Charleston, SC, USA
12 hours ago
Information System Security Specialist III – Compute

The - Information System Security Specialist III – Compute is a highly skilled and experienced customer-focused technical professional who provides in-depth technical information and specific design/implementation guidance to Red River’s customers related to Compute. They provide architectural guidance for customers across the Red River product portfolio, including products and services from OEM partners.  The candidate works with Design Architects, and Engineering peers, to validate the best solution to address customer requirements. 

The candidate is responsible for performing the required activities and services to ensure that the supported capability remains operationally available to the functional user at agreed service levels and complies with baseline functional and technical requirements. This encompasses security, planning, management, and configuration management tasks.

Candidate may undertake minor sustainment software changes as part of the maintenance process. These services include minor software modifications that are beyond routine break/fix updates; they pertain to adjustments for business process and policy updates, as well as improvements in modularity and open systems architecture that are not extensive enough to be classified as system or software engineering endeavors. Such enhancements or modifications are distinct from regular maintenance and break/fix activities. These software engineering activities generally correspond to minor upgrades or adjustments derived from help desk trouble tickets, defect reports, and change requests. The candidate is required to apply appropriate quality control and configuration management techniques to implement any changes. In addition, the candidate may conduct tests to confirm that each software release is functionally and technically operational, including adequate data exchange for relevant interfaces. The candidate may also support routine testing and acceptance processes necessary for the release of the software.

Duties:

Research, analyze, and translate changes, updates, and new technology into qualitative and quantitative technical requirementsAssist in providing data to plan for cost, schedule and personnel requirements of technology projects.Support/perform system software updates, tuning, patching, administration, monitoring, maintenance, Information Assurance Vulnerability Management (IAVM) patching, DON Application and Database Management System (DADMS) registration, Security Technical Implementation Guide (STIG) implementation, maintaining security compliance, Communications Tasking Order (CTO) responses, auditing and logging, and reporting.Support and perform tasks for network infrastructure such as installing, configuring, managing, troubleshooting and operating to include but not limited to: Software defined networking, Cloud networking services, Cisco switches, routers and firewalls

Required Experience/Certifications:

Bachelor’s degree in a technical or managerial related discipline or High School Diploma or GED. Individual shall meet the latest Cybersecurity workforce certification/training in accordance with DoD 8570.1M and subsequent DoD 8140 manual as applicable.Five (5) years with Bachelor’s degree or seven (7) years with HS/GED of practical experience demonstrating competency in Cybersecurity, Engineering, Test & Evaluation (T&E) or Assessment & Authorization (A&A)/ Certification & Accreditation (C&A) related field as they pertain to compute environments. Individual shall demonstrate a working knowledge of the Risk Management Framework (RMF) process. Individual shall be familiar with security policies & guidance documents to assist with the preparation and maintenance of process artifacts, traceability documents purposed for compliance with Authority to Operate (ATO) requirements. The specialist shall be capable of evaluating security solutions to ensure they meet security requirements for processing up to classified information and supervise and/or maintain the operational security posture for an information system or program. Individual shall have experience assisting or developing system security policy and ensuring compliance of change management and configuration control processes.At least one (1) of the following: CompTIA Security+ or CompTIA Advanced Security Practitioner (CASP) or Certified Information System Security Professional (CISSP).At least one (1) of the following: IEEE CS Software Development Associate Engineer Certification or complete a vendor/platform specific certification such as: VMware Certified Technical Associate - Data Center Virtualization, Cloud certifications such as AWS Architect, Developer, and SysOps Associate.
 

Desired Skills:

Desired certifications in Information Assurance Management (IAM) or Information Assurance Technical (IAT) or Information Assurance System Architect and Engineer (IASAE) Level II or III (position-based).Desired experience applying programming principles in either a professional or academic setting and significant experience using modern software development methodologies (e.g. agile, DEVOPS/DEVSECOPS) in either context.Desired experience with the System Development Lifecycle (SDLC) including evaluation, planning, design, engineering, testing, documentation, and integration is required to support the modernization of applications and hosting solutions like software development, low/no-code platforms, physical/virtual servers, containerization, serverless computing, and PaaS/SaaS. The contractor must offer innovative engineering solutions prioritizing automation and cloud services, while ensuring robust cybersecurity compliance.

Basic Qualifications:

U.S. Citizenship Required

Red River offers a competitive salary, excellent benefits and an exceptional work environment. You can review our benefit offerings here. If you are ready to join a growing company, please submit your resume and cover letter (optional).

EOE M/F/DISABLED/Vet

Red River is an equal opportunity employer and makes employment decisions based on business needs, job requirements and individual qualifications, without regard to race, color, religion, national origin, sex (including pregnancy), sexual orientation, gender identity or expression, marital status, age, family medical history or genetic information, disability, past or present military service, or any other characteristics protected under the laws applicable in the locations where Red River operates.  Red River will not tolerate discrimination or harassment based on any of these characteristics. 

Red River does not accept unsolicited resumes from individual recruiters or third party recruiting agencies in response to job postings or otherwise. Placement fees will not be paid to any recruiter unless Red River has an active agreement in place with the recruiter and such a request has been made by the Red River Talent Acquisition team and such candidate was submitted to the Red River Talent Acquisition Team via our Applicant Tracking System. Any unsolicited resumes or other data submitted to Red River in violation of this policy may be used by Red River without obligation to pay any fees of any kind to the recruiter.

Confirm your E-mail: Send Email