Posted 3 days ago
Top Secret
Unspecified
Unspecified
IT - Security
Tysons, VA (On-Site/Office)
OVERVIEW:
We are seeking a highly skilled Cybersecurity Engineer (CSE) with extensive experience in air-gapped and classified container platforms, CI/CD pipelines, security automation, and federal cybersecurity requirements. The ideal candidate will possess hands-on expertise in Kubernetes, OpenShift, registry management, security test automation, and the implementation of cybersecurity controls in compliance with federal standards like NIST 800-53, DISA STIGs, and RMF/ATO workflows.
A) Air-Gapped / Classified Container Platforms (Kubernetes/OpenShift/RKE2)
Designing a Disconnected Cluster Registry and Artifact Governance Admission Control & Policy Enforcement Cluster Multi-Tenancy in SCIFs Patching and CVE Response Offline
B) CI/CD & Security Test Automation (Disconnected)
Pipeline Architecture for Classified Enclaves Automated Security Testing Coverage Evidence Generation for RMF Promotion Gates & Provenance Testing for Platform + App Security Regressions
C) Federal Cybersecurity Requirements (RMF/ATO, STIGs, CNSS, FedRAMP)
RMF Tailoring in Containerized Systems DISA STIG Application to Kubernetes Workloads Continuous Monitoring (CONMON) ATO Acceleration through Automation Policy Conflicts & Adjudication
D) Networking, Identity & Zero Trust in On-Prem/Classified Enclaves
Zero Trust in Kubernetes Offline PKI Operations East-West Segmentation Strategy Identity Propagation Across Layers Cross-Domain and Data Movement Patterns
E) Operations, SRE & Incident Response in SCIFs
Observability without SaaS Break Glass & Change Control Forensics & Container Runtime Resiliency & DR in Disconnected Sites Application Team & SOC Integration
REQUIRED QUALIFICATIONS:
CLEARANCE:
We are seeking a highly skilled Cybersecurity Engineer (CSE) with extensive experience in air-gapped and classified container platforms, CI/CD pipelines, security automation, and federal cybersecurity requirements. The ideal candidate will possess hands-on expertise in Kubernetes, OpenShift, registry management, security test automation, and the implementation of cybersecurity controls in compliance with federal standards like NIST 800-53, DISA STIGs, and RMF/ATO workflows.
A) Air-Gapped / Classified Container Platforms (Kubernetes/OpenShift/RKE2)
- Design and manage a multi-container OpenShift hosted platform in an air-gapped enclave.
- Expertise in cross-domain CI/CD, blue-green testing, and platform deployment within disconnected environments.
- Familiar with image/helm/chart mirroring, FIPS 140 validated crypto, OS hardening (e.g., Alpine), and SELinux enforcing.
- Maintain and govern a disconnected container registry, ensuring content sources, image signing, SBOMs, and vulnerability gating.
- Familiarity with tools such as Cosign, Syft, Grype, Trivy, OCI level attestations, and curated repository promotions.
- Enforce security baselines and policies without internet dependencies using tools like OPA Gatekeeper, Kyverno, and image provenance verification.
- Implement RBAC, namespace isolation, and mTLS for mixed-sensitivity workloads within a SCIF (Sensitive Compartmented Information Facility).
- Manage critical Kubernetes CVEs in air-gapped enclaves through risk triage, change windows, and mirrored updates.
B) CI/CD & Security Test Automation (Disconnected)
- Design CI/CD pipelines to build, test, sign, scan, and promote containers across Dev → Test → Prod in closed networks.
- Familiarity with GitLab/Jenkins runners, artifact promotion, and "compliance as code" practices.
- Implement automated tests for SAST, DAST, IAST, SCA, and IaC scanning within CI/CD pipelines.
- Ensure pipeline failures persist if discrepancies are detected.
- Generate RMF/ATO evidence via automated pipeline outputs, mapping artifacts to NIST controls.
- Knowledge of OSCAL output, control mappings, and integration with evidence stores like eMASS.
- Ensure artifacts meet quality and security criteria (e.g., reproducible builds, signed/provenanced artifacts, passing STIG checks) before promotion to higher environments.
- Implement tests for platform upgrade regressions using tools like kube-bench, kube-hunter, and e2e integration suites.
C) Federal Cybersecurity Requirements (RMF/ATO, STIGs, CNSS, FedRAMP)
- Tailor NIST 800-53 controls for microservices platforms, identifying platform vs. app team responsibilities.
- Work with shared responsibility matrices and control inheritance catalogs.
- Apply and track Kubernetes/Docker/OpenShift STIG findings and exceptions.
- Implement a "STIG as code" approach in CI/CD pipelines and perform continuous drift checks.
- Implement telemetry collection for CONMON using on-prem tools (e.g., Prometheus, Grafana, auditd, Falco).
- Design and manage control dashboards and evidence snapshots.
- Reduce ATO lead times using automated assessments, OSCAL generation, and integration with tools like eMASS.
- Reconcile conflicts between NIST, CNSS, and program-specific directives, leveraging risk-based decision memos and compensating controls.
D) Networking, Identity & Zero Trust in On-Prem/Classified Enclaves
- Implement Zero Trust principles within Kubernetes beyond mTLS and RBAC, using tools like SPIFFE, SPIRE, and service mesh authZ.
- Manage certificate lifecycles in air-gapped environments, utilizing offline roots, short-lived certs, and mesh cert synchronization strategies.
- Design and implement micro-segmentation and egress controls for multi-tenancy within classified environments.
- Ensure identity propagation from build systems through runtime enforcement, using tools like Sigstore attestations and audit chain linking.
- Securely move artifacts across domains with tamper-evident transfer logs, hash-based validation, and offline review stations.
E) Operations, SRE & Incident Response in SCIFs
- Build observability solutions for logs, metrics, traces, and capacity planning using on-prem tools like EFK, Prometheus, and Tempo.
- Design a break-glass process with time-bound privilege elevation, session recording, and immutable logs.
- Collect forensic evidence from compromised container nodes while preserving data integrity through disk snapshots and isolated triage nodes.
- Develop strategies for service continuity across multiple isolated sites, including staged upgrades and backup/restore drills.
- Integrate containerized environments with enterprise SOC teams during incident detection, containment, and recovery.
- Define roles, telemetry requirements, and communication channels for effective response.
REQUIRED QUALIFICATIONS:
- 12 years of experience and a Masters degree. Degree can be substituted for 6 additional years of applicable experience
- IAT/IAM Level 3 Certification in compliance with DoD 8570/8140 guidelines
- Extensive experience working with Kubernetes, OpenShift, RKE2, and container registry management in air-gapped and classified environments.
- Deep understanding of CI/CD pipeline architectures, especially in disconnected networks.
- Expertise in federal cybersecurity frameworks, such as NIST 800-53, DISA STIGs, RMF, and ATO processes.
- Familiarity with security testing tools (SAST, DAST, IAST, IaC) and automated compliance validation.
- Proven track record of enforcing Zero Trust principles, PKI management, and network segmentation in a classified environment.
- Strong ability to map pipeline artifacts to RMF/ATO controls and support security operations during incidents.
- Extensive experience in cybersecurity design and architecture.
CLEARANCE:
- Top Secret minimum
group id: 90943786
N