Security Analyst

  • Langley
  • Constellation West
<strong>Job Description and Tasks</strong>: <br><br>Be part of a small team who provides ACC communications squadrons with network expertise to maintain and/or improve cybersecurity to protect the missions which depend upon the MAJCOM's Non-classified Internet Protocol (IP) Router Network (NIPRNet), Secret Internet Protocol Router Network (SIPRNet), and incorporated information systems. Conduct Staff Assisted Visits, where they will perform assessments on Main Operation Base/Geographically Separated Unit's (MOB/GSU) network infrastructure, systems, and equipment using National, Federal, DoD and related cyber best practices publications approved by JFHQ-DODIN and the ACC Communications Support Squadron (ACC CSS). Support off-site engagement, assisting ACC's MOB/GSU that enables personnel the ability to continuously monitor and report on cybersecurity posture. Provide technical and security expertise support in the operation and specialized review of (new and/or enhanced) complex network environments including local area network switches, routers, management components, server operating systems, database administration, web technologies, associated software, and other network systems.<br><br><strong>Tasks</strong>: <br><ul><li>Provide support in preparation for JFHQ-DODIN CORAs, in accordance with the most current JFHQ-DODIN guidance. </li><li>Review technical design plans and determine the feasibility of installing, modifying, or acquiring new network system equipment to support the mission of the site in review. Provide detailed Security Technical Implementation Guide (STIG) configuration information regarding security aspects of equipment, software, and systems. </li><li>Assist in configuration, testing, setting up, loading, and implementing hardware and software to operate within STIG, Maintenance Technical Orders (MTO), Network Tasking Orders (NTO), Special Instructions (SPINS), Notice To Airman (NOTAM)/ regulatory guidance as prescribed by DISA, Department of Defense and/or Air Force instructions. </li><li>Assist coordinating efforts in mitigating and/or resolving installation and sustainment issues with Communication Squadrons/Units, Network Operations Squadrons, 16 Air Force (AF), and providing post-implementation support to end-users. </li><li>Assist with monitoring the progress of assigned vulnerability remediation and ensure assessment timelines are met. Assesses security effectiveness of installed network infrastructure, systems, and equipment ensuring adherence to Defense Information Systems Agency (DISA), DoD and AF standards/guidance. Provides hands on training to network technicians also ensuring their awareness and knowledge of DISA, DoD and AF standards/guidance.</li></ul><br><strong>Specific tasks:</strong><br><br><ul><li>Assist the ACC MAJCOM Cyberspace Coordination Center (ACC MCCC) in the execution and evaluation processes across twelve (12) site visits. Contractor personnel must be able to present clear and concise, concepts and data both orally and in writing as requested by the government. </li><li>During on-site visits, the contractor support shall brief site personnel daily on the status and progress of the NSAT team conducting the site visit. </li><li>In accordance with the most current JFHQ-DODIN guidance, assess at minimum, DISA Security Technical Implementation Guides (STIG) in the following technical areas. Examples provided are included, but are not limited to: </li><li>Internal Network: Layer 2 switches, gigabit-capable passive optical network (GPON); Cisco, Juniper, and Brocade switches/routers </li><li>Vulnerability Management: Assured Compliance Assessment Solution (ACAS) weighted vulnerability index (WVI) </li><li>Traditional Security: Physical protections, procedures, and implementation </li><li>Wireless Communications/Mobility: Blackberry, iPhone, Android (government issued cell phones), and tablets. </li><li>Cross Domain Solution (CDS): Radiant Mercury and other approved CDSs on the DISA Approved Products List </li><li>Virtual Infrastructure: VMware applications (Horizon, NSX-T, vSphere, and Workspace One among others not listed) </li><li>Web Servers </li><li>Database: SQL database servers </li><li>Video and Voice over IP (VVOIP): Cisco Unified Call Manager (CUCM), VoIP phones, VTCs </li><li>Microsoft Windows Operating System (OS) and Unix OS </li><li>In accordance with the most current JFHQ-DODIN guidance, assess at minimum, the following Orders, Directives, and Policies: </li><li>Endpoint Security </li><li>Network Vulnerability Scans o References: ACAS Scanning Best Practice Guide, TASKORD 20-0020 (including FRAGO 2 & FRAGO 3) </li><li>Insider Threat (National Security System (NSS) only) </li><li>Cross Domain Solution </li><li>Cyber Defense Monitor, Detect, Response </li><li>Cybersecurity and Resiliency </li><li>Supply Chain Risk Management (SCRM) </li><li>Provide informal training during NSAT visits on the use of the DISA STIG viewer, STIG security policies, and Security Content Automation Protocol (SCAP) tools. Be responsible to complete all STIG Reviews, as directed by the NSAT Team Lead, by the fourth (4) day during an NSAT visit. Infrastructure STIGS would include Network Layer 2 and 3, Network Policy, Video/Voice Over IP (VVOIP), Wireless, and VTC. System STIGS would include all server/workstation operating systems, all databases, and all Web technologies.</li><li>Provide a report of consolidated NSAT inspection CAT I, II, III vulnerability findings (in Excel format) to the NSAT Team Lead within five (5) business days following the last day of the inspection. Contact and work to resolution, all open NSAT findings with the appropriate unit POCs at a minimum every ten (10) business days, until all findings are closed or accepted under a Plan of Action and Milestones (POAM). The contractor shall continue follow-up processes until all findings are agreed to be resolved or POAM'ed by inspected base personnel with assistance of the NSAT team as needed.</li><li>Coordinate visit requests with squadron leadership, Wing Informational Assurance (IA), and the Information Protection Office.</li><li>Provide off-site support by assessing reported cyber readiness CORA criteria, performing an analysis of trends and concerns, and report key findings to base POC, ACC MCCC, and ACC CSS Cyberspace Operations Flight leadership. </li><li>Coordinate with and keep track of ACC base's projected NIPR and SIPR CORA scores on a quarterly cycle. </li><li>Provide weekly update to ACC/A6 on status of cyber readiness. </li><li>Develop and submit best practices, artifacts, and draft Tactics, Techniques, and Procedures (TTPs). </li><li>Provide assistance to establish and maintain vulnerability processes. </li><li>Provide thorough assessment and technical support for Assured Compliance Assessment Solution.</li><li>Provide IT engineering and technical services associated with Layer 2/3 of the Network Open Systems Interconnection (OSI) Model, Routing and Switching devices/equipment, Voice Over IP (VoIP), various Server operating systems, databases, web technologies, and Video Teleconference (VTC) in support of operationalizing and sustaining ACC Mission Assurance functions. </li><li>Assist with monitoring the progress of assigned vulnerability remediation and ensure assessment timelines are met. Assesses security effectiveness of installed network infrastructure, systems, and equipment ensuring adherence to DISA, DoD and AF standards/guidance. Provides hands on training to network technicians also ensuring their awareness and knowledge of DISA, DoD and AF standards/guidance. </li><li>Be responsible to complete all STIG Reviews. Infrastructure STIGS would include Network Layer 2 and 3, Network Policy, VVOIP, Wireless, and VTC. System STIGS would include all server/workstation operating systems, all databases, all Web technologies, and any other server applications that are installed on the Automated Information System (AIS).</li></ul><br><strong>Qualifications:</strong><br><br><strong>Education and Years' Experience</strong>: bachelor's degree in computer science or related field, and minimum, three (3) years' experience in Computer Science or related field <br><br><strong>Specific Training</strong>: Official JFHQ-DODIN inspector training.<br><br><strong>Specific Knowledge and Experience</strong>: <br><br><strong>Knowledge </strong>of Local Area Network (LAN) infrastructure, server hardware and software platforms and related support tools that are commensurate with a 7 Level 1D771Q, Enterprise Operations, IAW the Department of the Air Force Enlisted Classification Directory (DAFECD) dated 31 October 2023 or Infrastructure Technology Support Specialist and Server Operating System (OS), Database, and Web application administrator. <br><br><strong>Experience</strong> interfacing with external agencies (such as, 690 CYCS (Air Force Mission Assurance Center (AMAC)), ACC MCCC, 16 AF, 561 NOS) to resolve technical issues impacting directorate/unit users. <br><br><strong>Other Requirements:</strong><br><br>Must be able to travel up to 12 times per year to various Air Force bases within CONUS. <br><br><strong>Certification</strong>: Possess a 8570 IAT Level II Certification IAW 8570.01-M, Information Assurance Workforce Improvement Program. Meet the annual cybersecurity training requirements.<br><br><strong>Clearance</strong>: A Secret clearance is required. <br><br><strong>We are an Equal Opportunity Employer</strong><br><br>All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender, gender identity, national origin, disability status, protected veteran status, or any other characteristic protected by law. Constellation West will not discharge or, in any other manner, discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. However, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by the employer, or (c) consistent with the contractor's legal duty to furnish information. 41 CFR 60-1.35(c)