| Job Location | Kuwait |
| Education | Not Mentioned |
| Salary | Not Mentioned |
| Industry | Other Business Support Services |
| Functional Area | Not Mentioned |
Cyber Defense Sustainment EngJob Category:INFORMATION TECHNOLOGYRequisition Number:CYBER003408 Showing 1 locationJob DetailsDescriptionRequisition #:CYBER003408Job Title:Cyber Defense Sustainment EngLocation:Camp Arifjan, KuwaitClearance Level:Active DoD - Top Secret SCISelected applicants may be subject to a government security investigation and must meet eligibility requirements for access to classified information.SUMMARYThis contract effort provides non-personal defensive cyberspace operations support to the Defensive Cyberspace Operations Division (DCOD), U.S. Army Regional Cyber Center ? Southwest Asia (USARCC-SWA). The DCOD environment includes any hardware, software, application, tool, system, or network used by the Government, whether developed, leased, or commercially purchased. Work includes current and new systems at various lifecycle stages, and any future applications/systems not currently identified. DCO services are required to defend against unauthorized activity on all Army assets residing on the NIPRNet, SIPRNet, CENTRIXS, JWICS, and any authorized CENTCOM Coalition computer network. This includes activities from external hackers who may attempt to gain unauthorized access, insider threats attempts for unauthorized access, and policy violations that may impact network security and operations. Work is required to continue performance during peace, crisis, hostilities, and war operations.DUTIES* The Defensive Cyber Operations (DCO) division within the USARCC-SWA is looking for a candidate with strong scripting abilities, experience with systems security administration, and network security technologies.* The Cyber Defense Sustainment Engineer will design, implement, automate, maintain, and optimize measures protecting systems, networks, and information.* Develop and maintain applications in support of DCO activities such as incident response, investigation, and reporting.* Manage and monitor IDS/IPS sensor grid, such as McAfee, Sourcefire, Netscout, and other perimeter devices.* Coordinate network operations, maintenance, repairs, or upgrades. Design, and maintain a test lab for malware analysis and non-attributable intelligence research.* Perform analysis on cyber threat reports and provide recommendations on defense mitigation measures.* Conduct routine training on cyber defense topics developed from industry standards, research and lessons learned.* Develop procedures to track, project, or report network availability, reliability, capacity, or utilization.* Use tools such as Splunk to monitor and analyze network performance and data input/output reports to detect problems, identify inefficient use of computer resources, or perform capacity planning.* Prepare detailed network specifications, including diagrams, charts, equipment configurations, and recommended technologies.* Research and test new or modified hardware or software products to determine performance and interoperability.***Qualifications*Education and Certifications* Bachelor Degree or equivalent experience preferably in Computer Science or MIS, IS, Engineering or related field.* One-year related experience can be substituted for one year of education if the degree is required.* One year of related academic study above the high school level may be substituted for one year of experience up to a maximum of a 4-year bachelors degree in a Business Information Systems discipline for three years general experience.* One certification is required from each category for this position. It can be any from the following list per category (8570 & CE). Required certs: Baseline 8570 (any): CEH, CySA+, GICSP, SSCP, CHFI, CFR, Cloud+, or CND Computing Environment (CE)(any): CCNP (any), MCSE (2016 or newer), Microsoft Certified: M365C:EAE or MC:SAE, GSEC GCIH, GCIA, GREM, GCFA, GDAT, GCWN, OSCP, OSCE, or GSECBackground Needed and Years of Experience* At least five (5) years of practical experience working with various data (network and system) technologies, with a minimum of two of those years focused on information systems security.* Working knowledge of certification tools, IDS/IPS operation, and tuning, and Splunk highly preferred.***Additional Skills & Qualifications*Must-Have Technical Skills* Ability to troubleshoot servers and infrastructure equipment Ability to assess networking requirements and provide solutions.* Ability to make accurate and independent decisions under pressure.* Experience with a customer service oriented company.* Excellent organizational, interpersonal, written, and verbal communication skills.* Ability to perform comfortably in a fast-paced, deadline-oriented work environment.* Ability to successfully execute many complex tasks simultaneously.Preferred Technical Skills* Threat Intelligence and visualization technologies Security enclave engineeringNon-Technical Skills* Visualization of quantitative (numerical) or qualitative information Excellent interpersonal, organization, writing, communicating, and briefing skills Excellent analytical and problem-solving skills***Working Conditions*Working Conditions* Contractor site with 10%+ travel possible.* Shift-work with up to 60 hours of support required per week.* Possible off-hours work to support cybersecurity events and threat response.* General office environment.* Work is generally sedentary in nature, but may require standing and walking for up to 10% of the time.* The working environment is generally favorable.* Lighting and temperature are adequate, and there are not hazardous or unpleasant conditions caused by noise, dust, etc.* Work is generally performed within an office environment, with standard office equipment available.Strength Demands* Sedentary ? 10 lbs. Maximum lifting, occasional lift/?carry of small articles.* Some occasional walking or standing may be required.* Jobs are sedentary if walking and standing are required only occasionally, and all other sedentary criteria are met.Physical Requirements* Stand or Sit* Walk* Repetitive Motion* Use Hands /? Fingers to Handle or Feel* Stoop, Kneel, Crouch, or Crawl* Talk or Hear* See* Push or PullCOVID-19 Vaccination RequirementsAs a federal contractor, Agile Defense is subject to any federal vaccine mandates or other customer/facility vaccination requirements. As such, to protect the health and safety of its employees and to comply with customer requirements, Agile Defense may require employees in certain positions to be fully vaccinated against COVID-19. Vaccination requirements will depend on the status of the federal contractor mandate and customer site requirements.Agile Defense is an Information Technology Solutions provider committed to partnering with our customers to deliver the highest level of service to our customers. We provided Information Technology (IT) services to the U.S. Government, including several United States Civil agencies and various branches within the U.S. Department of Defense.Agile Defense has established a solid reputation of partnering with our customers to deliver innovative IT solutions with our ?Listen. Think. Innovate.? philosophy.At Agile Defense, we know that our employees are our most important asset. We believe in our responsibility to our fellow employees, customers, company, and to our country. We promote teamwork, integrity, and creativity; we expect our fellow employees to also live these values.SkillsEducationExperienceEqual Opportunity Employer/Protected Veterans/Individuals with Disabilities The contractor will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of anoth
Keyskills :
© 2023 HireeJobsGulf All Rights Reserved