Own your opportunity to work with the largest government agency in the nation. Make an impact by advancing the Department of Defense’s mission to keep our country safe and secure.
Job DescriptionResponsibilities include:
Monitor and analyze Intrusion Detection Systems (IDS) to identify security issues for remediation.
Recognizes potential, successful, and unsuccessful intrusion attempts and compromises thorough reviews and analyses of relevant event detail and summary information.
Evaluate firewall change requests and assess organizational risk.
Communicates alerts to agencies regarding intrusions and compromises to their network infrastructure, applications and operating systems.
Assists with implementation of counter-measures or mitigating controls.
Conducts regular audits to ensure that systems are being operated securely, and information systems security policies and procedures are being implemented as defined in security plans.
Develops, tests, and operates firewalls, intrusion detection systems, enterprise antivirus systems and software deployment tools.
Safeguards the network against unauthorized infiltration, modification, destruction or disclosure.
Researches, evaluates, tests, recommends, communicates and implements new security software or devices.
Conducts investigations of computer security violations and incidents, reporting as necessary to management.
Researches, evaluates, tests, recommends, communicates and implements new security software or devices.
Implements, enforces, communicates and develops security policies or plans for data, software applications, hardware, telecommunications and information systems security education/awareness programs.
Ensures the integrity and protection of networks, systems, and applications by technical enforcement of organizational security policies, through monitoring of vulnerability scanning devices.
Performs periodic and on-demand system audits and vulnerability assessments, including user accounts, application access, file system and external Web integrity scans to determine compliance.
Prepares incident reports of analysis methodology and results.
Ensure compliance with regulations and privacy laws.
Provides guidance and leadership to less-experienced team members.
DESIRED QUALIFICATIONS:
BA/BS (or equivalent experience), 5+ years of experience. Additional experience can possibly off set lack of degree, assessed on a case by case basis.
Security Clearance (day one): TS/SCI
Some Travel May Be Required
NOTE: 24x7x365 Mission. Involves providing round clock monitoring. 8 Hour shift rotations (3 8-hour shifts). Shifts are rotated, first voluntarily and mandatory if necessary to ensure full coverage.
Required Certifications:
8570 Compliance: CISSP, CEH, Sec+ or CySA+.
IAT LVL II and CSSP Auditor
https://public.cyber.mil/cw/cwmp/dod-approved-8570-baseline-certifications