Let’s get started
By clicking ‘Next’, I agree to the Terms of Service
and Privacy Policy
Jobs / Job page
Cybersecurity Engineer image - Rise Careers
Job details

Cybersecurity Engineer

Basic Qualifications

Requires a Bachelor’s degree in Engineering, or a related Science or Mathematics field. Also requires 5+ years of job-related experience, or a Master's degree plus 3 years of job-related experience.

 

CLEARANCE REQUIREMENTS:  Department of Defense Secret security clearance is required at time of hire. Applicants selected will be subject to a U.S. Government security investigation and must meet eligibility requirements for access to classified information. Due to the nature of work performed within our facilities, U.S. citizenship is required.

Responsibilities for this Position

Cybersecurity Engineer, Colorado Springs

 

Make the world’s most advanced Missile Defense Systems even smarter and more secure.

 

ROLE AND POSITION OBJECTIVES:

As a Cybersecurity Engineer, the successful candidate will perform the following activities as part of the daily work routine:

 

  • Perform assessment of systems and networks within a virtual environment
  • Identify where systems deviate from acceptable configurations, enclave policy, or local policy using passive evaluations with STIG Viewer, SCAP and ACAS.
  • Perform Security Technical Implementation Guide (STIG) assessments and hardening for both Windows, Red Hat Enterprise Linux (RHEL) systems using ConfigOS
  • Support the development of system security test plans and demonstrate expected outcomes of those checks
  • Update Risk Management Framework (RMF) artifact documentation utilizing eMASS
  • Assist in the implementation of the required government policy (i.e., NISPOM, NIST, DoD), making recommendations on process tailoring, participating in and documenting process activities.
  • Prepare artifacts such as Test Results (TR), Authorization Boundary Diagrams (ABD), Network Topologies, Flow-diagrams, Hardware and Software listings, Ports, Protocols, and Services Management documentation, supporting Assessment and Authorization activities and maintain the Plan of Actions and Milestones (POA&M).

 We encourage you to apply if you have any of these preferred skills or experiences:

  • Utilizing Security Technical Implementation Guides (STIGs) to ensure compliance of system security requirements on both Windows and Red Hat Linux (RHEL)
  • Performing Continuous Monitoring activities as related to the approved assessment and authorization plan approved by the system AO
  • Use of various static and dynamic code scanning utilities, such as SonarCube and Fortify
  • Body of Evidence artifact development in support of system assessment and authorization activities
  • System administration of Windows and/or RHEL operating systems to include user account security group management
  • Deployment of approved system security software to include ACAS, HBSS, and ESS

 What sets you apart:  

  • Strong system administration experience with Windows and RHEL
  • Demonstrated execution of system security test events, documenting results, and presenting to program and government leadership
  • Knowledge of Risk Management Framework (RMF) life-cycle
  • Identifying security controls and overlays
  • Identifying resilient architecture design, configuring, running, and scripting audit tools
  • Providing analysis of vulnerability analyses, conducting verification testing for compliance assessment

Our Commitment to You:

  • An exciting career path with opportunities for continuous learning and development.
  • Flexible work schedules
  • Competitive benefits, including 401k matching, flex time off, paid parental leave, healthcare benefits, health & wellness programs, employee resource and social groups, and more
  • See more at gdmissionsystems.com/careers/why-work-for-us/benefits

Workplace Options:

This position is on-site 100% and does not support telecommuting.

While on-site, you will be a part of the GDMS team supporting the Missile Defense Agency.

 

Salary Note

This estimate represents the typical salary range for this position based on experience and other factors (geographic location, etc.). Actual pay may vary. This job posting will remain open until the position is filled.

Combined Salary Range

USD $121,363.00 - USD $134,638.00 /Yr.

Company Overview

General Dynamics Mission Systems (GDMS) engineers a diverse portfolio of high technology solutions, products and services that enable customers to successfully execute missions across all domains of operation. With a global team of 12,000+ top professionals, we partner with the best in industry to expand the bounds of innovation in the defense and scientific arenas. Given the nature of our work and who we are, we value trust, honesty, alignment and transparency. We offer highly competitive benefits and pride ourselves in being a great place to work with a shared sense of purpose. You will also enjoy a flexible work environment where contributions are recognized and rewarded. If who we are and what we do resonates with you, we invite you to join our high-performance team!

Equal Opportunity Employer / Individuals with Disabilities / Protected Veterans

Average salary estimate

$128000.5 / YEARLY (est.)
min
max
$121363K
$134638K

If an employer mentions a salary or salary range on their job, we display it as an "Employer Estimate". If a job has no salary data, Rise displays an estimate if available.

What You Should Know About Cybersecurity Engineer, General Dynamics Mission Systems, Inc

Are you ready to make a significant impact in the world of cybersecurity? Join General Dynamics Mission Systems (GDMS) as a Cybersecurity Engineer in beautiful Schriever AFB, Colorado Springs. In this role, you’ll help enhance the security of some of the world’s most advanced missile defense systems. If you have a Bachelor’s degree in Engineering, Science, or Mathematics, along with a wealth of experience—5+ years, or 3 years with a Master’s degree—you might be just what we’re looking for! You'll dive into evaluating systems and networks, performing vital STIG assessments for both Windows and Red Hat systems, all while ensuring compliance with rigorous government policies such as NISPOM and NIST. We’re seeking someone who loves tackling security technical implementation and has a knack for risk management—after all, you'll be driving the protection of classified information! Beyond your core responsibilities, your expertise in continuous monitoring, vulnerability assessment, and system administration will help our team shine. Plus, we value your contribution with a competitive salary, flexible working hours, and comprehensive benefits. Let’s work collectively to protect what matters most! If this sounds like the perfect career path for you, we welcome you to apply and become part of our inclusive, innovative GDMS family.

Frequently Asked Questions (FAQs) for Cybersecurity Engineer Role at General Dynamics Mission Systems, Inc
What are the main responsibilities of a Cybersecurity Engineer at General Dynamics Mission Systems?

As a Cybersecurity Engineer at General Dynamics Mission Systems, your core responsibilities will include assessing systems and networks, conducting Security Technical Implementation Guide (STIG) assessments, and developing system security test plans. You'll also be responsible for maintaining documentation, updating Risk Management Framework (RMF) artifacts, and aiding in the implementation of government security policies.

Join Rise to see the full answer
What qualifications are required for the Cybersecurity Engineer position at GDMS?

To qualify for the Cybersecurity Engineer position at GDMS, candidates must possess a Bachelor’s degree in Engineering, Science, or Mathematics plus 5+ years of relevant experience. Alternatively, a Master’s degree with 3 years of experience is acceptable. Additionally, a DoD Secret security clearance is required at the time of hire.

Join Rise to see the full answer
What preferred skills could enhance my application for the Cybersecurity Engineer role at GDMS?

While the essential qualifications are critical, having experience in using Security Technical Implementation Guides (STIGs), performing continuous monitoring, and deploying security software like ACAS and HBSS will significantly strengthen your application for the Cybersecurity Engineer position.

Join Rise to see the full answer
Is the Cybersecurity Engineer position at GDMS remote or on-site?

The Cybersecurity Engineer position at General Dynamics Mission Systems is an on-site role, requiring 100% physical presence at the Schriever AFB. This setup fosters collaboration and ensures a robust environment for enhancing missile defense cybersecurity.

Join Rise to see the full answer
What benefits does General Dynamics Mission Systems offer to Cybersecurity Engineers?

General Dynamics Mission Systems offers an array of competitive benefits for Cybersecurity Engineers, including 401k matching, flexible time off, paid parental leave, healthcare benefits, wellness programs, and the opportunity for continuous professional development.

Join Rise to see the full answer
Common Interview Questions for Cybersecurity Engineer
Can you describe your experience with Security Technical Implementation Guide (STIG) assessments?

When answering this question, provide specific examples of how you've utilized STIG assessments in your previous roles. Discuss the methods you employed to identify deviations in systems and how you ensured compliance, highlighting any particular challenges you faced and overcame.

Join Rise to see the full answer
What frameworks or policies have you helped implement in your cybersecurity roles?

Be ready to discuss your familiarity with government security policies like NISPOM or NIST. Provide examples of your experience implementing these frameworks in past positions and explain the impact of your contributions on organizational security.

Join Rise to see the full answer
How do you perform vulnerability assessments and manage risks?

A good response would include outlining a step-by-step approach you take for vulnerability assessments. Mention any tools you’ve used, the frequency of assessments, and how the results were communicated and acted upon to reduce risk effectively.

Join Rise to see the full answer
What methods do you use to ensure compliance with security requirements?

Talk about methodologies such as regular audits, the use of compliance checklists, and ongoing monitoring tools. Highlight any experiences where your proactive measures led to successful compliance during assessments.

Join Rise to see the full answer
How do you stay updated on cybersecurity trends and best practices?

Discuss the specific resources you utilize, such as reputable cybersecurity journals, online forums, professional networks, and certifications. This shows that you are committed to personal growth in the evolving field of cybersecurity.

Join Rise to see the full answer
Describe a challenging security-related problem you faced and how you solved it.

Use the STAR method (Situation, Task, Action, Result) to narrate a specific instance. Highlight your problem-solving skills and how your actions directly contributed to safeguarding the organization's assets.

Join Rise to see the full answer
What experience do you have with system administration for Windows or RHEL?

In your response, detail the specific tasks you have performed in system administration for both Windows and RHEL environments. Discuss user account management, security group configurations, and any security software you have managed or installed.

Join Rise to see the full answer
What is your experience with continuous monitoring in a cybersecurity context?

Share examples of how you've implemented continuous monitoring practices. Discuss the tools you’ve used and how this initiative helped detect vulnerabilities faster, thus reinforcing security defenses.

Join Rise to see the full answer
How do you prepare documentation needed for risk management?

Emphasize your organizational skills. Discuss your systematic approach to preparing documentation such as Risk Management Framework artifacts and how this contributes to seamless security assessments and authorizations.

Join Rise to see the full answer
What tools and software are you familiar with in cybersecurity?

Provide an overview of tools you’ve used, such as ACAS, Fortify, and static/dynamic code scanning utilities. Discuss your level of expertise with each tool and how they enhance your efficiency in cybersecurity practices.

Join Rise to see the full answer
MATCH
Calculating your matching score...
FUNDING
SENIORITY LEVEL REQUIREMENT
TEAM SIZE
No info
HQ LOCATION
No info
EMPLOYMENT TYPE
Full-time, on-site
DATE POSTED
March 27, 2025

Subscribe to Rise newsletter

Risa star 🔮 Hi, I'm Risa! Your AI
Career Copilot
Want to see a list of jobs tailored to
you, just ask me below!