Information Assurance Specialist Team Leadother related Employment listings at Geebo

Information Assurance Specialist Team Lead

Company Name:
Arca24.com
Salary period: Annual
Additional classifications: Engineering
TASC is seeking experienced professionals to join the Intelligence Solutions and Analytics (ISA) Sector. ISA provides specialized systems engineering, acquisition, and intelligence support to multiple Intelligence Community customers. The Information Assurance Specialists will provide security support services to the Agency's Cyber Security Operation Cell (CSOC) functional operations to perform 24x7x365 event monitoring, event investigating, and support the activities and equipment needed to safeguard computer infrastructure. Team will also provide the necessary Operations and Sustainment (O&S;) of the specialized equipment needed to perform the functions and manage the programs, described below:
Provide an integrated, overarching contract execution strategy that coordinates all functionalities (e.g., technical support, configuration, logistics and program management, cost control, schedules; to include monitoring and reporting)
Provide day-to-day management of contractor personnel including but not limited to Incident Analysts, Network Engineers, SIEM SME, SIEM Content Engineer, and database personnel identified to meet program requirements.
Support overall management of program to ensure 24x7x365 monitoring for potential compromise, intrusion, deficiency, significant event or threat to the Agency's security posture security baseline.
Be responsible for collection of Security Systems metrics as defined by the government.
Recommend opportunities for continual improvement, including industry best practices and recommends changes to the Security Systems and reporting process.
Oversee team assessment of intrusion risks for Agency's systems and networks. The assessments shall include, but not limited to: risk analysis, solutions to risk factors, and mitigation strategies.
Develop training and certification maintenance program for contractor personnel.
Evaluate, modify, or create Training Program SOPs for Security System analysts.
Maintain and develop new documentation in all areas including: SOP, Concept of Operations (CONOPs), internal training plans, technical white papers, technical tool documentation, meeting minutes, status reports, daily operations, briefings, training courses, and other documentation as specified by the government.
Support the Hand Receipt Holders (HRH) to control property, track, inventory and maintain government property records for government furnished equipment.
Produce quarterly briefings detailing conditions of Security Systems, mitigation and plans.
Oversee installation solutions and design system specifications, standards, and programming.
Participate in special projects as required.
Subject to government approval, develop detailed recommendations for implementation of sustainment upgrades, recapitalization, and reconfigurations resulting from the technology insertion, services planning, and programming functions. These recommendations shall reflect the design, development, and implementation costs to replace and/or upgrade equipment and/or software as part of regular O&M; for any of the functional areas. This will include, but not be limited to: Network Intrusion Sensors (servers), Host-based Intrusion Detectors (servers), Intrusion Prevention appliances or servers, Taps, management consoles, PKI workstations, IAO policy control system and equipment and vulnerability assessment servers; implementing a storage solution for journaling; and standardizing of controlled interfaces of IDS equipment.
Provide Program Management Review (PMR), After Action Reports (AARs), and daily network status coordination meetings.
Follow SOPs and notify the CSOC Leadership of any compromise, intrusion, deficiency, significant event or threat to the Agency'security posture, and/or system failures or outages, (e.g., a power failure).
Prepare a one-page AAR within four (4) hours from the time of incident(s) and initial government discussion.
Prepare and complete an Annual Information Technology Disaster Recovery (ITDR) Testing at a working-level event designed to facilitate communication between recovery team members on how to execute and improve system and data recovery at the primary operations site and planned alternate locations following an event that causes a service disruption. Exercise is needed and designed to improve readiness to respond in a contingency situation.
Support full access for the periodic Independent Verification and Validation (IV&V;) process including audits, continuous monitoring, and C&A; penetration testing of Agency systems and networks.
Required
Qualifications:
TS/SCI Clearance
Any Master's degree. Master's degree in Computer Information Systems, Computer Science, Information Technology, Information Science, Information Systems, or a related academic disciplines of science,technology, engineering, or mathematics preferred
15-19 years in related field with minimum 6 years in Incident Monitoring
Program Management Professional (PmP) cerification preferred
SourceFire Certified Professional (SFCP)
DoD 8570 Management Level III
Demonstrated Intrusion Analyst experience
Demonstrated Network Packet Traffic Analysis experience
ISC2 recognized professional certifications preferred
Demonstrated Experience in Cyber Intelligence briefing preparation and presentation preferred
Demonstrated Experience leading an Incident Monitoring Team preferred
Demonstrated Experience working in a Security Operations Center preferred
Network Infrastructure Architecture and Implementation experience preferred
Systems Engineering & Process Improvement experience preferredEstimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.