Computer Network Defense, System/ Network Administratorother related Employment listings at Geebo

Computer Network Defense, System/ Network Administrator

Company Name:
BlueForce LLC
Computer Network Defense, System/ Network Administrator
IMMEDIATE HIRE
Location: Langley AFB Hampton, VA
Skills:
Provide installation, loading and configuration of systems, servers and networks
Responsible for administration of network, computer, or communications systems
Including LAN, WAN, and the organization's website
Also includes administration of user accounts, passwords, permissions, access control lists, email, chat, and other server or network services
Maintains servers, creates monitoring reports and logs and ensures functionality of links
Monitors networks, websites, and servers for acceptable performance and user accessibility
Establishes backups and monitors site security
Responsible for configuration management documentation of network and system topologies
Responsible for applying security lockdowns on all ACC/ A5CX equipment in accordance with Joint Task Force - Global Network Operations (JTF-GNO) and System Program Office (SPO) guidance
Desired Skills:
Conducts scans on all ACC/ A5CX systems to include systems under test/ experimentation to ensure minimum security standards are met
Manages IAVA program and analyzes whether IAVAs are applicable to the ACC/ A5CX enclave
Manages updates to Core enclave systems working in conjunction with system administrators
Monitors networks, websites and servers for acceptable performance and user accessibility
Reports status to the ACC/ A5CX Configuration Control Board
Responsible for applying security lockdowns on all ACC/ A5CX equipment in accordance with Joint Task Force - Global Network Operations (JTF-GNO) and System Program Office (SPO) guidance

Minimum Experience Requirements:
Top Secret/ Sensitive Compartmented Information (TS/ SCI)
5 years' increasingly complex and progressive experience in implementing, administering, performing tests, security scans and analyzing all elements of network systems/ servers/ Web sites
Must have strong experience in large Microsoft, Solaris, Linux, and Cisco environments
Security
or equivalent certification is required

Additional Requirements:
Expertise with intrusion detection, monitoring, and auditing activities including host-based, network-based, and application level
Must perform with mastery of current network security tool suites used to continually validate Security Test and Evaluation (T&E) settings, including, but not limited to: Retina, Assured Compliance Assessment Solution (ACAS), Defense Information Systems Agency (DISA) Gold/ Platinum Disk, System Readiness Review (SRR), Wireshark, Host Based Security System (HBSS), McAfee Anti-Virus and/ or Symantec Anti-Virus
Must have an extensive working knowledge of information, computer and communications security principles required for effectively utilizing host and network based Intrusion Detection Systems (IDS) to provide real-time and retrospective monitoring and analysis including forensic analysis of intrusion events
Must have extensive experience and expertise in communications related fields with a thorough knowledge in NetD reporting criteria and handling procedures and knowledge of Local Area Network (LAN)s, Wide Area Networks (WANs), Virtual Private Networks (VPNs), routers, firewalls, network protocols, and other security and network operations and monitoring
Must maintain compliance with DoD 8570.01-M Change 3 (24 Jan 12), Information Assurance Workforce Improvement ProgramEstimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.