15 hours

Systems Engineer Technical Specialist w/Cyber

Chantilly, VA 20151


The Systems Engineer Technical Specialists/Cyber is responsible for supporting our clients meet their mission goals and strategic objectives by providing high-quality Systems Engineering and technical expertise for design, development, evaluation of end-to-end systems and systems-oriented products through their full development and operational life cycle. In addition, the SE Specialists provides essential support to Project Management for risk identification and mitigation and keeping the project on schedule and within budget. Provide support for business development activities to help shape requirements. Participates in system conceptual design and documentation of the design concepts.

Provides assessment and authorization (A&A) support by the development of all documentation necessary to complete the A&A process to include system security plans, contingency plans, and other associated documentation. Conducts vulnerability scans and develops risk mitigation strategies with the customer based on assessing the vulnerabilities, threats, and risk associated with the scan results. Reviews system configurations and scan tool results in order to determine system compliance and report results.

Create reports and briefings that easily and succinctly describe the highly complex program and its future plans

Validate, document and manage stakeholder expectations in concert with customer

Assist sponsor managers with modifying or establishing processes to implement strategic plans

Assist the Sponsor in assessing, documenting, and tracking program requirements and follow-on technical exchange meetings (TEMs)

Compose and maintain correspondence documentation such as operating procedures and internal memorandums

Work independently and amongst a team with minimal supervision to address roadblocks and deliver results in a timely manner or provide the most relevant course of action

Provide technical writing and acquisition support as needed

Provide Information Security support to prevent, detect, and mitigate security threats against the sponsors infrastructure networks with the purpose of enhancing sponsor security defense posture.

Provide strategic and tactical support with the use of Xacta, Nessus, Web-lnspect, and Appdetective in support of sponsors network ATO submissions.

Design development, and integration of sponsor's mission systems to integrated resources, information, and technology to better enable the customer's mission.

Analyze, design, and improve end-to-end lT processes and technical review of documentation to drive efficiency and information flows.


Candidate will have experience in complex, multi-segmented system development, integration, and test of projects including specialized, relevant technical experience in the general areas of systems engineering, system development and verification, hardware and software development.

Candidate will have demonstrated experience with Microsoft Office products, such as Word, Excel, PowerPoint, and MS Project.

Candidate will demonstrate strong interpersonal skills with demonstrated ability to work as part of an interdisciplinary team in pursuit organizational goals.

Candidate will have demonstrated expertise in writing, and ability to brief complex technical information to non-experts.

Candidate shall have experience with end-to-end integration and test methods including identification and mitigation of programmatic and technical risk.

Candidate will have experience with testing and evaluation.

Candidate will be able to demonstrate a strong understanding of Best Security practices

Candidate shall demonstrate the ability to execute vulnerability/compliance assessment tools and evaluate results for systems undergoing security assessment and continuous evaluation.

Candidate shall have expertise with COTS cybersecurity and Authorization tools to include: Xacta, Tenable/Nessus, WebInspect, AppDetective, RedSeal, and etc.

Candidate shall demonstrate strong experience with customer's Assessment and Authorization (A&A) process (e.g. RMF, NIST800-53, ICD503)

Candidate shall have a strong understanding of the National Institute of Standards and Technology (NIST) Special Publication (SP) 800-53 and or 800-53A Revision 4 as well as 800-30, 37 and 39,(CNSS) Instruction No. 1253.

Candidate shall demonstrate strong understanding of Cyber Security Policies and be able to handle multiple project, Networks and IT systems

Certifications Desired

Candidate should have professional certifications (e.g., CCIE, CISSP, CISM, CASP, CISA, Security+)

Additional Desired experience: Splunk

Requires 10 to 12 years with BS/BA or 8 to 10 years with MS/MA or 5 to 7 years with PhD.

TS/SCI w/poly required

About Peraton

Peraton drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the worlds leading mission capability integrator and transformative enterprise IT provider, we deliver trusted and highly differentiated national security solutions and technologies that keep people safe and secure. Peraton serves as a valued partner to essential government agencies across the intelligence, space, cyber, defense, civilian, health, and state and local markets. Every day, our 22,000 employees do the cant be done, solving the most daunting challenges facing our customers.

We are an Equal Opportunity/Affirmative Action Employer. We consider applicants without regard to race, color, religion, age, national origin, ancestry, ethnicity, gender, gender identity, gender expression, sexual orientation, marital status, veteran status, disability, genetic information, citizenship status, or membership in any other group protected by federal, state, or local law.

As a government contractor, Peraton abides by the following provision

Pay Transparency Nondiscrimination Provision

The contractor will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. However, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of the other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by the employer, or (c) consistent with the contractors legal duty to furnish information. 41 CFR 60-1.35(c).


  • Information Technology
Posted: 2021-05-10 Expires: 2021-06-08

With offerings in mission services, digital transformation and enterprise operations, our team of 14,000 engineers, analysts, investigators and architects work tirelessly to create innovative solutions. We have the expertise and experience not only to devise solutions, but to execute on them successfully.

Sponsored by:
ADP Logo
Sponsored by:
Bank of America Logo

Featured Jobs[ View All ]

Featured Employers

Before you go...

Our free job seeker tools include alerts for new jobs, saving your favorites, optimized job matching, and more! Just enter your email below.

Share this job:

Systems Engineer Technical Specialist w/Cyber

Chantilly, VA 20151

Join us to start saving your Favorite Jobs!

Sign In Create Account
Powered ByCareerCast