Product Security Engineer - Weapons Direct Attack Programs

Boeing Boeing · Aerospace · Saint Charles, MO

Product Security Engineer role at Boeing focused on weapons direct attack programs, involving assessment, updating, and maintaining the security posture of systems, interacting with cyber teams to remediate vulnerabilities, performing system analysis for cyber threats, and ensuring product security engineering lifecycle adherence. Requires a Secret U.S. Security Clearance.

What you'd actually do

  1. Assess organization-wide security and privacy risk and update assessment results on an ongoing basis
  2. Perform system analysis and develop system test for cyber threats, cyber test activities, and the cybersecurity of large-scale events
  3. Ensure product security engineering development lifecycle is followed, with an emphasis on clear requirements development/verification (using CAMEO)
  4. Perform criticality analysis to include the ability to work with suppliers, identify critical components, and integrating them into the overall system
  5. Perform cyber risk assessments and develop risk mitigation plans (i.e., POA&Ms, SCRM, etc.) using a variety of tools including but not limited to CAMEO

Skills

Required

  • Bachelor of Science degree in engineering, engineering technology, chemistry, physics, mathematics, data science, or computer science
  • Active Secret U.S. Security Clearance

Nice to have

  • Current DoD 8570 certification at IAT Level II / IAM Level I or higher (e.g., Security+, GSEC, SCNP, SSCP, CISSP, CISA, GSE, SCNA)
  • 1+ years of experience in product security / cybersecurity engineering
  • 1+ years of experience with industry standard cybersecurity frameworks (NIST, OWASP, DFARS)
  • Experience using analytical, collaboration, communication and organizational skills
  • Experience using CAMEO (proficiency preferred)
  • 2+ years of experience in Windows/RHEL System admin experience, installing, tuning & troubleshooting Cyber Tools to include ESS/HBSS, ConfigOS, Splunk, etc.
  • 2+ years of experience in configuring, running, and scripting audit tools
  • 2+ years of experience using knowledge of Software Assurance (SwA) static and/or dynamic code analysis (e.g. Fortify)
  • Experience with Federal Information Security Management Act (FISMA)/RMF and National institute of Standards and Technology (NIST) 800-53 requirements
  • Experience leading system and component level cyber test and evaluation, including threat and security assessments, and tabletop exercises
  • Experienced self-starter with strong written and oral communication skills, and a focus on translating technically complex issues into simple, easy to understand concept
  • Growing understanding of DoD defense systems architectures and communication

What the JD emphasized

  • Active Secret U.S. Security Clearance
  • product security
  • cybersecurity