8 total openings!!
4 focusing within Compliance and Analysis
4 focusing within Design and Development
Position Title: Cyber Security Engineer
Location: Ft. Worth, TX (relocation provided if needed)
Direct Hire
Salary:
Level 2 Engineer is 2 - 6 years of exp – $101,000 to $111,000
Level 3 Engineer is 6 - 11 years - $128,000 to $140,000
Level 4 Engineer is 11 - 20 years – $157,000 to $172,000
Level 5 Engineer is 20+ years – $191,000 to $205,000
Desired Skill Set:
- At least 2 years of experience in product cyber design and implementation in industries such as automotive, industrial aviation, aerospace or embedded systems
- Must have experience working in a NIST compliance model (ideally NIST SP 800-37/53/160v2 RMF publications, but greatly prefer those with have in depth knowledge of NIST SP800 standards)
- Experience developing, communicating and implementing cyber design solutions based on security requirements and system specifications
- Experience with implementation of one or more of the following areas: device authentication, embedded cross domain solutions, tactical cryptographic key management, or imbedded intrusion protection/detection systems
- Must possess at least a Sec+ or any IAT level I certification (Sec+ CE, CAP, CSSLP etc.)
Plusses:
- 2+ years RMF/DIACAP experience
- Previous experience working in an Aerospace and Defense environments
Education:
- Bachelor’s Degree is required
- Here are the preferred technical disciplines (Electrical/Electronic Engineering (EE), Electronic Engineering in Technology (EET), Computer Science, and/or Cyber Security or similar technical bachelor’s degree).
Day to Day:
A fortune 500 aerospace and defense client is looking for Product Cybersecurity Engineer's to join their team in Fort Worth, TX. The ideal candidate is able to engage in the flight controls, avionics, or mission system architecture development and influence design for cyber security. You will be responsible to conduct analytics of design options, identify risks and mitigation steps. While working in the clients state of the art system integrated labs (SILs), you will own the vulnerability analysis. The ideal candidate must have experience with implementation of one or more of the following areas: device authentication, embedded cross domain solutions, tactical cryptographic key management, or embedded intrusion protection/detection systems.