Sumaria-posted 9 months ago
$33 - $38/Yr
Full-time • Mid Level
Professional, Scientific, and Technical Services

Information Networks are critical to modern warfare. This position plays a critical role in our nation's defense through the operation, management and defense of the Air Force portion of the Department of Defense Information Network. In this role, you will maintain network infrastructure, to include routers, switches, proxies, firewalls, servers, workstations, printers, Storage Area Networks (SAN) and test labs, to provide maneuverability and defense of both classified and unclassified networks. This is expected to include, but not necessarily be limited to, the following activities:

  • Measure effectiveness of defense indepth architecture against known vulnerabilities using available tools within organization to find them.
  • Analyze, prioritize, and mitigate vulnerabilities to lower or eliminate risk.
  • Perform/review/validate vulnerability scans to include analysis of results, identification of false positives, exceptions, and subsequent POA&Ms and/or MFRs creation, monitoring and reporting to include POA&M status and contributions to Monthly and Quarterly reports.
  • Collects and reviews data gathered from a variety of tools (including intrusion detection system alerts, firewall, network traffic logs, and host system logs) to analyze events for possible attacks that occur within computing, network, or enclave environments.
  • Validates, investigates, and analyzes all response activities related to cyber incidents.
  • Create and maintain incident tracking information; plan, coordinate, and direct recovery activities.
  • Perform assessments of systems and networks within the network environment or enclave and identify where those systems and/or networks deviate from acceptable configurations, enclave policy, or local policy.
  • Create reports to effectively communicate to government problems and proposed solutions.
  • Actively manage (inventory, track, and request corrective action) all hardware devices on network that only authorized devices are given access and unauthorized and unmanaged devices are found and prevented from gaining access.
  • Actively manage (inventory, track, and correct) all software on the network so that only authorized software is installed and can execute, and that unauthorized and unmanaged software is found and prevented from installation or execution.
  • Submit tickets to appropriate teams for corrective actions.
  • Other cybersecurity related tasks, as assigned.
  • Education: High School Diploma or GED.
  • Certification Requirements: DoDD 8140 IAT-II; DISA ACAS Supervisor and Operator Course and DISA Forescout Comply to Connect (C2C) Certified Administrator Training (FSCA) AND Security + or CEH.
  • Years of Experience: 3+ years of experience in utilizing security relevant tools to include: NESSUS, ACAS, DISA STIGs, Audit Tools, Forescout, ESS.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service