The job below is no longer available.

You might also like

in Organ, NM

Use left and right arrow keys to navigate
Hours Full-time, Part-time
Location Organ, New Mexico

About this job

Job Description

Job Description

Dynamic Solutions Technology, LLC, a premier strategic services firm that meets IT and Service needs for commercial and government clients. We are is seeking a full-time Information Assurance Security Analyst II to support DoD customer. This position is to provide support in White Sands Missle Range (WSMR), NM locations upon request.

ESSENTIAL DUTIES AND RESPONSIBILITIES:

  • Serves as a team member providing network monitoring and scanning functions.
    • Provides network vulnerability scanning to ensure IAVA compliance and remediation.
    • Provides antivirus management using antivirus tools.
    • Provides wireless scanning using network detection software.
    • Implements system security policies, scans and IAVAs for WSMR, including WSMR organizations, tenant activities, and other contractors.
    • Provides Cybersecurity reporting requirements to appropriate authorities.
  • Provides Tier 2 assistance for personnel / users needing information/assistance with Information Assurance (IA) and CSO related issues.
  • Risk Management/Accreditation/Certification Services; Assists the Information Systems Security Manager (ISSM) in the management of the RMF process in accordance with AR 25-2 and DoDI 8510.01. Provide Knowledge Management Services for all information required to perform Certification and Accreditation services for the White Sands Missile Range Cybersecurity Office (CSO).
  • Position requires knowledge of SharePoint services in maintaining required documentation such as appointment orders, Authority to Connect (ATC) and Authority to Operate (ATO) documentation, library of Army and other regulations relating to Information Assurance, Memorandums of Understanding/Agreement, Tenant Security Plans, Certificates of Networthiness (CoNs), etc.
  • Directly supports Information Assurance (IA) requirements, within the immediate area of responsibility (AOR), managing and tracking system administrator elevated level of access to network resources. Therefore, requires the knowledge of the Army Training and Certification Tracking System (ATCTS), and IA DoD 8570.01 status verification.
  • Works with team members to identify IA trends and suggests long-term strategies to help mitigate IA issues.
  • Analyzes and evaluates risk and makes recommendations that are in compliance with all policies, rules and regulations governing IA functions.
  • Assesses procedures and identifies opportunities to improve customer service.
  • Champions customer service and sets and monitors parameters for customer service excellence.

REQUIRED SKILLS:

  • COTS software/hardware experience: Working knowledge of COTS software/hardware, and network products, including Windows OS, MS Office, Remedy, etc.
    • Working knowledge of WEB filter management tools, such as WebSense.
    • Working knowledge of IDS management tools, SourceFire.
    • Working knowledge of IAVA tools, such as ACAS, Symantec Endpoint, WSUS, HBSS and Fluke air Check.
    • Working knowledge of Server Operating Systems and Microsoft Active Directory.
  • Working knowledge of Information Assurance policies and procedures.
  • Skills/Certifications/Training - Security+ ce certification, and relevant Computing Environment training, in accordance with DoD 8570.01m. ACAS, Retina, Flying Squirrel, and Snort are preferred Computing Environment training.
  • Good oral and written communication skills. Ability to react to customer issues and formulate resolutions quickly.

REQUIRED EXPERIENCE/CERTIFICATIONS/CLEARANCE:

  • 5-7 years of direct related Cyber/IA experience. 3-5 Years of ISSO experience is preferred.
  • IAM Level II Certified Preferred, if not must be obtained within 6 months of hire date. The following certifications are acceptable: CAP/CASP+CE/CISM/CISSP/GSLC/CCISO/HCISPP
  • CompTIA Security+ Required
  • Active Secret clearance

Preferred Education/Training:

  • Certified Ethical Hacker (CEH) certification.
  • ITIL Foundation certification.
  • Cybersecurity Information Systems Security Professional (CISSP) Certification (Preferred).