What are the responsibilities and job description for the System Engineer 3 position at Leidos?
Job Description
As a Senior Systems Engineer you will be responsible for researching, gathering requirements and developing use cases and building prototype solutions for discovery mission customers with an eye towards corporate services adoption. Familiarity with the customer's capabilities organization is preferable for this position. Customer relations and use cases will drive the timetable and possibly development efforts in order to transition those users from an R&D environment to corporate services. This position requires an innovative thinking with a knack for developing solutions within the realm of possibility for R&D efforts in a data center environment. The candidate will often require interaction with personnel from various organizations inside and out of Operations. This job is perfect for someone who wants to lead and/or be part of a Focused Effort team that constantly strives to architect/engineer open, component-based technological solutions in a fast paced, highly collaborative, challenging environment for the customer. Candidate must be able to perform Linux Admin and Application installation/config/setup duties in a prototype development and evaluation lab on customer site. The candidate must be a self-starter and be able to work with integrated engineering, software and security teams as well as independently. Must come to the position with solid foundation of current technologies, and be able to learn new HW and SW technologies quickly. Must be able to interface with multiple customer POCs and brief customer leadership.
Basic Qualifications
• Eighteen (18 ) years of general experience in computer science, computer engineering, engineering, mathematics, or related discipline.
• At least ten (10) years of experience in engineering and program processes (CM, QA, risk management, reporting) software development methodologies, planning, designing, and analyzing processing and storage retrieval systems on a mid- to large-scale.
• Minimum IAT level I certification
• A bachelor's degree in electrical engineering, math, computer science, or computer engineering may be substituted for four (4) years of general experience. A master's degree in computer science, engineering, mathematics, or a related discipline may be substituted for two years of general experience.
Preferred Qualifications
Provide support to senior ISSOs for implementing, and enforcing information systems security policies, standards, and methodologies .
• Assist in the evaluation of security solutions to ensure they meet security requirements for processing classified information
• Assist with the CM for information system security software, hardware, and firmware
• Assist with preparation and maintenance of documentation
• Maintain records on workstations, servers, routers, firewalls, intelligent hubs, network switches, etc. to include system upgrades
• Evaluate security solutions to ensure they meet security requirements for processing classified information
• Propose, coordinate, implement, and enforce information systems security policies, standards, and methodologies
• Maintain operational security posture for an information system or program Provide support to the Information System Security Manager (ISSM) for maintaining the appropriate operational IA posture for a system, program, or enclave
• Develop and maintain documentation for C&A in accordance with ODNI and DoD policies
• Develop and update the system security plan and other IA documentation
• Provide CM for security-relevant information system software, hardware, and firmware Assist with the management of security aspects of the information system and perform day-today security operations of the system
• Develop system security policy and ensures compliance Administer the user identification and authentication mechanism of the Information System (IS)
Desired Skills and Experience (in as many areas as possible)
The ISSO leads a team of ISSOs that provides support for a program, organization, system, or enclave's information assurance program.
• Provides support for proposing, coordinating, implementing, and enforcing information systems security policies, standards, and methodologies.
• Maintains operational security posture for an information system or program to ensure information systems security policies, standards, and procedures are established and followed.
• Assists with the management of security aspects of the information system and performs day-to-day security operations of the system.
• Evaluate security solutions to ensure they meet security requirements for processing classified information.
• Performs vulnerability/risk assessment analysis to support certification and accreditation. Provides configuration management (CM) for information system security software, hardware, and firmware.
• Manages changes to system and assesses the security impact of those changes. Prepares and reviews documentation to include System Security Plans (SSPs), Risk Assessment Reports, Certification and Accreditation (C&A) packages, and System Requirements Traceability Matrices (SRTMs).
• Provide support for implementing and enforcing information systems security policies, standards, and methodologies.
• Assist in the evaluation of security solutions to ensure they meet security requirements for processing multiple types information.
• Assist with the CM for information system security software, hardware, and firmware. Maintain records on workstations, servers, routers, firewalls, intelligent hubs, network switches, etc. to include system upgrades.
• Evaluate security solutions to ensure they meet security requirements for processing classified information.
• Maintain operational security posture for an information system or program. Provide support to the Information System Security Manager (ISSM) for maintaining the appropriate operational IA posture for a system, program, or enclave.
• Develop and maintain documentation for C&A in accordance with ODNI and DoD policies.
• Develop and update the system security plans and other IA documentation.
• Provide CM for security-relevant information system software, hardware, and firmware.
• Develop system security policy and ensure compliance. Administer the user identification and authentication mechanisms of the Information System (IS).
• Scanning Compliance: Conduct security scans of the ISs under their purview to highlight security weaknesses and maintain record of devices. The ISSO will use the security scans to ensure that patching has been applied to the ISs and use the security scans to prove security compliance.
• STE Compliance: Monitor and evaluate Secure The Enterprise (STE) compliance for the ISs under their purview. Ensure that the IS maintains STE compliance, working with SAs and programmers to fix STE non-compliance items
Pay Range:
Pay Range $118,300.00 - $182,000.00 - $245,700.00
The Leidos pay range for this job level is a general guideline only and not a guarantee of compensation or salary. Additional factors considered in extending an offer include (but are not limited to) responsibilities of the job, education, experience, knowledge, skills, and abilities, as well as internal equity, alignment with market data, applicable bargaining agreement (if any), or other law.
Basic Qualifications
• Eighteen (18 ) years of general experience in computer science, computer engineering, engineering, mathematics, or related discipline.
• At least ten (10) years of experience in engineering and program processes (CM, QA, risk management, reporting) software development methodologies, planning, designing, and analyzing processing and storage retrieval systems on a mid- to large-scale.
• Minimum IAT level I certification
• A bachelor's degree in electrical engineering, math, computer science, or computer engineering may be substituted for four (4) years of general experience. A master's degree in computer science, engineering, mathematics, or a related discipline may be substituted for two years of general experience.
Preferred Qualifications
Provide support to senior ISSOs for implementing, and enforcing information systems security policies, standards, and methodologies .
• Assist in the evaluation of security solutions to ensure they meet security requirements for processing classified information
• Assist with the CM for information system security software, hardware, and firmware
• Assist with preparation and maintenance of documentation
• Maintain records on workstations, servers, routers, firewalls, intelligent hubs, network switches, etc. to include system upgrades
• Evaluate security solutions to ensure they meet security requirements for processing classified information
• Propose, coordinate, implement, and enforce information systems security policies, standards, and methodologies
• Maintain operational security posture for an information system or program Provide support to the Information System Security Manager (ISSM) for maintaining the appropriate operational IA posture for a system, program, or enclave
• Develop and maintain documentation for C&A in accordance with ODNI and DoD policies
• Develop and update the system security plan and other IA documentation
• Provide CM for security-relevant information system software, hardware, and firmware Assist with the management of security aspects of the information system and perform day-today security operations of the system
• Develop system security policy and ensures compliance Administer the user identification and authentication mechanism of the Information System (IS)
Desired Skills and Experience (in as many areas as possible)
The ISSO leads a team of ISSOs that provides support for a program, organization, system, or enclave's information assurance program.
• Provides support for proposing, coordinating, implementing, and enforcing information systems security policies, standards, and methodologies.
• Maintains operational security posture for an information system or program to ensure information systems security policies, standards, and procedures are established and followed.
• Assists with the management of security aspects of the information system and performs day-to-day security operations of the system.
• Evaluate security solutions to ensure they meet security requirements for processing classified information.
• Performs vulnerability/risk assessment analysis to support certification and accreditation. Provides configuration management (CM) for information system security software, hardware, and firmware.
• Manages changes to system and assesses the security impact of those changes. Prepares and reviews documentation to include System Security Plans (SSPs), Risk Assessment Reports, Certification and Accreditation (C&A) packages, and System Requirements Traceability Matrices (SRTMs).
• Provide support for implementing and enforcing information systems security policies, standards, and methodologies.
• Assist in the evaluation of security solutions to ensure they meet security requirements for processing multiple types information.
• Assist with the CM for information system security software, hardware, and firmware. Maintain records on workstations, servers, routers, firewalls, intelligent hubs, network switches, etc. to include system upgrades.
• Evaluate security solutions to ensure they meet security requirements for processing classified information.
• Maintain operational security posture for an information system or program. Provide support to the Information System Security Manager (ISSM) for maintaining the appropriate operational IA posture for a system, program, or enclave.
• Develop and maintain documentation for C&A in accordance with ODNI and DoD policies.
• Develop and update the system security plans and other IA documentation.
• Provide CM for security-relevant information system software, hardware, and firmware.
• Develop system security policy and ensure compliance. Administer the user identification and authentication mechanisms of the Information System (IS).
• Scanning Compliance: Conduct security scans of the ISs under their purview to highlight security weaknesses and maintain record of devices. The ISSO will use the security scans to ensure that patching has been applied to the ISs and use the security scans to prove security compliance.
• STE Compliance: Monitor and evaluate Secure The Enterprise (STE) compliance for the ISs under their purview. Ensure that the IS maintains STE compliance, working with SAs and programmers to fix STE non-compliance items
Pay Range:
Pay Range $118,300.00 - $182,000.00 - $245,700.00
The Leidos pay range for this job level is a general guideline only and not a guarantee of compensation or salary. Additional factors considered in extending an offer include (but are not limited to) responsibilities of the job, education, experience, knowledge, skills, and abilities, as well as internal equity, alignment with market data, applicable bargaining agreement (if any), or other law.
Salary : $118,300 - $182,000
System Engineer/ DevOps Engineer
System One -
Gainesville, VA
Mechanical System Design Engineer
System One -
Bellevue, WA
Senior System Engineer
System One -
Washington, DC