Experience: 3-6 years experience with architecting and designing security infrastructures and understanding of how to design security devices that are network and systems compliant with the requirements of a desired security posture or state. Highly knowledgeable of security principles such as defense in depth, granularity of privilege; understanding of intrinsic security weaknesses within the core infrastructure components such as TCP/IP, VPN, file transfer, proxy, DNS, and remote administration protocols; pragmatic understanding of security problems as a mix of technology and process issues with the ability to pursue solutions at both layers within the organization. DIACAP / RMF / CoN / ATO documentation and approval experience required.
Functional Responsibilities: Design and architect network and security systems including firewalls, IDS, proxies, policy compliance tools, routers, switches, VPN hardware / software, and other security devices. Executes network security projects in a diverse set of areas that include intrusion detection, end point security, log file correlation, security information management, actively identify where new work efforts are required, and network / security metrics. Takes a leadership role in providing network security advice, such as risk analysis, to business units who engage with the Information Assurance team. Defines, gathers, and reports metrics regarding network and security; provides technical insight for network and security direction and designs to achieve agreed upon objectives; improves stability, availability, and scalability of the network security infrastructure.
Tools: DISA Security Technical Implementation Guidelines (STIGs), Host Based Security System (HBBS), Assured Compliance Assessment Solution (ACAS), Security Content Automation Protocol (SCAP), Intrusion Detection / Prevention Systems, Log correlation and management systems, Vulnerability Scanners (Nessus, eEye Retina, AppDetective and WebInspect), Compliance Scanners (DISA Security Readiness Reviews (SRRs) and Microsoft Management Console), source code and web application scans, and penetration testing (black box, white box, gray box).
Regulations: NIST SP800-37; DOD Instructions: 8500.2, 8510.01; USCYBERCOM IAVA policy and procedures compliance; DIARMF, DIACAP, and FISMA.
Systems: SUN Solaris 9 and 10; Redhat Linux; Sun Enterprise 15K’s,6900’s, or M9000 platforms; Oracle 10G R3 and 11G, Microsoft Windows XP, Server 2003, Server 2008 operating systems; IBM z900, z990, z9 and z10 server systems; and Unix.
Applications: Crystal Reports, .NET, Cognos, VB6, Embedded VB3, VC++, Java, VB.NET, Web Service, Oracle DB, PL/SQL, Java Web, Java Cores, C, Jaspersoft, HTML, SAS, PL/1, DEERS, ADR, Aion KB, DBIDS, VMWare, and NTS/ETAS.
BS/BA Degree in a Technical field. The equivalent of a Bachelor’s Degree is three years additional experience (minimum 6 years total experience) and CISSP
Require at minimum one of the following: CISA, CASP, GCIH, GCED, or CISSP (or Associate). Prefer to also have one of the following: GCIA, CEH, SSCP, CSIH, GCFA, GSNA, CISSP-ISSMP, or CISM.