Information Assurance Engineer 6314 Remote/Teleworker US

Other Jobs To Apply

No other job posts for this day.

<p>Leidos is seeking an Information Assurance (IA) Engineer to support cybersecurity authorization related efforts for SMIT. SMIT is the largest IT services program for the Navy and Marine Corps. Under the Service Management, Integration, and Transport (SMIT) program, the Leidos team will deliver the core backbone of the Navy-Marine Corps Intranet (NMCI) and Marine Corps Enterprise Network (MCEN), including cybersecurity services, network operations, service desk, and data transport. Ultimately, the Leidos team will support the Navy and Marine Corps in unifying its shore-based networks and data management to improve capability and service while also saving significant dollars by focusing efforts under one enterprise network.</p><p></p><p><b>Primary Responsibilities</b></p><p>The <span>IA Engineer will perform </span>cybersecurity authorization services, including acting as a point of contact for cybersecurity authorization related aspects to the assigned information systems, ensuring systems are maintained per security policies and procedures and maintaining compliance and ongoing reporting to management. Responsibilities include:</p><p></p><ul><li>Serve as an information system security engineer (ISSE) for Authorization to Operate (ATO) packages under the Risk Management Framework (RMF)</li><li>Assist in the development and review of ATO submissions and coordinate all updates and corrections to assessment and authorization (A&A) artifacts</li><li>Evaluate software and hardware during pre-acquisition phases to determine its ability to meet minimum security requirements based on NIST SP 800-53 Rev4 security controls.</li><li>Author, review, coordinate and submit cybersecurity authorization required artifacts to eMASS (including change requests) to achieve milestones such as Interim Authority to Test (IATT) and ATO in accordance with the project schedule.</li><li>Support conducting cybersecurity authorization activities to <span>comply with all current Cybersecurity and IA manuals, instructions, and guides</span> <span>within the DoDI 8500.01, DON 5239, and Marine Corps ECSM’s.</span></li><li>Continuously monitor system resources through automated scanning and implement automated reporting feeds to support cybersecurity authorizations</li><li>Verify patch compliance using the approved technical solution (i.e., Assured Compliance Assessment Solution (ACAS)), Information Assurance Vulnerability Alert (IAVA) compliance dashboards, and Microsoft Defender for Endpoints.</li><li>Coordinate with local administrators to troubleshoot and elevate patching issues in a timely manner in order to meet patch compliance timelines.</li><li>Assist with the implementation of security procedures, and verify information system security requirements, including coordinating the execution, review, and disposition of Security Technical Implementation Guide (STIG) checklists for systems, applications, developed code and other components.</li><li>Develop and maintain system security documentation, including drafting, reviewing, editing and recommending guidance for Standard Operating Procedures (SOP), Tactics, Techniques, & Procedures (TTP), Plan of Action and Milestones (POA&M) and Federal Information Security Management Act (FISMA) Score Card.</li><li>Participate in regular briefings with the customer on cybersecurity statuses, including preparing briefing materials. Work closely with government Cyber team to support ATO conditions and requirements</li><li>Ensure secure, effective and efficient operation of network systems, architecture, and topology</li><li>Assist with the development and application of business processes to ensure they have the appropriate level of security</li><li>Participate in strategic network, security, and operations new technology planning</li><li>Assist the engineering managers in employing approved defense-in-depth principles and practices (e.g., defense-in-multiple places, layered defenses, and security robustness)</li><li>Discuss and document the Ports, Protocols and Services (PPS) to include ensuring the dataflows are accurate, CAL boundaries crossed are compliant, and registrations with the AO are completed per DODI 8551.1</li></ul><p></p><p><b>Basic Qualifications (Required Qualifications)</b></p><ul><li>Bachelor’s degree and 4 years of prior relevant experience or Masters with 2 years of prior relevant experience in a related field.</li><li>US Citizen and DoD Secret Clearance</li><li>Hold an active security certification that meets DOD 8570 IAT level II or higher, such as Security+ CE or CISSP.</li><li>Technical knowledge and skills in one of the following areas: cybersecurity assessment, vulnerability scanning, integration and testing, data analytics or security operations.</li><li>Experience with Security Engineering and Architecture, Certification and Accreditation, Vulnerability Assessment, Incident Management, Vulnerability Management, Security Operations, and Policy and Program Development.</li><li>Hands-on knowledge and experience with the Risk Management Framework (RMF).</li><li>Knowledge of cybersecurity assessment and authorization (A&A) and associated processes, procedures, and activities in accordance with DoDID 8500.01, DoDI 8551.01, and other applicable NIST instructions, guidelines.</li><li>Hands-on experience with a variety of cybersecurity tools such as eMASS, ACAS, STIGs, etc.</li><li>Experience supporting the formal Cybersecurity/IA testing required by government accrediting authorities and preparing System Security Plans.</li><li>Experience in FISMA and other information assurance assurance-related compliance reporting.</li><li>Experience in working with DoD networks.</li><li>Ability to multi-task, self-assign work in a dynamic, fast-paced environment.</li><li>Strong analytical, communication and troubleshooting skills that enable proactive and effective collaboration with a virtual team, including the ability to clearly articulate status and present to both customers and program leadership. </li><li>Exceptional communication abilities, both verbal and written, including business writing on complex topics.</li><li>Technical understanding of supporting security initiatives, conducting security monitoring, reporting and maintaining security compliance following security regulations and policies.</li><li>Motivated self-starter with ability to work in a matrix organization and communicate effectively with peers, junior team members, and program leadership.</li><li>Ability to collaborate with customers, stakeholders, and team members to complete tasks.</li></ul><p></p><p><b>Preferred Qualifications</b></p><ul><li>Hands-on experience in working with Cloud Authorizations</li><li>Hands-on experience in working with NMCI and/or MCEN authorizations</li><li>Experience with ITIL processes and/or ITIL Foundation V4 certification</li><li>An entrepreneurial spirit with the ability to drive innovation independently; have a passion to improve at every opportunity</li><li>Proven ability to credibly coordinate between technical teams and business stakeholders</li><li>Willing to perform shift work</li></ul><p>If youre looking for comfort, keep scrolling. At Leidos, we outthink, outbuild, and outpace the status quo — because the mission demands it. Were not hiring followers. Were recruiting the ones who disrupt, provoke, and refuse to fail. Step 10 is ancient history. Were already at step 30 — and moving faster than anyone else dares.</p><h2></h2><h2></h2><h2><u><b>Original Posting:</b></u></h2>November 18, 2025<div><div><div><div><div><div><div><p></p><p>For U.S. Positions: While subject to change based on business needs, Leidos reasonably anticipates that this job requisition will remain open for at least 3 days with an anticipated close date of no earlier than 3 days after the original posting date as listed above.</p></div></div></div></div></div></div></div><div></div><p></p><h2><b><u>Pay Range:</u></b></h2>Pay Range $85,150.00 - $153,925.00<p></p><p><span>The Leidos pay range for this job level is a general guideline only and not a guarantee of compensation or salary. Additional factors considered in extending an offer include (but are not limited to) responsibilities of the job, education, experience, knowledge, skills, and abilities, as well as internal equity, alignment with market data, applicable bargaining agreement (if any), or other law.</span></p>

Back to blog

Common Interview Questions And Answers

1. HOW DO YOU PLAN YOUR DAY?

This is what this question poses: When do you focus and start working seriously? What are the hours you work optimally? Are you a night owl? A morning bird? Remote teams can be made up of people working on different shifts and around the world, so you won't necessarily be stuck in the 9-5 schedule if it's not for you...

2. HOW DO YOU USE THE DIFFERENT COMMUNICATION TOOLS IN DIFFERENT SITUATIONS?

When you're working on a remote team, there's no way to chat in the hallway between meetings or catch up on the latest project during an office carpool. Therefore, virtual communication will be absolutely essential to get your work done...

3. WHAT IS "WORKING REMOTE" REALLY FOR YOU?

Many people want to work remotely because of the flexibility it allows. You can work anywhere and at any time of the day...

4. WHAT DO YOU NEED IN YOUR PHYSICAL WORKSPACE TO SUCCEED IN YOUR WORK?

With this question, companies are looking to see what equipment they may need to provide you with and to verify how aware you are of what remote working could mean for you physically and logistically...

5. HOW DO YOU PROCESS INFORMATION?

Several years ago, I was working in a team to plan a big event. My supervisor made us all work as a team before the big day. One of our activities has been to find out how each of us processes information...

6. HOW DO YOU MANAGE THE CALENDAR AND THE PROGRAM? WHICH APPLICATIONS / SYSTEM DO YOU USE?

Or you may receive even more specific questions, such as: What's on your calendar? Do you plan blocks of time to do certain types of work? Do you have an open calendar that everyone can see?...

7. HOW DO YOU ORGANIZE FILES, LINKS, AND TABS ON YOUR COMPUTER?

Just like your schedule, how you track files and other information is very important. After all, everything is digital!...

8. HOW TO PRIORITIZE WORK?

The day I watched Marie Forleo's film separating the important from the urgent, my life changed. Not all remote jobs start fast, but most of them are...

9. HOW DO YOU PREPARE FOR A MEETING AND PREPARE A MEETING? WHAT DO YOU SEE HAPPENING DURING THE MEETING?

Just as communication is essential when working remotely, so is organization. Because you won't have those opportunities in the elevator or a casual conversation in the lunchroom, you should take advantage of the little time you have in a video or phone conference...

10. HOW DO YOU USE TECHNOLOGY ON A DAILY BASIS, IN YOUR WORK AND FOR YOUR PLEASURE?

This is a great question because it shows your comfort level with technology, which is very important for a remote worker because you will be working with technology over time...