Description
The DarkStar Group, a GRVTY Company is seeking a Cyber Security Project Engineer with a TS/SCI + Poly clearance (applicable to this customer) to join one of our top projects in Chantilly, VA. Below is an overview of the project, as well as information on our company, and our benefits.
THE PROGRAM
The DarkStar Group is a member of 100% of the winning teams for the largest technology program in the Intel Community. We've been supporting this customer on many different sub-projects of this program since our founding in 2013. We've grown on this effort by providing the customer with Engineers who have done exceptional work, and we've retained our staff by paying very strong salaries, and working hard to ensure each Engineer is doing work that aligns with their career interest.
THE PROJECT
The Sponsor supports a diverse set of corporate goals across the organization by conducting technical risk assessments and providing technical risk mitigation guidance on the use of various enabling technologies. The Sponsor requires subject matter expertise in technical risk analysis of enterprise and mission systems, IT systems and networks, mobile and wireless networks, cloud-based computing, network management platforms, communication protocols, scripting or programming products, configuration scripts, and IT hardware and software products in support of Sponsor’s technical risk assessment activities. The Sponsor also requires software development to maintain an online infrastructure, evaluating and extracting relevant data, web development, and software coding.
The Role
- The Contractor shall perform technical risk assessments and provide technical risk mitigation guidance on the use of various enabling technologies.
- The Contractor shall gather Body of Evidence (BOE) and assess artifacts, such as CONOPS, use cases, detailed network diagrams, technical design details, procurement methods, and System Security Plan (SSP) to get a holistic view of the interworking parts of a given technology implementation being evaluated, from which real insights can be derived to inform risk assessor’s judgement.
- The Contractor shall apply consistent and systematic investigative practices to comprehensively assess risks, identify and characterize threats and vulnerabilities.
- The Contractor shall evaluate system or network operations using network management platforms, network scanning tools, auditing functions, PCAP captures, and log reviews.
- The Contractor shall analyze system, network, or cloud configurations for mis-configured settings, configurations not required for deployment, removal of test scripts to minimize the configuration to fulfill the specific deployment.
- The Contractor shall analyze hardware and software used in a system or network for origin of manufacturer, known vulnerabilities, outdated hardware or software.
- The Contractor shall remain current with existing and future technologies to assist the Sponsor with identifying associated risks of implementing proposed technologies.
- The Contractor shall provide guidance of potential cyber threats, attacks, and exploitations and advise decision-makers of the inherent risks and mitigation to the Sponsor’s equities.
- The Contractor shall ensure appropriate risk mitigation considerations are baked in early in the development cycle, and risks and vulnerabilities are well understood and appropriately mitigated.
- The Contractor shall organize and schedule work to effectively manage a case load
- The Contractor shall track, document, and communicate progress status updates and weekly status updates on all technical risk assessment reports, cases describing potential security concerns and mitigations to enhance security posture.
Required Skills
- Demonstrated experience analyzing IT systems for cyber security vulnerabilities.
- Demonstrated experience developing IT system or network architecture design, conducting IP data flow analysis, encryption configuration, and vulnerability analysis using both open-source and commercial tools, such as Nmap, Wireshark, Metasploit, Canvas, Kismet, or BackTrack.
- Demonstrated experience analyzing IT network configurations of devices such as firewalls, routers, switches, VPNs, or Intrusion Detection/Prevention Systems for cyber security vulnerabilities.
- Demonstrated experience with communications protocols such as IP, TCP, UDP, HTTP, HTTPS, MPLS, OSPF, IGRP, BGP, SIP, H.232.
- Demonstrated experience with multiple OS’s, including Windows, Linux, and OSX.
- Demonstrated experience with Microsoft Windows ver.; 7, 8, 10, 2008R2, 2012, 2012R2, or 2016.
- Demonstrated experience with cloud computing technology and hypervisors such as HyperV, VMWare ESX, or Virtual Box.
- Demonstrated experience with transitioning security domains and use of cross domain appliances.
- Demonstrated experience with network management systems, network storage, backup systems, and disaster recovery (DR) architectures.
- Demonstrated experience performing technical risk assessments and providing technical risk mitigation guidance.
- Demonstrated experience ensuring appropriate risk mitigation considerations, risks and vulnerabilities are well understood and appropriately mitigated.
- Demonstrated experience analyzing procurement processes of hardware, software and services to comply with cyber security and operational needs.
- Demonstrated experience creating concise and well-structured written assessments.
- Certifications
Desired Skills (Optional)
- Demonstrated experience with the Sponsor’s IT review boards.
- Demonstrated experience with providing recommendations to IT architecture and design reviews.
- Demonstrated experience with the Sponsor’s security policies and regulations.
- Demonstrated experience providing recommendations in technical standards, security standards, and operational assurance.
- Demonstrated experience with USG standards such as Intelligence Community Directive (ICD) 503, Federal Information Processing Standards (FIPS), National Institute of Standards and Technology (NIST) Special Publication (SP) 800-37, SP 800-39, SP 800-53, SP 800-53A, SP 800-60.
- Certifications: Certified Information Security Manager (CISM), Certified Ethical Hacker.
Why Choose The DarkStar Group, a GRVTY Company
The DarkStar Group, a GRVTY Company, started with a simple, American idea: we do things not because they are easy but because they are hard. The DarkStar Group, a GRVTY Company, exists to answer challenges. We do it for customers in defense, intelligence, homeland security—anyone whose job it is to advance America’s strategic position. The size of the challenge we face demands new skills, new backgrounds, and new thinking. That’s what we’re here to deliver. And when you work shoulder to shoulder with brilliant people tackling the most high-stakes challenges, it’s invigorating. Our culture is built on collaboration, mission-focused innovation, and a commitment to excellence, where every challenge we answer opens the door to a new possibility.
The toughest national security challenges demand vision and ingenuity, not just resources. We deliver mission and technical expertise to outpace our adversaries. We’re purpose-built to tackle the most entrenched, systemic national security issues around the world.
We partner with our customers to help them overcome challenges in every corner of technology and defense—including the ones still being explored. Our growing capabilities create complementary advantages, giving on-the-ground operations the edge they need to succeed. We muster everything we have to answer every challenge presented, every day of our lives.
At The DarkStar Group, a GRVTY Company, we believe that when our employees thrive, our company thrives. That’s why we offer a comprehensive and competitive benefits package designed to support your well-being, growth, and work-life balance.
- Robust health plan including medical, dental, and vision
- Health Savings Account with company contribution
- Annual Paid Time Off and Paid Holidays
- Paid Parental Leave
- 401k with generous company match
- Training and Development Opportunities
- Award Programs
- Variety of Company Sponsored Events
The DarkStar Group, A GRVTY Company, is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran and will not be discriminated against on the basis of disability.
Anyone requiring reasonable accommodations should email ds_recruiting@grvty.com or call 703-544-7930 with requested details. A member of the HR team will respond to your request within 2 business days.
Know Your Rights: Workplace Discrimination is Illegal