NEWS + ADVICE
Engility’s Cybersecurity Opportunities
A discussion with Brigit Freedman, Talent Strategies Director with Engility.
What Particular Skills Sets are you Looking for to Support Your Cybersecurity Programs
Engility supports the San Antonio based 92nd Information Operations Squadron in support of their mission statement: “To assess the integrity, security, and network defense posture of AF and DoD cyber assets.” Engility executes system, vulnerability and compliance assessment, and hunt operations on Air Force bases worldwide by providing exceptional management, engineering, and technical support services. Our subject matter experts identify requirements and develop solutions for specific military applications, networks, and enterprise architectures, supporting multiple programs to determine secure architectures and site deployments.
The desired skill sets for our team include: CISSP, Certified Ethical Hacker ( CEH), Information Assurance Technical (IAT), Security+, GSEC, SSCP – mainly the DoD 8570 compliance certifications. Our team members must be able to provide cyber intelligence briefings and an active Top Secret Clearance is necessary for our work to support the mission.
Engility’s cyber approach encompasses three components:
1) Situational awareness;
2) Systems engineering; and
3) Strategic consulting, operations support and information assurance.
Situational awareness addresses evaluating threats and network operations at the enterprise level. Systems engineering involves integrating cybersecurity into the network architecture, knowing that every network must incorporate security before deployment. The final aspect of our cybersecurity strategy is offering strategic consulting, operations support and information assurance to include DoD Information Assurance Certification & Accreditation (DIACAP C&A).
Engility also offers engineering integration and operations analysis, which provides insight into the integration and interoperability of all components on your network. It indicates how the level of assurance within the architecture impacts interoperability, operations and security. Engility also evaluates network effectiveness.
One of the key components of Engility’s Cybersecurity strategy is readiness. To a services company like Engility, readiness is having well-trained and well-equipped staff available to serve our clients and further their mission. So, we strive to hire the most qualified candidates. We are always looking to hire veterans with these skillsets. By hiring the best, Engility remains the best.
What are Engility’s Cybersecurity Career Paths
Although many positions focus on the technical components of cybersecurity, the policy component is absolutely critical as well. If you don’t have a comprehensive cybersecurity policy in place at the start, all of the tactics behind it are for naught. Consistency across the enterprise is essential.
In the Engility Defense and Civil Sector unit, we have folks working with the U.S. Navy to set information assurance policy around the way IT and systems interact. Within the U.S. Air Force, we have subject-matter experts in defensive operations who do everything from detecting and monitoring advanced persistent threats to engineering the gateways and proxies within a network that keep people out through automation.
We hire intelligence analysts to support multiple intelligence agencies around the beltway. They perform a variety of functions from monitoring what the adversary is doing on the network to protecting the intelligence community’s infrastructure from attack. We also perform operations planning, such as developing a responsive or defensive action, and we offer capabilities analysis to address the actions that can be taken from offensive and defensive perspectives. Engility also is involved in the development associated with offensive and defensive tactics, techniques and procedures (TTPs).
Engility executes system, vulnerability and compliance assessment, and hunt operations on worldwide by providing exceptional management, engineering, and technical support services. Our subject matter experts identify requirements and develop solutions for specific military applications, networks, and enterprise architectures, supporting multiple programs to determine secure architectures and site deployments.
Computer Systems Security Trainer
Computer Forensic Analyst
Cyber Incident Analyst
Cyber Systems Security Assessor
Cyber Systems Security Database Assessor
Cyber Threat Analyst
Junior Cybersecurity Professional
Senior Software Engineer
Information Systems Security Officer
Any Recommendations for Transitioning Military Pursuing a Cybersecurity Career
Veterans are some of the most qualified cybersecurity applicants we see. Being both a veteran and a cyber veteran myself, I know the specialized training and experience active duty personnel in my job classification at NSA acquired. Simply put, active duty military personnel receive training that is second to none.
Some professionals looking to separate from active duty aren’t even aware of the opportunities available to them when the leave the service. I was fortunate. My colleagues and I were actively recruited by industry while still on active duty. Many, though, are not recruited because they work at remote duty stations. They have no idea how valuable their skills are. They need to learn that great demand exists for their talents not just in companies that support the defense and intelligence space, but also in private firms, especially within the banking and finance industries. They are always looking for cybersecurity experts.
Again, military training is second to none. Veterans separate from the military with valuable certifications due to the military’s emphasis on continuing education. I can assign these professionals to a contract or place them in a client space right away, knowing that within weeks they will be fully up to speed and able to support the mission completely.
Do You Have Cybersecurity Internships for Students
We have internships across almost all of our accounts and we do have cyber security students coming on board with us this summer.
Do You Have Positions for Professionals Without a Security Clearance
Most of our CyberSecurity jobs require at least a Top Secret before you can begin working on a customer site.
This entry was posted on Wednesday, April 15, 2015 11:57 am