Register Here to Apply for Jobs or Post Jobs. X

Cybersecurity Counter Access Specialist

Job in SC South Carolina - USA
Company: CACI International Inc.
Contract position
Listed on 2021-02-24
Job specializations:
  • IT/Tech
    Computer Networking, Network Security, Network Administrator, Network Engineer
  • Security
    Network Security
Job Description & How to Apply Below
Location: Shaw Air Force Base
Job Description

What You'll Get to Do:

CACI has an exciting and immediate opportunity for a Cybersecurity Counter Access Specialist to support the USAF Network Operations Security Center (NOSC). This position works at the customer on-site Tier 3 support location at Shaw Air Force Base in South Carolina.

More About the Role:

In this role you will:

* Monitor network traffic to determine system vulnerabilities and required fixes; apply established network security procedures, log, and make recommendations for correcting network security incidents; and coordinate the escalation of security issues requiring detailed analysis.
* Build tactical and strategic network profiles for specific systems and complete network architecture.
* Analyze network intrusion detection systems and conduct vulnerability assessments.
* Utilize network intrusion devices and information assurance tools, including but not limited to, Internet Security Scanner (ISS), Cisco Security Agent (CSA), and other zero-day personal firewall and security agents.
* Provide an overall site-analysis profile to serve as a benchmark to identify unusual or suspicious activity.
* Analyze live and historical data for events related to possible network infiltration
* Maintain current knowledge on new vulnerabilities and exploits. Develop countermeasures (to include IDS/IPS signature development and correlation rule sets) to isolate, contain and prevent intrusive actives and secure networks.
* Develop methods to identify contain, log, and analyze intrusive activities and security vulnerabilities on networks.
* Perform network traffic and host analysis to evaluate intruder activities using host and network-based monitoring system. Correlate information gathered to provide effective methods to protect the domain. Ensure appropriate notification action is taken to reduce the risk to networks.
* Conduct network and computer forensics on suspected and confirmed compromised system to determine the method of intrusion and corrective actions to be taken to prevent or detect similar future activities.
* Develop methods to identify contain, log, and analyze intrusive activities and security vulnerabilities on networks. Prevent intruders from accessing resources. Maintain current knowledge on new vulnerabilities and exploits. Develop countermeasures (to include IDS/IPS signature development and correlation rule sets) to isolate, contain and prevent intrusive activities and secure networks.
* Maintain current knowledge on existing and new malware behavior and propagation characteristics. Maintain current knowledge on the anti-virus tools currently in use. Develop methods to identify, contain, log, and analyze malware-based activities on networks.
* Utilize DOD mandated vulnerability scanner to scan for vulnerabilities on the enterprise.
* Use vulnerability toolset to determine networks and systems security weaknesses and shortfalls. Research and coordinate vulnerability findings to provide detailed fix actions. Coordinate with other computer emergency response teams (CERT) to ensure latest known vulnerabilities are properly identified and corrected.
* Manage and maintain control of network intrusion detection systems (IDS). Ensure end-to-end operations for network and information technology systems.
* Perform security device/sensor maintenance, troubleshooting and fault isolation to ensure network connectivity to sensor equipment.
* Establish VPNs between sites for protected communications and access control lists to restrict unauthorized access to network resources.
* Monitor network traffic to determine system vulnerabilities and required fixes; apply established network security procedures, logs and makes recommendation for correcting network security incidents; and coordinate the escalation of security issues requiring detailed analysis.
* Examine logs and information gained from network sniffers or protocol analyzers to determine if possible unauthorized access has occurred; identify, track, and record suspected intrusion or actual security breach; and detail analyses in written reports for legal use. May be required to provide oral or written findings and explanation of events for any legal actions associated with security breaches.
* Schedule, coordinate and attend daily Theater Network Control Central Cyber Defense briefings.
* Facilitate weekly Information Assurance teleconferences.

You will also be required to:

* Provide support in the application of network security devices
* Install and maintain network devices such as routers, switches, bridges, and hubs
* Implement wide area and local area network architectures
* Perform installation and administration of hardware, software, and services in a client-server environment
* Optimize operations on a network and systems level
* Configure Dynamic Host Control Protocol (DHCP), Windows Internet Naming Service (WINS), Dynamic and Integrated Domain Name Service (DNS), and Active Directory (AD) services
* Apply proper security measures to safeguard government IT infrastructure
* Implement Public Key Infrastructure (PKI) technology for network and systems access
* Assist deployed IT support staff with the use and migration of PKI-enabled systems
* Research, document, and track to resolution all outages, trouble calls, virus outbreaks, and network intrusions
* Analyze and report on the overall health of local and deployed networks
* Recommend appropriate changes/resolutions in response to observed trends in Enterprise Level Cisco and Microsoft fault isolation and correction
* Configure and maintain DNS and BIND domain name services on UNIX and Microsoft platforms
* Implement Certificate Authority (CA), Online Certificate Status Protocol (OCSP), and LEAP server PKI technologies
* Serve as consultant on enterprise IT/Cybersecurity equipment, systems, software, and support services
* Provide remote engineering and technical support to assist local and deployed IT support personnel
* Provide technical assistance on assigned projects
* Supplement government IT and Cybersecurity personnel to support the day-to-day management, operation, maintenance and administration of enterprise IT systems and services
* Perform preventive, remedial, and corrective maintenance
* Install, configure, optimize, update, patch and maintain server, client and network operating systems and integrate and apply authorized third-party drivers, applications, and software
* Monitor network/systems hardware, software, and services for indications of warnings, faults, errors, anomalies, alarm conditions and/or outages
* Provide local and remote fault isolation, diagnostics, troubleshooting and restoration services
* Provide on-call support via cell phone after hours, on weekends and holidays
* Assist with configuration and cybersecurity program inspections and audits
* Assist the government's Accountable Property Officers/Equipment Control Officers with communications and IT asset management and related activities
* Develop, update, and maintain facility, network, and systems documentation
* Use Microsoft Project Server to document, update, and track and report the status of assigned projects
* Develop and review technical documents and checklists to explain abstract IT and cybersecurity technologies and concepts
* Develop and review detailed or complex technical documents such as techniques, tactics, and procedures (TTPs), concepts of operations (CONOPS), special instructions and engineering plans, for supported enterprise IT and cybersecurity technology, services, applications, and processes
* Host and/or participate in technical meetings as necessary
* Develop and provide meeting agendas and minutes, as requested by the government.
* Support continuity and on-the job training to contractor and government technical support personnel (CONUS and OCONUS)
* Deploy/ travel to OCONUS locations in the USCENTCOM AOR to support sustainment operations, projects, surveys, installations, upgrades, testing, troubleshooting, and training

You'll Bring These Qualifications:

Required:

* DoD Secret Security Clearance (or the ability to obtain a Secret clearance prior to starting)
* BS in related field and 5 or more years' experience; OR 7 or more years' of relevant IT experience.
* Firewall experience.
* Excellent customer service skills
* Excellent verbal and written communication skills
* CSSP-A Baseline Certification (CEH)
* Minimum Professional Certifications:
* MCSA
* Network+ CE
* Firewall (Linux+)
* ITIL Foundations



These Qualifications Would be Nice to Have:

* Experience working in DoD, Air Force, and local base environments

What We Can Offer You:

* We've been named a Best Place to Work by the Washington Post.
* Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives.
* We offer competitive benefits and learning and development opportunities.
* We are mission-oriented and ever vigilant in aligning our solutions with the nation's highest priorities.
* For over 55 years, the principles of CACI's unique, character-based culture have been the driving force behind our success.

ASN1

Job Location

US-Shaw Air Force Base-SC-COLUMBIA

CACI employs a diverse range of talent to create an environment that fuels innovation and fosters continuous improvement and success. At CACI, you will have the opportunity to make an immediate impact by providing information solutions and services in support of national security missions and government transformation for Intelligence, Defense, and Federal Civilian customers. CACI is proud to provide dynamic careers for employees worldwide. CACI is an Equal Opportunity Employer - Females/Minorities/Protected Veterans/Individuals with Disabilities.
Position Requirements
Less than 1 Year work experience
 
 
 
Search for further Jobs Here:
(Enter less keywords for more results. Suggestions may be selected)
Location
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
LOGIN Area - Jobsite