Cyber Support Developer, Principal
ManTech
Currently, ManTech is seeking a motivated, career and customer-oriented Cyber Support Developer, Principal to join our team in the Chantilly, VA.Responsibilities include, but are not limited to: Technically integrate/tailor/engineer/design and maintain cybersecurity relevant features & capabilities using well-known windows and cloud vendor capabilities/services/platforms (e.g. Amazon Web Services, MS Azure, Oracle Cloud) and 3rd party vendor cloud products to align & support NIST cybersecurity framework (Identify, Protect, Detect, Respond, Recover) customer mission goals. Apply system security engineering expertise in one or more of the following: system security design process; engineering life cycle; information domain; cross domain solutions; commercial off-the-shelf and government off-the-shelf cryptography; identification, authentication, and authorization; system integration; risk management; intrusion detection; contingency planning; incident handling; configuration control; change management; auditing; certification and accreditation process; principles of IA (confidentiality, integrity, non-repudiation, availability, and access control); and security testing. Integrate security solutions with existing on-premises operational cybersecurity platforms (e.g. SIEM systems, elastic system, and data lake asset). Overall desire to automate sundry of cybersecurity-related workflows, develop solution patterns with cloud-managed resources & features, implement automated solution(s) where feasible related to Security-Orchestration-Automation-and-Response (SOAR), and deploy & maintain solutions enabling cyber operations monitoring teams. Provide data analytics support and data science subject matter expertise for specialized cybersecurity applications and big data analytical systems. Provide inputs, participate, and assist with architecture design and documentation. Execute between a blend of Agile, ITIL, and/or general waterfall-based delivery framework approaches depending on specific project activity or enterprise security service. As technically needed, interact with stakeholder, customer, and data consuming team(s) to turn cyber data into action with intelligent analytics and clear insights, define input requirements to support data models, and final outputs for quick analysis and summary reporting for actions. Execute and meet software programming work obligations through self-sufficient work habits, meeting deadlines, supporting required technical meetings, and assigned development work. Occasionally lead or brief in-depth technical meetings providing subject matter expertise when needed. Demonstrate ability to pivot between work assignments in a small (2-3 person), high performance team based on fast-paced customer prioritization needs.Basic Qualifications: Requires Bachelors degree or equivalent and 7 years of related experience; or masters degree with 3-5 years of experience D0D8570 certified at minimum IAT Level II Minimum of 7 years of Node.js (minimum version 12) or Python (minimum version 3.6) Minimum of 5 years of Linux scripting, Bash Minimum of 3 years of Git, Gitlab, developing with continuous integration-continuous delivery (Cl/CD) pipeline Solid foundation in software programming within Cl-CD pipeline and associated industry best-practices. Solid foundation in software programming integrating data protection / encrypt-decrypt capabilities to support data confidentiality and integrity requirements. Mature understanding of data asset types through discovery, description, and organization of datasets. Experience setting up and supporting various IDEs needed to support work tasks. Experience with installation and administration of COTS applications on RHEL and/ or CentOS Linux Ability to provide development support to the emerging requirements of event ingest and transformation into a common data schema for consistent data analytic search capabilities. Experience in design and development of Elastic Beats or Logstasll configurations to enable the data collection to either accept or extract data from an audit generation system such as an application database, file, or syslog stream. Ability to establish and implement a Data Governance Workflow focusing primarily on meta data, data sources, data quality, policies, and procedures. streamPreferred Qualifications: Developing/implementing/deploying solutions associated with: Server-less solution in Amazon Web Services (AWS) incorporating CloudFormatlon, SAM CU, lambda, Eventbridge, CloudWatch, SNS, SQS, S3, 1AM policies & roles, VPC endpoints, AWS Service-Linked Roles (SLRs) Leveraging AWS CodeBuild, CodeCommit CodeDeploy, CodePipeline AWS-managed security services (e.g. Security Hub, Config, GuardDuty, Inspector, Macie, Detective. 1AM Access-Analyzer, CloudTrail), AWS Systems Manager (SSM). AWS or Azure Solutions Architect certified. Experience with Azure Resource Manager templates, BICEP, or similar cloud templates. Experience in automation and server-less solution architecting development in Azure. Experience in automation and server-less solution architecting development in Oracle Cloud. Experience with streaming data tools and software, such as Apache or Confluent Kafka Experience with Data Integration, Data Engineering and Data Lake implementations using ETL, Big Data and Cloud Technology. Experience with JIRA Confluence Familiarity with Security Information and Event Management (SIEM) software Experience with Container Services like Docker and Kubernetes Ability to create dashboard content and visualizations to demonstrate the ability to provide actionable intelligence, e.g., leverage machine learning (ML) makes the enterprise cyber data more easily consumable, to identify uncommon characteristics of a dataset and ensure a better/fuller use of cyber dataSecurity Clearance Requirements: TS/SCI w/ CI PolygraphPhysical Requirements: Must be able to remain in a stationary position 50% Constantly operates a computer and other office productivity machineryFor all positions requiring access to technology/software source code that is subject to export control laws, employment with the company is contingent on either verifying U.S.-person status or obtaining any necessary license. The applicant will be required to answer certain questions for export control purposes, and that information will be reviewed by compliance personnel to ensure compliance with federal law. ManTech may choose not to apply for a license for such individuals whose access to export-controlled technology or software source code may require authorization and may decline to proceed with an applicant on that basis alone.ManTech International Corporation, as well as its subsidiaries proactively fulfills its role as an equal opportunity employer. We do not discriminate against any employee or applicant for employment because of race, color, sex, religion, age, sexual orientation, gender identity and expression, national origin, marital status, physical or mental disability, status as a Disabled Veteran, Recently Separated Veteran, Active-Duty Wartime or Campaign Badge Veteran, Armed Forces Services Medal, or any other characteristic protected by law.If you require a reasonable accommodation to apply for a position with ManTech through its online applicant system, please contact ManTechs Corporate EEO Department at (703) 218-6000. ManTech is an affirmative action/equal opportunity employer – minorities, females, disabled and protected veterans are urged to apply. ManTechs utilization of any external recruitment or job placement agency is predicated upon its full compliance with our equal opportunity/affirmative action policies. ManTech does not accept resumes from unsolicited recruiting firms. We pay no fees for unsolicited services.If you are a qualified individual with a disability or a disabled veteran, you have the right to request an accommodation if you are unable or limited in your ability to use or access http://www.mantech.com/careers/Pages/careers.aspx as a result of your disability. To request an accommodation please click careersmantech.com and provide your name and contact information.