CACI International Cybersecurity Counter Access Specialist in Shaw Air Force Base, South Carolina
What You’ll Get to Do:CACI has an exciting and immediate opportunity for a Cybersecurity Counter Access Specialist to support the USAF Network Operations Security Center (NOSC). This position works at the customer on-site Tier 3 support location at Shaw Air Force Base in South Carolina.More About the Role:
In this role you will:
Monitor network traffic to determine system vulnerabilities and required fixes; apply established network security procedures, log, and make recommendations for correcting network security incidents; and coordinate the escalation of security issues requiring detailed analysis.
Build tactical and strategic network profiles for specific systems and complete network architecture.
Analyze network intrusion detection systems and conduct vulnerability assessments.
Utilize network intrusion devices and information assurance tools, including but not limited to, Internet Security Scanner (ISS), Cisco Security Agent (CSA), and other zero-day personal firewall and security agents.
Provide an overall site-analysis profile to serve as a benchmark to identify unusual or suspicious activity.
Analyze live and historical data for events related to possible network infiltration
Maintain current knowledge on new vulnerabilities and exploits. Develop countermeasures (to include IDS/IPS signature development and correlation rule sets) to isolate, contain and prevent intrusive actives and secure networks.
Develop methods to identify contain, log, and analyze intrusive activities and security vulnerabilities on networks.
Perform network traffic and host analysis to evaluate intruder activities using host and network-based monitoring system. Correlate information gathered to provide effective methods to protect the domain. Ensure appropriate notification action is taken to reduce the risk to networks.
Conduct network and computer forensics on suspected and confirmed compromised system to determine the method of intrusion and corrective actions to be taken to prevent or detect similar future activities.
Develop methods to identify contain, log, and analyze intrusive activities and security vulnerabilities on networks. Prevent intruders from accessing resources. Maintain current knowledge on new vulnerabilities and exploits. Develop countermeasures (to include IDS/IPS signature development and correlation rule sets) to isolate, contain and prevent intrusive activities and secure networks.
Maintain current knowledge on existing and new malware behavior and propagation characteristics. Maintain current knowledge on the anti-virus tools currently in use. Develop methods to identify, contain, log, and analyze malware-based activities on networks.
Utilize DOD mandated vulnerability scanner to scan for vulnerabilities on the enterprise.
Use vulnerability toolset to determine networks and systems security weaknesses and shortfalls. Research and coordinate vulnerability findings to provide detailed fix actions. Coordinate with other computer emergency response teams (CERT) to ensure latest known vulnerabilities are properly identified and corrected.
Manage and maintain control of network intrusion detection systems (IDS). Ensure end-to-end operations for network and information technology systems.
Perform security device/sensor maintenance, troubleshooting and fault isolation to ensure network connectivity to sensor equipment.
Establish VPNs between sites for protected communications and access control lists to restrict unauthorized access to network resources.
Monitor network traffic to determine system vulnerabilities and required fixes; apply established network security procedures, logs and makes recommendation for correcting network security incidents; and coordinate the escalation of security issues requiring detailed analysis.
Examine logs and information gained from network sniffers or protocol analyzers to determine if possible unauthorized access has occurred; identify, track, and record suspected intrusion or actual security breach; and detail analyses in written reports for legal use. May be required to provide oral or written findings and explanation of events for any legal actions associated with security breaches.
Schedule, coordinate and attend daily Theater Network Control Central Cyber Defense briefings.
Facilitate weekly Information Assurance teleconferences.
You will also be required to:
Provide support in the application of network security devices
Install and maintain network devices such as routers, switches, bridges, and hubs
Implement wide area and local area network architectures
Perform installation and administration of hardware, software, and services in a client-server environment
Optimize operations on a network and systems level
Configure Dynamic Host Control Protocol (DHCP), Windows Internet Naming Service (WINS), Dynamic and Integrated Domain Name Service (DNS), and Active Directory (AD) services
Apply proper security measures to safeguard government IT infrastructure
Implement Public Key Infrastructure (PKI) technology for network and systems access
Assist deployed IT support staff with the use and migration of PKI-enabled systems
Research, document, and track to resolution all outages, trouble calls, virus outbreaks, and network intrusions
Analyze and report on the overall health of local and deployed networks
Recommend appropriate changes/resolutions in response to observed trends in Enterprise Level Cisco and Microsoft fault isolation and correction
Configure and maintain DNS and BIND domain name services on UNIX and Microsoft platforms
Implement Certificate Authority (CA), Online Certificate Status Protocol (OCSP), and LEAP server PKI technologies
Serve as consultant on enterprise IT/Cybersecurity equipment, systems, software, and support services
Provide remote engineering and technical support to assist local and deployed IT support personnel
Provide technical assistance on assigned projects
Supplement government IT and Cybersecurity personnel to support the day-to-day management, operation, maintenance and administration of enterprise IT systems and services
Perform preventive, remedial, and corrective maintenance
Install, configure, optimize, update, patch and maintain server, client and network operating systems and integrate and apply authorized third-party drivers, applications, and software
Monitor network/systems hardware, software, and services for indications of warnings, faults, errors, anomalies, alarm conditions and/or outages
Provide local and remote fault isolation, diagnostics, troubleshooting and restoration services
Provide on-call support via cell phone after hours, on weekends and holidays
Assist with configuration and cybersecurity program inspections and audits
Assist the government’s Accountable Property Officers/Equipment Control Officers with communications and IT asset management and related activities
Develop, update, and maintain facility, network, and systems documentation
Use Microsoft Project Server to document, update, and track and report the status of assigned projects
Develop and review technical documents and checklists to explain abstract IT and cybersecurity technologies and concepts
Develop and review detailed or complex technical documents such as techniques, tactics, and procedures (TTPs), concepts of operations (CONOPS), special instructions and engineering plans, for supported enterprise IT and cybersecurity technology, services, applications, and processes
Host and/or participate in technical meetings as necessary
Develop and provide meeting agendas and minutes, as requested by the government.
Support continuity and on-the job training to contractor and government technical support personnel (CONUS and OCONUS)
Deploy/ travel to OCONUS locations in the USCENTCOM AOR to support sustainment operations, projects, surveys, installations, upgrades, testing, troubleshooting, and training
You’ll Bring These Qualifications:
DoD Secret Security Clearance (or the ability to obtain a Secret clearance prior to starting)
BS in related field and 5 or more years’ experience; OR 7 or more years’ of relevant IT experience.
Excellent customer service skills
Excellent verbal and written communication skills
CSSP-A Baseline Certification (CEH)
Minimum Professional Certifications:
These Qualifications Would be Nice to Have:
- Experience working in DoD, Air Force, and local base environments
What We Can Offer You:
We’ve been named a Best Place to Work by the Washington Post.
Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives.
We offer competitive benefits and learning and development opportunities.
We are mission-oriented and ever vigilant in aligning our solutions with the nation’s highest priorities.
For over 55 years, the principles of CACI’s unique, character-based culture have been the driving force behind our success.
US-Shaw Air Force Base-SC-COLUMBIA
CACI employs a diverse range of talent to create an environment that fuels innovation and fosters continuous improvement and success. At CACI, you will have the opportunity to make an immediate impact by providing information solutions and services in support of national security missions and government transformation for Intelligence, Defense, and Federal Civilian customers. CACI is proud to provide dynamic careers for employees worldwide. CACI is an Equal Opportunity Employer - Females/Minorities/Protected Veterans/Individuals with Disabilities.