The IT Trainer/Developer assists with curriculum development and provides instructor-led and web-based training to staff onsite at headquarters and in field offices. He/she develops, participates and conducts training programs for customer on new processes and implementation of policies.
Plan, develop, implement, and manage Quality on assigned programs over their life cycle, ensuring that contractors meet their RESPONSIBILITIES for product quality in accordance with the contract requirements, and that systems fielded to Soldiers are of high quality and meet user requirements.
The IA Engineer reviews weekly security posture of computer system configurations, identify deficiencies, and identify actions needed to correct the deficiencies. This includes regular weekly patches, as well as as-needed efforts.
The Information Systems Security Engineer shall perform; or review; technical security assessments of computing environments to identify points of vulnerability; non-compliance with established Information Assurance (lA) standards and regulations; and recommend mitigation strategies.
Perform all testing activities for initiatives across one or more assigned projects, utilizing processes, methods, metrics and software that ensure the quality, reliability and systems safety and security.
Familiarity with NASA IT Security CISSP and/or Security + (at a minimum, exam passed) Working knowledge of Apple OSX, Solaris 11 and Linux. Working knowledge of systems security tools, including Nessus, Foundstone, BigFix, ForeScout.
In this role, you will performs incident investigative analysis support and compiles technical artifacts and evidential material using security content monitoring tools, intrusion detection tools, and security information & event management tools.
The primary focus will be to maintain system Operational Availability and ensure that information can be collected in the field utilizing the appropriate sensors in a secure manner and can pass Security Audits and Information System Security Assessments relative to Information system security policies and procedures.