Posted today
Public Trust
$160,000 - $180,000
Unspecified
IT - Software
Remote/Hybrid• (Off-Site/Hybrid)
Piper Companies is currently looking for an CAASM Systems Engineer to work remotely for an established managed services provider, responsible for designing, building, deploying, operating, and maintaining a complete Data Services solution. This candidate will be required to obtain a public trust clearance.
Responsibilities for the CAASM Systems Engineer:
Qualifications for the CAASM Systems Engineer:
Compensation for the CAASM Systems Engineer:
This job opens for applications on 2/9/26. Applications for this job will be accepted for at least 30 days from the posting date
#LI-BM2
#LI-REMOTE
Systems engineering, Cyber systems engineering, CAASM, Cyber Asset Attack Surface Management, Asset visibility, Asset inventory, Enterprise asset management, Authoritative data sources, Data normalization, Data correlation, Data enrichment, Data ingestion pipelines, API integration, Systems integration, Toolchain integration, Configuration management, Configuration baseline, Configuration drift, Asset attribution, Asset correlation logic, Entity resolution, Identity resolution, Systems-of-systems engineering, Enterprise architecture, Technical architecture, Logical architecture, Physical architecture, Cyber terrain mapping, Attack surface mapping, Digital terrain analysis, Asset discovery, Continuous asset discovery, Passive discovery, Active scanning integration, Network topology mapping, Dependency mapping, System interdependencies, Service mapping, Application dependency mapping, Infrastructure dependency mapping, Cloud asset visibility, Hybrid environment visibility, On-premises asset tracking, SaaS asset management, IaaS asset management, PaaS asset management, Container visibility, Kubernetes asset mapping, Virtual machine inventory, Endpoint visibility, Mobile asset tracking, IoT asset awareness, OT asset visibility, Shadow IT discovery, Asset ownership attribution, Business service alignment, Mission-to-system mapping, System criticality scoring, Asset criticality assessment, Risk-based prioritization, Threat exposure analysis, Vulnerability correlation, Vulnerability context enrichment, CVE correlation, Exploitability assessment, Threat intelligence integration, Attack path analysis, Kill chain mapping, MITRE ATT&CK alignment, Control coverage analysis, Control effectiveness assessment, Security control mapping, Defense-in-depth validation, Zero Trust architecture alignment, Continuous authorization, Continuous monitoring, Near-real-time telemetry, Event correlation, Signal fusion, Data confidence scoring, Data quality management, Data lineage tracking, Source-of-truth reconciliation, Asset lifecycle management, Asset onboarding, Asset decommissioning, Configuration item management, CMDB augmentation, CMDB validation, CMDB reconciliation, Model-based systems engineering, System modeling, Architectural modeling, Digital engineering, Systems lifecycle engineering, Requirements traceability, Security requirements engineering, Cyber requirements validation, Compliance engineering, Control compliance mapping, Policy-to-control mapping, Framework alignment, NIST framework mapping, RMF integration, Authority to Operate support, Risk management integration, Continuous risk assessment, Operational risk engineering, Resilience engineering, Cyber resilience assessment, Fault tolerance analysis, Single point of failure identification, Mission assurance, Mission impact analysis, Business impact analysis, Cyber mission engineering, Operational readiness assessment, Exposure management, Attack surface reduction, Engineering risk tradeoffs, Performance engineering, Scalability engineering, Reliability engineering, Availability engineering, Observability integration, Telemetry aggregation, Log source correlation, Sensor integration, Automation engineering, Workflow orchestration, Event-driven architecture, Rule-based correlation, Graph-based modeling, Knowledge graph engineering, Asset relationship graphs, Systems data fusion, Cross-domain integration, Security data fabric, Enterprise cyber visibility, Decision-support engineering, Engineering dashboards, Executive reporting pipelines, Engineering metrics, Key risk indicators, Key performance indicators, Continuous improvement engineering
Responsibilities for the CAASM Systems Engineer:
- Configuring and managing CAASM instances (Axonius and Armis) in non-production and production environments; configuring adaptors to collect asset and user data from cyber tools, sensors, and other sources
- Working closely with architects, engineers, and integrators to assess customer requirements and to design and support CAASM instance configurations in compliance with CDM data requirements
- Provide advanced technical support for RESTful API integrations, including interpreting OpenAPI specifications, tracing requests using tools like Postman, and effectively handling HTTP methods (GET, POST, etc.), status codes (e.g., 202, 401), request bodies, parameters, and headers
- Securing the solution using TLS, certificates, SSO/PIV authentication, and encryption technologies
Qualifications for the CAASM Systems Engineer:
- Bachelor's degree and 6+ years experience in the field preferred
- 6+ years architecting, implementing, integrating, and managing COTS products in a regulated production environment (Axonius/Armis preferred)
- 4+ years performing systems administration in Windows, Linux, or VMware environments, including performing basic troubleshooting, installation, configuration, monitoring system performance or availability, and performing security upgrades
- 3+ years of hands-on programming and debugging (Python, GO or Java), shell scripting, application containerization, data storage and retrieval from a variety of sources (ex. REST APIs)
- 2+ years experience with data ingest and Extract, Transform, and Load (ETL) techniques using COTS Products (Axonius/Armis preferred)
Compensation for the CAASM Systems Engineer:
- Salary Range: $160,000-180,000 (depending on experience)
- Comprehensive benefit package; Cigna Medical, Cigna Dental, Vision, 401k w/ ADP, PTO, paid holidays, sick Leave as required by law
This job opens for applications on 2/9/26. Applications for this job will be accepted for at least 30 days from the posting date
#LI-BM2
#LI-REMOTE
Systems engineering, Cyber systems engineering, CAASM, Cyber Asset Attack Surface Management, Asset visibility, Asset inventory, Enterprise asset management, Authoritative data sources, Data normalization, Data correlation, Data enrichment, Data ingestion pipelines, API integration, Systems integration, Toolchain integration, Configuration management, Configuration baseline, Configuration drift, Asset attribution, Asset correlation logic, Entity resolution, Identity resolution, Systems-of-systems engineering, Enterprise architecture, Technical architecture, Logical architecture, Physical architecture, Cyber terrain mapping, Attack surface mapping, Digital terrain analysis, Asset discovery, Continuous asset discovery, Passive discovery, Active scanning integration, Network topology mapping, Dependency mapping, System interdependencies, Service mapping, Application dependency mapping, Infrastructure dependency mapping, Cloud asset visibility, Hybrid environment visibility, On-premises asset tracking, SaaS asset management, IaaS asset management, PaaS asset management, Container visibility, Kubernetes asset mapping, Virtual machine inventory, Endpoint visibility, Mobile asset tracking, IoT asset awareness, OT asset visibility, Shadow IT discovery, Asset ownership attribution, Business service alignment, Mission-to-system mapping, System criticality scoring, Asset criticality assessment, Risk-based prioritization, Threat exposure analysis, Vulnerability correlation, Vulnerability context enrichment, CVE correlation, Exploitability assessment, Threat intelligence integration, Attack path analysis, Kill chain mapping, MITRE ATT&CK alignment, Control coverage analysis, Control effectiveness assessment, Security control mapping, Defense-in-depth validation, Zero Trust architecture alignment, Continuous authorization, Continuous monitoring, Near-real-time telemetry, Event correlation, Signal fusion, Data confidence scoring, Data quality management, Data lineage tracking, Source-of-truth reconciliation, Asset lifecycle management, Asset onboarding, Asset decommissioning, Configuration item management, CMDB augmentation, CMDB validation, CMDB reconciliation, Model-based systems engineering, System modeling, Architectural modeling, Digital engineering, Systems lifecycle engineering, Requirements traceability, Security requirements engineering, Cyber requirements validation, Compliance engineering, Control compliance mapping, Policy-to-control mapping, Framework alignment, NIST framework mapping, RMF integration, Authority to Operate support, Risk management integration, Continuous risk assessment, Operational risk engineering, Resilience engineering, Cyber resilience assessment, Fault tolerance analysis, Single point of failure identification, Mission assurance, Mission impact analysis, Business impact analysis, Cyber mission engineering, Operational readiness assessment, Exposure management, Attack surface reduction, Engineering risk tradeoffs, Performance engineering, Scalability engineering, Reliability engineering, Availability engineering, Observability integration, Telemetry aggregation, Log source correlation, Sensor integration, Automation engineering, Workflow orchestration, Event-driven architecture, Rule-based correlation, Graph-based modeling, Knowledge graph engineering, Asset relationship graphs, Systems data fusion, Cross-domain integration, Security data fabric, Enterprise cyber visibility, Decision-support engineering, Engineering dashboards, Executive reporting pipelines, Engineering metrics, Key risk indicators, Key performance indicators, Continuous improvement engineering
group id: 10430981