4 days old

Boundary Systems Information Assurance/Security Engineer

Columbia, SC 29201
Apply Now
Apply on the Company Site
Business Group Highlights


The Defense group supports the Department of Defense (DoD) mission to keep our homeland and its citizens safe. We provide solutions to improve the Nation's defense by providing software, systems engineering, IT, training and logistics and fleet management solutions.


  • The Boundary Systems Information Assurance/Security Engineer is responsible for operating security devices remotely and locally.
  • Provides technical and programmatic Information Assurance Services in support of network and information security systems.
  • Responsible for designing, developing, and implementing security requirements.
  • Leverages the host protection software directed for use by the customer to review events and logs to detect anomalies.
  • Utilizes firewall toolsets to accurately analyze and report on the overall health of local and deployed firewalls.
  • Recommends appropriate changes/resolutions in response to the trends analysis.
  • Prepares documentation from information obtained from customer using accepted guidelines.
  • Prepare Security Test and Evaluation plans.
  • Provide certification and accreditation support in the development of security and contingency plans and conducts complex risk and vulnerability assessments; scan systems for vulnerabilities and indications of compromise.
  • Develops and completes system security plans and contingency plans. Recommends system enhancements to improve security deficiencies.
  • Implements proper backup procedures, walk remote users through backup and restoration actions, and accomplish the same locally.
  • Develops, tests, and integrates computer and network security tools. Secures system configurations and install security tools, scan systems in order to determine compliancy and report results and evaluate products and various aspects of system administration.
  • Responsible for overall compliance, identification of anomalies, and coordination with Signature Management personnel to develop custom host-based signatures to automate the detection of events of interest.
  • Conducts security program audits and develop solutions to lessen identified risks. Develops strategies to comply with privacy, risk management, and e-authentication requirements.
  • Provide information assurance support for the development and implementation of security architectures to meet new and evolving security requirements.
  • Evaluate, develop and enhance security requirements, policy and tools.
  • Provides assistance in computer incident investigations.
  • Performs vulnerability assessments including development of risk mitigation strategies.


  • B.S. in related field, and 5 or more years relevant IT experience (preferred); OR 7 or more years relevant IT experience.
  • Firewall, Unix, ACAS, and HBSS experience
  • Security+ or CCNA-Sec
  • MCSA, CCENT, Firewall, Unix, ACAS, HBSS, and ITIL Foundation


Sumpter, SC / Shaw AFB

About Perspecta

What matters to our nation, is what matters to us. At Perspecta, everything we do, from conducting innovative research to cultivating strong relationships, supports one imperative: ensuring that your work succeeds. Our company was formed to bring a broad array of capabilities to all parts of the public sectorfrom investigative services and IT strategy to systems work and next-generation engineering.

Our promise is simple: never stop solving our nations most complex challenges. And with a workforce of approximately 14,000, more than 48 percent of which is cleared, we have been trusted to do just that, as a partner of choice across the entire sector.

Perspecta is anAA/EEOEmployer - Minorities/Women/Veterans/Disabled and other protected categories.

As a government contractor, Perspecta abides by the following provision

Pay Transparency Nondiscrimination Provision

The contractor will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. However, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of the other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by the employer, or (c) consistent with the contractors legal duty to furnish information. 41 CFR 60-1.35(c).


  • Information Technology
Posted: 2020-10-20 Expires: 2020-11-19

With offerings in mission services, digital transformation and enterprise operations, our team of 14,000 engineers, analysts, investigators and architects work tirelessly to create innovative solutions. We have the expertise and experience not only to devise solutions, but to execute on them successfully.

Featured Job

Featured Employer

Before you go...

Our free job seeker tools include alerts for new jobs, saving your favorites, optimized job matching, and more! Just enter your email below.

Share this job:

Boundary Systems Information Assurance/Security Engineer

Columbia, SC 29201

Join us to start saving your Favorite Jobs!

Sign In Create Account
Powered ByCareerCast