Skip to content
mimi

Cyber Security Engineer

Maximus

Fort Meade · On-site Full-time Mid Level $125k – $144k/yr 1w ago

About the role

About Maximus

Maximus is a trusted federal partner supporting mission critical programs across national security, defense, and public service delivery. Recent contract awards in cybersecurity and operational readiness underscore Maximus' role as a reliable prime for high impact government missions. Joining Maximus means contributing to meaningful work in fast paced environments alongside professionals committed to service, accountability, and results.

This position is contingent upon contract award and position availability. Selected candidates will receive a contingent offer of employment, which will become final only upon successful contract award to Maximus, availability of the position, and receipt of authorization to proceed.

Job Details

  • Location: Fort Meade, MD
  • Onsite Requirement: This position is onsite five days a week in Ft Meade, MD.
  • Clearance: Requires a TS/SCI security clearance.
  • Internal Job Profile Code: TCS051, T3, Band 6

Job-Specific Essential Duties and Responsibilities:

  • Implements and maintains cybersecurity controls supporting JCC2 operational systems.
  • Conducts risk assessments, vulnerability scans, and threat analysis activities.
  • Performs security testing and validation to identify and mitigate system vulnerabilities.
  • Investigates and responds to cybersecurity incidents and security events.
  • Develops remediation actions and supports incident recovery activities.
  • Maintains security documentation, playbooks, and reporting artifacts.
  • Ensures compliance with DoD cybersecurity policies, RMF, and security standards.
  • Supports system accreditation and security assessment activities.
  • Collaborates with engineering and operations teams to improve system security posture.
  • Participates in Agile program increment (PI) planning and activities requiring periodic travels.

Job-Specific Minimum Requirements:

  • Active TS/SCI clearance is required.
  • Bachelor's degree in Cyber Security, Information Technology, Computer Science, or related field.
  • Must be able to report on-site in Ft Meade, MD up to five days per week based on customer requirements.
  • IAT Level II certification required.
  • 5 years experience with DoD cybersecurity policies and frameworks (RMF, NIST, ISO 27001, CIS Controls, DISA STIGs).
  • 5 years experience with security technologies (firewalls, IDS/IPS, SIEM, endpoint protection).
  • 5 years experience securing network protocols, operating systems, and databases.
  • 5 years experience scripting for automation and reporting (Python, PowerShell, or Bash).

Preferred Skills and Qualifications:

  • Certified Information Systems Security Professional (CISSP).
  • Certified Ethical Hacker (CEH).
  • Certified Information Security Manager (CISM).
  • Offensive Security Certified Professional (OSCP) IAT Level III.
  • Experience supporting DoD DevSecOps environments.
  • Experience supporting accredited classified systems.
  • Experience performing incident response and forensic analysis.

Benefits

Maximus provides a variety of benefits to employees, including:

  • Health insurance coverage
  • Life and disability insurance
  • A retirement savings plan
  • Paid holidays
  • Paid time off

Skills

BashCIS ControlsDISA STIGsDoDEndpoint ProtectionFirewallsInformation TechnologyInformation SecurityInformation Systems SecurityInformation Systems Security ManagementInformation Systems Security ProfessionalInformation Systems Security TestingInformation Systems Security ValidationInformation Systems Security VulnerabilityInformation Systems Security Vulnerability ScanningInformation Systems Security Vulnerability TestingInformation Systems Security Vulnerability ValidationInformation Systems Security Vulnerability MitigationInformation Systems Security Vulnerability AssessmentInformation Systems Security Vulnerability AnalysisInformation Systems Security Vulnerability ManagementInformation Systems Security Vulnerability RemediationInformation Systems Security Vulnerability ResponseInformation Systems Security Vulnerability InvestigationInformation Systems Security Vulnerability ReportingInformation Systems Security Vulnerability DocumentationInformation Systems Security Vulnerability PlaybooksInformation Systems Security Vulnerability ArtifactsInformation Systems Security ComplianceInformation Systems Security PoliciesInformation Systems Security StandardsInformation Systems Security AccreditationInformation Systems Security AssessmentInformation Systems Security PostureInformation Systems Security CollaborationInformation Systems Security PlanningInformation Systems Security ActivitiesInformation Systems Security TravelsInformation Systems Security EnvironmentsInformation Systems Security Classified SystemsInformation Systems Security Incident ResponseInformation Systems Security Forensic AnalysisInformation Systems Security Incident RecoveryInformation Systems Security EventsInformation Systems Security ControlsInformation Systems Security Operational SystemsInformation Systems Security Risk AssessmentsInformation Systems Security Threat AnalysisInformation Systems Security VulnerabilitiesInformation Systems Security MitigationInformation Systems Security ScriptingInformation Systems Security AutomationInformation Systems Security ReportingInformation Systems Security PythonInformation Systems Security PowerShellInformation Systems Security Network ProtocolsInformation Systems Security Operating SystemsInformation Systems Security DatabasesInformation Systems Security TechnologiesInformation Systems Security FirewallsInformation Systems Security IDS/IPSInformation Systems Security SIEMInformation Systems Security Endpoint ProtectionInformation Systems Security DoDInformation Systems Security RMFInformation Systems Security NISTInformation Systems Security ISO 27001Information Systems Security CIS ControlsInformation Systems Security DISA STIGsInformation Systems Security Bachelor's degreeInformation Systems Security Cyber SecurityInformation Systems Security Information TechnologyInformation Systems Security Computer ScienceInformation Systems Security IAT Level IIInformation Systems Security TS/SCIInformation Systems Security OnsiteInformation Systems Security 5 years experienceInformation Systems Security MaximusInformation Systems Security TCSInformation Systems Security T3Information Systems Security Band 6Information Systems Security JCC2Information Systems Security AgileInformation Systems Security PI planningInformation Systems Security periodic travelsInformation Systems Security Preferred SkillsInformation Systems Security CISSPInformation Systems Security CEHInformation Systems Security CISMInformation Systems Security OSCPInformation Systems Security IAT Level IIIInformation Systems Security DevSecOpsInformation Systems Security USCYBERCOMInformation Systems Security techjobsInformation Systems Security clearanceInformation Systems Security veteransPageInformation Systems Security Minimum RequirementsInformation Systems Security EEO StatementInformation Systems Security equal opportunity employerInformation Systems Security raceInformation Systems Security colorInformation Systems Security religionInformation Systems Security sexInformation Systems Security ageInformation Systems Security national originInformation Systems Security disabilityInformation Systems Security veteran statusInformation Systems Security genetic informationInformation Systems Security Pay TransparencyInformation Systems Security compensationInformation Systems Security job locationInformation Systems Security candidate's educationInformation Systems Security trainingInformation Systems Security experienceInformation Systems Security expected qualityInformation Systems Security quantity of workInformation Systems Security required travelInformation Systems Security external marketInformation Systems Security internal value analysisInformation Systems Security seniorityInformation Systems Security merit systemsInformation Systems Security internal pay alignmentInformation Systems Security Annual salaryInformation Systems Security total compensation packageInformation Systems Security Other rewardsInformation Systems Security short-term incentivesInformation Systems Security long-term incentivesInformation Systems Security program-specific awardsInformation Systems Security benefitsInformation Systems Security employeesInformation Systems Security health insurance coverageInformation Systems Security life insuranceInformation Systems Security disability insuranceInformation Systems Security retirement savings planInformation Systems Security paid holidaysInformation Systems Security paid time offInformation Systems Security Compensation rangesInformation Systems Security contract valueInformation Systems Security job dutiesInformation Systems Security relevant work experienceInformation Systems Security applicant's salary historyInformation Systems Security regulatory minimum wage ratesInformation Systems Security exempt salary thresholdsInformation Systems Security AccommodationsInformation Systems Security reasonable accommodationsInformation Systems Security individualsInformation Systems Security assistanceInformation Systems Security employment processInformation Systems Security medical conditionInformation Systems Security physical or mental impairmentInformation Systems Security stage of the employment processInformation Systems Security accessing job postingsInformation Systems Security completing assessmentsInformation Systems Security participating in interviewsInformation Systems Security People OperationsInformation Systems Security applicantaccom@PythonPowerShellRMFSIEMTS/SCINISTISO 27001IAT Level IIIDS/IPSCyber SecurityComputer Science

Don't send a generic resume

Paste this job description into Mimi and get a resume tailored to exactly what the hiring team is looking for.

Get started free