close

Information Assurance Jobs

cyberspace workforceDIARMF JobsInformation Assurance Jobsrisk jobs

Full Time Position Immediate Interview Need Network Technician location Gunter AFB Montgomery, AL with Air Force

Air Force Network Technician location Gunter AFB Montgomery
Conduct network security monitoring and intrusion detection analysis for the NIPRNet and SIPRNet using the AF’s selected IDS/IPS toolset
–  Research NIPR and SIPR defensive cyber operations events to determine the necessity for deeper analysis and conduct an initial assessment of type and extent of intruder activities.
–  Enter event data into mission support systems according to operational procedures and reports through the 33rd operational chain.
–  Record suspicious events, meeting established thresholds, into the operational database for suspicious traffic. Records shall contain sufficient information to stimulate future research of suspicious traffic. The record shall answer the: who, what, where, why and when for this suspicious activity.
–  Provide computer security-related assistance to Air Force field units (example: the Integrated Network Operations and Security Center (INOSC), Base Information Assurance shop) in countering vulnerabilities, minimizing risk, and improving the security posture of AF computer networks and systems within the scope of operational requirements and mission execution.
BASIC QUALIFICATIONS:
–  Intermediate knowledge with one or more of the IDS/IPS systems currently in use by the Department of Defense (DoD), Services, and Agencies (i.e., AF, Navy, Army, DC3, DISA) or Federal Government and intermediate experience in the following areas:
EDUCATION REQUIREMENTS:
–  One or more of the following IAT Level II Certifications (GSEC, Security +, SSCP, CCNA-Security)
–  CND Certification (GCIA, CEH, GCIH).
Thanks & Regards,
Harpal Singh
Technical Recruiter
22nd Century Technologies Inc. (TSCTI)
8(a) / SDB | CMMI level 3 Certified
read more
cyberspace workforceDIARMF JobsInformation Assurance Jobsrisk jobs

Need Help Desk Specialist in Honolulu, HI with US Army

Help Desk Specialist in Honolulu
Job title :Help Desk Specialist
Location: Honolulu, HI
Client : US Army
CLEARANCE: SECRET
Description
  • The contractor shall provide service execution to CLIN conversion within two (2) business days.
  • The contractor shall provide service management to EITSMS processing within one (1) business day.
Contractor will implement and operate an IT Infrastructure Library (ITIL)-based service desk to provide the HQ a single assured point of contact for all Automated Data Processing (ADP) hardware, software, and networking problems; for service requests, to include new systems, major modifications to existing systems and entry points for emerging technologies. Also maintains service catalogs, an approved product list, and
a knowledge base for Service Desk operations. Adhere to HQs policy of using Information Technology Requests for all maintenance requests. Documents all users’ trouble calls and coordinates all software maintenance changes with government leads while ensuring project maintenance logs are maintained and reviewed.
Special Qualifications:
  • experience using Microsoft Office tools (Word, PowerPoint, Excel, and Outlook)
  • Security+ Certification
Thanks & Regards,
Kartik Jain
Technical Recruiter
read more
cyberspace workforceDIARMF JobsInformation Assurance Jobsrisk jobs

Need Information Systems Security Officer in Herndon, VA

Need Information Systems Security Officer in Herndon, VA
Information Systems Security Officer

Location: Herndon, VA
Duration: 1 year
US Citizenship Required –  Public Trust or Secret Clearance Tier III
Summary• Advises key technical personnel of system regarding design, engineering and compliance requirements
• Advises key stakeholders of security posture and risks associated with the system
• Reviews configurations changes for the system and the impact of changes
• Creates, manages and facilitates NIST based security documentation and controls
• Identifies, manages and facilitates remediation of security weaknesses

Job Responsibilities/ Duties:
• Develop, consult, implement controls and documentation for the security of the system. This includes: outlining system operating environment, overall mission, physical diagrams, hardware and software inventories, configuration management, type of data processed, user organizations, security classifications, operating modes, interconnections to other systems/networks, security personnel, and other associated responsibilities.
• Oversee, develop, improve and maintain the overall security posture of the system; that includes: Information System Security Plans, Risk Ratings, Contingency Plans, Security Assessments, and Contingency Plan Tests and other associated documentation.
• Participate in the development or revision of security controls of the system and local operating procedures that are based upon regulatory, policy and industry requirements.
• Act as a consultant to system owners for the security of the system and system documentation. For example, security incident reports, equipment/software inventories, operating instructions, technical vulnerability reports, and contingency plans
• Provide expertise in classified and unclassified ratings to customers.
• Work closely with technical teams for successful Certification & Accreditation of the system that leads to ATO
• Attend ISSO training courses and sessions as required
• Perform interpretations of monthly vulnerability scan results of assigned systems

Required Training:
Senior Level IT Security Certifications (CCDP, CCNP Security, CISSP, CISM, etc.)
Education/Equivalent Training Required: Bachelor’s Degree or equivalent experience will be evaluated
Unique/Additional /Experience (Position Specifics):
Expert knowledge of FISMA and NIST Special Publications
Experience implementing, assessing and managing security controls for federal IT systems
Expert knowledge of IT security best practices
Expert knowledge of current IT security threats
Broad knowledge of IT technologies and operations
Ability to develop good working relationships with customers, colleagues and other stakeholders.
Excellent verbal and written communication skills
Ability to handle and prioritize multiple simultaneous systems, projects and other assignments.
Experience leading information security teams
Knowledge of HIPAA, FedRAMP, PCI, ISO and other standards
Location(s): District of Columbia (Metro Area),
Department: IT Security
Keywords: Certification and Accreditation, C&A, A&A, SA&A, FISMA, compliance, information assurance, ISSO, AISO, ISO, IASO and ISSM
Comments: US Citizen, US Government Suitability Determination and DoE Q Security Clearance is a Plus

Thanks & Regards,
Kartik Jain
Technical Recruiter
read more
cyberspace workforceDIARMF JobsInformation Assurance Jobsrisk jobs

Cyber Security Analyst / Information Assurance Analyst with Security+ CE in Monterey, CA with Defense Language Institute

Security Analyst in Monterey CA with The DLI
Agency:                                DLI (Defense Language Institute) 
Position:                              Cyber security / Information Assurance Analyst
Duration:                             Full Time
Location-                             Monterey, CAJob Description:
Security+CE certification Must!
Duties may include:
•             Support an Information Systems Security, Education, Training, and Awareness Program.
•             support implementation and enforcement of Information Security Policies and Procedures.
•             Review and update all Information Systems Security Plans/SSPs and support certification and accreditation efforts.
•             Provide technical support in the areas of vulnerability assessment, risk assessment, and security implementation.Technical Skills:
Information Assurance
HBSS
ACAS
STIG
Retina, MacAfee
Thanks & Regards,
Harpal Singh
Technical Recruiter
22nd Century Technologies Inc.(TSCTI)
read more
cyberspace workforceDIARMF JobsInformation Assurance Jobsrisk jobs

IT OPERATIONS ENGR – COMPUTE

IT OPERATIONS ENGR – COMPUTE
Title                                                      IT OPERATIONS ENGR – COMPUTE (5388997)
Location:                                            CHATTANOOGA TN
Duration:                                             9-12 Months
Hours:                                                 8:00am to 5:00 pm
Job Description
  • FOLLOWS THE ENGINEERING DESIGN PROCESS TO PROVIDE COMPLETE IT SOLUTIONS INCLUDING HARDWARE, SOFTWARE, CONFIGURATION, AND PROCESS BASED ON COLLABORATION AND ANALYSIS WITH STAKEHOLDERS, INDUSTRY BEST PRACTICE AND BEST VALUE SOLUTIONS.
  • LEVERAGE ADVANCED KNOWLEDGE IN MULTIPLE TECHNOLOGIES;
  • COLLABORATE WITH PEERS TO ANALYZE PERFORMANCE OF COMPONENTS AND SYSTEMS TO TROUBLE SHOOT, EVALUATE PERFORMANCE, AND DETERMINE CAPACITY.
  • USES ROOT CAUSE ANALYSIS, CORRECTIVE ACTIONS, TACTICAL PLANNING AND STRATEGIC PLANNING TO CORRECT PROBLEMS, PROVIDE IMPROVED RESPONSE AND PROJECT LONG TERM INVESTMENTS REQUIRED TO PROVIDE SUFFICIENT SUPPORT FOR IT SERVICES TO THE BUSINESS.
  • ABILITY TO MANAGE OR PARTICIPATE ON COMPLEX ISSUES IMPACTING THE INFRASTRUCTURE.
  • A BACHELOR’S DEGREE IN COMPUTER SCIENCE, ENGINEERING, MATHEMATICS, BUSINESS ADMINISTRATION, OR RELATED FIELD OF STUDY; OR EQUIVALENT EDUCATION, TRAINING & EXPERIENCE.
  • ADVANCED KNOWLEDGE OF SERVER INCLUDING SOLARIS, LINUX, WINDOWS SERVER, VMWARE ESX, VCLOUD, EMC, AND JVMS IN ALL AREAS (EXAMPLES: CONFIGURATION, TUNING, CAPACITY MANAGEMENT, SECURITY, COMPLIANCE, MONITORING, AUTOMATION, SUPPORT, VENDOR RELATIONSHIPS, AND OTHER AREAS) HARDWARE INCLUDING ORACLE, HP BLADE, CISCO UCS, VERITAS. KNOWLEDGABLE IN DEVELOPING, IMPLEMENTING, TROUBLE SHOOTING AND SUPPORTING CLOUD BASED SOLUTIONS.
  • IN DEPTH KNOWLEDGE AND UNDERSTANDING OF A BROAD RANGE OF MANAGEMENT, COMPUTE AND NETWORKING TECHNOLOGIES.
Additional Job Details: 
Need someone that is a windows resource that might also have some cloud experience.
This is a request for 1 position but could possibly turn into more. Depends on the candidates received.
Skills needed include:
Advanced Knowledge
• Server 2003/2008 Upgrade Experience
• Group Policy Configuration
• Active Directory Organizational Design Experience
• Microsoft Hyper-V
• File Shares and Access Based Enumeration
• 2012 DFS and Namespace Basic Knowledge
• Active Directory Sites and Services
• DHCP
• DNS
• VMWare
• Technical Documentation
Soft Skills:
• Punctual
• Positive Attitude
• High Aptitude for new technology
• Excellent verbal and written communication Good to have but not required:
• Active Directory Federation Services
• Public Azure enterprise administration
• VMware vSphere 5.1, 5.5, 6.0
• System Center Configuration Manager
Thanks & Regards,
Simranjeet Singh
Intern Recruiter
Fax No: 609-228-4044
read more
cyberspace workforceDIARMF JobsInformation Assurance Jobsrisk jobs

Remote Position: Security Engineer/ Architect: Greenwood Village, CO

Greenwood Village, CO

Job Title: Security Engineer/ Architect (50% Remote)
Location: Greenwood Village, CO
Duration: 12+ Months Contract (Very High possibility of Extension/ Conversion)

Job Description:
KP’s Cyber Security team is looking to expand, mature, and execute the Enterprise Technology Security Hardening Service.  The goal of the Security Hardening Service is to develop security-hardening standards for platforms, applications, networks and protocols.  These hardening standards serve as the gold image requiring compliance for all implementation of a particular technology or a protocol.  The hardening standards take into account the entire lifecycle of a technology or a protocol, and include hardening requirements and/or security recommendations for each phase in the lifecycle from a people, process and technology perspective. These baselines are produced and maintained for applications, networks, and platforms to ensure consistent implementation of technical security controls across KP’s technology landscape. This position is focused towards providing expert level security guidance for producing and maintaining security certifications for KP’s IT landscape based on identification and analysis of security control gaps, industry security best practices, regulatory guidance, and KP’s IS Policies. The position will also involve building a security strategy for the service to ensure the service is extensible to accommodate the changing IT landscape for near term future (e.g. cloud, mobile, big data etc.).

Top 3-5 Daily Responsibilities:

  • Perform Security Hardening Service Design including process, methodology, and any tools that would be required to ensure hardening standards are developed using a repeatable methodology.
  • Formally document the artifacts for various phases of security architecture engagements, and obtain sign-off from all stakeholders.

Top 3-5 Required Skills:

  • BS in IT-related or engineering degree and 4 years of experience  in IT industry, OR Associates/ equivalent collegiate certificate in an IT-related or engineering degree program and six years of experience in IT industry.
  • At least two years of experience in general endpoint configuration management and/or computer engineering, with one year of specialized experience in the following platform OS’s:   (requirements can be broken up among different people)
  • Windows Professional
  • Windows Server
  • Linux (RedHat & Suse)
  • Unix (Solaris)
  • At least one year specialized experience in interpreting and applying a system of cyber security controls to endpoints, such as NIST 800-53, Defense Information Systems Agency Security Technical Implementation Guides (DISA STIGs), or Center for Internet Security (CIS) Security Benchmarks.
  • Demonstrated understanding of cloud computing and mobile computing concepts and how to apply them.

Desired Skills:

  • At least one year’s specialized experience in configuring security settings and setting Enterprise security policy for the following operating systems:  (requirements can be broken up among different people)
  • RedHat Enterprise Linux 7.1, 6.x and 5.x
  • Suse Linux 11 and 12
  • Solaris 10 and 11
  • IBM AIX 5.x, 6.x and 7.x
  • MacOS 10.x
  • Experience in working in one of the following cloud architecture environments:
  • AWS
  • Azure
  • Experience in working with and managing mobile devices in an Enterprise environment.
  • Advanced GIAC certification and/or CISSP

Soft Skills:

  • Very strong communication skills

If you are qualified, available, interested and planning to make a change, or know of a friend who might have the required qualifications and interest, you can contact me on desk: 415-915-1164 even if we have spoken recently about a different position. If you do respond via e-mail please include the Best time to call and phone number so I can reach you.

Thank you,

Anuj S. Verma
Executive – Resourcing
Pyramid Consulting, Inc.
Email:
anuj.verma@pyramidci.com

read more
1 2 3 11
Page 1 of 11