Information Security (Assurance) Engineer
Role details
Job location
Tech stack
Job description
Location: 90% On-site travel to Huntingdon, 10% travel to West LondonClearance Level: High - DV 'Developed Vetting'Role DescriptionWe require an information assurance engineer for support to our customer projects, Logistics, Civil and National Security Defence and Intelligence groups in the UK.You may need to apply for additional personnel security clearances. We are looking for individuals who join a high-performing team and work confidently to make excellent security happen quietly for our customers with high assurance and no fuss. Simple, effective security that our customers value. The role will support work that produces robust and efficiently managed assurance solutions for our customers sensitive
programmes.The role (first deployment) requires a high degree of third-party and customer liaison and will establish then support in ongoing growth including an on-boarding cycle each month. This will bring some diversity in what is required day-to-day and with flexible operating parameters to maintain service in an agile environment, will require good scheduling and scheduling prioritisation skills.Beyond we expect to develop further information assurance opportunities as our customer base and each of the projects we deliver continue to expand, including the use of common tooling that will facilitate the tracking and reporting of assurance actions. We are also developing NIST-compliant risk assessment methodology and tooling that is raising our quality and customer confidence, you will be part of these developments. The role in P-ITSM and likely other projects later will be responsible to the cyber lead for project outcomes and to help with career planning and personal development for junior members of the team.The ideal candidate will support the wider Leidos security capability, beyond Information Assurance, joining a talented and multi-faceted cyber team with a reach across our UK business delivering on our customer commitments and seeking out great opportunities to deliver great security by design.Candidate EssentialsBritish - Non-dual national
many of our projects have nationality restrictionsDV cleared
Requirements
Candidates should be willing to undergo SPC.Experience in delivering accredited security solutions in sensitive government scenariosEssential Process Skills/ExperienceExperience of the IT systems engineering lifecycleUnderstanding of the controlling processes for the systems engineering lifecycle (e.g. requirements management, configuration management, testing and assurance) and where cyber assurance fits in to theseUnderstanding of different
lifecycles/methodologies
(waterfall, incremental, SAFE, DevOps)Managing ITHC activities through the lifecycle from scoping, coordination and remediation managementSolid understanding of Confidentiality, Integrity, Availability and Safety (CIA+S) and practical experience in applying that understanding in management of risk and response to events and changesExperience of process involved in gaining and maintaining accreditation for secure/sensitive systems using structured Risk analysis and treatment approachesExperience of process involved in continuous assurance for information security management systems, e.g. NIST, ISOExperience of developing and managing a Cyber Incident Response capabilityExperience of developing Security Awareness training including Threat Modelling, table top war gamingExperience in tracing through and evaluating responses to security requirements for a systemExperience in maintaining elements of security documentation sets (SyOPS, RMADs, Security Management Plans, ISMS elements, CARBN)Desirable ExperienceExperience working in both delivery and proposal environmentsExperience working in MOD AS environmentsTechnology skills/ExperienceUnderstanding of principles of network and boundary protection technologies (firewalls, mail gateways, load balancers, antivirus, IPS, IDS, Diodes)Understanding of Protective Monitoring systems (SIEM/SOC) and the principles of their deployment.Understanding of authentication and authorisation technologies (SAML, LDAP, PKI, etc)Understanding of encryption and protocols and structures in support of deployment, e.g. custodian.Understanding of purpose and effectiveness of penetration tests or IT Health Checks.Communication and Soft SkillsExcellent verbal and written communication skills and works well in a team environment;Capable of developing and communicating reports to meet defined objectives for intended audience;A good level of commercial awareness and project disciplines