Computer Security Systems Specialist

By Light Professional IT Services LLC
1d

About The Position

By Light Professional IT Services LLC readies warfighters and federal agencies with technology and systems engineered to connect, protect, and prepare individuals and teams for whatever comes next. Headquartered in McLean, VA, By Light supports defense, civilian, and commercial IT customers worldwide. By Light Professional IT Services (By Light) are leading providers of innovative Information Technology (IT) services and communications support to the Department of Defense and Federal Agencies. By Light is looking for personnel to support a U.S. Army information technology infrastructure program. The project includes conducting survey and design, engineer, furnish, install, secure, and test (EFIS&T) solutions to include non-secure internet protocol router (NIPR), secure internet protocol router (SIPR), Wi-Fi, Voice over Internet Protocol (VoIP), Inside Plant (ISP), Outside Plant (OSP), and Voice Modernization at U.S. Army Base/Post/Camp/Station (B/P/C/S) across the Continental United States (CONUS).

Requirements

  • Bachelor’s Degree in Cybersecurity, Information Assurance (IA), or relevant IT degree with demonstrated coursework related to cybersecurity an/or information assurance. Additional four (4) years of relevant experience allowed in lieu of degree allowed
  • Ten (10) or more years cybersecurity or information assurance experience, with at least two (2) years leading cyber or IA personnel or teams
  • Must meet DoD Approved 8570 certification requirements for IAT-III
  • Active Top-Secret clearance with eligibility for Sensitive Compartmented Information

Nice To Haves

  • Certifications and/or experience in Zero Trust preferred

Responsibilities

  • Design and plan security measures per PWS 14.3 to protect the network and system unauthorized access or attacks IAW DISA STIGS/SRGs, IAVAs, and DODI 8100.04.
  • Research, review, maintain, and reference all Cyber Security artifacts: Security Technical Implementation Guide (STIG) checklist, internetwork operating systems versions, Plan of Action & Milestones (POA&M), list of hardware and software, etc., test plan(s), data connectivity plan, training plan, implementation plan, transition/migration plan, and installation team checklists.
  • Align to NIST 800-53 and CIS Benchmarks; Provide all fielded systems cybersecurity requirement artifacts to the GENM-A ISSM for approval.
  • Provide PM for CDRL delivery a diagram (topology, physical, data flow, logical) of the system/network design to GENM-A ISSM for delivery NLT five days of acceptance and approval by the Government.
  • Provide the design and engineering plans to conduct vulnerability assessments, perform penetration testing, implement intrusion detection/prevention systems, and configure security policies (firewall rules, access control lists)
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service