Information System Security Engineer #4419


  • US-AL-Huntsville
  • Cybersecurity & Intelligence
Apply Now
Company Overview

GovCIO is a team of transformers–people who are passionate about transforming government I.T. We believe in making a difference by developing digital strategies and delivering the technology-related innovation governmental operations that improve the citizen experience every day.


The ideal candidate will be responsible for:


  • The contractor shall assist the government to build a cybersecurity engineering framework designed to complement and enhance the Security Assessment and Authorization (SAA) process
  • The contractor shall provide subject matter and industry expertise and assist our client with standards identification
  • The contractor shall advise on and assist the government with Amazon Web Services (AWS) best practices implementation
  • The contractor shall assist with management of vendor relationships to ensure our client security posture goals are met
  • The contractor shall analyze computer networks, identify possible issues, and assist the government to design solutions
  • The contractor shall gain a strong working knowledge of our client security architecture and policy to design systems that meet or exceed requirements
  • The contractor shall communicate technical requirements to technical and non-technical personnel, partner with IT developers and project managers to represent security requirements, and leverage threat intelligence to assist the government in modifying designs and plans to counter such threats
  • The contractor shall recommend security enhancements to our client managers, install and use firewalls and data encryption programs, review systems designs for flaws or risks, build and deploy security infrastructure and automate enterprise security operations, assist the government with internal build projects, develop technical content such as automation tools; reference architectures; and white papers, architect and develop customer applications for cloud optimization, provide software development subject matter expertise with respect cloud architecture, design patterns, and programming


  • Bachelor’s with 8+ years (or commensurate experience)
  • A bachelor’s degree in Computer Science, Information Systems Management, Information Security or related discipline is preferred.
  • 8+ years of experience providing information assurance support for enterprise level IT projects.  
  • Demonstrated experience in application development and cybersecurity.
  • Demonstrated experience implementing DevOps practices such as infrastructure as code, continuous integration, and automated deployment.
  • 8+ years of an application programming and/or hands-on technical application architecture experience.
  • 5+ years of experience in an IT security audit, assessment, compliance, risk management, or data privacy role.
  • 3+ years of experience assessing/auditing customers on PCI DSS, ISO 27001, HIPAA, HITRUST, FedRAMP, FISMA or NIST/DoD frameworks.
  • Certified Information Systems Security Professional (CISSP).  

All personnel assigned under this task order must possess current TS clearances and maintain them throughout the life of the contract. Personnel must be SCI eligible

But we can’t do it alone. We welcome and nurture an inclusive and diversified work culture. Because different backgrounds, experiences, abilities, and perspectives make us better decision-makers, problem solvers, and creators. We’re changing the face of I.T. – from our diverse staff to the end-products we develop. And we’re excited to expand our team. Are you ready to be a transformer?


Correlates threat data from various sources to establish the identity and modus operandi of hackers active in client’s networks and posing a potential threat. Provides the customer with assessments and reports facilitating situational awareness and understanding of current cyber threats and adversaries. Develops cyber threat profiles based on geographic region, country, group, or individual actors. Produces cyber threat assessments based on entity threat analysis. May provide computer forensic and intrusion support to high technology investigations in the form of computer evidence seizure,computer forensic analysis, data recovery, and network assessments. Researches and maintains proficiency in tools, techniques, countermeasures, and trends in computer network vulnerabilities, data hiding and network security and encryption.

1.Collaborates with intrusion analysts to identify, report on, and coordinate remediation of cyber threats to the client.
2.Provides timely and actionable sanitized intelligence to cyber incident response professionals.
3.Leverages technical knowledge of computer systems and networks with cyber threat information to assess the client’s security posture.
4.Conducts intelligence analysis to assess intrusion signatures, tactics, techniques and procedures associated with preparation for and execution of cyber attacks.
5.Researches hackers, hacker techniques, vulnerabilities, exploits, and provides detailed briefings and intelligence reports to leadership.


Bachelor’s with 8+ years (or commensurate experience)

COVID Policy: New employees will be required to adhere to the Company’s and its clients’ COVID-19 safety procedures. In the event that the COVID-19 vaccination mandate for Federal Contractors is enforced, you must become fully vaccinated or request and be approved for an exemption. Employees working onsite at a client location must comply with our client’s COVID-19 requirements.


GovCIO is a team of professionals who want to make a difference. And that can only happen with a diverse, happy, and cared-for team. So, we prioritize your well-being, equity for all and look for ways to make work a better place for each of us every day.


We are an Equal Opportunity Employer. All qualified applicants receive consideration for employment without regard to race, ethnicity, religious affiliation, gender, gender identity or expression, sexual orientation, national origin, or disability status.
Apply Now

Not The Right Fit?

Is this not the job you’re looking for? That’s ok! We’ve got plenty of other opportunities for you to peruse. Search all of our open positions by your area of interest or location.

View All Jobs