Returning Candidate?

Sr. Cyber Systems Engineer - (TS/SCI Clearance with Polygraph Required)

Sr. Cyber Systems Engineer - (TS/SCI Clearance with Polygraph Required)

Job ID 
Number of Positions 
Job Locations 
Job Function 
Information Technology
Security Clearance Level 
Top Secret/SCI with Polygraph
Full/Part Time 
Full Time

More information about this job

Job Description

Designs and defines system architecture for new or existing computer systems. Comprehensive knowledge of IT and information security subject matter to include knowledge of various operating systems, network protocols, and programming concepts. Successful execution of the cybersecurity assessments, cybersecurity site audits, and prototyping and process development.  The candidate must be able to identify technical risks and mitigation strategies as well as identify infrastructure dependencies.  The successful candidate will also develop and deliver Information Assurance, Security, and Certification and Accreditation (C&A) requirements, and related policy standards including System Security Plans (SSP),Concept of Operations (CONOPS) documents, System Test and Evaluation Plans and Reports, Security White Papers, Risk Assessments, Vulnerability Reports, POA&M Reports, Security User Guides, etc.


1. Performs complex systems development and design work that may include logic design, I/O design, firmware development, model formulation, manufacturing and development cost projections, computer architecture analysis and design, and analog or digital systems engineering.


2. Performs systems modeling, simulation, and analysis.


3. Reviews completion and implementation of system additions and/or enhancements and makes recommendations to management and/or clients.


4. Plans and directs upgrades of operating systems and designs systems enhancements.


5. Develops documentation on new or existing systems.


6. Develops and directs tests to ensure systems meet documented user requirements.


7. Identifies, analyzes, and resolves system problems.


8. Provides system/equipment/specialized training and technical guidance.


9. Determines system specifications, input/output processes, and working parameters for hardware/software compatibility.


10. Provides guidance and work leadership to less-experienced systems engineers and may have supervisory responsibilities.


11. Serves as liaison with clients, participating in meetings to ensure client needs are met.


12. Maintains current knowledge of relevant technology as assigned.


13. Experience performing/overseeing penetration testing and managing remediation of identified vulnerabilities


14. Experience with automated security tools tool include broad scanning products and tactical vulnerability/exploitation tools in an enterprise environment.


15. Experience and interest in creating custom tools for specific, often temporary, testing needs.


16. Designing, implementing and monitoring Intrusion Detection Systems for anomalies and perform network analysis as necessary.


17. Analyzing complex data from cyber security tools, sensors and networks.


18. Document policies and procedures, lessons learned.


19. Participates in special projects as required, participates in meetings, briefings and symposiums.


Bachelors Degree in Computer Science, Engineering or a related technical discipline, or the equivalent combination of education, technical training, or work/military experience.


8-10 years of related systems engineering experience.


Excellent problem-solving skills with attention to detail, and ability to work independently as well as collaboratively with a diverse team of highly skilled cybersecurity engineers, architects and analysts.


Demonstrated experience in requirements definition, system design development and documentation.


Willingness to learn and participate in non-engineering activities, such as requirements development, customer interface, and risk management and deployment planning


Demonstrated experience conducting technical research on system upgrades to determine feasibility, cost, time required, and compatibility with system, preparing report, studies, and documentation.


Strong Experience in Linux administration, architecture, networking and optimization


Software development and/or scripting experience and scripting using VBScript, PowerShell or other scripting languages.


Expert level knowledge of networking, routing, switching, sub netting, firewalls, VLANs, ports and protocols


Demonstrated experience in support of software deployment, patch management, operation system deployment and imaging.


In-depth understanding of information assurance processes, procedures, and controls.


Experience with cyber security initiatives and standards, to include National Institute for Standards and Technology (NIST) SP 800-53, and/or derivative best practices standards/mandates (e.g., ISO 27001, COBIT, CCS CSC, ISA 62443, DNI security initiatives)


Experience with cyber vulnerability assessments techniques and procedures.


Perform and analyze results of open source security and scanning tools including Wireshark, ngrep, nmap, OpenVAS, Metaspoloit, tcpdump, and Snort


Solid foundation in network monitoring and analysis including Netflow, port mirroring and PCAP; Expert knowledge of the TCP/IP Stack, OSI model and packet analysis


Strong experience with cyber security including active and passive vulnerability scanning


Strong work experience with intrusion detection and intrusion prevention systems, and C&A process/standards


Desired certifications include: CISSP, CEH, Security +, or equivalent


Experience with Encase forensic analysis tool


Experience with Splunk, NetIQ, FireEye


Experience with McAfee based security systems


Familiarity with Microsoft Team Foundation Server (TFS)


Experience with Linux OS, Cisco IOS


Strong experience with cyber security including active and passive vulnerability scanning


Strong Experience in Linux administration, architecture, networking and optimization


Experience with one or more or the following; DNS, database or application security, Active Directory, identity management/PKI.


Experience assessing, implementing and documenting security controls in accordance with the NIST Cybersecurity Framework, or CIS 20 Critical Controls


Excellent communications skills to articulate complex technical issues orally and in writing \


Cloud technologies, their provisioning and security


As a trusted systems integrator for more than 50 years, General Dynamics Information Technology provides information technology (IT), systems engineering, professional services and simulation and training to customers in the defense, federal civilian government, health, homeland security, intelligence, state and local government and commercial sectors.With approximately 32,000 professionals worldwide, the company delivers IT enterprise solutions, manages large-scale, mission-critical IT programs and provides mission support services.GDIT is an Equal Opportunity/Affirmative Action Employer - Minorities/Females/Protected Veterans/Individuals with Disabilities.

Connect With Us!

Not ready to apply or just want to stay informed on various career opportunities and events at GDIT? Join one of our Talent Communities today!