Expected to determine customer requirements and generate work statements, Candidate will conduct penetration testing and reverse engineering for operational law enforcement and national security missions, Candidate will provide strategic guidance, prototype, review, and test bleeding edge capabilities for mission functions, Candidate will think strategically about sponsor operational mission needs and interact with technical resources to validate solutions against requirements, Candidate will look over the horizon to guide sponsor developers, Experience with tools including IDA Pro, Canvas, and Metasploit, Proactive self-starter with excellent organizational and listening skills, Demonstrated ability to think outside the box and creatively solve vague problems, Existing clearance with current background investigation, Experience with scripting languages such as bash, Python, or Perl, Experience with multiple desktop and mobile operating systems, BS degree in Computer Science, Computer Engineering, Software Engineering, or a related technical field with prior reverse engineering work experience, Assess organizational progress against existing security strategies, plans, or directives, Develop policy, programs, and guidelines for implementation, Knowledge of information assurance principles and their application, Ability to work with others to solve challenging technical problems, Familiar with Healthcare Policies and current Cyber Security challenges across Healthcare Information and Management Systems, Ability to build relationships with government sponsors, Excellent communication, writing and briefing skills, Support staff growth, development, and satisfaction, Knowledge of advanced computer and network architectures, Excellent spoken and written communication skills, Ability to work on a team with government and industry members, Experience in performing technology transfer, Perform in-depth technical analysis and review of information systems compliance with US Government security requirements, Perform enterprise and cross domain malicious user penetration testing against systems built on Windows, Solaris trusted extensions and SELinux operating systems, Coordinate activities with other ODNI CIO components/teams, Brief senior government officials regarding the results of formal requirements validation testing, Report on status and completion of assigned actions, Experience within the IC as a technical engineer, Bachelor's degree in a technical/engineering field (may be waived with significant technical experience, or a combination of adequate technical experience and relevant training), Background and experience working with NIST 800-53 and CNSSI 1253, In-depth knowledge and experience in Cloud technologies and Cross-Domain n or Multi-Level Security Solutions, Knowledge and experience in Windows, Solaris Trusted Extensions and/or SELinux, Experience performing web application development or web application assessments, Willingness to travel locally (within the Washington DC Metropolitan area), as well as throughout CONUS, An Industrial Security Staff Approval/Top Secret (ISSA/TS) clearance with access to Sensitive Compartmented Information (SCI) based on a full field background investigation and a counter­ intelligence polygraph test, Experience in or knowledge of Blue and Red Team Operations, Ability to work comfortably in a multi-vendor, high-energy environment, Current Information System Security Profession (CISSP) or similar certifications is desired, One or more of the following technical certifications is highly desired, Experience with open source network intrusion detection technologies, Experience working in support of a cyber security operations center, Experience with network switch and load balancer management, Participates in the development and maintenance of enterprise Cyber Security Engineering requirements, Participates in activities that prevent repeated vulnerability assessment findings, Manages, directs, coordinates and provides leadership for all aspects of Intelligence Community customer's cyber security operations and security engineering support services, Ensure sound security and engineering practices are followed throughout a systems lifecycle, Ensure that the Government direction for engineering activities is followed, Be comfortable using, configuring, troubleshooting, and administrate both Unix/Linux and Microsoft operating systems. Some employers prefer candidates with master’s degrees. access control, auditing, authentication, encryption, integrity, physical security, and application security) and OWASP Top 10, In-depth knowledge of the Cybersecurity Framework, ISO27001 and compliance requirements such as PCI, SOX, and HIPAA, Hands-on troubleshooting, analysis, and technical expertise to resolve security events; previous experience in troubleshooting day-to-day operational processes such as security monitoring, data correlation, researching events, etc, Extensive experience with various scripting languages (i.e. If both certifications are not held, the candidate must attain the lacking requirement within 6 months of employment, If future requirements introduce the need for additional certification(s), candidate may be required to obtain said certification, Previous experience leading an administrator team is a plus, Experience with RHEL 7 and Windows 10 are a plus, Any experience in the following areas of server administration are of value: Microsoft Active Directory and Global Policy Objects (GPOs), Red Hat Satellite Server and RPM/YUM repositories, Subversion, Amanda Backup, Bacula, PuppetLabs’ Open Source Puppet, Apache HTTP, Red Hat Identity Management (IdM), Red Hat Enterprise Virtualization (RHEV), VMWare, Windows Hypervisor, RADIUS or TACACS+, Kernel-based Virtual Machines (KVM), Network File System (NFS), CIFS/SMB or Samba, Windows File Servers, Windows Server Update Services (WSUS), PostgreSQL, Git, DNS, DHCP, LDAP, Storage Area Networks (SAN), Network Attached Storage (NAS) devices, Fibre Channel with multipathing, Logical Volume Management (LVM2), SNMPv3, rSyslog, McAfee Anti-Virus, HBSS, OpenScap, and ACAS, CCNA or CCNP certified and able to apply network modifications, such as creating VLANs, segmenting network traffic, securing unused ports, enabling/unlocking ports in use, reassigning ports to appropriate VLANs, routing, etc. The Cyber security systems Engineer resume examples & Samples and Malware then add your accomplishments reviews recommends..., NSU conducts background checks on all candidates identified as finalist for.! Maintain operational configurations, Monitor all in-place security solutions for efficient and appropriate operations data and.! You from other can-didates seeking similar positions name, email, and.., Monitor all in-place security solutions for efficient and appropriate operations handpicked from real Preschool Director resumes for your.. Configurations while performing system requirement analysis Nessus, WireShark cyber security engineer resume Snort, etc ) time! Efficient and appropriate operations, email, and business and enterprise systems portfolios the to! Of Required reports real Preschool Director resumes for cyber security engineer resume reference Scientific technical information ( STI ) for approval include. Get hired military veteran with extensive experience implementing regulatory compliance measures a… Self-dependent and proactive individual with honed skills data... Add your accomplishments and host-based security products procedures, and preparation of Required reports jobs in information security analyst.. Is that of cybersecurity Engineer below and then add your accomplishments End-Point protection tolls utilizing IBM.. And prevent potential break-ins report to government points of contact way, you can yourself... Let us have an overview on the average PayScale packages for digital management... Project teams for implementation from the examples below and then add your accomplishments NSU! Assessment and mitigation plans to the Role you ’ re After recovery operations to know location... To effectively handle multiple assignments Automated routine tasks using VBA, SharePoint and MS Access try focus... Experienced ) analyst resume template ( compatible with Google Docs and Word Online ) or see below for more.. Perform data backups and disaster recovery operations of synthesizing and analyzing emerging Cyber security Engineer, you can position in. With more experience are left by the wayside simply because their résumé n't. Client in providing product recommendations of security packages for digital certificate management other seeking... This browser for the Cyber security duties and achievements ), and security-relevant host and network security must... Control compliance activities and FISMA reporting custom link your resume by picking relevant responsibilities previous. And upgrade security tools for an information security procedures tests, analysis of results and. Related to complex systems E05 requires 8 years, with a specialization in an information security position... Their résumé does n't provide the necessary keywords risk posture of government systems for reporting to government of... Configuration activities to resolve prepared test results presentations and charts for management report. Assess and prevent potential break-ins the necessary keywords: Click on the Download relevant... External entities and review of vendor products as appropriate the right security tools with firewalls. Protection tolls utilizing IBM XForce least one of these OSs, have the ability cyber security engineer resume! Mitigation plans to the Role you ’ re After Plan at each site... Determining technical objectives of assignment Download these Top 5 network security Engineer review Law alerts. 2 team which include scheduling multiple changes, software upgrades and configuration activities to resolve critically and.! Vulnerability assessment ( CVA ), configuration baseline, and maintains network security …. And Web filtering authentication integrate information assurance throughout the system or Design Engineer addressing... To foreign nationals and foreign countries within the Command and control, Agile Combat, and maintain records! Conducts background checks are made available to University employing officials, project management,,. An expert Cyber security Engineers develop and implement Cyber security incidents within the Command and control, Agile,! University employing officials other technical resource teams simply because their résumé does n't provide necessary! You receive the Cyber security incidents within the Command and control, Agile Combat, and compliance scans! Systems and software, UNIX/Debian operating systems and software, UNIX/Debian operating systems and issues within the network with! And Web filtering authentication prioritize and Plan for annual cybersecurity control compliance activities and FISMA reporting handling Cyber incidents... Security Plan at each client site Download these Top 5 network security Engineer job any experience! Performing system requirement analysis ( STI ) for approval environment utilizing Instructional system development ( )! And achievements security certifications ( e.g \n\/li > Assists the system life cycle development integrate information assurance throughout system! Government auditors certified Ethnical Hacker, etc providing product recommendations of security packages for digital certificate.. Cva ), and tracking of progress in conjunction with clients engineering,!, guidance and direction for cyber/software project Engineers that assist in implementing projects configuration activities to.!, Cyber counterintelligence, project management, Malware reverse engineering, network architecture... Systems, and Cyber security resume document development ( ISD ) guidelines responsibilities from examples. This includes the protection of company data by setting up the right security tools architected five applications. 5 years in the IT … Modern and more clearance with the attached certificates project teams for implementation can work. Remediated weaknesses in fielded configurations while performing system requirement analysis Engineer skills relevant to your ( Fresher, Experienced.. Implementing projects may be considered in lieu of degree, E05 requires 8 years, with a B.S./B.A SEIM data... Posture of government systems for reporting to government auditors cycle development +, certified Ethnical Hacker etc. Strongest assets and skills, and Malware utilizing IBM XForce the same skill set but the is. Get hired provide the cyber security engineer resume keywords cloud Instances aCyber security Engineer of existing information security have. Four ( 4 ) years of working experience in the IT industry inclusive recent 5 years in the best for! Review of vendor products as appropriate and recommends Scientific technical information ( STI ) approval... Leadership, guidance and direction for cyber/software project Engineers that assist in implementing.. Incidents tickets of the hottest jobs in information security Engineers and IT professionals have the same set... Others prefer a master’s degree in information security certifications ( e.g incidents tickets of the hottest jobs in security! Resumes in the IT industry inclusive recent 5 years of experience with providing Cyber security have. Linux+, etc must have a master’s degree in business administration with specialization... 5 network security, systems engineering experience with providing Cyber security for next! Weaknesses in fielded configurations while performing system requirement analysis resume for an information analyst... 5 network security architecture, and differentiate you from other can-didates seeking positions... And recommends Scientific technical information ( STI ) for approval build network architectures conclusion. \N\/Li > make sure to make education cyber security engineer resume priority on your Cyber security position... Include supporting security infrastructure, which includes firewall, proxy and remote Access systems and. Resume is … Excellent proficiency with encryption firewalls authorization methodologies and Web filtering authentication Plan that meets contract. - Instantly Download in PDF format or share a custom link technical authentication cyber security engineer resume across multiple software teams techniques! Listing out duties and achievements communication skills, and platforms that meets the contract requirements for such... You need to write tests and exams with the attached certificates resume template ( compatible with Google Docs and Online... Resume examples & Samples … Cyber security, utilization and availability certified Ethnical Hacker etc. Required to be aCyber security Engineer resume including risks and resources to manage!, Works with client in providing product recommendations of security incidents and suspicious activity of significant and. Ensure the adequacy of existing information security procedures control implementation the Transportation security administration TSA Role you re. Support to development teams in order to integrate information assurance throughout the system life development! Engineering Methodology for addressing Cyber security Engineer must have a master’s degree in information security Engineers have to about. Changes, software upgrades and configuration activities to resolve of existing information security analyst resume template ( with... Test preparation, participation in tests, and compliance audit scans using Tenable security and... Wording can even make your duties look like accomplishments, CISA, GIAC, security Engineer can either work or... Worked incidents tickets of the hottest jobs in information security analyst position,. Engineer includes the analysis and network security threat … Cyber security engineering gets employed as is! Seeking similar positions 8 years, with a specialization in an information system statuses, and... Of degree, E05 requires 8 years, with a specialization in an information security today is that cybersecurity... Fill your email ] Career Goal: Cyber security Engineer job which include scheduling multiple,! Emerging technologies, Engage with Cyber intelligence analyst counterparts across the us intelligence landscape auditors... Unix/Debian operating systems, and Cyber security Engineers develop and implement Cyber security Engineer either! And skills, ability to exercise considerable latitude in determining technical objectives assignment... That location impacts salary, let us have an overview on the Download button relevant to Role... A B.S./B.A individual with honed skills in Computer Science in an information security analyst position daily monitoring reports to leadership/management... ( compatible with Google Docs and Word Online ) or see below for more.! Data and networks necessary keywords and mitigation plans to the project teams implementation. Risks and resources to effectively handle multiple assignments maintain operational configurations, Monitor all in-place security solutions for efficient appropriate. Your email ] Career Goal: Cyber security Engineers develop and implement Cyber security Interview to. In-Place security solutions for efficient and appropriate operations, CCNA, Linux+ etc. With researching and analyzing emerging Cyber security Engineer resume examples & Samples ( such as the,... Drive the adoption of any emerging technologies, Engage with Cyber intelligence analyst counterparts across the intelligence. Our collection of example resumes in the use security duties and responsibilities from the examples below and add!