ISS, Inc

Returning Candidate?

Cyber-security Engineer

Cyber-security Engineer

Req # 
Position Type 
Full Time
FLSA Status 
Engineering - System Engineering
Security Clearance 
Preferred Top Secret/SCI
Camp Lejeune, NC

More information about this job


In addition to a competitive salary, ISS – Polaris Alpha offers excellent benefits to full-time employees:

  • Medical, Dental, and Vision premiums are paid 100% by ISS for employee and their family
  • Life and AD&D insurance premiums are paid 100%, by ISS for employee at 3x annual salary
  • 401k plan, ISS matches up to 3% of employee contributions and participants are 100% vested in plan from date of enrollment
  • 4+ weeks of PTO and 8 Paid Holidays observed
  • Education Assistance Program
  • Relocation may be considered

Benefits are subject to change

Job Description

Polaris Alpha (“Polaris”) provides advanced technical capabilities, specialized domain expertise and mission critical solutions to Department of Defense and Intelligence Community customers. The Company has approximately 1,100 employees with major offices in Colorado Springs, CO, Fredericksburg, VA, Annapolis Junction, MD, Aberdeen Proving Ground, MD, and Alexandria, VA as well as customer sites both domestically and internationally. Polaris Alpha is a highly technical industry leader uniquely positioned to address customers’ most complex challenges across the full spectrum of air, land, sea, cyber and space domains.
Primary activities will be supporting the organization’s cyber security program by providing expertise in strategies, tactics, and techniques for cyber and network defense. This includes setting up cyber/network defense procedures, actively monitoring the network and endpoints, proactively interfacing with DoD cyber organizations and adopting best practices, troubleshooting problems, implementing a remediation plan, and reporting cyber-related incidents. Implements and manages a network intrusion detection system. Provides training in cyber hygiene and incident prevention on a periodic basis.
This position is in the Technical Services Department, and is focused on providing the II MEF with an experienced cyber security professional with a strong background in network security. This professional must qualify and obtain a U.S. Top Secret/SCI security clearance. This position requires an active Department of Defense level security clearance which requires US citizenship while working in support of a government contract. The successful candidate will be a self-starter with a strong work ethic who can thrive in a fast-paced environment employing agile methodologies. Travel may be required.

• As a part of cyber operations, this person must work with surveillance, reporting and network management systems. Duties can include advising readiness of capabilities, status reports, and evaluation results.
• Will evaluate the operational readiness of communications, sensors, intrusion detection, and related support equipment.
• Will coordinate with other operators performing control and surveillance of network activities.
• Will work to protect data and network systems in ways of passive defense measures such as firewalls.
• Must be able to interpret directives into specific guidance and procedures for operator actions and develop and execute operation plans.
• Contributes cyber-related input to CONOPS and TTPs. Supports implementation of cyber/network security requirements consistent with II MEF IW Cyber Security COE.
• Interfaces with the II MEF G-2, MIG, G-6, and C2CoreCyber team at 2d MAW to establish CONOPS and TTPs for use of C2 Core Cyber across II MEF and subordinate units.
• Interfaces with the II MEF G-Staff to identify end-user systems, networks, and communication equipment vulnerabilities and maintenance requirements and ensure that information is properly cataloged and coordinated within the 2d MAW C2CoreCyber for effective and efficient resolution of technical issues.
• Provides detailed query metrics and reports from 2d MAW C2CoreCyber to II MEF staff for cyber operations and status.
• Must understand cyber operation laws.

This field requires knowledge of computer operating systems, hardware, software, databases, and programming languages. It is essential the candidate understand networking fundamentals, networking protocols, network addressing and infrastructure, telecommunications theory and data communications. Must be proficient on wireless networking as well as delivery to personal wireless devices; also must understand and apply cryptography, including utilization and exploitation techniques.

Essential knowledge and skills for computer and networks security management:
• Recognizing the effects and symptoms of cyberattacks, to include but not limited to detected virus infection, network degradation, spoofing, data manipulation, logging anomalies, file corruption, data exfiltration, and network outages.
• Supporting the organization’s Information Assurance Vulnerability Management Program -- conducts, schedules, and coordinates software patch activities
• Developing and implementing email authentication and validation processes
• Setting up travelers and remote users to use virtual private network capabilities
• Implementing intrusion prevention and intrusion detection systems; providing intrusion warnings and taking appropriate remedial action
• Developing and executing remediation plans and processes
• Conducting penetration testing and validation
• Inventorying software and find potentially vulnerable applications
• Monitoring network traffic and user behavior for anomalies using multiple techniques
• Monitoring for creation of and find hidden files and directories
• Conducting application, file, and network scans for malware
• Conducting vulnerability assessments, leveraging vulnerability notification services, and implementing appropriate remediation steps
• Establishing cyber deterrence measures, such as authentication gateways, reverse proxies, hardware hardening techniques
• Establishing and implementing appropriate end-point protection policies

Required Skills

Bachelor’s Degree and minimum 5 years of experience in cyber security fields, including a minimum of 3 years of experience with tactical data links and network defense. Eight (8) years of additional experience, applicable training and/or certifications may be substituted for the Bachelor’s Degree.
Ability to learn and apply skills related to new functional areas
Ability to communicate effectively with both technical and non-technical personnel.
Brigade, Division or above staff level experience.
Excellent written and oral communication skills

Desired Skills

Familiarity with Information Assurance Vulnerability Management (IAVM) and Information Assurance Vulnerability Alerts and Software Updates.
Familiarity with cyber defense tactics and techniques, such as computer security management, DoD Cybersecurity Discipline, Defense-In-Depth Software Application Security, compartmentation, micro-segmentation, geofencing, virtual private networking services, SSL encryption, malware detection and mitigation, monitoring for malicious behavior detection, automated penetration testing, and authentication gateway/reverse proxies. This list provides examples of desired experience and skills and is not conclusive.
Experience with cyber defense tools, such as Block All Drive-By Download Exploits (BLADE), Open Source Tripwire, Change Tracker Enterprise, StackDefender, BufferShield, Security Administrator's Tools for Analyzing Networks (SATAN), anti-keylogging tools, dynamic program analysis tools, intrusion detection systems/intrusion prevention systems (IDS/IPS), and vulnerability scanning.
Current professional cyber security certification, such as CompTIA Security+, GIAC Security Essentials Certification, Systems Security Certified Practitioner, and Certified Information Systems Security Professional (CISSP).

Physical Demands and Working Conditions:
Normal office setting, therefore the noise level in the work environment is usually moderate. Work is generally sedentary in nature, but may require standing and walking. Use of hands to operate computer equipment. Frequent near vision use for reading and computer use. Reasonable accommodations may be made to enable individuals with disabilities to perform essential functions.
Polaris Alpha is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, age, protected veteran status, genetic information or disability status. Reasonable accommodations may be made to enable individuals with disabilities to perform essential functions.

Connect With Us!

Not ready to apply? Connect with us for general consideration.