Principle Network Engineer

  • Full-time
  • Clearance Required: Top Secret

Company Description

A Sea of Choices – One Solution
There are almost as many IT security firms as there are organizations in need of their guidance. The big names boast decades of experience and a global reputation; the smaller names promise personalized work experience with lean operations.

We know there are a lot of firms vying for you. So why choose MindPoint Group?

MindPoint Group – The IT Security Job You’ve Been Looking For
At MindPoint Group, we specialize in one thing: IT security. In fact, our singular focus and reputation as cyber security specialist have earned us roles as trusted advisors to key government decision makers where we help shape IT security policy, engineer innovative security solutions, and support security operations.

At MindPoint Group, we hire only the most driven, most qualified IT security professionals, and we equip them with the tools and resources they need to deliver success. We are profoundly invested in selecting the right people to join our team and are equally driven to retain them for the long term.  And so, when we find the right fit, we make it work. We offer challenging, growth-oriented assignments. Our collaborative culture unites our staff. And we reward employees with a competitive and exceptional benefits package.

Company Mission
MindPoint Group’s is deeply committed to our mission to become a trusted partner by consistently delivering proven, on point services to our clients. We strive to provide an organizational culture that fosters innovation, technical excellence, dedication to repeatable processes, and attention to detail. We believe that by empowering our employees to excel and providing them with the means to do so, MindPoint Group will consistently exceed our customers’ expectations.

Job Description

MindPoint Group is seeking an experienced Network Engineer to support pre-deployment network and system security and engineering efforts for a federal government client. The candidate will be responsible for the following:

Network Engineering: The Network Engineer will be responsible for guiding the implementation of program standards and the development and deployment of targeted solutions by:

  • Developing and maintaining the network architecture
  • Collaborating with other enterprise engineers to ensure consistency and completeness
  • Documenting enterprise architecture using approved documentation standards
  • Defining and maintaining policies, principles, hardware, and software relevant to the network
  • Ensuring architecture continues to reflect agency needs and technical opportunities
  • Configuring and maintaining a lab environment as a near replica of the productions network

Network Operations: The candidate will perform root cause analysis and develop problem resolutions following organizational change management processes. Components, technologies, and protocols for which the candidate will be responsible for network operations include, but are not limited to:

  • Cisco Routers and Switches, 6500, 3800, 3700, and 880 series;
  • OSPF, BGP, DMVPN, HSRP, ACS, NAC, PIX, Nexus, Catalyst, and ASA firewalls;
  • General Dynamics TACLANES;
  • Virtual Switches;
  • SafeNet KG-340
  • Dell Workstations
  • Fijitsu Scanners
  • GEM-X Management
  • Hewlett Packard Scanners and Printers
  • Remedy
  • Tanberg VTC
  • Cybex KVM
  • Transition Networks Media Converters

Product Evaluation:  The candidate will provide a comprehensive review and/or evaluation of COTS products to ensure client’s functional requirements are met to support the network enterprise. The candidate will also utilize other determining factors such as the agency’s enterprise architecture, previous software and hardware security assessments to provide the client with the best cost-effective solution while meeting both operational and security requirements for the organizations network.

Configuration Management and Technical Support Services: The candidate will ensure that Secure Baselines are enforced and managed with the goal of securing the client’s network and computing infrastructure. The candidate will provide the following specific support services:

  • Support a secure and trusted network environment with access to information and communication systems operated at different security levels
  • Provide strong authentication services to ensure that only authorized users can access network equipment
  • Provide confidentiality and integrity for data in transit
  • Ensure network and system availability
  • Enforce traceability and accountability for actions
  • Recognize the highly networked nature of the current Federal computing environment and provide effective government wide management and oversight of the related information security risks, including coordination of information security efforts throughout the civilian, national security, and law enforcement communities
  • Provide for development and maintenance of security controls required to protect Federal information and information systems as it applies to network systems
  • Provide a mechanism for improved oversight of Federal agency information security programs
  • Maintain complete documentation of Federal agency information systems and identify any shortcoming with the government
  • Update and/or generate documentation for all changes made to the systems, providing comprehensive details.

Functional Responsibilities:  The Network Engineer may perform any or all of the following: Develops and applies advanced methods, theories and research techniques to define engineering requirements, guidance and direction for analysis, investigation, implementation and testing of complex and advanced information systems requiring expert application of advanced knowledge. Provides leadership and vision for system engineering of large-scale systems, major system elements, and/or interfacing systems. Develops strategic and implementations plans for large-scale information systems. Applies reverse engineering and reengineering and disciplines to complex complexity. Reviews, evaluates, and analyzes design interfaces. Prepares, reviews and evaluates interface documentation, specifications, test plans and procedures. Conducts analysis to define, analysis of system requirements and components and performs system audits to ensure intended system functionality, operation and performance requirements are achieved. Analyzes, designs, codes and documents applications of software programs. Codes assigned programs, scripts and segments using appropriate languages. Evaluates, installs, configures, tests, and updates networking hardware and software. Analyses complex systems requirements and resolves network performance issues. May plan, conduct, and technically direct projects or major phases of significant projects, coordinating the efforts of engineers and technical staff in the performance of assigned projects.


Qualifications

  • 10 years of general work experience and 8 years of relevant experience in functional responsibility.
  • Top Secret clearance required and SCI eligible.
  • Bachelor’s degree. A Master’s Degree may be substituted for 4 years of general work experience.  
  • Experience and education equivalents: CEH, eCPPT, CISA, OSCP, Security+, Network+, GSEC, or CCNA, Tenable Certified Nessus Auditor, CISSP, CISM, ISO 27001, or CISA.
  • Certifications with industry leading network manufacturers (i.e., Cisco, Bay, Cabletron, Fore, etc.).
  • Experience with Cisco routers and switches with the following protocols HSRP, GRE tunneling, DMVPN and OSPF.    
  • Experience with IOS, ACS, NAC, ASA, Cisco Works and KG-175 Type 1 encryption devices.
  • Additional experience is not mandatory but is a plus: SQL Server, Windows Server 2003 R2, Windows Server 2008 SP2, Windows Server 2008 R2, Windows Server 2012, RedHat,Windows XP Professional SP3 and Windows 7, McAfee ePO, McAfee Network Intrusion Detection System (NIDS) (Intrushield), McAfee Host Based Security System (HBSS)/Host Intrusion Detection System (HIDS), AD, Group policy, Exchange, SANS and VMware. System Log Server and network device logs (router, switch, and firewall) management tools, (Kiwi), Event log archiving, audit reduction, and analysis, National Information Assurance Partnership (NIAP), Common Criteria (CC) Evaluation and Validation Scheme (CCEVS), and NIST Cryptographic Module Validation Program (CMVP).

Additional Information

All your information will be kept confidential according to EEO guidelines.