Information Systems Security Engineer
Listed on 2026-03-12
-
IT/Tech
Cybersecurity
Description
Leidos has a career opportunity for an Information Systems Security Engineer to support the Air Force National Capital Region IT Services program.
Leidos Digital Modernization Team provides a diverse portfolio of systems, solutions, and services covering land, sea, air, space, and cyberspace for customers worldwide. Solutions for Defense include enterprise and mission IT, large-scale intelligence systems, command and control, geospatial and data analytics, cybersecurity, logistics, training, and intelligence analysis and operations support. Our team is solving the world’s toughest security challenges for customers with “can’t fail” missions.
The AFNCR IT Services program provides support services for information systems for Headquarters Air Force (HAF), Air Force District of Washington (AFDW), Office of the Secretary of Defense (OSD), Joint Chiefs of Staff, and other Air Force activities within the AFNCR, missions to include the Pentagon, Joint Base Andrews (JBA), Joint Base Anacostia-Bolling (JBAB), and other locations, leased spaces, and alternate sites.
The major support areas required are IT Operations and Maintenance;
Plans, Projects, and Engineering (PP&E); and National Military Command Center (NMCC). The senior leaders and national defense missions that are supported require that the AFNCR operations never fail, resulting in a fast-paced, challenging, but also rewarding environment.
If this sounds like the kind of environment where you can thrive, keep reading!
Position SummaryAssist with scheduling and running vulnerability scans using Tenable Security Center/Nessus (ACAS) in classified and unclassified environments.
Review scan results to help identify potential CAT I/II/III findings, false positives, and basic configuration issues. Identify hardening requirements that still need to be met and apply those Security Technical Implementations (STIGs). Act as expert for system admins and engineers to assist through the STIG hardening process.
Support tracking of remediation actions, Plans of Action and Milestones (POA&Ms), and exceptions in accordance with RMF guidance.
Follow established procedures to validate DISA STIG checklists and work with team members to ensure secure system configurations.
Primary Responsibilities- Help prepare basic vulnerability reports, compliance summaries, and metrics to support leadership briefings and inspection readiness (e.g., CCRI/CORA).
- Assist in maintaining asset groupings, scan zones, and credentialed scanning configurations as directed by senior analysts.
- Coordinate with Queue Managers, ISSOs, and Engineering teams to support the remediation of high-priority vulnerabilities.
- Maintain data accuracy within ACAS, including proper tagging and grouping for consistent reporting.
- Active DoD Secret clearance required.
- CompTIA Security+ CE or higher DoD 8570 IAT Level II certification must meet 8140 ISSM role qualification.
- Bachelor's Degree and 4-8 years of cybersecurity or system administration experience, with at least 1 year of direct ACAS or Tenable experience. Additional years of experience may be considered in lieu of a degree.
- Working knowledge of DISA STIGs, vulnerability risk levels, and POA&M remediation strategies.
- Familiarity with NIST SP 800-53, RMF compliance, and Air Force cybersecurity policy (AFMAN 17-130).
- Strong attention to detail, documentation skills, and the ability to interpret technical vulnerability data.
Experience supporting USAF, DISA, or other DoD mission systems.
Familiarity with Evaluate
STIG, Stig Viewer, OpenSCAP, Nessus/ACAS.
Prior involvement in CCRI/CORA preparation or vulnerability remediation campaigns.
Ability to communicate risk-based recommendations to both technical and non-technical stakeholders.
Understanding of automation tools/scripts (e.g., Power Shell, Nessus APIs) to support scan or report optimization.
If you're looking for comfort, keep scrolling. At Leidos, we outthink, outbuild, and outpace the status quo — because the mission demands it. We're not hiring followers. We're recruiting the ones who disrupt, provoke, and refuse to fail. Step 10 is ancient history. We're…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).