Let’s get started
By clicking ‘Next’, I agree to the Terms of Service
and Privacy Policy
Jobs / Job page
Cybersecurity Engineer (Mid) (Cleared) image - Rise Careers
Job details

Cybersecurity Engineer (Mid) (Cleared)

Thank you for considering IT Concepts dba Kentro, where innovation drives opportunity and collaboration leads to success. Our dynamic community of experts is fully committed to advancing our customers' missions, fostering professional growth, and making a positive impact on our communities.                                                

Our transition to Kentro in 2025 reflects a rich legacy built upon the foundation of IT Concepts. Rather than leaving ITC behind, we confidently embrace a future centered around the Core of More. By joining our supportive community, you will find that Kentro is dedicated to your personal and professional development. Together, we can drive meaningful change, spark innovation, and achieve extraordinary milestones.

Kentro is hiring for a Cybersecurity Engineer to support the National Geospatial-Intelligence Agency.

Responsibilities:

  • Develop, write, and maintain a formal Information Systems Security Program (ISSP) that includes all applicable security Information Systems (IS) documentation in accordance with standards and protocols.
  • Conduct periodic reviews to ensure compliance with the SSP. Adopt and maintain a customer notification and enforcement process for implementing IS security policy changes.
  • Ensure configuration management (CM) for security-relevant software, hardware, and firmware is maintained and documented.
  • Ensure the development of system assessment documentation by reviewing and endorsing such documentation and recommending action to the Authorizing Official/Delegated Authorizing Official (AO/DAO).
  • Ensure approved procedures are in place for clearing, purging, declassifying, and releasing system memory, media, and output and provide procedures.
  • Develop, review, and update procedures for responding to security incidents and for investigating and reporting.
  • Ensure proper protection or corrective measures have been taken when an incident or vulnerability has been discovered.
  • Ensure data ownership and responsibilities are established.
  • Develop, implement, review, and update procedures for authorizing the use of software, hardware, and firmware on the system.
  • Evaluate and/or create and staff, as needed, system security plans (SSPs), System Security Authorization Agreements (SSAAs), CONOPS, ISA, MOU/A, network and system diagrams, Security Requirement Traceability Matrixes (SRTMs), and other documentation.
  • Test and enforce IS security policies. Specifically: Perform tests and scans, using client-accepted scanning tools (software and hardware), used either remotely or locally on the systems to ensure compliance and to identify security holes, risks, threats, and gaps.
  • Perform vulnerability assessments, determine residual security risks, prepare assessment test finding reports, and provide formal authorization recommendations.
  • Provide Data Transfer Officer (DTO) duties as needed.

Location: onsite in Springfield, VA. It may require some travel to Bluemont, VA.

  • Bachelor's degree in Cybersecurity or related technical field.
  • 5-9 years of experience in cybersecurity.
  • Valid certification to meet DoDI 8570.01-M and DoDD 8140.01 Level II requirements.
  • Demonstrated experience with Risk Management Framework assessment and authorization activities and processes.
  • Demonstrated experience with vulnerability management.
  • Demonstrated understanding of cybersecurity best practices.
  • Demonstrated technical understanding of physical, virtualized, and cloud computing.
  • Demonstrated understanding of computer networking.

Preferred Skills:

  • Ability to effectively communicate cybersecurity concepts to partners, stakeholders, and customers.

Clearance requirements:

  • Must have an active DOD TS/SCI at the time of hire, and willing/able to get CI Polygraph

The Company

We believe in generating success collaboratively, enabling long-term mission success, and building trust for the next challenge. With you as our partner, let’s solve challenges, think innovatively, and maximize impact. As a valued member of our team, you have the unique opportunity to work in a diverse range of technology and business career paths, all while supporting our nation and delivering innovative technology solutions. We are a close community of experts that pride ourselves on creating an environment defined by teamwork, dedication, and excellence.

We hold three ISO certifications (27001:2013, 20000-1:2011, 9001:2015) and two CMMI ML 3 ratings (DEV and SVC).

Industry Recognition

Growth | Inc 5000’s Fastest Growing Private Companies, DC Metro List Fastest Growing; Washington Business Journal: Fastest Growing Companies, Top Performing Small Technology Companies in Greater D.C.

Culture | Northern Virginia Technology Council Tech 100 Honoree; Virginia Best Place to Work; Washington Business Journal: Best Places to Work, Corporate Diversity Index Winner – Mid-Size Companies, Companies Owned by People of Color; Department of Labor’s HireVets for our work helping veterans transition; SECAF Award of Excellence finalist; Victory Military Friendly Brand; Virginia Values Veterans (V3); Cystic Fibrosis Foundation Corporate Breath Award

Benefits

We offer competitive benefits package including paid time off, healthcare benefits, supplemental benefits, 401k including an employer match, discount perks, rewards, and more.  We invest in our employees – Every employee is eligible for education reimbursement for certifications, degrees, or professional development.  Reimbursement amounts may fluctuate due to IRS limitations. We want you to grow as an expert and a leader and offer flexibility for you to take a course, complete a certification, or other professional growth and networking. We are committed to supporting your curiosity and sustaining a culture that prioritizes commitment to continuous professional development.

We work hard; we play hard. Kentro is committed to incorporating fun into every day. We dedicate funds for activities – virtual and in-person – e.g., we host happy hours, holiday events, fitness & wellness events, and annual celebrations. In alignment with our commitment to our communities, we also host and attend charity galas/events. We believe in appreciating your commitment and building a positive workspace for you to be creative, innovative, and happy.

Commitment Equal Opportunity Employment & VEVRAA

Kentro is an equal opportunity employer.  All qualified applicants will receive consideration for employment without regard to disability, status as a protected veteran or any other status protected by applicable federal, state or local law.

Kentro is strongly committed to compliance with VEVRAA and other applicable federal, state, and local laws governing equal employment opportunity. We have developed comprehensive policies and procedures to ensure our hiring practices align with these requirements.

As part of our VEVRAA compliance efforts, Kentro has established an equal opportunity plan outlining our commitment to recruiting, hiring, and advancing protected veterans. This plan is regularly reviewed and updated to ensure its effectiveness.

We encourage protected veterans to self-identify during the application process. This information is strictly confidential and will only be used for reporting and compliance purposes as required by law. Providing this information is voluntary and will not impact your employment eligibility.

Our commitment to equal employment opportunity extends beyond legal compliance. We are dedicated to fostering an inclusive workplace where all employees, including protected veterans, are treated with dignity, respect, and fairness.

How to Apply

To apply to Kentro Positions- Please click on the: “Apply for this Job” button at the bottom of this Job Description or the button at the top: “Application.”  Please upload your resume and complete all the application steps. You must submit the application for Kentro to consider you for a position.  If you need alternative application methods, please email careers@kentro.us and request assistance.  

Accommodations

To perform this job successfully, an individual must be able to perform each essential duty satisfactorily. Reasonable Accommodations may be made to enable qualified individuals with disabilities to perform the essential functions. If you need to discuss reasonable accommodations, please email careers@kentro.us.  

#ITCCAREERS #LI-SS1

Average salary estimate

$105000 / YEARLY (est.)
min
max
$90000K
$120000K

If an employer mentions a salary or salary range on their job, we display it as an "Employer Estimate". If a job has no salary data, Rise displays an estimate if available.

What You Should Know About Cybersecurity Engineer (Mid) (Cleared), Kentro

Join the innovative team at Kentro as a Cybersecurity Engineer (Mid) and play a vital role in advancing the mission of the National Geospatial-Intelligence Agency. At Kentro, we pride ourselves on our commitment to professional growth and making a meaningful impact in our community. In this position, you will develop and maintain the Information Systems Security Program, ensuring all security documentation aligns with established standards. You'll monitor compliance and implement security policies, conduct vulnerability assessments, and maintain configuration management for security-relevant systems. Collaborating with a dynamic team, you'll assess security risks, recommend corrective actions, and communicate key cybersecurity concepts to stakeholders. If you have a passion for safeguarding information systems and an active DOD TS/SCI clearance, we'd love to hear from you! Kentro offers a range of competitive benefits, including education reimbursement and opportunities for personal and professional development, creating an ideal environment for those looking to grow their career in cybersecurity. Let's work together to solve challenges and drive innovation in a supportive and engaging atmosphere.

Frequently Asked Questions (FAQs) for Cybersecurity Engineer (Mid) (Cleared) Role at Kentro
What are the main responsibilities of a Cybersecurity Engineer at Kentro?

As a Cybersecurity Engineer at Kentro, your main responsibilities include developing and maintaining an Information Systems Security Program, ensuring all security documentation is current and compliant. You'll conduct reviews, maintain configuration management, and oversee security incident responses, ensuring effective procedures are in place to handle vulnerabilities. You'll also coordinate with teams to perform vulnerability assessments and prepare reports that guide the security posture of our systems.

Join Rise to see the full answer
What qualifications are needed for the Cybersecurity Engineer (Mid) position at Kentro?

To qualify for the Cybersecurity Engineer (Mid) position at Kentro, you should hold a Bachelor's degree in Cybersecurity or a related field, along with 5-9 years of relevant experience. An active DOD TS/SCI clearance is required at the time of hire, and you must meet Level II certification requirements per DoDI 8570.01-M and DoDD 8140.01. Experience with Risk Management Framework processes and a strong understanding of cybersecurity best practices will greatly benefit candidates.

Join Rise to see the full answer
How does Kentro support professional development for Cybersecurity Engineers?

Kentro is committed to the growth of its Cybersecurity Engineers through a comprehensive benefits package that includes education reimbursement for certifications and degrees. Employees are encouraged to pursue professional development opportunities that enhance their skill sets and expand their career paths within the company. We believe in nurturing talent and providing flexibility for our team members to achieve their professional goals.

Join Rise to see the full answer
What is the work environment like for Cybersecurity Engineers at Kentro?

The work environment for Cybersecurity Engineers at Kentro is collaborative and community-oriented. We pride ourselves on fostering a positive workspace where teamwork and innovation thrive. Employees engage in various activities, from virtual happy hours to fitness events, creating a balance between professionalism and a fun, inclusive workplace. As a part of our team, you'll be supported in your endeavors while also contributing to meaningful projects.

Join Rise to see the full answer
What types of projects will I work on as a Cybersecurity Engineer at Kentro?

As a Cybersecurity Engineer at Kentro, you will work on crucial projects that enhance the security posture of the National Geospatial-Intelligence Agency's systems. This will involve developing security protocols, conducting vulnerability assessments, and implementing security policies. You’ll also collaborate with various teams to create documentation that supports system security and manages risks effectively.

Join Rise to see the full answer
Common Interview Questions for Cybersecurity Engineer (Mid) (Cleared)
Can you explain your experience with the Risk Management Framework?

It's essential to provide a clear overview of your experience with the Risk Management Framework. Focus on specific assessments you've executed, how you ensured compliance, and any tools or methodologies you used during the process. Make sure to highlight your understanding of the overall framework and how it applies to maintaining security standards effectively.

Join Rise to see the full answer
How do you stay current with cybersecurity threats and best practices?

Discuss your methods for staying informed about cybersecurity threats, such as following industry news, attending conferences, or participating in professional organizations. Provide examples of how you have applied new knowledge or techniques to your work, demonstrating your commitment to continuous learning and adaptation in this fast-evolving field.

Join Rise to see the full answer
Describe a time you had to deal with a cybersecurity incident.

Share a specific incident where you played a key role in managing a cybersecurity event. Detail the steps you took to identify the issue, mitigate the risks, and communicate with stakeholders. Emphasize your problem-solving skills and any lessons learned that improved security protocols afterward.

Join Rise to see the full answer
What strategies do you use for vulnerability assessments?

Outline the strategies you typically employ for conducting vulnerability assessments. Discuss specific tools you use and how you prioritize assessment findings. It's beneficial to mention your approach to mitigating identified vulnerabilities and collaborating with teams to ensure robust security measures are implemented.

Join Rise to see the full answer
How would you communicate complex cybersecurity concepts to non-technical stakeholders?

Highlight your ability to simplify complex technical language into terms that non-technical stakeholders can understand. Illustrate this response with specific examples of past experiences where you successfully communicated cybersecurity risks and strategies, ensuring that stakeholders were informed and engaged in decision-making.

Join Rise to see the full answer
What do you consider the most critical aspects of information security?

Identify the key aspects of information security you believe are vital, such as data protection, user awareness, and regulatory compliance. Provide your reasoning for why you prioritize these areas and how you’ve demonstrated their importance in your previous roles.

Join Rise to see the full answer
How do you handle competing priorities in your work as a Cybersecurity Engineer?

Explain your time management strategies that help you balance competing priorities. Give examples of scenarios where you successfully juggled multiple projects or deadlines while ensuring quality and adherence to security protocols, demonstrating your organizational skills.

Join Rise to see the full answer
Can you explain the concept of least privilege and why it’s important?

Discuss least privilege as a principle that limits user access only to the resources necessary for their job functions. Emphasize its importance in reducing the attack surface and preventing potential vulnerabilities, providing examples of how you have applied this concept in past positions.

Join Rise to see the full answer
What experience do you have with configuration management in cybersecurity?

Specify your experience with configuration management, including tools and methodologies you've used. Explain how effective configuration management contributes to maintaining security across software and hardware systems, focusing on your direct role in implementing and monitoring these practices.

Join Rise to see the full answer
What would you do if you discovered a security gap in your organization's systems?

Outline the steps you would take upon discovering a security gap, such as conducting a thorough analysis, assessing the risk, and developing a remediation plan. Emphasize the importance of transparency and collaboration with relevant teams to address the vulnerability swiftly and effectively.

Join Rise to see the full answer
Similar Jobs

IT Concepts, soon to be Kentro, is looking for a driven Senior BPR Consultant dedicated to improving HR processes and driving organizational efficiency.

Photo of the Rise User

Join UNLV's Information Technology team as an Associate/Journey Salesforce Developer to enhance processes through innovative Salesforce solutions.

Photo of the Rise User
Posted 5 days ago

CIBC seeks a Senior Infrastructure Engineer with strong Windows and Linux administration experience to support their innovative banking solutions.

Photo of the Rise User

As a Solution Architect at NewRocket, you'll lead the delivery of innovative ServiceNow solutions while being part of a diverse and inclusive team.

Photo of the Rise User
Inclusive & Diverse
Rise from Within
Mission Driven
Diversity of Opinions
Work/Life Harmony
Take Risks
Casual Dress Code
Startup Mindset
Emails over Meetings
Collaboration over Competition
Fast-Paced
Growth & Learning
Medical Insurance
Paid Time-Off
Maternity Leave
Mental Health Resources
Equity
WFH Reimbursements
Some Meals Provided
Snacks
Onsite Cafeteria
Social Gatherings
Dental Insurance
Vision Insurance

Become a crucial member of CrowdStrike's team as a Senior Threat Hunting Intelligence Analyst committed to enhancing cybersecurity through advanced threat intelligence.

Photo of the Rise User
RepRisk AG Remote Zürich, Switzerland
Posted 14 days ago

Join RepRisk as a Cloud & DevOps Engineer to innovate and optimize cloud operations in a mission-driven environment.

Photo of the Rise User

Join Aetos Systems, Inc. as a Senior Information System Security Officer (ISSO) to lead and enhance the security posture of information systems.

Photo of the Rise User

Join HealthPartners as an IT Business Analyst focused on optimizing Marketing and Sales Systems in a collaborative, inclusive setting.

Photo of the Rise User
KU Endowment Hybrid Lawrence, Kansas, United States
Posted 9 days ago

Join KU Endowment as a Scrum Master to empower fundraising efforts through effective project management and collaboration in a nonprofit environment.

MATCH
Calculating your matching score...
FUNDING
SENIORITY LEVEL REQUIREMENT
TEAM SIZE
No info
HQ LOCATION
No info
EMPLOYMENT TYPE
Full-time, on-site
DATE POSTED
April 3, 2025

Subscribe to Rise newsletter

Risa star 🔮 Hi, I'm Risa! Your AI
Career Copilot
Want to see a list of jobs tailored to
you, just ask me below!
LATEST ACTIVITY
Photo of the Rise User
Someone from OH, Cleveland just viewed Event Specialist at Marble Room
Photo of the Rise User
18 people applied to SOC Analyst I at CBIZ
Photo of the Rise User
Someone from OH, Youngstown just viewed Director, Clinical Informatics at Ro
Photo of the Rise User
Someone from OH, Dayton just viewed Shopify Specialist at Remote VA
L
Someone from OH, Dayton just viewed Mechanical Design Engineer(s) at LTTS
Photo of the Rise User
14 people applied to Junior Security Engineer at Epic
H
Someone from OH, Akron just viewed Financial Content Writer at Huntington
W
Someone from OH, Columbus just viewed Director of Regulatory Compliance - WEX Bank at WEX Inc
E
Someone from OH, Cincinnati just viewed Administrative Assistant at Elevate and Delegate