Today
Top Secret
Unspecified
CI Polygraph
IT - Security
Saint Louis, MO (On-Site/Office)
Title
Information Systems Security Developer - Intermediate
Full-Time/Part-Time Full-Time Description
RiVidium Inc (dba, TripleCyber) is seeking an applicant who can designs, develop, test, and evaluate information system security throughout the systems development life cycle. Candidate will analyze design constraints, analyze trade-offs and detailed system and security design, and consider life cycle support. Specifically, the candidate will provide support to the Client's Cross Domain Support Office to include governance of delivering cross domain capability at mission speed, defending the classified networks, enabling federated cross domain services and developing cross domain expertise throughout the Client's operating environment.
Responsibilities include, but are not limited to, the following:
This position is currently accepting applications.
Information Systems Security Developer - Intermediate
Full-Time/Part-Time Full-Time Description
RiVidium Inc (dba, TripleCyber) is seeking an applicant who can designs, develop, test, and evaluate information system security throughout the systems development life cycle. Candidate will analyze design constraints, analyze trade-offs and detailed system and security design, and consider life cycle support. Specifically, the candidate will provide support to the Client's Cross Domain Support Office to include governance of delivering cross domain capability at mission speed, defending the classified networks, enabling federated cross domain services and developing cross domain expertise throughout the Client's operating environment.
Responsibilities include, but are not limited to, the following:
- Analyze design constraints, analyze trade-offs and detailed system and security design, and consider life cycle support.
- Apply security policies to applications that interface with one another, such as Business-to-Business (B2B) applications.
- Assess the effectiveness of cybersecurity measures utilized by system(s).
- Assess threats to and vulnerabilities of computer system(s) to develop a security risk profile.
- Build, test, and modify product prototypes using working models or theoretical models.
- Conduct Privacy Impact Assessments (PIAs) of the application's security design for the appropriate security controls, which protect the confidentiality and integrity of Personally Identifiable Information (PII).
- Design and develop cybersecurity or cybersecurity-enabled products.
- Design hardware, operating systems, and software applications to adequately address cybersecurity requirements.
- Design or integrate appropriate data backup capabilities into overall system designs and ensure that appropriate technical and procedural processes exist for secure system backups and protected storage of backup data.
- Develop and direct system testing and validation procedures and documentation.
- Develop detailed security design documentation for component and interface specifications to support system design and development.
- Develop Disaster Recovery and Continuity of Operations plans for systems under development and ensure testing prior to systems entering a production environment.
- Develop risk mitigation strategies to resolve vulnerabilities and recommend security changes to system or system components as needed.
- Develop specific cybersecurity countermeasures and risk mitigation strategies for systems and/or applications.
- Identify components or elements, allocate security functions to those elements, and describe the relationships between the elements.
- Identify and direct the remediation of technical problems encountered during testing and implementation of new systems (e.g., identify and find workarounds for communication protocols that are not interoperable).
- Designing countermeasures to identify security risks.
- Designing security controls based on cybersecurity principles and tenets.
- Designing the integration of hardware and software solutions.
- Developing and applying security system access controls.
- Discerning the protection needs (i.e., security controls) of information systems and networks.
- Evaluating the adequacy of security designs.
- Conducting audits or reviews of technical systems.
- Integrating and applying policies that meet system security objectives.
- The use of design modeling (e.g., unified modeling language).
- Applying cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).
- Conducting vulnerability scans and recognizing vulnerabilities in security systems.
- Apply the methods, standards, and approaches for describing, analyzing, and documenting an organization's enterprise information technology (IT) architecture (e.g., Open Group Architecture Framework [TOGAF], Department of Defense Architecture Framework [DoDAF], Federal Enterprise Architecture Framework [FEAF]).
- Effectively communicate complex information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means.
- Effectively collaborate with others as a member of planning teams, coordination groups, and task forces as necessary.
- IAT, IAM, or IASAE Level 3 certification
- In addition to the above required certifications, cloud certifications such as CCSP, Cloud+ would be desired.
- US citizenship
- Active Top Secret/Sensitive Compartmented Information (TS/SCI) clearance, eligible for Counterintelligence (CI) Polygraph.
- Bachelor's degree or higher from an accredited college or university in Computer Science, Cyber Security, Information Technology, Software Engineering, Information Systems, or Computer Engineering degree; or a degree in a Mathematics or Engineering field.
- Available for possible travel within the Continental United States (CONUS) and Outside CONUS (OCONUS) (if any likely less than 10%)
This position is currently accepting applications.
group id: RTX15cf25