Scott Air Force Base, IL, 62225, USA
2 days ago
Cyber Security Specialist IV
**REQUIRES: Active DOD Clearance** Description This role is onsite full-time, 40hrs/wk, and can be located at any of these three locations: Langley AFB, Hanscom AFB, and Scott AFB. Please notate location preference on resumes. PRIMARY RESPONSIBILITIES • Serve as consultant and advisor to Air Force operations community leadership • Research, track, and report on program status for operational orders • Compile, format, and report cyber operations status and evidence • Serve as program advisor for Air Force operations processes and planning • Review of system vulnerability and STIG reports for compliance management • Security process tracking, documentation, and periodic recurring report management • Risk Management Framework required documentation support • eMASS package support to include Plan of Action and Milestones management • Other security department and leadership task and project support BASIC QUALIFICATIONS • Experience with IT concepts and system administration • Experience with cybersecurity applications and reporting • Experience with Air Force operations and cyber assessment • High efficiency with personal task management organization • Preferred but not required: BS Computer Science, Information Systems, Information Security or solid IA background • Military experience in lieu of education is permissible Required QUALIFICATIONS • Currently possess DOD 8570, IAT Level II Security+ certification or equivalent • Currently possess a DoD SECRET security clearance or higher   Mid ACAS Administrator: PRIMARY RESPONSIBILITIES • Installation, monitoring, testing, troubleshooting, and administration of the ACAS/Nessus Vulnerability Scanner applications • Experience with vulnerability scanning tools to include and understanding of Vulnerability Management System (VMS) and Continuous Monitoring and Risk Scoring (CMRS) • Experience with security architectures - Experience in Windows, Linux and VMware virtual environment • Provide technical support to customers involving a wide range of software, hardware, and DoD specific applications with respect to the ACAS solution • Analyze and assist in the application of Security Technical Implementation Guides (STIGs) and Information Assurance Vulnerability Alerts (IAVAs) • Ensure scheduled scans are covering 100% of intended assets and are being run successfully • Ensure Security Center (SC) is being updated regularly; address unsuccessful updates of the SC and identify the root cause of the unsuccessful update • Configure, optimize, and test vulnerability scans against new and existing Operating Systems and platforms • Perform Nessus vulnerability scans and agent scans • Perform scan policy analysis & configuration to determine the impact of vulnerability scanning against target devices • Troubleshoot credential failure issues by performing configuration analysis against the target device • Conduct vulnerability analysis, research, collaborate with System Administrators to mitigate identified vulnerabilities and/or author Plans of Actions and Milestones (PO&AM) as needed • Provide guidance on vulnerability and malware remediation. • Maintain ACAS compliance with DISA, OPORD, FRAGOs, CTO, and other DoD compliance requirements and best practices. • Ability to analyze the customer’s needs and identify security requirements / solutions. Position requires strong written and verbal communications skills BASIC QUALIFICATIONS • Experience with DoD STIGS, IA Tools (Host Based Security System), and Risk Management Framework • Experience with network design, LAN/WAN systems and lab configurations • Experience with ServiceNow or Remedy • Preferred but not required: BS Computer Science, Information Systems, Information Security or solid IA background Required QUALIFICATIONS • Currently possess DOD 8570, IAT Level II Security+ certification or equivalent. • Currently possess an active DoD SECRET security clearance and upgrade to TS   What you’ll do: The ACAS Technician position will be responsible for the following but not limited to: • Installation, monitoring, testing, troubleshooting, and administration of the ACAS/Nessus Vulnerability Scanner applications • Experience with vulnerability scanning tools to include and understanding of Vulnerability Management System (VMS) and Continuous Monitoring and Risk Scoring (CMRS) • Experience with security architectures - Experience in Windows, Linux and VMware virtual environment • Provide technical support to customers involving a wide range of software, hardware, and DoD specific applications with respect to the ACAS solution • Analyze and assist in the application of Security Technical Implementation Guides (STIGs) and Information Assurance Vulnerability Alerts (IAVAs) • Ensure scheduled scans are covering 100% of intended assets and are being run successfully • Ensure Security Center (SC) is being updated regularly; address unsuccessful updates of the SC and identify the root cause of the unsuccessful update • Configure, optimize, and test vulnerability scans against new and existing Operating Systems and platforms • Perform Nessus vulnerability scans and agent scans • Perform scan policy analysis & configuration to determine the impact of vulnerability scanning against target devices • Troubleshoot credential failure issues by performing configuration analysis against the target device • Conduct vulnerability analysis, research, collaborate with System Administrators to mitigate identified vulnerabilities and/or author Plans of Actions and Milestones (PO&AM) as needed • Provide guidance on vulnerability and malware remediation. • Maintain ACAS compliance with DISA, OPORD, FRAGOs, CTO, and other DoD compliance requirements and best practices. • Ability to analyze the customer’s needs and identify security requirements / solutions. Position requires strong written and verbal communications skills Required qualifications: • Experience with cybersecurity and IT systems • 2 years with BS, 6 years with no degree. Military experience in lieu of education permissible Desired qualifications: • Experience with DoD STIGS, IA Tools (Host Based Security System), and Risk Management Framework • Experience with network design, LAN/WAN systems and lab configurations • Experience with ServiceNow or Remedy • Preferred but not required: BS Computer Science, Information Systems, Information Security or solid IA background Skills Cyber Security, eMass, Security, Vulnerability Assessment, POAMs, Vulnerability Management, Information Security, STIGing, RMF, ACAS Experience Level Expert Level Pay and Benefits The pay range for this position is $48.08 - $55.00/hr. Eligibility requirements apply to some benefits and may depend on your job classification and length of employment. Benefits are subject to change and may be subject to specific elections, plan, or program terms. If eligible, the benefits available for this temporary role may include the following: • Medical, dental & vision• Critical Illness, Accident, and Hospital• 401(k) Retirement Plan – Pre-tax and Roth post-tax contributions available• Life Insurance (Voluntary Life & AD&D for the employee and dependents)• Short and long-term disability• Health Spending Account (HSA)• Transportation benefits• Employee Assistance Program• Time Off/Leave (PTO, Vacation or Sick Leave) Workplace Type This is a fully onsite position in Scott Air Force Base,IL. Application Deadline This position is anticipated to close on Feb 26, 2025. About TEKsystems: We're partners in transformation. We help clients activate ideas and solutions to take advantage of a new world of opportunity. We are a team of 80,000 strong, working with over 6,000 clients, including 80% of the Fortune 500, across North America, Europe and Asia. As an industry leader in Full-Stack Technology Services, Talent Services, and real-world application, we work with progressive leaders to drive change. That's the power of true partnership. TEKsystems is an Allegis Group company. The company is an equal opportunity employer and will consider all applications without regards to race, sex, age, color, religion, national origin, veteran status, disability, sexual orientation, gender identity, genetic information or any characteristic protected by law.
Confirm your E-mail: Send Email