• Cyber Security Project Engineer

    Job Locations US-Reston
    Job ID
    Information Technology
  • Overview

    By submitting your resume for this position, you understand and agree that ASEC may share your resume, as well as any other related personal information or documentation you provide, with its subsidiaries and affiliated companies for the purpose of considering you for other available positions.

    ASEC is an Equal Opportunity/Affirmative Action Employer.

    We consider applicants without regard to race, color, religion, age, national origin, ancestry, ethnicity, gender, gender identity, gender expression, sexual orientation, marital status, veteran status, disability, genetic information, citizenship status, or membership in any other group protected by federal, state or local law. Equal Opportunity Employer Minorities/Women/Vets/Disabled.

    Candidates must already possess a current and active TS/SCI with Poly clearance to be considered for this position


    The Cyber Security Engineer provides IT security engineering, integration services and solutions. This includes malicious code detection, intrusion detection, and cyber security tool development and integration. Cyber Security Engineers who are team leads are responsible for project management activities throughout the life of a project and may lead team members to achieve the project objectives and customer requirements through research, evaluation, design, testing and implementation of new or improved information security software, devices or systems.




    Demonstrated experience using network monitoring tools such as HBSS, Splunk, IDS/IPS to correlate information and synthesize data that exploit the infrastructure's vulnerability points.
    • Demonstrated experience with conducting security info and event management as it relates to Cyber Security Defense. Specifically address your experience with SIEM processes used to track incidents, analyze logs, and create and/or assess signatures.
    • Demonstrated experience with validating or correlating hardware and software sightings to possibly lead to an unauthorized or foreign identity entry.
    • Demonstrated experience for producing comprehensive documentation on vulnerability findings, its analysis, and actions taken in formal and informal incident reports.
    • Demonstrated experience in working with DISA Security Technical Implementation Guides (STIGs).
    • Demonstrated experience participating or leading technical exchange meetings and application review boards, documenting actions items/results of these events.


    • Demonstrated experience with Sponsors Partners information Assurance policies and regulations and how they relate to the Assessment and Authorization process.


    Sorry the Share function is not working properly at this moment. Please refresh the page and try again later.
    Share on your newsfeed