Cybersecurity Engineering Professional
Listed on 2026-01-15
-
IT/Tech
Cybersecurity -
Engineering
Cybersecurity
Cybersecurity Engineering Professional at NANA
Join to apply for the Cybersecurity Engineering Professional role at NANA
.
5 days ago – Be among the first 25 applicants.
Base pay range: $ / yr – $ / yr.
Job :
Work Type:
On‑Site
Pay Range: $ / yr – $ / yr
Benefits:
Regular – The company offers a comprehensive benefits program, including medical, dental, vision, life insurance, 401(k) and a range of other voluntary benefits. Paid Time Off (PTO) is offered to regular full‑time and part‑time employees.
Analyzes, retrieves, catalogs, and safeguards digital data related to cybercrime investigations. Researches and evaluates equipment and software that helps in recovering necessary data. Tests new software to ensure functionality. Documents artifacts and deliverables according to set standards. Conducts complex and high‑profile, non‑destructive evaluations of computer systems to determine operating and file systems. Analyzes computer network security settings, server, system, router, firewall, intrusion detection system (IDS) and intrusion prevention system (IPS) logs and packet capture data.
Provides detailed examination reports to government agencies. Configures, installs, and maintains Network Intrusion Detection systems and Network Forensic Analysis Tools. Performs work with a high degree of latitude, handles the most complex issues, possesses expert knowledge of subject matter, and may act as lead or first‑level supervisor.
- Provide cyber security engineering, RMF, and Security Manager support for SCCA activities, including implementing security measures, conducting risk assessments, supporting DoD authorization and accreditation efforts, and developing strategies to mitigate potential threats and vulnerabilities.
- Offer engineering support for all SCCA programs, applying engineering principles to design, implement, and maintain secure systems, operations, and infrastructures.
- Assist in the development of security policies and procedures, personnel security functions such as briefings and debriefings, and management of controlled areas and classified documents.
- Provide security engineering support services to technical aspects of the SCCASCCA programs using a combination of DoD policy and industry best practices.
- Architect and create secure, modern, and repeatable security solutions for the SCCA Marketplace following industry best practices (e.g., Dev Sec Ops , Agile principles) and map to DoD security standards.
- Support security engineering efforts related to networking equipment needed to connect existing DoD networks to SCCA Cloud Service Providers at all information levels and classification levels.
- Support design and review for high‑assurance/high‑security one‑way file transfer solutions.
- Respond, investigate, and assist in remediation of any breach or potential security issues reported by the SCCA cloud service provider.
- Monitor logs from SCCA managed hardware and software to identify and remediate potential breaches or misconfigurations.
- Collaborate with cross‑functional teams to ensure security requirements are integrated into the design and development of systems and applications.
- Conduct regular security assessments and audits to identify vulnerabilities and recommend appropriate security controls.
- Assist in the development and implementation of security policies, standards, and procedures.
- Stay updated with the latest security technologies, industry trends, and emerging threats to provide proactive security recommendations.
- Perform risk assessments and threat modeling to identify potential risks and vulnerabilities.
- Participate in incident response activities, including investigating security incidents, conducting forensic analysis, and implementing remediation measures.
- Provide guidance to SCCA staff on security best practices, security awareness, and incident response protocols.
- Support the development and maintenance of security documentation, such as security plans, system security requirements, and security assessment reports.
- Conduct security reviews of third‑party applications and software to evaluate their security posture and identify potential risks.
- An interim Secret…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).