Information Assurance II
GENERAL EXPERIENCE:Intermediate level of experience in design, maintenance, and operation of small to medium networks. This experience must include administrating corporate or business’ user accounts managing mail servers, printer servers, WWW servers, and/or firewalls. Must have experience in reviewing and recommending software applications as well as identifying hardware salient characteristics and any add on devices. Experience in systems management, monitoring and sustainment; hardware repair for servers, PCs, peripheral equipment; software installation, maintenance and sustainment. SPECIALIZED EXPERIENCE:Must have intermediate level of experience working with the following:• Tactical and strategic security issues of systems and networks, and associated requirements specific to deployed architecture• Network security, network and systems intrusion detections, advanced devices, firewalls, and software specific to the Department of Defense• Server operations including installation, configuration, optimization, and analyzing logs on Windows operating systems (including Server 2008/2012 and modern desktop versions)• Cisco IOS, CAT OS, configuration of Cisco routers and switches• Server operations including installation, configuration, optimization, and analyzing logs on Unix operating systems (including Linux and Solaris)• Mastery of the functions of DoD 8570-defined IAT Level I position Performs all procedures necessary to ensure the safety of information systems assets and to protect systems from intentional or inadvertent access or destruction. 1. Performs Computer Security Incident Response activities for a large organization, coordinates with other government agencies to record and report incidents. 2. Monitor and analyze Intrusion Detection Systems (IDS) to identify security issues for remediation. 3. Recognizes potential, successful, and unsuccessful intrusion attempts and compromises thorough reviews and analyses of relevant event detail and summary information. 4. Evaluate firewall change requests and assess organizational risk. 5. Communicates alerts to agencies regarding intrusions and compromises to their network infrastructure, applications and operating systems. 6. Assists with implementation of counter-measures or mitigating controls. 7. Ensures the integrity and protection of networks, systems, and applications by technical enforcement of organizational security policies, through monitoring of vulnerability scanning devices. 8. Performs periodic and on-demand system audits and vulnerability assessments, including user accounts, application access, file system and external Web integrity scans to determine compliance. 9. Prepares incident reports of analysis methodology and results. 10. Maintains current knowledge of relevant technology as assigned. 11. Participates in special projects as required. Education Bachelors Degree in Computer Science or a related technical discipline, or the equivalent combination of education, professional training or work experience. MUST have at least one cert from each of the following groups: Group 1: Information Technology Certification Requirements• Microsoft Certified Solutions Expert (MCSE) – Microsoft Exchange/Windows Server or equivalent • Cisco Certified Network Associate • Cisco Certified Network Professional (CCNP) • CompTIA Linux + • Linux Professional Institute Certification (LPIC) • Red Hat Certified Engineer (RHCE) Group 2: IA Technology Certification Requirements• GIAC Certified Perimeter Protection Analyst (GPPA) • GIAC Certified Intrusion Analyst (GCIA) • GIAC Certified Windows Security Administrator (GCWN) • GIAC Certified UNIX Security Administrator (GCUX) • GIAC Systems and Network Auditor (GSNA) • GIAC IT Security Audit Essentials (GSAE) • GIAC Global Industrial Cyber Security Professional (GICSP) • GIAC Certified Incident Handler (GCIH) Group 3: IAT Level II Requirements• Global Information Assurance Certification (GIAC) Security Essentials Certification (GSEC) • CompTIA Security + • Security Certified Network Professional (SCNP) • Systems Security, Certified Practitioner (SSCP) • Certified Information Security Auditor (CISA) • GIAC Security Expert (GSE)• Security Certified Network Architect (SCNA) • Certified Information System Security Professional (CISSP) or Associate • Certification and Accreditation Professional (CAP) • GIAC Information Security Fundamentals (GISF) • GIAC Security Leadership Certification (GSLC) • Certified Information Security Manager (CISM) Qualifications 2-5 years of related experience in data security administration. As a trusted systems integrator for more than 50 years, General Dynamics Information Technology provides information technology (IT), systems engineering, professional services and simulation and training to customers in the defense, federal civilian government, health, homeland security, intelligence, state and local government and commercial sectors.With approximately 32,000 professionals worldwide, the company delivers IT enterprise solutions, manages large-scale, mission-critical IT programs and provides mission support services.GDIT is an Equal Opportunity/Affirmative Action Employer - Minorities/Females/Protected Veterans/Individuals with Disabilities.