Cyber Security Engineer in North Charleston, SC at Volt

Date Posted: 5/17/2020

Job Snapshot

Job Description

VOLT is seeking a Cyber Security Engineer in Charleston, SC to support Client’s health analytics/health informatics technologies team and build/implement breakthrough solutions that help improve healthcare delivery for millions of active, reserve and retired militaries and their beneficiaries worldwide.

We’re seeking individuals who know and understand healthcare delivery, advanced health data analytics, healthcare electronic records end to end.

We need experienced healthcare focused professionals who know and understand the importance of improving electronic healthcare records and healthcare records management.
The Cyber Security Engineer applies extensive technical expertise in field of Cybersecurity. They design, test, and implement secure operating systems, networks, security monitoring, tuning and management of IT security systems and applications, incident response, digital forensics, loss prevention, and eDiscovery actions. At the Leadership level this is senior technical staff dedicated to transforming customer environments into a more secure operating environment in a holistic manner.

The Cyber Security Engineer will be responsible for preparing and obtaining approval of Certification and Accreditation documentation in accordance with NIWC direction, DODD 8500, DoDI8510.01, and the Risk Management Framework (RMF).
 

RESPONSIBILITIES
Prepare and maintain all Certification & Accreditation(C&A) artifacts and documentation for the program’s products and systems in accordance with DoD Instructions, Directives, Policies, and Regulations;
Input and maintain artifacts for the program’s products and systems into the Enterprise Mission Assurance Support Service (EMASS);
Execute the Information Assurance Vulnerability Management (IAVM) process to ensure dissemination, reporting, and compliance;
Provide engineering and technical assistance to support vulnerability scans, penetration testing, vulnerability analysis, scan analysis, and security analysis on the program’s products and network components.
Execute and analyze information from required scanning tools (e.g. Assured Compliance Assessment Solution (ACAS), Security Content Automation Protocol (SCAP), as well as commercial products, such as Fortify and CAST);
Execute all other Cybersecurity monitoring and reporting to ensure compliance to include the development and maintenance of POA&Ms;
Applies a combination of expert engineering knowledge of enterprise IT and security solutions to design, develop and/or implement solutions to ensure they are consistent with enterprise architecture security policies and support full spectrum military cyberspace operations.
Architects, plans, configures, deploys, maintains, and upgrades COTS/GOTS and custom toolsets to address vulnerabilities and/or implement security controls.
Assists in the implementation of the required government policy (i.e., NISPOM, DCID 6/3), and makes recommendations on process tailoring.
Conducts risk and vulnerability assessment at the network, system and application level.
Conducts threat modeling exercises.
Designs, tests, and implements secure operating systems, networks, security monitoring, tuning and management of IT security systems and applications, incident response, digital forensics, loss prevention, and eDiscovery actions.
Develops and implements security controls and formulates operational risk mitigations along with assisting in security awareness programs.
Includes security control design and solution planning at the system, mission, and enterprise level, security-in-depth/defense-in-depth, and other related IAM/ISSO/ISSE support functions.
Involved in a wide range of security issues including architectures, firewalls, electronic data traffic, and network access.
May provide briefings to senior staff.
May support cyber metrics development, maintenance and reporting.
Performs analyses to validate established security requirements and to recommend additional security requirements and safeguards.
Periodically conducts a review of each system's audits and monitors corrective actions until all actions are closed.
Researches and evaluates cyber capabilities and new security tools and products against operational requirements and introduces them to the enterprise in alignment with IT security strategy, and to support the offensive and defensive capability design and troubleshoot and problem solve technical and non-technical issues.
Supports the formal Security Test and Evaluation (ST&E) required by each government accrediting authority through pre-test preparations, participation in the tests, analysis of the results, and preparation of required reports.
Utilizes COTS/GOTS and custom tools and processes/procedures in order to scan, identify, contain, mitigate and remediate vulnerabilities, and intrusions.
Designs secure encryption of interface transmissions from the Defense Medical Information Exchange (DMIX) Data Exchange Service (DES).
Ensures the system can achieve an Accreditation/ATO.
 

REQUIRED
Bachelors and nine (9) years or more experience;

Masters and seven (7) years or more experience;

PhD or JD and four (4) years or more experience.
Any of the following certifications: Security+, CISM, CISSP, Certified Cloud Professional.
Experience designing system interface connectivity testing to ensure data retrieval from data warehouses in response to user inquiries.
Previous Department of Defense cyber experience.
Experience designing cyber security in Amazon Web Services (AWS) Government Cloud environment.
Support secure encryption of interface transmissions from the Defense Medical Information Exchange (DMIX) Data Exchange Service (DES) system and the relational database.
Prior experience working in the healthcare industry and familiarity with health terminology.
Must be ability to obtain a Public Trust clearance
 

DESIRED
Understanding of HIPPAA Rules and Regulations.
Experience in Health Systems Data such as Electronic Health Records (EHR) or Military Health (MHS) systems.
Integration experience with the DHA MHS Joint Active Directory (MJAD) as well as Internet Authentication Service (IAS)/ Security Assertion Markup Language (SAML) for authentication purposes.
Previous experience with any of the following systems is highly preferred:
o Composite Health Care System – CHCS
o ESSENTRIS
o Surgical Scheduling System - S3
o Anesthesia Reporting Monitoring Device - ARMD
o Armed Forces health Longitudinal Technology Application -AHLTA/Clinical Data Repository - CDR
Ability to obtain Secret clearance
Travel up to 10%

As a Volt employee, you can expect the highest level of support. 

We have a long-standing tradition of developing lasting and mutually beneficial relationships with our employees. 

Contact a Volt representative by applying to this posting online for immediate consideration.

Submit your resume today! To learn more about Volt, please visit: http://www.volt.com and to see more of our job postings, please visit: http://jobs.volt.com

VOLT is an Equal Opportunity Employer.

Pay Rate is based on experience