directed the interpretation and implementation of various DISA STIGs and other relevant security best practices documentation across several platforms.
  • Supported AFSCN with the Installation, configuration, and testing of hardware and software IAW DoD 8570 controls and DISA STIGs.
  • root cause, repeat faults, trends to identify opportunities for improvement and initiate investigation and/or corrective action, where appropriate.
  • Developed policy compliance guidance and leveraged DISA Gold Disk, STIGs, and NSA guidelines and standards.
  • Implented DISA STIGS on agency's systems to ensure required configuration and maintain security posture.
  • Identified and analyzed DISA security technical implementation guides (STIGs).
  • Managed an IT team of 5 to run weekly/monthly STIG Audits and Virus definition updates from Dept.
  • Configured and maintained Netwitness Nextgen Infrastructure (Decoder, Concentrator, Informer, Investigator).

Show More

16 Stig Jobs

No jobs at selected location

13. Acas

demand arrow
high Demand
Here's how Acas is used in Security System Engineer jobs:
  • Conduct testing of new ACAS technologies and develop documentation to meet suspense dates.
  • Perform weekly ACAS and VRAM updates on PMW-120 systems.

Show More

1 Acas Jobs

No jobs at selected location

14. Active Directory

demand arrow
high Demand
Here's how Active Directory is used in Security System Engineer jobs:
  • Provided Active Directory administration, routine maintenance along with fixing Backups and Console Control Secure Gateway Systems.
  • Received Microsoft Professional Active Directory Training and participated in planning the roll-out during meetings in Kansas City.
  • Designed and administered a complex Active Directory and Group Policy infrastructure.
  • Create Separate Active Directory domains for Government and Commercial environments.
  • Initiated Active Directory migration and managed Active Directory Group polices.
  • Administered and created active directory accounts and artifacts.
  • Developed a very good understanding the difference between smart card per host and per user in Windows Active Directory authentication.
  • Created Audit and Security policies for the infrastructure leveraging Microsoft Active Directory Group Policy Objects, and Snare Agent.
  • Deployed Windows and Linux servers to support enterprise LDAP active directory and DNS services and workstations within the environment.
  • Worked closely with Active Directory teams to administer and implement current and new group policies across multiple domains.
  • Experience with the configuration of a clustered 2012 Active Directory environment and management of Windows 2012 servers.
  • Migrated 2000 users from different domains and hosted platforms into one consolidated Active Directory Structure.
  • Administered the creation and deletion of Active Directory objects from multiple classified and unclassified networks.
  • Manage security permission for user account and access to shares in Active Directory.
  • Maintained Windows Active Directory user and Windows Exchange email accounts.
  • Created and updated Active Directory Group Policies.
  • Administered Active Directory and Exchange servers.
  • Analyzed and deployed MS Active Directory technology and the migration from Novell NDS to AD.
  • Designed, managed and implemented a multi-forest, multi-domain Active Directory consolidation project.
  • Configured TACACS+ to allow Active Directory login for SSH access on all Cisco switches and routers.

Show More

4 Active Directory Jobs

No jobs at selected location

15. Information Security

demand arrow
average Demand
Here's how Information Security is used in Security System Engineer jobs:
  • Provided premier security expertise including all information security operations in designing, implementing, trouble-shooting and mitigating vulnerabilities.
  • Conducted information security risk assessment, management, evaluation, and mitigation to projects and initiatives.
  • Drafted and implemented information security policies resulting in a more secure and compliant organization.
  • Reviewed and assess information security events and logs via sophisticated security information/event manager.
  • Helped in establishing and executing the Information Security Program in Qatar Petroleum.
  • Prepared information security evaluation for new and existing project enhancements.
  • Designated Information Security Official on the Policy and Compliance Committee.
  • Exposed serious information security vulnerabilities in highly sensitive business units.
  • Coordinated responses to information security incidents.
  • Created Information Security Program Management Plan.
  • Performed consulting services for Information Security to internal bank clients; responsibilities included fact gathering, design, and project planning.
  • Assisted LM engineers in design of the ground-based JSF network to ensure compliance with government information security regulations.
  • Maintain current knowledge of information security concepts, technologies and practices.
  • Collaborate with Internal Audit Division as a business advisor on information security and IT compliance matters.
  • Developed and published Information Security policies, procedures, standards and guidelines based on knowledge of best practices and compliance requirements.
  • Completed risk assessment in regards to Information Security for an ATM to IP migration.

Show More

26 Information Security Jobs

No jobs at selected location

16. Access Control

demand arrow
average Demand
Here's how Access Control is used in Security System Engineer jobs:
  • Developed and implemented high technology video surveillance, access controls, and intercom systems for commercial and municipal entities.
  • Versed in EST, Honeywell, Fire-lite fire systems, Video, Intrusion and Access Control, all local codes.
  • Designed, installed, and maintained a variety of access control products, security systems and video systems.
  • Prepared all weekly activity reports showing maintenance & installation for Security CCTV cameras & Access Control Systems work.
  • Ensured the uninterrupted operation of checkpoint firewalls and Cisco Router access controls list.
  • Isolated all access control panels controlling entry, corridors, and surrounding areas.
  • Created access control lists to restrict access to the data on our systems.
  • Provided users with technical support for computer and access control problems.
  • Develop new code for Security and Access Control projects.
  • Installed and performed diagnostics on electronic security equipment, electro-mechanical systems, video systems, access control systems and alarm systems.
  • Research other Access Control Systems and biometrics suitable for use at the Pentagon and external buildings that are FIPS-201 compatible.
  • Worked on U.S Capitol Complex Replacement Access Control System Project to include field verification test procedure.
  • Maintained firewall policies and network access control lists (ACLs) on Cisco Nexus switch/routers.
  • Managed physical security servers, PCs, networks, and IDS/access control hardwaresoftware.
  • Developed eTrust Access Control backup solution via Python scripting with HP Server Automation.
  • Managed and troubleshoot user account login issues; also setup access controls.
  • Participated in multi-vendor Network Access Control (NAC) solution evaluation exercise.
  • Lead security systems engineer Design camera layouts and access control systems.
  • Managed and Maintain Fortigate firewalls with access controls.
  • Tested and commissioned the CCTV Monitoring System and Access Control System for King Abdul Aziz Specialized Hospital in Taif.

Show More

11 Access Control Jobs

No jobs at selected location

17. Risk Assessments

demand arrow
average Demand
Here's how Risk Assessments is used in Security System Engineer jobs:
  • Communicated the results of risk assessments to senior management and appropriate stakeholders to enable risk-based decision making.
  • Performed risk assessments and provided management with recommendations on enterprise wide security enhancements.
  • Created a metrics report that simplified reporting on all aspects of system security, audit logging and risk assessments values.
  • Performed risk assessments of new and existing IT systems and analyze, monitor, and enforce policy and compliance.
  • Provide guidance and direct technical engineering support teams and developers on mitigating risks found during risk assessments.
  • Write technical risk assessments for the project to enforce security on systems.
  • Supported/Performed IA risk assessments, develop Plan of Action and Milestones.
  • Executed analyses and trade studies and engineering risk assessments.
  • Performed risk analysis that also includes risk assessments.

Show More

18. Nist

demand arrow
average Demand
Here's how Nist is used in Security System Engineer jobs:
  • Participated in the coordination of contract administration activities for long term, extensive technical service contracts.
  • Implemented bar-coded inventory system * Performed backup network administration tasks.
  • Administer BackupExec solution to create policies to schedule data retention as well as restore files and folders that have been deleted.
  • Conducted Site Surveys and Documentation of IS Administrative Support Systems for the Weather Forecast Offices in Guam and Honolulu.
  • Performed mitigation and remediation actions of vulnerabilities (NIST), (US-CERT), (HIPAA).
  • Apply OS patches and upgrades on a regular basis, and upgrade administrative tools and utilities.
  • Assist customer in development and completion of security documentation as specified by DIAPCAP and NIST.
  • Administered security policies to control access to systems and maintains the company firewall.
  • Worked on user administration in Development, Quality, Training and Production instances.
  • Maintained User accounts, Licenses and perform other administration and configuration tasks.
  • SAP 4.7 - Security Roles and profiles Administration.
  • Administered network servers and services.
  • Experience with DIACAP, DITSCAP SP 800-33, NIST SP 800-53, FIPS 199 and HSPD-12 standards.
  • Experience with Risk Management Frameworks (NIST, OWASP, etc.)
  • Utilized NIST documentation to develop and implement a customized patch and vulnerability management system with the existing architecture.
  • Provided design strategy implementing NetWare 4.X environment for administrative and manufacturing production environment.
  • Facilitate enterprise scoping, pre-installment, installation, remediation, and administration.
  • Performed NIST C&A security assessment on badging system hardware, software, and network.
  • Provided third level antivirus support for end users, application and administration team.
  • Deployed and administered Patch Link Management using Novell Zenworks.

Show More

29 Nist Jobs

No jobs at selected location

19. VPN

demand arrow
average Demand
Here's how VPN is used in Security System Engineer jobs:
  • Managed firewalls, VPN's, applied firewall upgrades, take accountability of assigned projects and incident resolution based on SLA.
  • Supported Customer Applications through the security boundary including modifying access lists, firewalls, VPN configuration, routing, and DNS.
  • Led deployment of point-to-point hardware VPN tunnels from all space command bases to the Peterson NOSC and the IAF Facility.
  • Managed 3rd party approval requests for new account creation, remote access, and site-to-site VPN connections.
  • Managed and provided support for Windows Servers, phone systems, VPN / RSA admin.
  • Use encryption schemes Triple DES and AES algorithms to negotiate VPN encryption keys.
  • Worked on Cisco ASDM for configuring VPN on Cisco ASA Firewall.
  • Supported VPN users using EMC RSA token authentication.
  • Monitor & create access to VPN or Shiva dialup.
  • Manage Cisco firewall ACL rules governing network perimeter and interior defense, VLAN ACLs, and VPN ACLs.
  • Installed Netscreen Site-to-Site VPN at Oneida ARC, Utica.

Show More

4 VPN Jobs

No jobs at selected location

20. Mcafee

demand arrow
average Demand
Here's how Mcafee is used in Security System Engineer jobs:
  • Tested and analyzed WAN Firewall rules to ensure functionality of McAfee security solution products.
  • Support and administer McAfee SIEM, Email and Web Gateway appliances.
  • Installed, configured, and trained on McAfee InstruShield IPS.
  • Provide tier-three support for the McAfee Enterprise Protection Platform.
  • Configured and maintained McAfee (NitroSecurity) SIEM.
  • Developed and configure McAfee ePO 5.1 for virus-scan and drive encryption to provide greater security controls.
  • Create, maintain and administer McAfee ePO AD sync Points.
  • Deployed and administered McAfee Epolicy 3.5 Anti Virus Management.
  • Performed administrative functions in McAfee ePO in delivery of Enterprise Antivirus.

Show More

11 Mcafee Jobs

No jobs at selected location

21. Cyber

demand arrow
average Demand
Here's how Cyber is used in Security System Engineer jobs:
  • Provide architectural analysis of cyber security features and relate existing system to future needs and trends.
  • Ensured functionality of DHS cyber security software and applications prior to operational deployment.
  • Developed cyber security architecture and plans for Department of State future requirements.
  • Educated management on how to prevent or minimize cyber security attacks.
  • Developed the program s first cybersecurity training and awareness program.
  • Updated cyber security protocol and developed effective training procedures.
  • Instituted a Project Management Framework (PMF) to prioritize and drive best practices for cyber security engineering projects.
  • Collaborate with the Computer Information Response Team (CIRT) and the forensics analysis team to resolve cyber incidents.
  • Apply cyber security standards, best practices, directives, guidance and policies to an architectural framework.
  • Research cyber threat intelligence on the tactics, techniques, and procedures to provide guidance as requested.
  • Served in local insider threat working group providing input from the cyber side of the house.
  • Manage all aspects of Cyber Security for a Special Access Program (SAP).
  • Tested various DHS cyber systems and applications using the IBM Rational Functional Tester.
  • Created and delivered Northrop Grumman's Cyber Warrior Hacker Security and Training Program.
  • Supported the US Navy Red Team with subject matter support in cyber security.
  • Provide Cyber Security duties for classified systems within the PMW-120 program.
  • Updated all ISSO/ISSM on potential new cyber threats.
  • Risk management (risk assessment and threat analysis, risk treatment and mitigation plan) Cyber insurance readiness plan SECURE TARGET
  • Developed module to convert our Cyber Observables (CybOx) into STIX and share information using our TAXII server.
  • Key Accomplishments at Harris Corporation: C&A and Cyber security oversight of multiple intel.

Show More

86 Cyber Jobs

No jobs at selected location

22. Vmware

demand arrow
average Demand
Here's how Vmware is used in Security System Engineer jobs:
  • Included project participation in Architecture and Design of new VMWARE 5.5 environment to ensure efficient virtualization strategy.
  • Tasked with the creation of virtual machines, monitoring of resources and configuration of VMware networks.
  • Worked as a lead on getting all the Servers upgraded to 2003 using VMware.
  • Created VMware virtual machines for software developers, and testers to use.
  • Develop VMWare applications with direct support from VM and software manufacturers.
  • Designed, configured and maintained virtual web farm with VMware products.
  • Consolidated physical servers into Citrix XenServer and VMware ESX-based virtual hosts.
  • Utilized VirtualBox freeware and VMWare workstation to create virtual machines from Acronis backup images.
  • Manage complex test beds implementing both physical and virtual systems (VMWare & Virtualbox)
  • Managed complex VMware datacenter environment of over 150+ virtual machines.
  • Employed VMWare and OpenStack to delivery full life cycle solutions.
  • Use Virtualization tools (VMware Esxi 5.5, Hyper-V and Oracle Virtual Box) to host and manage VMs.

Show More

4 Vmware Jobs

No jobs at selected location

23. Intrusion Detection

demand arrow
average Demand
Here's how Intrusion Detection is used in Security System Engineer jobs:
  • Provided real-time monitoring of system integrity of ASIM Intrusion Detection Systems at every US Air Force installation ensuring enhanced network security.
  • Performed on-site installation and configuration of ASIM Intrusion Detection Suite.
  • Provided detail research and development on Intrusion Detection systems.
  • Implemented server and network-based intrusion detection.
  • Deployed distributed intrusion detection sensor network.
  • Monitored Firewall for intrusion detection.
  • Respond to downward-directed Intrusion Detection-related incident reports from the Air Force Network Operations and Security Center (AFNOSC).
  • Deployed network defense countermeasures such as anti-virus, anti-spam, and intrusion detection and prevention system solutions.
  • Designed and Implemented network and host based intrusion detection system for a major insurance company.
  • Assisted in the management of firewalls, intrusion detection systems, switches.
  • Performed Intrusion Detection Scans using Cisco Secure Scanner.
  • Managed the suite intrusion detection systems.
  • Provided real time intrusion detection host based monitoring services using Symantec Endpoint.
  • Maintain and respond to incidents from Bit9, Carbon Black Enterprise Response, and Sourcefire Intrusion Detection System.

Show More

39 Intrusion Detection Jobs

No jobs at selected location

24. Retina

demand arrow
average Demand
Here's how Retina is used in Security System Engineer jobs:
  • Performed network scans using REM, Retina, and ISS scanners.
  • Maintained FoundScan and Retina device configurations based on security best practices and recommendations in conjunction with the FMCSA security team.
  • Performed network vulnerability scans for Defense customers residing on USAITA backbone using Foundstone and Retina Scan engines.
  • Conduct scanning to discover vulnerabilities, malware, and rogue devices using the Retina and ACAS.
  • Led eEye Retina vulnerability scanning and patching effort for AFNIC RAVE.
  • Administer the security of the system by conducting security scans using eEye Retina and Threat Guard Secutor Prime Pro SCAP scanners.
  • Analyzed vulnerability assessment results from Vulnerability Management tools (Retina, Patchlink, GoldDisk) SRRs, manual STIGS, and pre

Show More

25. IDS

demand arrow
average Demand
Here's how IDS is used in Security System Engineer jobs:
  • Provided subject matter expertise for IDS implementation, log auditing, monitoring, and performed vulnerability assessments.
  • Conducted IDS presentations and answered any technical questions from clients Network and Security personnel.
  • Served as the designated point of contact for inbound IDS alerts from Office of the Secretary of Transportation.
  • Designed, built, maintained and managed multiple UNIX Checkpoint firewalls, including HA Cluster's/QOS/IDS/URL and CVP filtering.
  • Analyze and monitor TCP and UDP packets at the Network layer for IDS and firewall implementation.
  • Conduct surveys of Pentagon external buildings for upcoming ACS & IDS upgrades from DAQ to AMAG.
  • Install and maintain security infrastructure, including IPS/IDS, log management, and security assessment systems.
  • Conduct and manage risk assessments for DoD certification of third party firewall and IDS/IPS devices.
  • Managed of enterprise security systems including Firewall, Snort IDS, Windows patches and Anti-Virus.
  • Collaborated with corporate peers on Firewall, IDS, IPS, auditing and forensics.
  • Led IDS Administration, including sensor analysis, database backup and monitoring.
  • Developed customized rule sets for Intrusion Detection Systems (IDS).
  • Implemented and maintained IDS/IPS - review logs and reconfigure IDS/IPS settings.
  • Monitor and Report IDS issues w/ SourceFire IDS.
  • Experience with SIEM, IDS and Cisco ASA Firewalls.
  • Perform Check Point and PIX Firewall/IDS design, integration and implementation for Cyber Trap client networks.
  • Advise software developers in the design of an IDS & reporting tool.
  • Installed Vindicator IDS and ACS along with Pelco and Bosch camera systems.
  • Analyzed, evaluated, interpreted, and documented system level requirements defined in DOORS, PCDs, PIDS, and ICDs.
  • Deployed Kerberos security servers, Checkpoint Firewall, and SessionWall (NIDS), at each location of the project.

Show More

4 IDS Jobs

No jobs at selected location

26. Nessus

demand arrow
average Demand
Here's how Nessus is used in Security System Engineer jobs:
  • Conduct vulnerability and compliance scans of systems using the Nessus vulnerability scanner.
  • Provide Nessus operational and analysis support, including scanning, data assessment and analysis Create Data Impact Analysis and Risk assessments.
  • Documented field security posture by automating scan jobs in Nessus.
  • Modified stock Nessus scans for each piece of hardware, performed scans, and developed paths of action with tool owners.
  • Installed, configured, integrated, and administrated HBSS McAfee security suite, Syslog servers and Nessus ACAS.
  • Utilized the following tools for vulnerability scans: Tenable Security Center, Nessus, Secunia, Core-Impact, Wireshark, Tripwire.

Show More

16 Nessus Jobs

No jobs at selected location

27. Tcp/Ip

demand arrow
average Demand
Here's how Tcp/Ip is used in Security System Engineer jobs:
  • Configured and resolved - LAN and TCP/IP issues and Generated reports to show the trends of resource utilization user/CPU/network load.
  • Instructed staff on Microsoft Office courses ranging from TCP/IP to consulting skills.

Show More

28. Unix

demand arrow
average Demand
Here's how Unix is used in Security System Engineer jobs:
  • Analyzed security and event logs daily comprising 35 UNIX Web servers, UNIX Database Servers, Mainframe & Windows servers.
  • Developed system and application review proposals, and assessments of mainframe, UNIX, AS400, and LAN systems.
  • Utilized Tripwire Enterprise to identify unauthorized configuration changes, installed client software on Windows servers and UNIX servers.
  • Implement and enforce security configuration, policies and operations standards on Microsoft and UNIX systems.
  • Installed, configured, and maintained all Unix-based security and networking software.
  • Leveraged knowledge of UNIX shell scripting in log analysis and text-filtering procedures.
  • Monitor and manage call support queues for the CEEIS Systems UNIX group.
  • Created scripts using WIL scripting for Windows and Unix environments.
  • Developed and documented security policy settings for all platforms; Mainframe, UNIX, Microsoft, iOS.
  • Worked within mixed systems environment containing Windows and Unix platforms..
  • Contract position) Provided production (Unix and Windows) systems, security, and network support for hedge fund/investment firm.

Show More

2 Unix Jobs

No jobs at selected location

29. SQL

demand arrow
average Demand
Here's how SQL is used in Security System Engineer jobs:
  • Provided SQL, Windows 2000, Cisco and Citrix support to clients.
  • Developed Web Sites and Web Applications using Drupal, JQuery and designed SQL database queries.

Show More

9 SQL Jobs

No jobs at selected location

30. Security Requirements

demand arrow
low Demand
Here's how Security Requirements is used in Security System Engineer jobs:
  • Configure network systems to published security standards, and perform periodic audits to ensure systems still meet security requirements.
  • Provide system engineering IA leadership to identify, evaluate, and develop detail security requirements and support requirement certification.
  • Designed, developed, engineered, and implemented solutions to security requirements as they pertained to the network infrastructure.
  • Worked closely with division, customers and corporate departments with SAP security requirements.
  • Analyzed and defined security requirements for a variety of computer and telecommunications issues.
  • Validated company security requirements in in-house and outsourced applications.
  • Identify and define system security requirements.
  • Analyze and define security requirements.
  • Develop security requirements; perform risk analysis, risk assessment, and System Test & Evaluation (ST&E).
  • Provide technical leadership and guidance for performance testing of alarm system to meet DOE and site security requirements.
  • Analyzed and tested DISA operating system security requirements for Microsoft Windows NT 4.0 and Microsoft Windows 2000 systems.
  • Experienced in NIST, HIPAA/HITECH, and DoD security requirements.
  • Assess system against DCID 6/3 security requirements.
  • Selected Contributions: Identified and developed physical security requirements to meet the U.A.E.
  • Applied security requirements to systems for the Federal Government, Department of Defense, and Commercial Healthcare customers.

Show More

57 Security Requirements Jobs

No jobs at selected location

31. Security Engineering

demand arrow
low Demand
Here's how Security Engineering is used in Security System Engineer jobs:
  • Provided Assessment, Vulnerability, Penetration Testing, and Security Engineering services to energy grid related applications.
  • Reviewed, advised, and approved as security engineering resource within project engineering team.
  • Develop and maintain enterprise security engineering Concept of Operations (CONOPS) documentation.
  • Provided security engineering support for FXCM infrastructure and employees worldwide.
  • Directed the technical decision-making of security engineering staff.
  • Conduct crisis action planning and security engineering.
  • Performed key tactical and strategic roles as an Information Assurance (IA) subject matter expert within System Security Engineering.
  • Develop and maintain Standard Operating Procedures (SOP) for security engineering roles and responsibilities.
  • Oversee execution of network and security engineering projects for a global network.
  • Provided Information System Security Engineering in both current Security Risk Management Framework (certification &accreditation) processes and procedures.

Show More

64 Security Engineering Jobs

No jobs at selected location

32. Scap

demand arrow
low Demand
Here's how Scap is used in Security System Engineer jobs:
  • Perform subject matter expert support prior, during, and post Security Certification and Authorization Package (SCAP) activities.
  • Support all security audits, System Certification and Authorization Package (SCAP) and IG Security Inspection Team.
  • Performed re-certification and accreditation using the DITSCAP process on the project.
  • Maintained a strong awareness and understanding of the current threat landscape.
  • Performed a risk assessment on all machines for DITSCAP re-certification.
  • Transition from DITSCAP to DIACAP.
  • Developed SSAAs in accordance with DITSCAP.
  • Apply STIGs with the use of SCAP and SCAP tools.

Show More

4 Scap Jobs

No jobs at selected location

33. Security Tools

demand arrow
low Demand
Here's how Security Tools is used in Security System Engineer jobs:
  • Evaluate vulnerability scanners and other security tools to determine applicability for current and/or future needs.
  • Develop technical solutions and security tools to mitigate security vulnerabilities and automate repeatable tasks.
  • Assist with managing vendor relationships for network and security tools.
  • Integrate Static and Dynamic security tools into continuous build processes.
  • Implemented a baseline for all cyber security tools and foster an environment of continual improvement of the security posture.
  • Conduct brown bag sessions on how to use various security tools such as AirCrackNG, metasploit and OpenVAS.
  • Defined needs, researched vendors, and recommended most appropriate security toolsets to upper management.
  • Performed troubleshooting for all security toolset within Fiserv infrastructure when necessary.

Show More

34. Internet

demand arrow
low Demand
Here's how Internet is used in Security System Engineer jobs:
  • Planned and implemented Internet connectivity including all security design of DMZ and installation configuration and management of Cisco PIX firewall.
  • Supported and maintained remote access capability and Internet access support.
  • Design Internet Security Architecture to comply with Defense in Depth needs.
  • Perform pre-sell testing of the Internet Behavior Management Platform based on the actual requirements of functionality and performance figures.
  • Perform network security scans using IBM's (formerly Internet Security Systems) Internet Scanner and eEye's Retina Scanner.

Show More

35. Incident Response

demand arrow
low Demand
Here's how Incident Response is used in Security System Engineer jobs:
  • Interfaced daily with Government customers and provided briefings on incident response cases and information security events.
  • Resolved all fraud and virus infections in coordination with computer security incident response teams.
  • Served as a member of the company Incident Response team Co-founded the QP vulnerability management process.
  • Lead agency's Incident Response effort -- handled isolation, determination, correction, and communication.
  • Report security incidents according to the Incident Response and Reporting Procedure (IRRP).
  • Responded to and participated in incident response requirements directed by the DOCCIRT.
  • Provide Incident Response (IR) support when analysis confirms actionable incident.
  • Developed an Incident Response Plan, and performed Incident Response functions.
  • Experience with Incident response methods, AntiVirus and EndPoint Encryption.
  • Perform incident response and reporting.

Show More

9 Incident Response Jobs

No jobs at selected location

36. PKI

demand arrow
low Demand
Here's how PKI is used in Security System Engineer jobs:
  • Support the Certification and Accreditation (C&A) of information systems and intelligence community PKI.
  • Lead deployment of the PKI solution to over 55,000 MEDCOM users in less than 45 days.
  • Participated in the design, implementation and administration of the Public Key Infrastructure (PKI).
  • Engineered security event information management systems, PKI/PIV services, user session monitoring, remote access.
  • Provided oversight/guidance of SIPRNet PKI solution and developed policy guidance/Directives and management of project.
  • Involved in the technical support of Authentication (SecurID) and PKI (Keon) security hardware and software.
  • Developed security architecture requirements for LANs, routers/switches, firewalls, webservers, including the utilization of encryption/PKI.
  • Implement and integrate secure systems for key and pki certificate generation Use various cryptography for encryption of systems and content.

Show More

12 PKI Jobs

No jobs at selected location

37. Checkpoint

demand arrow
low Demand
Here's how Checkpoint is used in Security System Engineer jobs:
  • Migrated legacy badge reader and video camera firewall infrastructure from Checkpoint to FortiGate.
  • Administrated 40 some Linux and Windows servers, designed Blades server infrastructure migration, administrated CheckPoint firewall.
  • Perform the site-to-site VPN configurations and the firewall rule settings with the Checkpoint firewalls R7X platform.
  • Experience with CheckPoint Firewall, SmartLog, SmartEndPoint, SmartMonitor, SmartDashboard.
  • Design, Implement and Configure CheckPoint Firewall-1 Security Policies.
  • Work on Checkpoint Platform including Provider Smart Domain Manager.
  • Worked on cleanup project on Checkpoint Firewalls.
  • Instructed Checkpoint and RSA classes.
  • Completed Firewall migration from Juniper netscreen to new R77.20 checkpoint firewall.
  • Maintain and administer firewalls: Palo Alto, Fortinet, Cisco, Checkpoint.

Show More

1 Checkpoint Jobs

No jobs at selected location

38. Setup

demand arrow
low Demand
Here's how Setup is used in Security System Engineer jobs:
  • Designed and implemented access provisioning processes to automate security setup on YRC's systems for new employees.
  • Implemented and managed all group policies, file permissions, accounts setup, and rights issues.
  • Developed setup and managed an Intranet Web Page to streamline work trouble tickets.
  • Created all documents, setup test dates and invites.
  • Assist in the implementation, setup, and management of Symantec DLP (Data Loss Prevention).
  • Worked with internal and external customers to setup secure file transmissions.
  • Evaluated the existing Antivirus Setup.

Show More

39. Security Posture

demand arrow
low Demand
Here's how Security Posture is used in Security System Engineer jobs:
  • Performed interviews with management personnel to understand security posture and computing environments for planning technical walk-through s and evaluation methods.
  • Conducted system verification and auditing by collecting and analyzing event information maintaining system, services and network security posture.
  • Apply system security engineering principles to provide realistic solutions designed to enhance the MDIOC security posture.
  • Monitored security posture and security incidents regarding trending outside and inside threat vectors.
  • Assessed the security posture of applications and systems utilizing automated and manual approaches.
  • Improved organizational security posture by assessing risk and recommending mitigation controls and processes.
  • Experience with maintaining and monitoring the security posture of the installation of software and equipment on the network.
  • Interacted with government agencies to ensure the security posture of the current system and improvements did not degrade.
  • Gathered, presented, and wrote documentation showing improvement in security posture and risk reduction.
  • Analyzed cutting-edged technologies that would affect corporate security posture, as well as protecting against unknown risk (i.e.

Show More

10 Security Posture Jobs

No jobs at selected location

40. Solaris

demand arrow
low Demand

41. Hbss

demand arrow
low Demand
Here's how Hbss is used in Security System Engineer jobs:
  • Participated in Government Acceptance Testing (GAT) for the DoD Mobility Program and Host Based Security System (HBSS).
  • Served as a technical administrator for McAfee HBSS, ISS Site Protector, and ArcSight Enterprise.
  • Analyzed and tested DISA created signatures to determine impacts on production HBSS systems around the world.
  • Developed and created McAfee Host Base Security System (HBSS) deployment for the AFSCN.
  • Maintained and updated HBSS base images for new deployments and disaster recovery capabilities.
  • Provided Host Security input to improve IA policy enforcement via HBSS Policy.
  • Provided Tier III support for US Army deployments of enterprise HBSS.
  • Assured proper configuration of HBSS, Outlook, and other agents.
  • Review and validate implementation of policies and standards through HBSS.
  • Detail Design of HBSS deployment/installation plan and HBSS policy design.
  • Deploy third party software and scripts with the HBSS.
  • Managed HBSS trusted network polices for team.
  • Maintained baseline documentation and security analysis reporting to ensure best practice implementation for all ARMY deployed HBSS systems.
  • Install and maintain McAfee ePO (HBSS) Server, Anti-Virus, Data Loss Prevention, Firewall, HIPS, etc.

Show More

11 Hbss Jobs

No jobs at selected location

42. Technical Support

demand arrow
low Demand
Here's how Technical Support is used in Security System Engineer jobs:
  • Provide comprehensive end-user technical support including, but not limited to, configuring and performing hardware/software installations.
  • Develop relationships with Architects and Engineers for specification assistance, project development and technical support
  • Provided technical support and consultation for the implementation and usage of delivery systems.
  • Provided technical support and consultation and ensured 24/7 operational support and maintenance.
  • Provide 24x7 expert-level technical support and troubleshooting.
  • Handled the tasks of providing technical support for Hardware integration and driver integration by using driver software and application tools.
  • Provided daily technical support and subject matter expert guidance from the Information Assurance Office at the CTSF.
  • Perform Tier-3 level technical support activities for NOC/SOC engineers with 24x7 on-call support.
  • Provide client end-users with 24x7 technical support through help desk and on-call assistance.
  • Provided pre/post-technical support for all Cisco provided equipment.
  • Level two technical support for security systems.Escalation and PM of contracted repairs.
  • Provided technical support to the IT group with regards to troubleshooting computer access for CITGO employees and contractors.

Show More

4 Technical Support Jobs

No jobs at selected location

43. OS

demand arrow
low Demand
Here's how OS is used in Security System Engineer jobs:
  • Migrated and upgraded outdated systems to current Microsoft Desktop and Server operating systems.
  • Developed and documented standard operating procedures to ensure the system could be cross-certified.
  • Led 3rd-party solution security architecture assessments and provided feedback on proposed designs.
  • Managed fuel consumption analysis program, through the assembly of an engineering team from across key entities of the Navy.
  • Secured roles by Company Code, Plant, Cost Center, Profit Center, and Purchasing Organization, etc.
  • Worked closely with engineering staff Navy-wide, and vendor engineers, to ensure customer requirements met.
  • Posted various documents for self-help, reducing the workload for the desktop services staff.
  • Installed, troubleshot cross domain system solutions at customer sites and at the office.
  • Configured site replication of AD and Exchange data across 15 sites.
  • Developed and posted directions to help end users troubleshoot issues.
  • Accomplished all without the loss of any system or connectivity.
  • Posted company policies on various desktop support related issues.
  • Performed research projects relating to specific kiosk performance issues.
  • Performed online diagnostics of remote kiosk.
  • Document security incident findings, prepare incident reports, and participate in post-mortem briefings with management and non-technical executive stakeholders.
  • Maintain and streamline an in-house customizable application for addressing vulnerabilities on systems on closed satellite communication networks.
  • Implement first line of defense with closed core systems only accessible with secure VM on a secured pc.
  • Implemented network-wide monitoring system of all servers in operation with Nagios and OSSEC.
  • Cross reference lost or unmanaged systems with AD and tagged systems.
  • Post Sales Delivery Services around Symantec DLP and Zscaler Web Filter Security product training for sales force.

Show More

44. Fisma

demand arrow
low Demand
Here's how Fisma is used in Security System Engineer jobs:
  • Created and updated agency's Disaster Recovery and contingency plans in compliance with FISMA requirements.
  • Experience and knowledge of NIST SP 800-53A, ICD 503, FISMA, DCID 6/3, and FISCAM.
  • Provided system, network, and circuit guidance and support to 16 AirForce comands to ensuring FISMA compliance was met.
  • Standardize baseline audits, governance, compliance of FISMA,DT, OT, Pen/Vuln.

Show More

11 Fisma Jobs

No jobs at selected location

45. Cctv

demand arrow
low Demand
Here's how Cctv is used in Security System Engineer jobs:
  • Developed and engineered all CCTV and Network Card Access Systems needs for the Company.
  • Provided maintenance to audio and video CCTV system along with the DVR system.
  • Installed and programmed the CCTV systems in commercial and residential environment.
  • Maintained IP based CCTV system.
  • Close Circuit TV (CCTV) surveillance system.

Show More

3 Cctv Jobs

No jobs at selected location

46. ATO

demand arrow
low Demand
Here's how ATO is used in Security System Engineer jobs:
  • Identified, evaluated and communicated state of security controls and control deficiencies as per regulatory and client requirements and best practices.
  • Operate the current Configuration Management program on ONR networks to ensure applications do not cause conflicts and degrade network/operator performance.
  • Prepared detailed test and evaluation reports, and briefed both management and system administrators on formal findings and recommendations.
  • Consulted application owners, database administrators and other specialists when systems needed testing during development of security patches.
  • Understand, related and transform information security regulatory requirements into security policy, standards, procedures and guidelines.
  • Reviewed violations of computer security procedures and discuss procedures with violators to ensure violations were not repeated.
  • Manage certification and accreditation compliance for systems and data centers for DOE regulatory requirements.
  • Coordinated with field administrators on security problems for various software updates.
  • Provided financial coordinator support to numerous Government contracts.
  • Provided Tripwire training to local site administrators.
  • Certified C/Cure systems integrator and manager.
  • Correlate security incident indicators; review services and information at risk, threat actor activity and capabilities, and incident scope.
  • Developed and published Command Launch Element/Ground Based Interceptor (CLE/GBI) Security Administrators Guide and (CLE/GBI) Users Guide.
  • Acted as a Master Tripwire Administrator to implement Tripwire Enterprise on over 2,100 servers to comply with PCI requirements.
  • Configured Profile Generator and transported settings to all clients, setup security for the developers.
  • Key participant in DIACAP audits resulting in ATO (Authorization to Operate) status.
  • Assisted in maintaining regulatory compliance in HIPAA & PCI-DSS.
  • Centralized Graphic Operator Interface (GOI).
  • Experience with IT Regulatory Compliance (PCI, FISMA, NCUA, HIPAA, etc.)
  • Review DIACAP package documents for integrity and completeness regarding testing and risk analysis as a Navy Validator.

Show More

6 ATO Jobs

No jobs at selected location

47. Security Solutions

demand arrow
low Demand
Here's how Security Solutions is used in Security System Engineer jobs:
  • Offered security engineering support for technical implementation of security solutions comprised of COTS as well as custom products.
  • Implement system configuration changes and security solutions to support customers' requirements.
  • Design, test, and implement security solutions for systems and networks deployed across secure government facilities.
  • Identify customer needs and design a Security solutions to fit those specific needs.
  • Worked with sales in designing custom security solutions for customers.
  • Designed, engineered, and implemented security solutions for Fiserv enterprise infrastructure, such as corporate intranet and external facing assets.
  • Architected, implemented and assessed complete Enterprise Class Security Solutions for Fortune 100 companies.
  • Provide the Army governing security solutions in the battlespace.
  • Train Dell personell, and Dell partners in Sonicwall security solutions.

Show More

25 Security Solutions Jobs

No jobs at selected location

48. POA

demand arrow
low Demand
Here's how POA is used in Security System Engineer jobs:
  • Managed the POA&M for the system and worked with site and government personnel to mitigate items.
  • Developed and maintained the program POA&M, and briefed the customer on a monthly basis.
  • Assisted DAO (Delegated Authorizing Officers) with on-site testing for POA&M follow ups.
  • Create and update system security documentation (SSP, SAR, RAR, POA&M, etc.)
  • Tracked and maintained POA&Ms and provided solution for remediation.
  • Developed workflows for POA&M updates and vulnerability scanning.
  • Developed Risk Management Matrixes and POA&Ms for multiple high performance data systems and software packages.

Show More

2 POA Jobs

No jobs at selected location

49. DNS

demand arrow
low Demand
Here's how DNS is used in Security System Engineer jobs:
  • Deployed a secure DNS architecture re-purposing F5 DNS appliances with NetBSD, BIND9, DNSSEC, and Sender Policy Framework.
  • Configured, modified, and maintained Red Hat servers providing security logging facilities, and DNS caching services.
  • Used AD Migration Tool, cross-forest trusts, DNS zone delegation, inter-site replication.
  • Provided UNIX server and network support to the environment; managed all DNS services.
  • Managed and Implemented PKI infrastructure and agency's transition to DNSSEC.
  • Administered firewall and security policies, ACE/Server, and DNS/Bind.
  • Administered DNS, Remote access server and Unix user accounts.
  • Provided enterprise level DNS support for a major multi-domain network.
  • Performed evaluations of IPSEC, MD-5 Authentication, DNSsec, Kerberos, and PKI CA and RA servers.

Show More

9 DNS Jobs

No jobs at selected location

50. Accreditation Process

demand arrow
low Demand
Here's how Accreditation Process is used in Security System Engineer jobs:
  • Developed the required NSA Information System Certification and Accreditation Process (NISCAP) documentation for the database system.
  • Provide DoD Information Assurance Certification and Accreditation Process (DIACAP) support.

Show More

11 Accreditation Process Jobs

No jobs at selected location

Security System Engineer Jobs

NO RESULTS

Aw snap, no jobs found.

20 Most Common Skills For A Security System Engineer

Vulnerability Assessments

9.7%

Firewall

9.4%

Windows XP

9.1%

Information Technology

6.1%

Security Policies

5.9%

Assurance

5.8%

Disa

5.2%

DOD

4.7%

System Security Plan

4.5%

Architecture

4.4%

Linux

4.1%

Stig

3.9%

Acas

3.7%

Active Directory

3.6%

Information Security

3.5%

Access Control

3.4%

Risk Assessments

3.4%

Nist

3.3%

VPN

3.2%

Mcafee

3.2%
Show More

Typical Skill-Sets Required For A Security System Engineer

Rank Skill
1 Vulnerability Assessments 5.8%
2 Firewall 5.7%
3 Windows XP 5.5%
4 Information Technology 3.7%
5 Security Policies 3.5%
6 Assurance 3.5%
7 Disa 3.1%
8 DOD 2.9%
9 System Security Plan 2.7%
10 Architecture 2.7%
11 Linux 2.5%
12 Stig 2.3%
13 Acas 2.2%
14 Active Directory 2.1%
15 Information Security 2.1%
16 Access Control 2.1%
17 Risk Assessments 2.1%
18 Nist 2.0%
19 VPN 1.9%
20 Mcafee 1.9%
21 Cyber 1.9%
22 Vmware 1.8%
23 Intrusion Detection 1.8%
24 Retina 1.8%
25 IDS 1.7%
26 Nessus 1.7%
27 Tcp/Ip 1.7%
28 Unix 1.6%
29 SQL 1.5%
30 Security Requirements 1.5%
31 Security Engineering 1.5%
32 Scap 1.5%
33 Security Tools 1.4%
34 Internet 1.4%
35 Incident Response 1.4%
36 PKI 1.3%
37 Checkpoint 1.2%
38 Setup 1.2%
39 Security Posture 1.2%
40 Solaris 1.1%
41 Hbss 1.1%
42 Technical Support 1.1%
43 OS 1.1%
44 Fisma 0.9%
45 Cctv 0.9%
46 ATO 0.9%
47 Security Solutions 0.9%
48 POA 0.9%
49 DNS 0.9%
50 Accreditation Process 0.8%
{[{skill.rank}]} {[{skill.name}]} {[{skill.percentageDisplay}]}%
Show More

23,604 Security System Engineer Jobs

Where do you want to work?

To get started, tell us where you'd like to work.
Sorry, we can't find that. Please try a different city or state.