Hoplite Solutions LLC
Cyber Security
Hoplite Solutions LLCUnited States5 days ago
Full-timeEngineering, Information Technology
Hoplite Solutions is seeking a Cyber Security Team responsible for overseeing the system assessment and authorization processes within the Sponsor’s office. This team will also provide security engineering expertise throughout the systems development lifecycle. The goal is to advance new cyber security tools that enhance threat awareness, monitoring, and proactive enablement activities, all in alignment with the Sponsor’s strategic objectives.

The Cyber Security Team plays a pivotal role in delivering security expertise across various systems, collaborating closely with stakeholders and external partners to facilitate activities, and ensuring successful system authorizations. This is done in accordance with the Sponsor's formalized processes. The Sponsor, in turn, handles coordination and facilitates communication between technical and non-technical teams to support the broader cyber mission. This includes providing expert-level guidance in cyber risk management, vulnerability assessment, mitigation strategies, as well as overseeing both Cloud and On-Premise infrastructure—from application layers to physical components. The Cyber Security Team works cross-functionally to identify, develop roadmaps, and implement advanced cyber security tools, offering best practice recommendations to safeguard a dynamic and diverse infrastructure.

Work Requirements:

  • Assist the Sponsor in guiding multiple IT systems through the Assessment and Authorization (A&A) processes
  • Support continuous monitoring of IT systems to ensure their accreditation is maintained
  • Demonstrate expertise in Networking, Linux, Windows, log analysis, malware detection and mitigation, and the A&A process
  • Collaborate with Sponsor personnel to enhance requested metrics and improve security posture
  • Provide responses and technical guidance to system security managers
  • Develop and maintain A&A documentation, including System Security Plans (SSPs) and Continuous Monitoring plans
  • Identify countermeasures for emerging IT threats and vulnerabilities
  • Assess potential security risks, recommend mitigation strategies, and implement solutions
  • Configure and optimize security-related systems
  • Utilize security tools for log analysis, security incident response, vulnerability scanning, and task automation
  • Translate customer requirements into effective technical solutions
  • Participate in and present at information systems architectural boards at the Group level
  • Coordinate engineering projects, conduct technical risk assessments, resolve implementation conflicts, and address technical challenges

Basic Qualifications:

  • Demonstrated experience in cyber security, InfoSec, security engineering, or network engineering. Demonstrated experience with vulnerability scanning tools. Demonstrated experience analyzing and documenting test results. Demonstrated experience assessing systems against information assurance policies and regulations. Demonstrated experience communicating complex technical concepts to both technical and non-technical audiences. Demonstrated experience coordinating and performing security testing. Demonstrated experience developing risk assessment and certification reports. Demonstrated experience leading security accreditation efforts for enterprise systems. Demonstrated experience recommending mitigating countermeasures to identified threats, vulnerabilities, or shortfalls. Demonstrated experience with Linux operating system. Demonstrated experience writing and reviewing documents such as requirements specifications, system architecture, design documents, test plans, or security plans

Demonstrated Experience Decomposing Functional Requirements Into Technical Requirements.

Demonstrated experience analyzing existing systems and identifying necessary corrective actions and improvements.

Demonstrated experience preparing program

Desired Qualifications:

  • Demonstrated experience with creating and maintaining integrated master schedules
  • Demonstrated experience with offensive security practices
  • Demonstrated experience explaining protocols, technical procedures and processes clearly and accurately to both technical and non-technical audiences

Powered by JazzHR

BpdpDGQ9b2

Key Skills

Ranked by relevance