Easter Seals Jobs

Job Information

V2X Information Assurance III in Kuwait

Overview

This position description is subject to change at any time as needed to meet the requirements of the program or company.

Working across the globe, V2X builds smart solutions designed to integrate physical and digital infrastructure from base to battlefield. We bring 120 years of successful mission support to improve security, streamline logistics, and enhance readiness. Aligned around a shared purpose, our $3.9B company and 16,000 people work alongside our clients, here and abroad, to tackle their most complex challenges with integrity, respect, responsibility, and professionalism.

Senior level lead Information Assurance Technician responsible for providing cyber security management support.

This position is contingent upon successful contract award to V2X.

Responsibilities

Major Job Activities:

Provide cyber security management support in accordance with (IAW) AFI 17-130, Air Force Cyber Security Program Management, as defined in the individual Task Orders (TOs). Support coordination of all actions required by USAFCENT cyber security-related CTOs including, but not limited to, vulnerability scanning and patch compliance. USAFCENT Cyber Security oversees all vulnerability scans IAW SPIN-C. Cyber security tasks include:

  • Scanning: Annotate remediation and mitigation actions on the vulnerability scan reports and return responses to USAFCENT Cyber Security to meet CTO compliance standards.

  • Patching: Monitor and verify patch compliance using the approved technical solution (i.e., SCCM, Assured Compliance Assessment Solution Information Assurance Vulnerability Alert compliance dashboards to track patching progress IAW patch compliance CTO requirements). Subtasks include:

  • Coordinate appropriate actions to ensure site systems are receiving patches and identify any patch installation issues.

  • Coordinate with local administrators to troubleshoot and elevate patching issues to NOSC engineers in a timely manner in order to meet patch compliance timelines. If automated patches are unavailable, such as with PMO systems, coordinate with PMO offices for manual patching of these systems to meet compliance levels IAW the CTO and SPIN-C requirements.

  • Develop a POA&M when CTO compliance cannot be met by the compliance date.

  • Review System Logs: Review all system logs daily for indications of unauthorized activity. Suspicious or abnormal log information shall be noted, escalated, and safeguarded IAW the SPIN-C.

  • Report and Contain Viruses, Malicious, and Negligent Activities: report virus outbreaks or suspected malicious activity IAW SPIN-C directives and

  • Take appropriate action to contain a virus outbreak or suspected malicious activity immediately; this includes updating virus signatures and possibly isolation of the infected system(s). A Remedy trouble ticket shall be opened for all virus outbreaks or suspected malicious activity.

  • Report all negligent discharges of classified information (NDCI) or cross-domain violations (CDV) IAW SPIN-C directives and instructions. Take appropriate actions to contain and safeguard classified information from being further compromised. All NDCIs / CDVs and their respective reporting shall be classified to the same level as the information contained.

  • Attend and participate in required NOSC systems and cyber security meetings or teleconferences.

  • Security Information and Event Management (SIEM): Monitor internal and wireless (if site is equipped with wireless) SIEM systems and escalate any possible alerts to USAFCENT Cyber Security for investigation. Attempt to identify the source and severity of activity and work with USAFCENT Cyber Security to contain, eradicate, or block the malicious activity. Review all intrusion and SIEM system alerts, logs, and reports for false positives. Identify all activity detected by working with site systems and networks to document the activity that is causing the alerts. Work with site and USAFCENT Cyber Security leadership to acquire approval to filter out these alerts.

  • Air Wireless Detection: Monitor over-the-air wireless detection systems, if site is so equipped, for indications of malicious activity against wireless systems. Attempt to identify the source of activity and consult with USAFCENT Cyber Security and site leadership on courses of action.

  • Wireless Audits: Conduct wireless audits (war drives) IAW the SPIN-C to detect any unauthorized wireless devices connected to the site network. Consult with site leadership and USAFCENT Cyber Security to identify the device and assist in any investigations as directed by leadership.

  • Network Compliance: Review all site access control lists and validate that permitted activity is relevant to current systems / network architecture and approved through USAFCENT Cyber Security leadership. Audit all backup procedures IAW the SPIN-C to validate critical systems can be reconstituted after failure. Review all network account access request forms for accuracy prior to account creation. Be responsible for maintaining certifications as listed in the labor category. Certification will be included in the work center’s continuity book.

    Material & Equipment Directly Used:

    Government computers and DoD approved software.

    Working Environment:

  • Working environment is a climate-controlled facility. Outdoor temperatures may exceed temperatures of 100 degrees Fahrenheit.

  • May require support during periods of non-traditional working hours including nights or weekends.

    Physical Activities:

    Must be able to lift/push/pull 40 lbs. unassisted.

Qualifications

Education / Certifications:

  • High School Diploma or GED

  • U.S. Citizen

  • Active Secret Tier 3 (or higher) Security Clearance

  • IAT Level III Certification

    Experience / Skills:

  • Lead-level experience in: IA technology or design, maintenance and operation of small to medium networks; administrating corporate or business' user accounts managing mail servers, printer servers, WWW servers, and/or firewalls; reviewing and recommending software applications as well as identifying hardware salient characteristics and any add on devices; systems management, monitoring and sustainment; hardware repair for servers, PCs, peripheral equipment; software installation, maintenance and sustainment; AND

  • Lead-level experience working with: tactical and strategic security issues of systems and networks, and associated requirements specific to deployed architecture; network security, network and systems intrusion detections, advanced devices, firewalls, and software specific to the Department of Defense; server operations including installation, configuration, optimization, and analyzing logs on Windows operating systems (including Server 2008/2012 and modern desktop versions); Cisco IOS, CAT OS, configuration of Cisco routers and switches; Server operations including installation, configuration, optimization, and analyzing logs on Unix operating systems (including Linux and Solaris); AND

  • Expert in all functions of the IAT Level I and Level II positions as defined in DoD 8570.

    Supervisory / Budget Responsibilities:

    TBD

    We are committed to an inclusive and diverse workplace that values and supports the contributions of each individual. This commitment along with our common Vision and Values of Integrity, Respect, and Responsibility, allows us to leverage differences, encourage innovation and expand our success in the global marketplace. Vectrus is an Equal Opportunity /Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, age, sex, national origin, protected veteran status or status as an individual with a disability. EOE/Minority/Female/Disabled/Veteran.

DirectEmployers