Posted today
Secret
Mid Level Career (5+ yrs experience)
$125,000 - $145,000
IT - Security
Radford, VA (Off-Site/Hybrid)
- Company: IBM
- Location: Radford, VA - can live within 4 hours of location and work hybrid 2-3 days onsite, at minimum 1 week per month, sometimes for 3 weeks per month or 2-3 days onsite. Travel expenses will be reimbursed.
- Clearance: Secret
- Duration: 1 year contract, most likely to extend up to 5 years
Required Skills & Experience
• Expertise in securing Kubernetes clusters and containerized workloads.
• Experience with Kubernetes-native security tools, such as Kube-Bench, Kube-Hunter, Falco, or similar.
• Proficiency in container image scanning tools (e.g., Trivy, Clair, Anchore) and VM scanning tools like ACAS and AESS.
• Knowledge of Infrastructure as Code (IaC) scanning tools (e.g., Checkov, KubeLinter, Polaris).
• Experience with runtime security tools (e.g., Falco, Sysdig Secure, Aqua Security).
• Familiarity with DevSecOps frameworks and integrating security tools into CI/CD pipelines.
• Experience implementing and monitoring RBAC, Pod Security Standards (PSS), and network policies in Kubernetes.
• Familiarity with compliance frameworks such as CIS Benchmarks, NIST 800-53, and PCI DSS.
• Experience implementing, tuning, and monitoring SIEM solutions (e.g., Splunk, Elasticsearch).
• Strong understanding of common cyber threat patterns, indicators of compromise, and defenses.
• Proficiency in automation tools like Ansible, Terraform, and scripting languages (e.g., Python, Bash).
Desired Skills:
• Working knowledge of DoD STIGs, and IA Vulnerability Management (IAVM).
• Basic understanding of DOD Risk Management Framework Assessment & Authorization (RMF A&A).
Required Certifications:
· DoD 8140 Cybersecurity ISSM (722 role or similar)
§ Resource must possess Baseline certification as defined in DoD Instruction 8570.01-M (generally Security+ CE).
· Must have (or obtain within 6 months of hire) a computing environment certification as defined in DoD 8570.01-M, such as:
§ Certified Kubernetes Security Specialist (CKS)
§ Certified Kubernetes Administrator (CKA)
§ Red Hat Certified Specialist in OpenShift Administration
§ Cloud Native Security Certification (CNSC)
§ GIAC Kubernetes and Cloud Security (GCKS)
§ AWS Certified Security – Specialty
§ Microsoft Certified: Azure Security Engineer Associate
§ Any other related certification to the role of this position
Job Description
Insight Global is seeking a Cybersecurity Engineer supporting a Federal Government Project for the DoD. This project is a containerized, Kubernetes-based, multitenant hosting environment for hosting Army enterprise and tactical applications. They are utilizing Kubernetes and potentially Red Hat OpenShift to implement a cloud-native, software-defined infrastructure across multiple global sites . The client provides value-added common and managed services built on top of the Kubernetes foundation that hosted Army applications will require. The client is a managed service provider (MSP) and hosting services provider for Army applications.
Position Duties:
• Deploy, configure, and manage cybersecurity tools for Kubernetes environments, including vulnerability scanners, runtime security tools, and compliance frameworks.
• Administer and oversee Kubernetes-native security tools, such as ACA S(Nessus), AESS(Army Endpoint Security System), Kube-Bench, Kube-Hunter, and Falco, to ensure cluster security and compliance .
• Implement and monitor Role-Based Access Control (RBAC) policies and Pod Security Standards (PSS) to enforce least privilege and workload isolation.
• Harden Kubernetes clusters and containerized workloads using industry best practices and DoD Security Technical Implementation Guides (STIGs).
• Perform regular container image scanning using tools like Trivy, Clair, or Anchore to identify vulnerabilities in container images.
• Conduct Infrastructure as Code (IaC) scanning for Kubernetes manifests, Helm charts, and Terraform scripts using tools like Checkov, KubeLinter, or Polaris.
• Ensure compliance with DoD RMF by using tools like Kube-Bench and OpenSCAP.
• Deploy, configure, and manage Security Information and Event Management (SIEM) solutions, such as Splunk or Elasticsearch, to monitor Kubernetes clusters and containerized workloads.
• Develop and integrate rules, queries, and dashboards to detect and respond to security incidents in real time.
• Monitor runtime security using tools like Falco, Sysdig Secure, or Aqua Security to detect anomalous behavior in containers and Kubernetes clusters.
• Collaborate with the Cyber Incident Response Team to investigate and remediate security incidents.
• Integrate security tools into the CI/CD pipeline to automate security scans for code, container images, and IaC configurations.
• Work with DevOps teams to implement security gates in the pipeline, ensuring that only secure and compliant workloads are deployed.
• Automate routine administrative tasks using tools like Ansible, Terraform, or scripting languages (e.g., Python, Bash).
• Collaborate with internal and external teams, including developers, Kubernetes administrators, and Army Cybersecurity Service Providers, to ensure security requirements are met.
• Review and respond to Army Cyber Tasking Orders (CTOs), ensuring timely implementation of required changes.
• Create and maintain documentation for security configurations and standard processes.
• Provide regular reports on the security posture of the Kubernetes environment, including vulnerability assessments and compliance status.
• Responsible for assessment of threats and vulnerabilities to organizational computing assets and developing/integrating rules, queries, and filtering techniques to produce meaningful risk analysis for responses.
• Coordinate with PL ALTESS team to ensure all devices and components report all relevant logs to the SIEM solution and perform troubleshooting of non-reporting assets.
• Work with a team to review Army Cyber Tasking Orders (CTOs), determine applicability and response, and incorporate required changes.
• Review proposed SIEM configuration changes for security impact.
• Interact with Army Cyber Security Service Providers and customer ISSOs/ISSMs on a regular basis.
- Location: Radford, VA - can live within 4 hours of location and work hybrid 2-3 days onsite, at minimum 1 week per month, sometimes for 3 weeks per month or 2-3 days onsite. Travel expenses will be reimbursed.
- Clearance: Secret
- Duration: 1 year contract, most likely to extend up to 5 years
Required Skills & Experience
• Expertise in securing Kubernetes clusters and containerized workloads.
• Experience with Kubernetes-native security tools, such as Kube-Bench, Kube-Hunter, Falco, or similar.
• Proficiency in container image scanning tools (e.g., Trivy, Clair, Anchore) and VM scanning tools like ACAS and AESS.
• Knowledge of Infrastructure as Code (IaC) scanning tools (e.g., Checkov, KubeLinter, Polaris).
• Experience with runtime security tools (e.g., Falco, Sysdig Secure, Aqua Security).
• Familiarity with DevSecOps frameworks and integrating security tools into CI/CD pipelines.
• Experience implementing and monitoring RBAC, Pod Security Standards (PSS), and network policies in Kubernetes.
• Familiarity with compliance frameworks such as CIS Benchmarks, NIST 800-53, and PCI DSS.
• Experience implementing, tuning, and monitoring SIEM solutions (e.g., Splunk, Elasticsearch).
• Strong understanding of common cyber threat patterns, indicators of compromise, and defenses.
• Proficiency in automation tools like Ansible, Terraform, and scripting languages (e.g., Python, Bash).
Desired Skills:
• Working knowledge of DoD STIGs, and IA Vulnerability Management (IAVM).
• Basic understanding of DOD Risk Management Framework Assessment & Authorization (RMF A&A).
Required Certifications:
· DoD 8140 Cybersecurity ISSM (722 role or similar)
§ Resource must possess Baseline certification as defined in DoD Instruction 8570.01-M (generally Security+ CE).
· Must have (or obtain within 6 months of hire) a computing environment certification as defined in DoD 8570.01-M, such as:
§ Certified Kubernetes Security Specialist (CKS)
§ Certified Kubernetes Administrator (CKA)
§ Red Hat Certified Specialist in OpenShift Administration
§ Cloud Native Security Certification (CNSC)
§ GIAC Kubernetes and Cloud Security (GCKS)
§ AWS Certified Security – Specialty
§ Microsoft Certified: Azure Security Engineer Associate
§ Any other related certification to the role of this position
Job Description
Insight Global is seeking a Cybersecurity Engineer supporting a Federal Government Project for the DoD. This project is a containerized, Kubernetes-based, multitenant hosting environment for hosting Army enterprise and tactical applications. They are utilizing Kubernetes and potentially Red Hat OpenShift to implement a cloud-native, software-defined infrastructure across multiple global sites . The client provides value-added common and managed services built on top of the Kubernetes foundation that hosted Army applications will require. The client is a managed service provider (MSP) and hosting services provider for Army applications.
Position Duties:
• Deploy, configure, and manage cybersecurity tools for Kubernetes environments, including vulnerability scanners, runtime security tools, and compliance frameworks.
• Administer and oversee Kubernetes-native security tools, such as ACA S(Nessus), AESS(Army Endpoint Security System), Kube-Bench, Kube-Hunter, and Falco, to ensure cluster security and compliance .
• Implement and monitor Role-Based Access Control (RBAC) policies and Pod Security Standards (PSS) to enforce least privilege and workload isolation.
• Harden Kubernetes clusters and containerized workloads using industry best practices and DoD Security Technical Implementation Guides (STIGs).
• Perform regular container image scanning using tools like Trivy, Clair, or Anchore to identify vulnerabilities in container images.
• Conduct Infrastructure as Code (IaC) scanning for Kubernetes manifests, Helm charts, and Terraform scripts using tools like Checkov, KubeLinter, or Polaris.
• Ensure compliance with DoD RMF by using tools like Kube-Bench and OpenSCAP.
• Deploy, configure, and manage Security Information and Event Management (SIEM) solutions, such as Splunk or Elasticsearch, to monitor Kubernetes clusters and containerized workloads.
• Develop and integrate rules, queries, and dashboards to detect and respond to security incidents in real time.
• Monitor runtime security using tools like Falco, Sysdig Secure, or Aqua Security to detect anomalous behavior in containers and Kubernetes clusters.
• Collaborate with the Cyber Incident Response Team to investigate and remediate security incidents.
• Integrate security tools into the CI/CD pipeline to automate security scans for code, container images, and IaC configurations.
• Work with DevOps teams to implement security gates in the pipeline, ensuring that only secure and compliant workloads are deployed.
• Automate routine administrative tasks using tools like Ansible, Terraform, or scripting languages (e.g., Python, Bash).
• Collaborate with internal and external teams, including developers, Kubernetes administrators, and Army Cybersecurity Service Providers, to ensure security requirements are met.
• Review and respond to Army Cyber Tasking Orders (CTOs), ensuring timely implementation of required changes.
• Create and maintain documentation for security configurations and standard processes.
• Provide regular reports on the security posture of the Kubernetes environment, including vulnerability assessments and compliance status.
• Responsible for assessment of threats and vulnerabilities to organizational computing assets and developing/integrating rules, queries, and filtering techniques to produce meaningful risk analysis for responses.
• Coordinate with PL ALTESS team to ensure all devices and components report all relevant logs to the SIEM solution and perform troubleshooting of non-reporting assets.
• Work with a team to review Army Cyber Tasking Orders (CTOs), determine applicability and response, and incorporate required changes.
• Review proposed SIEM configuration changes for security impact.
• Interact with Army Cyber Security Service Providers and customer ISSOs/ISSMs on a regular basis.
group id: 10112344
Defining Company Culture