Empower AI is AI for government. Empower AI gives federal agency leaders the tools to elevate the potential of their workforce with a direct path for meaningful transformation. Headquartered in Reston, Va., Empower AI leverages three decades of experience solving complex challenges in Health, Defense, and Civilian missions. Our proven Empower AI Platform provides a practical, sustainable path for clients to achieve transformation that is true to who they are, what they do, how they work, with the resources they have. The result is a government workforce that is exponentially more creative and productive. For more information, visit www.Empower.ai.
Empower AI is proud to be recognized as a 2022 Military Friendly Employer by Viqtory, the publisher of G.I. Jobs. This designation reflects the company's commitment to hiring and supporting active-duty and veteran employees.
Responsibilities
Empower AI: As the Security Engineer, you will provide Enterprise Cybersecurity Support Services to the Virgin Island Government Bureau of Information Technology. Core duties and responsibilities include the following:
- Administer and support all cybersecurity activities across the Enterprise in both an advisory and technical role.
- Perform all Cyber Defense and Security Operations Center (SOC) roles and activities to include but not limited to engineering, monitoring analysis, and response.
- Perform continuous monitoring, triage, analysis, and resolution of cybersecurity events and incidents using Microsoft 365 Defender, Microsoft Sentinel, and other SOC tools.
- Conduct continuous technical system and application vulnerability assessments and remediation support utilizing Microsoft Defender for Cloud, Microsoft 365 Defender, Microsoft Endpoint Manager/Intune, CIS Benchmarks, DISA STIGS, and vendor Security Guides and Best Business Practices.
- Conduct continuous technical network vulnerability assessments and remediation support utilizing Solarwinds Network Configuration Manager, CIS Benchmarks, DISA STIGS, and vendor Security Guides and Best Business Practices.
- Implement and maintain Data Loss Prevention using Microsoft Purview and Application Control using Microsoft Defender for Cloud Apps, Windows Defender Application Control, and AppLocker.
- Implement cyber incident response capabilities and support by developing policies, Incident Response Plan (ICP), playbooks, workflows, and automations.
- Provide post incident support and leadership in the development and preparation of after-action reports, recommending and implementing secure posture and policy improvements to minimize risk exposure, and other necessary activities to properly document the incident.
- Recommend and implement cybersecurity tools within the enterprise and update documentation and playbooks to incorporate the appropriate use, management, and documentation of such tools.
- Provide development training and leadership for cybersecurity team members in support of their continual technical and professional maturity by providing the knowledge, techniques, procedures, and mentorship necessary to protect, monitor, and defend the enterprise's information and information systems and ensure their confidentiality, integrity, availability.
- Develop reports, Plan of Actions and Milestones (POA&M), and recommendations for improvement to management and other stakeholders in regard to current cybersecurity postures based on all NIST Cybersecurity Framework categories and subcategories, secure device configurations, vulnerabilities, and cybersecurity incidents.
- Work collaboratively with IT engineering team members to design, implement, manage, and document network and systems infrastructures that achieve the required level of data security and meet cybersecurity frameworks and guidelines.
- Provide cyber coordination and collaboration support, working with Government employees and agencies, internal branches, states/customers to coordinate security operations and deliver or request assistance or assist with cybersecurity incidents and investigations.
- Provide compliance support through performing security services in accordance with applicable NIST and Federal cybersecurity guidance and regulations.
- Provide information system security policy, plan, and process development, implementation, and audit support to address administrative, operational, and technical requirements in accordance with applicable NIST and Federal cybersecurity guidance and regulations.
Qualifications
- Five (5) or more years of experience managing cybersecurity compliance for government agencies or in large-scale enterprise environments including securing IT systems and services using industry cybersecurity standards, policies, guidelines, and best practices.
- Five (5) or more years of experience managing a SOC and leading a security operations staff.
- Five (5) or more years of progressive incident response experience.
- Five (5) years of experience successfully managing information security risks by developing, documenting, and implementing cybersecurity programs, policies, and procedures.
- Twelve (12) or more years of progressive experience in IT security operations.
- Advanced knowledge and training of the following system monitoring, analysis, protection, and management tools: Microsoft System Internals, Microsoft 365 Defender, Microsoft Defender Firewall, Microsoft Defender for Cloud Apps, Microsoft Sentinel.
- GIAC Security Operations Certified (GSOC), GIAC Certified Intrusion Analyst (GCIA), GIAC Certified Enterprise Defender (GCED), GIAC Certified Incident Handler (GCIH), or other Professional/Expert Level SOC related certification.
- Advanced knowledge on industry standards for implementing secure configuration of Microsoft Operating Systems and applications using Group Policy.
- Demonstrable detailed knowledge and understanding of applicable cybersecurity and information protection frameworks such as National Institute of Standards and Technology (NIST) Cybersecurity Framework, NIST Special Publication (SP) 800-171 Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations, NIST SP 800-53 Security and Privacy Controls for Information Systems and Organizations, Cybersecurity Maturity Model Certification and others applicable to government data and information systems.
Preferred Qualifications:
- Preferred knowledge and training in the configuration and management of Windows endpoints using Microsoft Endpoint Manager/Intune.
- Preferred knowledge and training in the configuration and management of VMware, Nutanix, Avaya, and HP Enterprise network devices.
- Preferred knowledge and training in the configuration and management of Fortinet FortiGate firewall technology.
- Preferred knowledge and training of network monitoring and management tools such: SolarWinds Orion.
- Preferred knowledge and training on utilization of ServiceNow ITSM.
- Bachelor's degree in Information Security, Computer Science, Information Assurance, or another relevant technical field.
Physical Requirements:
- Sitting for long periods
- Standing for long periods
- Ambulate throughout an office
- Stoop, kneel, crouch, or crawl as required
- Travel by land or air transportation 25% or less
About Empower AI
It is the policy of Empower AI to provide equal opportunity in recruiting, hiring, training, and promoting individuals in all job categories without regard to race, color, religion, national origin, gender, age, disability, genetic information, veteran status, sexual orientation, gender identity, or any other protected class or category as may be defined by federal, state, or local laws or regulations. In addition, we affirm that all compensation, benefits, company-sponsored training, educational assistance, social, and recreational programs are administered without regard to race, color, religion, national origin, gender, age, disability, genetic information, veteran status, sexual orientation, or gender identity. It is our firm intent to support equal employment opportunity and affirmative action in keeping with applicable federal, state, and local laws and regulations. Empower AI is a VEVRAA Federal Contractor.
#J-18808-Ljbffr