StaffAttract
  • Login
  • Create Account
  • Products
    • Private Ad Placement
    • Reports Management
    • Publisher Monetization
    • Search Jobs
  • About Us
  • Contact Us
  • Unsubscribe

Login

Forgot Password?

Create Account

Job title, industry, keywords, etc.
City, State or Postcode

Information Assurance Engineer

Leidos - Norfolk, VA

Apply Now

Job Description

Description Leidos is seeking an Information Assurance (IA) Engineer Senior to support cybersecurity authorization related efforts for SMIT. SMIT is the largest IT services program for the Navy and Marine Corps. Under the Service Management, Integration, and Transport (SMIT) program, the Leidos team will deliver the core backbone of the Navy-Marine Corps Intranet (NMCI) and Marine Corps Enterprise Network (MCEN), including cybersecurity services, network operations, service desk, and data transport. Ultimately, the Leidos team will support the Navy and Marine Corps in unifying its shore-based networks and data management to improve capability and service while also saving significant dollars by focusing efforts under one enterprise network.Primary ResponsibilitiesThe IA Engineer will perform cybersecurity authorization services, including acting as a main point of contact for cybersecurity authorization related aspects to the assigned information systems, ensuring systems are maintained per security policies and procedures and maintaining compliance and ongoing reporting to management. Responsibilities include:Serve as a primary information system security engineer (ISSE) for Authorization to Operate (ATO) packages under the Risk Management Framework (RMF)Assist in the development and review of ATO submissions and coordinate all updates and corrections to assessment and authorization (A&A) artifactsEvaluate software and hardware during pre-acquisition phases to determine its ability to meet minimum security requirements based on NIST SP 800-53 Rev4 security controls.Author, review, coordinate and submit cybersecurity authorization required artifacts to eMASS (including change requests) to achieve milestones such as Interim Authority to Test (IATT) and ATO in accordance with the project schedule.Support conducting cybersecurity authorization activities to comply with all current Cybersecurity and IA manuals, instructions, and guides within the DoDI 8500.01, DON 5239, and Marine Corps ECSM’s.Continuously monitor system resources through automated scanning and implement automated reporting feeds to support cybersecurity authorizationsVerify patch compliance using the approved technical solution (i.e., Assured Compliance Assessment Solution (ACAS)), Information Assurance Vulnerability Alert (IAVA) compliance dashboards, and Microsoft Defender for Endpoints.Coordinate with local administrators to troubleshoot and elevate patching issues in a timely manner in order to meet patch compliance timelines.Assist with the implementation of security procedures, and verify information system security requirements, including coordinating the execution, review, and disposition of Security Technical Implementation Guide (STIG) checklists for systems, applications, developed code and other components.Independently develop and maintain system security documentation, including drafting, reviewing, editing and recommending guidance for Standard Operating Procedures (SOP), Tactics, Techniques, & Procedures (TTP), Plan of Action and Milestones (POA&M) and Federal Information Security Management Act (FISMA) Score Card.Participate in regular briefings with the customer on cybersecurity statuses, including preparing briefing materials. Work closely with government Cyber team to support ATO conditions and requirementsSupport site visits / audits, including System Readiness Reviews (SRR)Ensure secure, effective and efficient operation of network systems, architecture, and topologyAssist with the development and application of business processes to ensure they have the appropriate level of securityParticipate in strategic network, security, and operations new technology planningAs a cybersecurity authorization services security expert, assist the engineering managers in employing approved defense-in-depth principles and practices (e.g., defense-in-multiple places, layered defenses, and security robustness)Discuss and document the Ports, Protocols and Services (PPS) to include ensuring the dataflows are accurate, CAL boundaries crossed are compliant, and registrations with the AO are completed per DODI 8551.1Basic QualificationsBachelor's degree and 8-12 years of prior relevant experience or Master’s with 6-10 years of prior relevant experience in Cybersecurity, Information Security, IT, EE, Network Engineering, Computer Science, or related field.US Citizen and DoD Secret ClearanceHold an active security certification that meets DOD 8570 IAT level III or higherMust have complete understanding of the RMF steps, especially Steps 4 through Steps 7Ability to identify upon review of a system authorization boundary and its components to identify all applicable STIGsAbility to decompose a security control/security check and ensure the provided artifact and test result satisfies said control/AP/checkUnderstanding of techniques and tactics used to exploit systems (MITRE ATTACK) to determine risk and possible mitigationsAbility to understand technical mitigations/know resources to identify proper mitigating factors (i.e. with eMASS to include control inheritance, TR Import, and POAM import functionality.Support conducting cybersecurity authorization activities to comply with all current Cybersecurity and IA manuals, instructions, and guides within the DoDI 8500.01, DON 5239, and Marine Corps ECSM’s.Verify patch compliance using the approved technical solution (i.e., Assured Compliance Assessment Solution (ACAS)), Information Assurance Vulnerability Alert (IAVA) compliance dashboards, and Microsoft Defender for Endpoints.Assist with the implementation of security procedures, and verify information system security requirements, including coordinating the execution, review, and disposition of Security Technical Implementation Guide (STIG) checklists for systems, applications, developed code and other components.Independently develop and maintain system security documentation, including drafting, reviewing, editing and recommending guidance for Standard Operating Procedures (SOP), Tactics, Techniques, & Procedures (TTP), Plan of Action and Milestones (POA&M) and Federal Information Security Management Act (FISMA) Score Card.Assist with the development and application of business processes to ensure they have the appropriate level of securityDiscuss and document the Ports, Protocols and Services (PPS) to include ensuring the dataflows are accurate, CAL boundaries crossed are compliant, and registrations with the AO are completed per DODI 8551.1Hands-on experience with a variety of cybersecurity tools.Hands-on experience in working with DoD networks.Experience in FISMA and other information assurance assurance-related compliance reporting.Attention to detail is a mustAbility to multi-task, self-assign work in a dynamic, fast-paced environment.Analytical, communication and troubleshooting skills that enable proactive and effective collaboration with a virtual team, including the ability to clearly articulate status and present to both customers and program leadership.Experience in one of the following areas: cybersecurity assessment, vulnerability scanning, integration and testing, data analytics or security operations.Experience leading cybersecurity tasks and collaborate with customers, stakeholders, and team membersKnowledge of cybersecurity assessment and authorization (A&A) and associated processes, procedures, and activities in accordance with DoDID 8500.01, DoDI 8551.01, and other applicable NIST instructions, guidelines.Experience supporting the formal Cybersecurity/IA testing required by government accrediting authorities and preparing System Security Plans.Communication abilities, both verbal and written, including business writing on complex topics. Able to reach out across different teams and disciplines to include internal/external stakeholdersUnderstanding of supporting security initiatives, conducting security monitoring, reporting and maintaining security compliance following security regulations and policies.Knowledge of Security Engineering and Architecture, Assessment and Authorization, Vulnerability Assessment, Incident Management, Vulnerability Management, Security Operations, and Policy and Program DevelopmentMotivated self-starter with ability to lead and work in a matrix organization and communicate effectively with peers and program leadershipPreferred QualificationsTop Secret ClearanceHands-on experience in working with Cloud AuthorizationsHands-on experience in working with NMCI and/or MCEN authorizationsExperience with ITIL processes and/or ITIL Foundation V4 certificationAn entrepreneurial spirit with the ability to drive innovation independently; have a passion to improve at every opportunityProven ability to credibly coordinate between technical teams and business stakeholdersWilling to perform shift workIf you're looking for comfort, keep scrolling. At Leidos, we outthink, outbuild, and outpace the status quo — because the mission demands it. We're not hiring followers. We're recruiting the ones who disrupt, provoke, and refuse to fail. Step 10 is ancient history. We're already at step 30 — and moving faster than anyone else dares.Original Posting:February 25, 2026For U.S. Positions: While subject to change based on business needs, Leidos reasonably anticipates that this job requisition will remain open for at least 3 days with an anticipated close date of no earlier than 3 days after the original posting date as listed above.Pay Range:Pay Range $107,900.00 - $195,050.00The Leidos pay range for this job level is a general guideline only and not a guarantee of compensation or salary. Additional factors considered in extending an offer include (but are not limited to) responsibilities of the job, education, experience, knowledge, skills, and abilities, as well as internal equity, alignment with market data, applicable bargaining agreement (if any), or other law.About LeidosLeidos is an industry and technology leader serving government and commercial customers with smarter, more efficient digital and mission innovations. Headquartered in Reston, Virginia, with 47,000 global employees, Leidos reported annual revenues of approximately $16.7 billion for the fiscal year ended January 3, 2025. For more information, visit .Pay and BenefitsPay and benefits are fundamental to any career decision. That's why we craft compensation packages that reflect the importance of the work we do for our customers. Employment benefits include competitive compensation, Health and Wellness programs, Income Protection, Paid Leave and Retirement. More details are available at /careers/pay-benefits.Securing Your DataBeware of fake employment opportunities using Leidos’ name. Leidos will never ask you to provide payment-related information during any part of the employment application process (i.e., ask you for money), nor will Leidos ever advance money as part of the hiring process (i.e., send you a check or money order before doing any work). Further, Leidos will only communicate with you through emails that are generated by the automated system – never from free commercial services (e.g., Gmail, Yahoo, Hotmail) or via WhatsApp, Telegram, etc. If you received an email purporting to be from Leidos that asks for payment-related information or any other personal information (e.g., about you or your previous employer), and you are concerned about its legitimacy, please make us aware immediately by emailing us at [email protected] you believe you are the victim of a scam, contact your local law enforcement and report the incident to the U.S. Federal Trade Commission.Commitment to Non-DiscriminationAll qualified applicants will receive consideration for employment without regard to sex, race, ethnicity, age, national origin, citizenship, religion, physical or mental disability, medical condition, genetic information, pregnancy, family structure, marital status, ancestry, domestic partner status, sexual orientation, gender identity or expression, veteran or military status, or any other basis prohibited by law. Leidos will also consider for employment qualified applicants with criminal histories consistent with relevant laws.

Created: 2026-03-11

➤
Footer Logo
Privacy Policy | Terms & Conditions | Contact Us | About Us
Designed, Developed and Maintained by: NextGen TechEdge Solutions Pvt. Ltd.