Information Assurance Technician III
Performs all procedures necessary to ensure the safety of information systems assets and to protect systems from intentional or inadvertent access or destruction. 1. Performs Computer Security Incident Response activities for a large organization; coordinates with other government agencies to record and report incidents. 2. Monitor and analyze Intrusion Detection Systems (IDS) to identify security issues for remediation. 3. Recognizes potential; successful; and unsuccessful intrusion attempts and compromises thorough reviews and analyses of relevant event detail and summary information. 4. Evaluate firewall change requests and assess organizational risk. 5. Communicates alerts to agencies regarding intrusions and compromises to their network infrastructure; applications and operating systems. 6. Assists with implementation of counter-measures or mitigating controls. 7. Ensures the integrity and protection of networks; systems; and applications by technical enforcement of organizational security policies; through monitoring of vulnerability scanning devices. 8. Performs periodic and on-demand system audits and vulnerability assessments; including user accounts; application access; file system and external Web integrity scans to determine compliance. 9. Prepares incident reports of analysis methodology and results. 10. Provides guidance and work leadership to less-experienced technical staff members. 11. Maintains current knowledge of relevant technology as assigned. 12. Participates in special projects as required. Education Bachelors Degree in Computer Science or a related technical discipline; or the equivalent combination of education; professional training or work experience. Must meet the certification requirement of DoD 8570.01-M or otherwise stated in SPIN-C or individual task order. The contractor is expected to have; but is not limited to; one or more IT certifications from each group: Group 1: Information Technology Certification Requirements ' Microsoft Certified Master (MCM) ' Microsoft Exchange/Windows Server ' Cisco Certified Network Associate ' Cisco Certified Network Professional (CCNP) ' CompTIA Linux + ' Linux Professional Institute Certification (LPIC) ' Red Hat Certified Engineer (RHCE) Group 2: IA Technology Certification Requirements ' GIAC Certified Firewall Analyst (GCFW) ' GIAC Certified Intrusion Analyst (GCIA) ' GIAC Certified Windows Security Administrator (GCWN) ' GIAC Certified UNIX Security Administrator (GCUX) ' GIAC Systems and Network Auditor (GSNA) ' GIAC IT Security Audit Essentials (GSAE) ' GIAC Systems and Network Auditor (GSNA) ' GIAC Certified Security Consult ant (GCSC) ' GIAC Certified Incident Handler (GCIH) Group 3: IAT Level II Requirements ' Global Information Assurance Certification (GIAC) Security Essentials Certification (GSEC) ' CompTIA Security + ' Security Certified Network Professional (SCNP) ' Systems Security; Certified Practitioner (SSCP) Group 4: IAT Level III Requirements ' Certified Information Security Auditor (CISA) ' GIAC Security Expert (GSE) ' Security Certified Network Architect (SCNA) ' Certified Information System Security Professional (CISSP) or Associate ' Certification and Accreditation Professional (CAP) ' GIAC Information Security Fundamentals (GISF) ' GIAC Security Leadership Certification (GSLC) ' Certified Information Security Manager (CISM) Qualifications 5-8 years of related experience in data security administration. Lead level of experience in IA technology or design; maintenance; and operation of small to medium networks. This experience must include administrating corporate or business' user accounts managing mail servers; printer servers; WWW servers; and/or firewalls. Must have experience in reviewing and recommending software applications as well as identifying hardware salient characteristics and any add on devices. Experience in systems management; monitoring and sustainment; hardware repair for servers; PCs; peripheral equipment; software installation; maintenance and sustainment. Must have lead level of experience working with the following: ? Tactical and strategic security issues of systems and networks; and associated requirements specific to deployed architecture ? Network security; network and systems intrusion detections; advanced devices; firewalls; and software specific to the Department of Defense ? Server operations including installation; configuration; optimization; and analyzing logs on Windows operating systems (including Server 2003/2007 and modern desktop versions) ? Cisco IOS; CAT OS; configuration of Cisco routers and switches ? Server operations including installation; configuration; optimization; and analyzing logs on Unix operating systems (including Linux and Solaris) ? Expert in all functions of both DoD 8570-defined IAT Level I and IAT Level II positions As a trusted systems integrator for more than 50 years, General Dynamics Information Technology provides information technology (IT), systems engineering, professional services and simulation and training to customers in the defense, federal civilian government, health, homeland security, intelligence, state and local government and commercial sectors.With approximately 32,000 professionals worldwide, the company delivers IT enterprise solutions, manages large-scale, mission-critical IT programs and provides mission support services.GDIT is an Equal Opportunity/Affirmative Action Employer - Minorities/Females/Protected Veterans/Individuals with Disabilities.