Cybersecurity Configuration Engineer



Rosslyn, VA

Labor Category

Mid. E/A

Security Clearance

Secret, Top Secret desired

Years of experience

2 +




Preferred Requirements:

  • CompTIA A+, Network +, Security +
  • Microsoft Certified Professional (MCP)
  • RedHat Certified Engineer, Linux +
  • Microsoft Certified Solutions Engineer (MCSE)

Project Overview:
The Cyber Security Configuration Engineer will also evaluate various technical and policy questions, providing written responses to a wide range of audiences.
The ideal candidate will have base knowledge of cyber security principles and best practices, familiarity with Defense Information System Agency (DISA) Security Technical Implementation Guides (STIGs), a foundational knowledge of Windows and Linux server operating systems, and experience managing Active Directory

Key Personality traits that will do well in this environment

  • Inquisitive by nature; you know where to look to find answers
  • You enjoy collaboration and sharing information with other highly technical people.

Daily Responsibilities:

  • Promote awareness of security issues among management and ensure sound security principles are reflected in organizations’ visions and goals.
  • Research security threat vectors and participate in government and industry conferences and training that impact existing standards and/or principles and provide information to customer on potential impact
  • Create bulletins, alerts, and/or advisories related to published or developmental standards and/or principle documents
  • Ensure that rigorous application of information security/information assurance policies, principles, and practices are implemented in the delivery of all IT services.
  • Evaluate a wide array of existing, new, modified, and/or emerging technologies and develop recommended security configuration baselines documents that implement Departmental policy, technical security solutions, and industry best practices in alignment with Defense Information Systems Agency (DISA) Security Technical Implementation Guide (STIG) as much as possible
  • Actively participate in respective change review and control boards, providing written and verbal recommendations
  • Respond to various technical and policy questions from a wide range of customers/users with guidance and clarifications
  • Promote awareness of cybersecurity standards and principles among the customer stakeholders, coworkers, and the Department users
  • Collaborate with fellow team members and various internal and external stakeholders to share information and knowledge to establish and maintain a productive line of communication
  • Streamline processes to improve efficiency of Mission goals
  • Manage information and updates in SharePoint repositories
  • Keep awareness of items involving fellow team members to provide back up support and coverage as needed

To fit into our environment, you must have these core skills:

  • Clearance at the Secret level
  • Excellent verbal and written communication skills
  • Knowledge of cybersecurity and privacy principles
  • Knowledge of Cyber Security National Policies, Directives, and Laws
  • Knowledge of basic system, network, and OS hardening techniques
  • Knowledge in interpreting functional requirements for projects and proposal
  • 1-3 years’ experience developing and executing research plans
  • 2-3 years’ experience working with Windows Server on an enterprise level
  • 1-3 years’ experience managing Active Directory in a multi-domain environment.

Desired Skills

Highly desired skills

  • 2-3 years’ experience working with server/application virtualization on an enterprise level
  • 2-3 years’ experience working with Red Hat Enterprise Linux servers on an enterprise level
  • 2-3 years’ experience engineering/maintaining database infrastructure including SQL and Oracle
  • 1-3 years’ experience working with Active Directory Federation Services (ADFS), Azure Active Directory
  • 1-3 years’ experience developing and managing virtualized IT systems
  • 1-3 years’ experience with networking technologies
  • 1-3 years’ experience with configuration and/or administrating enterprise mobile device deployment

Apply Now