McIntire Solutions, LLC

  • Senior Cyber Security Engineer

    Posted Date 4 months ago(7/21/2018 9:21 PM)
    # of Openings
    Job Locations
    Information Technology
  • Overview

    McIntire Solutions is seeking to fill a Cloud Cyber Security Solutions engineer position that assists our IC customers in developing and revising cloud cyber security strategy then leading full lifecycle development and operations of mission critical enterprise cyber security solutions. The cyber security solutions engineer will work with a diverse group of cyber security leadership and technical information assurance specialists to revise the cloud cyber strategy, then engineer and deploy enterprise cyber security solutions.  The cyber security solutions must support and interact with multiple cloud platforms and agency legacy enterprise infrastructures to provide a world class cloud cyber operations platform. The position is based in Northern Virginia with limited travel required. 




    • Participate in technical solutions designs, implementations, testing and operations support
    • Serve as a technical advisor to executive customer security leadership on special cyber security research projects, cloud security implementation strategy, automation of cyber security cloud operations (offensive and defensive), and development of world class cloud cyber operations
    • Assist cyber security solutions development teams on cloud security best practices and cloud architectural design patterns
    • Assist in the development of new cyber security processes and implementations systems accreditation and authorization for cloud and hybrid platforms under the guidance of the RMF (risk management framework


    • Bachelor’s degree in technical engineering degree, preferably electrical engineering or computer science
    • Active TS/SCI clearance + CI Poly
    • Excellent oral and written communications of advanced concepts and designs to executive leadership and technical design teams
    • Technical project leadership, planning and execution
    • Architecture design and implementation experience with cloud, C2S, and GovCloud cyber security solutions and hybrid deployments
    • Implementation experience with cloud automation mechanisms for defensive cybersecurity
    • Must currently possess an active DoD 8570 IAT Level II or better cyber certification (customer requirement; no exceptions...please note that the previous Security + "for life" cert is NOT DoD 8570-compliant; however, Security + CE is compliant)
    • Must have at least one of the following certifications: SANS GIAC: GCED, GCIA, GCFA, GPEN, GWAPT, GCFE, GREM, GXPN, GMON or GCIH ISC2 CCFP, CCSP, CISSP CERT CSIH EC Council: CHFI, LPT, ECSA, Offensive Security: OSCP, OSCE, OSWP and OSEE EnCase: EnCE Dod 8570: IAT L3, CNDSP Analyst or IR Carnegie Mellon: CCSIH
    • Must have the capability to obtain agency privileged user access (no exceptions)


    Desired Skills

    • AWS Associate Architect Certification
    • Development of multi-tier fault tolerant systems on AWS and Azure cloud platforms using cloud native services and cloud orchestration automation
    • Identifying threats and developing countermeasures on cloud platforms
    • Developing and application of cyber security protection measures in cloud platforms
    • Integration of cyber sensors and analytic tools
    • Experience minimum 5 years
    • conducting detailed system security reviews and assessments of complex mission critical systems and networks
    • development and integration of cyber protection infrastructures for large multi-level enterprise environments
    • Experience minimum 4 years
    • Supports detection, containment, and eradication of APT activities targeting customer networks.
    • Investigate computer and information security incidents to determine extent of compromise to information and automated information systems.
    • Extensive experience analyzing and synthesizing information with other relevant data sources, providing guidance and mentorship to others in cyber threat analysis and operations, evaluating, interpreting, and integrating all sources of information, and fusing computer network attack analyses with counterintelligence and law enforcement investigations.



    Sorry the Share function is not working properly at this moment. Please refresh the page and try again later.
    Share on your newsfeed