Keywords: Space, USSF, SSC, Space systems command, weapon systems, ground systems, weapon, aerospace, cyber, cybersecurity, firewall, cyber, cybersecurity, networks, threat analysis, trend analysis, arcsight, splunk, wireshark, sharepoint, windows, vulnerability, vulnerability exploitation, ITIL, ITIL v3, Information Assurance, IAM, Risk, RMF, Risk management,, stigs, stig, ts/sci, top secret/sci, security clearance, bachelors, network defense, network defense operations, triage of events, CEH, APT, TTP, advanced persistent threat, tactics, techniques, procedures, information assurance, CND, computer network defense, CI polygraph, counter intelligence, counterintelligence, SOC, security operations center, intelligence, intelligence agency, Engineering, engineer, space systems, systems engineer, OS, DOD, department of defense, Chantilly, springfield, Virginia, cyber intelligence, security tools, GSEC, SSCP, CCNA, NOC, network operations center, network traffic, bachelors, masters, government, Federal, federal systems, ACAS, NESSUS, exploitation, exploit, network monitoring, ci poly, counterintelligence, tssci ci poly, tssci, ts/sci, cipoly, ci poly, ci polygraph, springfield, chantilly, virginia, nova, northern virginia, cyber security engineer, remote, wfh, remote work, work from home, security engineer, secret, cleared, public trust, ice, dhs, Red Hat Enterprise Linux (RHEL), Linux Security, SELinux (Security-Enhanced Linux), Kernel Hardening, Auditd (Audit Daemon), SSH (Secure Shell), Firewall Configuration, space domain awareness, IASAE, Intrusion Detection System (IDS), Intrusion Prevention System (IPS), Filesystem Security (Permissions, ACLs), Patch Management, Vulnerability Assessment, Hardening Guides, Secure Boot, System Logs and Log Analysis, Authentication Mechanisms (PAM - Pluggable Authentication Modules), Security Information and Event Management (SIEM), Network Security, Endpoint Security, Secure Networking Protocols (TLS/SSL, IPsec), Encryption (Disk, File, Communication), Security Updates, Container Security (Docker, Kubernetes), Splunk Enterprise, Splunk Universal Forwarder, Splunk Indexer, Splunk Search Language (SPL), Data Ingestion and Parsing, Log Collection and Analysis, Dashboards and Visualization, Correlation Searches, Alerts and Alerting Rules, Threat Intelligence Integration, Splunk Apps and Add-ons, Splunk Enterprise Security, RMF, Risk Management Framework, Linux, Windows, · Apply engineering knowledge of security solutions to design, develop and/or implement solutions to ensure programs are consistent with enterprise architecture security requirements and support full spectrum military cyberspace operations.