Security Engineer
Listed on 2026-02-28
-
IT/Tech
Cybersecurity, Systems Engineer, Network Security, Information Security
Steer Bridge Strategies is a modern technology company delivering innovative, mission‑focused solutions to the U.S. Government and private sector. Leveraging deep expertise in federal acquisition, digital transformation, and emerging technologies, we deliver agile, commercial‑grade capabilities that accelerate operational effectiveness and drive measurable mission success.
At the core of Steer Bridge is our people—especially the veterans whose leadership, problem‑solving mindset, and commitment to excellence elevate every project we support. We don’t simply hire exceptional talent;
we cultivate it
, creating meaningful career pathways for veterans, military spouses, and professionals who share our passion for advancing technology and strengthening the missions we serve.
Steer Bridge is seeking experienced Security Engineers to ensure the security of infrastructure and systems being leveraged to help customers achieve their mission. The ideal Security Engineer will have well rounded experience in network operations, systems administration, log analysis, blue team defense & incident response, and threat & vulnerability analysis. The Security Engineer will support multiple projects with diverse technology stacks and will have the opportunity to be the frontline defense for missions that make a difference.
- Must be a U.S. Citizen.
- Bachelor’s or Master’s degree in Cybersecurity, Information Systems, or a related field.
- An active Secret security clearance or the ability to obtain one is required.
- 5+ years of cybersecurity engineering experience in federal, military, or large enterprise environments.
- Familiarity with one or more of the following frameworks: NIST SP 800, CNSSI, SOC
- Experience with system hardening network security, encryption protocols, vulnerability scanning, and incident response
- Experience working with cloud platforms (AWS, Azure, GCP) in secure environments.
- Experience with the following methodologies and tools: SIEM, XDR, SAST/DAST, STIG, SCAP
- Experience implementing and managing identity and access management controls, including role-based, attribute-based, and federated access models, ensuring least-privilege enforcement and secure authorization across architectures and access governance practices.
- Experience with log aggregation and correlation
- CCNA-Security, Security+ CE, or CISSP
- Familiarity with Federal Executive and Military security requirements and IT systems.
- Strong written and verbal communication skills with the ability to produce audit-ready documentation (such as Incident Reports and Test Reports).
- Proficiency with Microsoft Sentinel, Splunk, Tenable/Nessus, Crowd Strike, Microsoft Defender Endpoint
- Proficiency with securing AI-based tools
- Experience coordinating with ISSOs, ISSEs, and federal security teams.
- Plan, implement, and monitor on-premises and virtual network services and systems
- Configure and maintain systems in compliance with organizational security policies and procedures including:
- User account management
- Backup and recovery
- Develop and harden secure solutions across cloud and hybrid infrastructures in support of mission essential systems.
- Review and enforce NIST 800-53 controls and System Security Plans (SSPs) in support of the ATO process.
- Perform vulnerability identification and remediation processes to reduce exposure to system threats.
- Collaborate with development, infrastructure, and compliance teams to enforce secure design principles.
- Contribute to the creation of security documentation, policies, and control evidence.
- Participate in security audits, penetration testing, and incident response events.
- Implement and enforce data protection, encryption, and identity/access controls.
- Employees in this role are responsible for safeguarding sensitive information and must adhere to all organizational security and privacy policies, ensuring the protection, proper handling, and confidentiality of data at all times.
We may use artificial intelligence (AI) tools to support parts of the hiring process, such as reviewing applications, analyzing resumes, or assessing responses. These tools assist our recruitment team but do not replace human judgment. Final hiring decisions are ultimately made by humans. If you would like more information about how your data is processed, please contact us.
#J-18808-Ljbffr(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).