Mid - Level Information Assurance Specialist

Salary depends on experience
Posted on 10/09/17
Barksdale A F B, LA
5 - 7 years experience
Business Services
Salary depends on experience
Posted on 10/09/17

Job ID 9946

Responsibilities

Functional Responsibilities:

 

ISYS Technologies is looking for a Mid-Level Information Assurance Specialist who will operate fixed and deployed information technology (IT) resources to monitor, evaluate and maintain systems, policy, and procedures to protect clients, networks, data/voice systems and databases from unauthorized activity. They identify potential threats and manage resolution of security violations.  Enforce national, DoD and Air Force security policies and directives; employ hardware and software tools to enhance the security by installing, monitoring and directing proactive and reactive information protection and defensive measures to ensure Confidentiality, Integrity and Availability (CIA) of IT resources. They administer and manage the overall Information Assurance (IA) program to include Communications Security (COMSEC), Emissions Security (EMSEC) and Computer Security (COMPUSEC) programs.  Performs tasks required to maintain, manage, and support Special Access Program / STO computers and network systems used in SMAC.

 

 

Job Duties:

 

  • Conducts IA risk and vulnerability assessments; ensures enterprise IA policies fully support all legal and regulatory requirements and ensures IA policies are applied in new and existing IT
  • Identifies IA weaknesses and provide recommendations for improvement. Monitors enterprise IA policy compliance and provides recommendations for effective implementation of IT security controls
  • Evaluates and assists IT activities
  • Makes periodic evaluation and assistance visits, notes discrepancies, and recommends corrective actions
  • Audits and enforces the compliance of IA procedures and investigates security-related incidents
  • Assists in conducting IT forensic investigations
  • Manages the IA program and monitors emerging securitytechnologies and industry best practices
  • Performs or supervises activities such as detection and protection of IT resources using IA and IA-enabled tools
  • Provides real-time intrusion detection and firewall protection for all IT resources
  • Responsible for IA oversight or management of national security systems during all phases of the IT life cycles
  • Ensures the CIA of IT resources
  • Operates and manages IA tools and IA-enabled tools. Integrates tools withother IT functions to protect and defend IT resources
  • Provides CIA by verifying IA controls are implemented in accordance with DoD and Air Force IA standards
  • Analyzes risks and/or vulnerabilities and takes corrective action
  • Ensures appropriate administrative, physical, and technical safeguards are incorporated into all new IT resources through certification and accreditation
  • Protects IT resources from malicious activity
  • Identify system problems that are of an unusual or complex nature and develops corrective action
  • Designs data products, processes, or programs that enhance functional area management and provide for increased organizational optimization of IT processes
  • Oversees the installation and configuration of applications software and the establishment of user environments
  • Troubleshoots and analyzes unusual or complex hardware and software malfunctions to resolve physical and logical processing problems and recommends acquisition of equipment, software and/or hardware which will resolve operational problems
  • Continually surveys system operation to identify and anticipate potential problems which could lead to loss or serious interruption of service
  • Identifies corrective or preventative procedures and takes actions to rectify immediate problems and prevent future occurrences
  • Performs testing, troubleshoots, and corrects complex or unusual problems involving interface and interoperability of system components such as hardware, systems software, and applications programs.
  • Ensures maintenance and upgrade procedures are established in such a way as to minimize disruption to normal business functions of organizations within the installation
  • Provides proactive consultation and instruction with system users to ensure seamless implementation of changes
  • Troubleshoots complex problems and provides support in a manner that minimizes interruptions in the customers' ability to carry out business activities
  • Coordinates withother IT specialists and management in identifying and correcting unusual or unprecedented problems and providing innovative approaches to solving them
  • Tests and evaluates current and proposed equipment and software enhancement and advises management regarding acquisition proposals designed to enhance mission accomplishment through automation
  • Analyze complex processes and/or a variety of unusual problems, questions, or conditions relative to the design and/or selection of management information systems and applications software technology
  • Evaluates vendor-developed software available over the counter to ensure defined subject-matter requirements can be accommodated
  • Establishes controls for data privacy and security in management information systems
  • Participates as a key member and advisor on special committees and special projects designed to study methods to enhance the use of information technology throughout the installation
  • Works with management to isolate and correct complex problems which hinder the capability of the organization to fully utilize information management technology

 

 

Qualifications

Experience Requirements:

 

  • Bachelor’s degree in Technical, Engineering, or Computer Information Systems related degreerequired or equivalent related military work experience (United States Army [USA] or United States Marine Corp [USMC])
  • 5+ years’ experiencewith Information Assurance or 2+ years with a Master of Science degree
  • Information Assurance (IA) Certification is a condition of employment. This position includes IA work as a paramount duty requirement.  Per DoD 8570.01-M, the incumbent of this position must achieve the appropriate TA certification within six months of assignment of these duties, as system administrative privileges are required on site.  A waiver of this six-month requirement may be granted per DoD 8570.01-M, C3.2.4.2 or C3.2.4.3.  Failure to receive the proper IA certification may result in removal from this position
  • CompTIA Security + certification
  • Department of Defense experience
  • Knowledge of IT application software design principles, methodologies, and approaches used in developing, coding, testing, debugging, and maintaining applications software that support functional requirements
  • 5years of experience in the AFSC 3D0X3, Cyber Surety, or equivalent fields of computer support.
  • Proven experiencewithin the MSWindows environment, to include registry, batch files, and Group Policy updates for patches
  • Proficient in executing TEMPEST certifications and understanding of TEMPEST restrictions within a SCIF or SAPF
  • Previous experience working as a Cyber Surety technician, Information Assurance Officer, Information Protection Officer, COMSEC Responsible Officer (CRO) or Information Systems Security Officer (ISSO)
  • Completion of E3ABR3D033 01AA, Cyber Surety, or equivalent DoD level formal training course
  • Completion of AF 7-level or higher Cyber Surety course
  • Experience in systems administration in a UNIX, Linux/MacOS, or Windows environment and/or software development, testing, and quality assurance is desired

 

 

Desired Experience:

 

  • Knowledge of systems integration methods, performance tuning methods, test and evaluation methods and procedures, IT security principles and methods, and project management principles and methods sufficient to plan and coordinate the installation of new products or equipment
  • Ability to modify existing systems and relate all aspects of the work to overall system requirements, to stay well informed on rapidly changing technology, to advise on and implement new technology, to evaluate its possible impact on organization missions, to develop strategies to satisfy requirements, and to offer alternative approaches in operating systems development and/or problem resolution
  • Completion of a formal Space and/or Cyberspace Warfare operations course or equivalent
  • Certified Ethical Hacking Certification
  • Linux Certification
  • Cisco Certified NetworkAssociate Certification
Not the right job?
Join Ladders to find it.
With a free Ladders account, you can find the best jobs for you and be found by over 20,0000 recruiters.