The Cybersecurity Engineer – Splunk Administrator – Mid Level will be responsible for administering, maintaining, and engineering the multi-enclave enterprise On-Premises and Splunk Cloud environment for the DCSA.
Bachelor’s Degree in Information Technology, Information Systems Management, or Cybersecurity (Preferred)
The PKI Analyst will be responsible for executing, maintaining, and providing support for Registration Authority (RA) duties. This position entails the implementation of the DoD PKI/PKE Program, including tasks such as token issuance, revocation, PIN resets, and support for the DoD PKI NEATS architecture solution.
As a PKI Analyst, they will also contribute to the support of the DoD enterprise authentication infrastructure, which encompasses digital certificate authentication for our 802.1x wireless and one-time password (OTP) services, NPE (Non-Person Entity) Certificates, and digital email certificates. Additionally, the PKI analyst will perform Identity Vetting.
Responsibilities:
DoD Intelligence Agency requires Cybersecurity Cloud support in order to maintain IT infrastructure, applications, and any new development projects in the cloud. As such, technical analysis, research, evaluation, and technical guidelines shall be performed in order to accomplish the needed support. The workload for the Cybersecurity Analyst will vary depending on the number of active development including FedRAMP and RMF governance tier level as well as other technical evaluations required by DoD Intelligence Agency.
The Cybersecurity Analyst will provide support for a program, an organization, system, or an enclave; provides support for proposing, coordinating, implementing, and enforcing information systems or enclave cybersecurity policies, standards, and methodologies; maintains operational security posture for an information system, program, or enclave to ensure cybersecurity standards, and procedures are established and followed; performs day-to-day security operations of the system or enclave; perform IT security control validations; provide configuration management (CM) for information system security software, hardware, and firmware; manage changes to system and assess the security impact of those changes; prepare and review documentation to include Systems Security Plans (SSPs) and Security Assessment & Authorization (SA&A) packages in accordance with DoD Risk Management Framework (RMF) procedures.
Duties:
DOD Intelligence Agency requires Cyber Defense Incident Responder Log reports, forensics investigations, incident reports, and trend reports on classified data spills. Log reports are conducted daily, covering the Security Information and Event Manager (SEIM, Host Based Security System (HBSS), and vulnerability scanners. Log reports are produced daily covering 30-plus activities that are used to depict current network security and any anomalous activity. Review logs to include but not limited to servers, firewalls, web proxy, and infrastructure devices.
Job Responsibilities:
Tasks include IDS/firewall placement and configuration support and network security monitoring: Responsible for traffic analysis, vulnerability scanning, Incident Response, wireless scanning, Host Based Security System (HBSS), Information Assurance Vulnerability Management program, Network Access control, insider threat support, web content filtering, data at rest and various cyber security application/tools installed on servers and workstations, may include maintenance and upkeep of the server or workstation.
Job Responsibilities:
Sign Up and Never Miss Out on What We’re Up To