Today
Secret
Mid Level Career (5+ yrs experience)
$125,000 - $150,000
No Traveling
Engineering - Systems
Orlando, FL (On-Site/Office)
Cybersecurity Engineer – Lab Support (Orlando, FL)
Contract Length:
Initial POP (Period of Performance): Through end of September
Potential for Extension: Yes, pending internal approvals in July/August
Start Date: ASAP (pending subcontractor coordination and clearance setup)
Location:
On-Site (Orlando, FL): Required due to classified lab environment
Clearance Requirements:
Active Secret clearance required
Lab Overview & Responsibilities:
The work will support a dynamic classified and unclassified lab environment heavily used by developers. The cyber engineering team ensures compliance and operational readiness, focusing on:
Primary Duties:
System hardening (Windows, Linux, network devices)
STIG application and validation
Vulnerability scanning (ACAS/Nessus, SCAP, SCC, etc.)
POAM item development and tracking
Security documentation for eMASS/ISSMs to maintain ATOs
Supporting ATO maintenance and compliance standards
Coordinating with system admins on mitigation plans
Occasionally assisting with remediation (especially if admin team is short-staffed)
Identifying and automating repetitive tasks to drive efficiency
Suggesting and evaluating new tools for process improvement
Writing or generating reports based on scan results
Creating Splunk dashboards and potentially assisting with data ingestion
Desired Technical Skills & Tooling Exposure:
Candidates do not need to have mastery over all tools listed, but should be technically strong, self-driven, and capable of picking up new tooling quickly.
Security & Compliance Tools:
Nessus / ACAS
SCAP / SCC tools
eMASS (for ATO documentation support)
Monitoring, Analytics, & Automation Tools:
Splunk (dashboard creation, data ingestion)
Ivanti (formerly LANDesk; patching and reporting — integration with Splunk possible)
WSUS experience acceptable as transferable skill
Operating Systems & Infrastructure:
Windows
Linux (SUSE, Red Hat)
Network Equipment (unspecified vendors)
Scripting & Automation:
Bash or comparable scripting tools
Automating scan schedules and report correlation
Identifying or proposing new automation tools
Soft Skills & Success Factors:
Strong technical foundation
High energy, initiative, and self-motivation
Effective collaboration and interpersonal skills
Willingness to take ownership and problem-solve
Ability to navigate dynamic, high-demand lab environments
Additional Notes:
Work is primarily on-site due to the classified nature of the environment
While remediation is primarily done by sysadmins, engineers may occasionally assist
Candidates will be assessed on their ability to work independently and add value to junior-heavy teams
Prior experience with POAM creation is preferred but not required; it can be learned on the job
Flexibility in tooling experience is allowed; focus is on capability and adaptability
Contract Length:
Initial POP (Period of Performance): Through end of September
Potential for Extension: Yes, pending internal approvals in July/August
Start Date: ASAP (pending subcontractor coordination and clearance setup)
Location:
On-Site (Orlando, FL): Required due to classified lab environment
Clearance Requirements:
Active Secret clearance required
Lab Overview & Responsibilities:
The work will support a dynamic classified and unclassified lab environment heavily used by developers. The cyber engineering team ensures compliance and operational readiness, focusing on:
Primary Duties:
System hardening (Windows, Linux, network devices)
STIG application and validation
Vulnerability scanning (ACAS/Nessus, SCAP, SCC, etc.)
POAM item development and tracking
Security documentation for eMASS/ISSMs to maintain ATOs
Supporting ATO maintenance and compliance standards
Coordinating with system admins on mitigation plans
Occasionally assisting with remediation (especially if admin team is short-staffed)
Identifying and automating repetitive tasks to drive efficiency
Suggesting and evaluating new tools for process improvement
Writing or generating reports based on scan results
Creating Splunk dashboards and potentially assisting with data ingestion
Desired Technical Skills & Tooling Exposure:
Candidates do not need to have mastery over all tools listed, but should be technically strong, self-driven, and capable of picking up new tooling quickly.
Security & Compliance Tools:
Nessus / ACAS
SCAP / SCC tools
eMASS (for ATO documentation support)
Monitoring, Analytics, & Automation Tools:
Splunk (dashboard creation, data ingestion)
Ivanti (formerly LANDesk; patching and reporting — integration with Splunk possible)
WSUS experience acceptable as transferable skill
Operating Systems & Infrastructure:
Windows
Linux (SUSE, Red Hat)
Network Equipment (unspecified vendors)
Scripting & Automation:
Bash or comparable scripting tools
Automating scan schedules and report correlation
Identifying or proposing new automation tools
Soft Skills & Success Factors:
Strong technical foundation
High energy, initiative, and self-motivation
Effective collaboration and interpersonal skills
Willingness to take ownership and problem-solve
Ability to navigate dynamic, high-demand lab environments
Additional Notes:
Work is primarily on-site due to the classified nature of the environment
While remediation is primarily done by sysadmins, engineers may occasionally assist
Candidates will be assessed on their ability to work independently and add value to junior-heavy teams
Prior experience with POAM creation is preferred but not required; it can be learned on the job
Flexibility in tooling experience is allowed; focus is on capability and adaptability
group id: apexsan