IA Architect/Cybersecurity Engineer (ID#008)

Tampa, Florida

Post Date: 07/18/2017 Job ID: JN -042017-8740 Industry: IT - Cleared
IA Architect, Cybersecurity/Incident Response Active TS/SCI Clearance and CISSP Required

SRG Government Services (SRG) is a leading provider of information technology, training, engineering, accounting and intelligence analytical services for agencies in the intelligence, defense, homeland security, cyber security, and federal civilian markets. SRG utilizes an innovative approach to identify and qualify talent that is unique to the federal contracting industry, featuring a cutting edge platform that allows us to rapidly and precisely match professionals to client requirements. We have a proprietary database of over one million candidates and maintain continuous contact with our qualified talent.

Location: Tampa, FL
Industry: Defense
Employment Type: Contract-to-Hire (5-6 months); shift work position with shift differential once perm
Salary: $95-100k

Job Description: Position is shift work and requires night and weekend work to include some holidays. Perform as part of the SOCOM Cyber Security Incident Response Team (CSIRT), working closely with USSOCOM Global NETOPS Control Center (GNCC) CND Watch to resolve detected network security incidents across the SOF Information Environment (SIE) and help ensure USSOCOM Collateral and JWICS networks are well protected from insider and outsider threat.

  • Must have active TS/SCI clearance
  • Bachelor s in computer science discipline and 8 years of experience OR additional 4 years in lieu of degree
  • CISSP or equivalent certification required prior to start
  • Working knowledge of computer incident response procedures and techniques
  • Must be comfortable reviewing audit logs and searching for computer incidents; ability to conduct network audits, read and understand audit logs, and determine actions to be taken when discrepancies are detected
  • Knowledge of DOD IA processes and policies (CJCSM 6510.01, Incident Response, etc.)
  • Ability to respond to network intrusions and perform limited forensic investigation
  • Ability to review security evaluations and vulnerability assessments using the Assured Compliance Assessment Solution (ACAS) and DISA STIGs
  • Familiarity with customer cybersecurity policies/procedures to provide guidance to users as needed
  • USCENTCOM/USSOCOM experience is desired
  • Position is shift work and requires night and weekend work to include some holidays

Job Duties:
  • Manage day-to-day cybersecurity incidents; work closely with HQ USSOCOM, SOCOM Components, Theater SOCS, CND Watch, and other SOF deployed units to quickly resolve identified or suspected malicious activity
  • Monitor network security and enterprise CND sensors for malicious activity or intrusion using tools such as McAfee HBSS, Sourcefire Intrusion Detection System (IDS), Bluecoat Web Filter, Ironport email Gateway, Splunk Security Information and Event Management (SIEM), and Kiwi Syslog
  • Review NTOC Advisories, Suspicious Activity Reports, Tippers, and other cybersecurity reports received from the Global NETOPS Support Center, USCYBERCOM, NSA, etc.
  • Assist with classified data spill detections/clean-up; provide advice on ports/protocols/services change requests
  • Open incidents in the Remedy IT Service Request Management (ITSRM) system and track to completion
  • Work with end-users and Component and TSOC sites to collect data regarding cybersecurity incidents
  • Recommend solutions for improved correlation of audit data to detect malicious cyber incidents

Apply Online

Not ready to apply?

Send an email reminder to:

Share This Job:

Related Jobs: