×
Register Here to Apply for Jobs or Post Jobs. X

Information System Security Engineer

Job in Orlando, Orange County, Florida, 32885, USA
Listing for: Leidos
Full Time position
Listed on 2026-01-10
Job specializations:
  • IT/Tech
    Cybersecurity, Systems Engineer, IT Consultant, Network Security
Job Description & How to Apply Below

Description

Join a team committed to a mission!

At Leidos
, we deliver innovative solutions through the efforts of our diverse and talented people who are dedicated to our customers’ success. We empower our teams, contribute to our communities, and operate sustainable. Everything we do is built on a commitment to do the right thing for our customers, our people, and our community. Our Mission, Vision, and Values guide the way we do business.

Are you ready for your next career challenge?

Leidos is seeking an Information System Security Engineer (ISSE) to collaborate with the Information System Security Manager (ISSM) serving as a subject matter expert in advanced technical principles, theories, and concepts in Security Engineering, including operations, engineering, technical and program management support services, and RMF/ATO compliance to support cyber-related operations.

Responsibilities

  • Under the direction and guidance of the ISSM, capture and refine information security requirements and ensure their integration into information technology components and information systems through purposeful security design and configuration.
  • Perform vulnerability assessments to determine weaknesses and exploit methods in systems/networks utilizing approved COTS and GOTS tools, in conjunction with security testing methodologies and frameworks to assess threats against information and system/networks and recommend appropriate countermeasures for continued mission assurance.
  • Perform cybersecurity analysis, identification, and remediation of complex cybersecurity compliance requirements on IT systems and applications to include:
    Microsoft Windows and RHEL family of servers, workstations operating systems. RDBMS such as SQL and Postgre

    SQL, XML, and JSON-based semi-structured technologies. Web-Server and web application technologies (e.g., MS IIS, Apache/Tomcat, SharePoint). Virtualization technologies such as VMware and VDI infrastructures. Network infrastructure components such as switches, firewalls, vSANs, and thin client hardware.
  • Provide remediation recommendations and mitigating strategies for vulnerabilities discovered and maintain in-depth knowledge of STIG/SRGs, technologies such as Tenable Nessus, SCAP compliance tools like Evaluate

    STIG and other automated tools that assist with the assessment of security controls and the presentation of security assessment results.
  • In coordination with change management processes, remediate, apply, and/or mitigate vulnerabilities to systems and system components through the application of security updates, patches, fixes, and/or secure configurations.
  • Support the creation, development, and documentation of cybersecurity processes and procedures supporting Authorization to Operate (ATO) packages and, as needed, to mature the program’s cybersecurity posture.
  • Experience with eMASS to manage ATO package
  • Prepare and maintain security documentation, including System Security Plans (SSPs), Security Assessment Reports, and Plans of Action and Milestones (POA&Ms).
  • Install, configure and manage Trellix products.
  • Create, tune, and enforce security policies through the ePO console to meet company security standards and compliance requirements.
  • Troubleshoot Splunk issues between server and forwarder, create custom dashboards and implement best practices.
  • Administer, configure, and maintain the Tenable Security Center.
  • Review ACAS results and remediate appropriately.

Basic Qualifications

  • Active DoD Secret Security Clearance
  • Bachelor’s degree in a related field and (8) eight or more years of related actual work experience; additional work experience may be considered in lieu of a degree. (Unpaid experience will not be considered.)
  • Compliant with DoD 8140 requirements.
  • DoD Risk Management Framework (RMF), especially in supporting Step 6.
  • System/software design, enterprise architecture security, integration, testing, system administration, application administration, training, deployment, and O&M.
  • Design, develop, and use host-based and network-based scanning tools.
  • Security Content Automated Protocol (SCAP) based tools and specifications.
  • Install, configure, test, deploy, and O&M of Enterprise-wide…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary