Senior Vulnerability Management Analysis

  • icrunchdata Network
  • SHAW AFB, SC
  • May 23, 2020
Information Technology (IT)

Job Description

Description Join SAIC's Information Technology (IT) Support Services Team in the Network Operations and Security Center (NOSC) of the US Air Forces Central Command (USAFCENT) Communications Directorate (A6). This opportunity places you at the tip of the spear for Engineering, Operations and Maintenance, Cyber Security, and Defensive Cyber Operations supporting the warfighter in the Southwest Asia area. USAFCENT is the air component of United States Central Command (USCENTCOM), a regional unified command. USAFCENT, in concert with its coalition, joint and interagency partners, delivers decisive air and space power on behalf of USCENTCOM for the security and stability of the Southwest Asia (SWA) region. The USAFCENT NOSC delivers cyberspace command and control (C2) superiority to the warfighter by engineering, implementing, securing, managing, operating and maintaining USAFCENT's Non-Classified Internet Protocol Router Network (NIPRNet), Secret Internet Protocol Router (SIPRNet), USCENTCOM Partner Networks (CPN-X), and associated C2 networks, systems and services. The USAFCENT NOSC executes the full-spectrum of IT services management and operations for USAFCENT networks 24 hour-a-day, 7 day-a-week (247) and is tasked by USCENTCOM to provide information assurance (IA) boundary intrusion detection and intrusion prevention for USCENTCOM components. Comprised of NOSC operations, operations support, cybersecurity, network engineering, and command support functions, the USAFCENT NOSC plans, engineers, installs, integrates, operates and maintains, protects and manages enterprise-wide network and systems architecture, infrastructure and services and provides enterprise-level oversight to its subordinate and supported communications support activities. Candidates will be working at Shaw AFB, SC andor Lackland AFB, TX. Frequent temporary duty (TDY) andor deployment travel to OCONUS locations in the USCENTCOM AOR is required to support sustainment, site surveys, installations, upgrades, integration, testing, troubleshooting and other mission-related requirements. The candidate for this position develops technical solutions to complex problems which require the regular use of ingenuity and creativity, exercises considerable latitude in determining technical objectives of assignment, exercises judgment in selecting methods, techniques and evaluation criteria for obtaining results, applies extensive technical expertise and has full knowledge of other related disciplines, provides guidance to subordinates to achieve goals in accordance with established policies, and establishes and recommends changes to policies which affect subordinate organization(s). Senior Vulnerability Management Analysis Designs, tests, and implements secure operating systems, networks, security monitoring, tuning and management of IT security systems and applications, incident response, digital forensics, loss prevention, and eDiscovery actions. Conducts risk and vulnerability assessment at the network, system and application level. Conducts threat modeling exercises. Develops and implements security controls and formulates operational risk mitigations along with assisting in security awareness programs. Involved in a wide range of security issues including architectures, firewalls, electronic data traffic, and network access. Researches, evaluates and recommends new security tools, techniques, and technologies and introduces them to the enterprise in alignment with IT security strategy. Utilizes COTSGOTS and custom tools and processesprocedures in order to scan, identify, contain, mitigate and remediate vulnerabilities, and intrusions. Assists in the implementation of the required government policy (i.e., NISPOM, DCID 63), and makes recommendations on process tailoring. Performs analyses to validate established security requirements and to recommend additional security requirements and safeguards. Supports the formal Security Test and Evaluation (STE) required by each government accrediting authority through pre-test preparations, participation in the tests, analysis of the results, and preparation of required reports. Periodically conducts a review of each system's audits and monitors corrective actions until all actions are closed. May support cyber metrics development, maintenance and reporting. May provide briefings to senior staff. Utilizes COTSGOTS and custom tools and processesprocedures in order to scan, identify, contain, mitigate and remediate vulnerabilities, and intrusions. Assists in the implementation of the required government policy (i.e., NISPOM, DCID 63), and makes recommendations on process tailoring. Performs analyses to validate established security requirements and to recommend additional security requirements and safeguards. Supports the formal Security Test and Evaluation (STE) required by each government accrediting authority through pre-test preparations, participation in the tests, analysis of the results, and preparation of required reports. Periodically conducts a review of each system's audits and monitors corrective actions until all actions are closed. May support cyber metrics development, maintenance and reporting. May provide briefings to senior staff. Represents organization as prime technical contact on contracts and projects. Interacts with senior external personnel on significant technical matters often requiring coordination between organizations. Specific duties for this position include, but are not limited to Install, configure, maintain, and manage the USAFCENTUSCENTCOM security devices to include but is not limited to IDSIPS, ArcSight Enterprise Security Manager, ACAS and associated Virtual Private Network (VPN) equipmentconfigurations and assist in development and documentation of sensor processes and checklists. Develop methods to detect and prevent intrusive activities utilizing knowledge. Assist NOSC-Cybersecurity to develop countermeasures to isolate, contain and prevent intrusive actives and secure USAFCENTUSCENTCOM networks (to include IDSIPS signature development and correlation rule sets). Monitor network traffic to determine system vulnerabilities and required fixes apply established network security procedures, logs and makes recommendation for correcting network security incidents and coordinate the escalation of security issues requiring detailed analysis to Security Analyst. Conduct network security monitoring Enterprise wide vulnerability scanning with ACAS

Job ID

SAIC