Today
Secret
Unspecified
Unspecified
IT - Security
Doha (On-Site/Office)
Information Assurance Technician II CLC 16
Transform technology into opportunity as an Information Assurance Technician II with GDIT. A career in enterprise IT means connecting and enhancing the systems that matter most. At GDIT you'll be at the forefront of innovation and play a meaningful part in improving how agencies operate.
At GDIT, people are our differentiator. As an Information Assurance Technician II you will help ensure today is safe and tomorrow is smarter. Our work depends on IA Technician IIs joining our team to ensure the safety of information systems assets.
HOW AN INFORMATION ASSURANCE TECHNICIAN II WILL MAKE AN IMPACT
Performs all procedures necessary to ensure the safety of information systems assets and to protect systems from intentional or inadvertent access or destruction
Monitor, evaluate, and maintain systems and procedures to safeguard internal information systems, network, databases, and Web-based security
Assists with implementation of countermeasures or mitigating controls
Ensures the integrity and protection of networks, systems, and applications by technical enforcement of organizational security policies, through monitoring of vulnerability scanning devices
Performs periodic and on-demand system audits and vulnerability assessments, including user accounts, application access, file system and external Web integrity scans to determine compliance
Safeguards the network against unauthorized infiltration, modification, destruction, or disclosure
WHAT YOU'LL NEED TO SUCCEED:
Certification: CISSP
Required Experience: 2 yrs related experience
Required Technical Skills: (see below)
Security Clearance Level: Top Secret
Required Skills and Abilities: (see below)
Location: On Customer Site
US Citizenship Required - CLEARANCE
GDIT IS YOUR PLACE:
401K with company match
Comprehensive health and wellness packages
Internal mobility team dedicated to helping you own your career
Professional growth opportunities including paid education & certifications
Cutting-edge technology you can learn from
Rest and recharge with paid vacation and holidays
***
#DefenseOCONUS
***
Performs all procedures necessary to ensure the safety of information systems assets & to protect systems from intentional or inadvertent access or destruction. Monitor, evaluate, & maintain systems & procedures to safeguard internal information systems, network, databases, & Web-based security
Monitors & analyzes Intrusion Detection Systems (IDS) to identify security issues for remediation
Recognizes potential, successful, & & intrusion attempts & compromises thorough reviews & analyses of relevant event detail & summary information
Evaluates firewall change requests & assesses organizational risk
Communicates alerts to agencies regarding intrusions & compromises to their network infrastructure, applications, & operating systems
Assists with implementation of countermeasures or mitigating controls
Conducts regular audits to ensure that systems are being operated securely, & information systems security policies & procedures are being implemented as defined in security plans
Develops, tests, & operates firewalls, intrusion detection systems, enterprise anti-virus systems & software deployment tools
Safeguards the network against unauthorized infiltration, modification, destruction, or disclosure
Researches, evaluates, tests, & implements new security software or devices
Conducts routine investigations of information systems security violations & incidents, reporting as necessary to management
Ensures the integrity & protection of networks, systems, & applications by technical enforcement of organizational security policies, through monitoring of vulnerability scanning devices
Implements, enforces, communicates, & develops security policies or plans for data, software applications, hardware, telecommunications, & information systems security education/awareness programs
Performs periodic & on-demand system audits & vulnerability assessments, including user accounts, application access, file system & external Web integrity scans to determine compliance
Prepares incident reports of analysis methodology & results. Ensure compliance with regulations & privacy laws
EDUCATION & EXPERIENCE: Technical Training, Certification(s) or Degree, 1+ years of experience
CERTIFICATIONS:
Must meet the certification requirement of DoD 8570.01-M or otherwise stated in SPIN-C or individual task order. The contractor is expected to have, but is not limited to, one or more IT certifications from each group:
Group 1: Information Technology Certification Requirements
• MCSE - Microsoft Exchange/Windows Server or equivalent
• CCNA
• CCNP
• CompTIA Linux +
• LPIC
• RHCE
Group 2: IA Technology Certification Requirements (GIAC items)
• GPPA
• GCIA
• GCWN
• GCUX
• GSNA
• GSAE
• GICSP
• GCIH
Group 3: IAT Level II Requirements
• GIAC - GSEC
• CompTIA Security +
• SCNP
• SSCP
• CISA
• GIAC - GSE
Security Certified Network Architect (SCNA)
• CISSP or Associate
• CAP
• GISF
• GSLC
• CISM
GENERAL EXPERIENCE:
Intermediate level of experience in design, maintenance, & operation of small to medium networks. This experience must include administrating corporate or business' user accounts managing mail servers, printer servers, WWW servers, and/or firewalls. Must have experience in reviewing & recommending software applications as well as identifying hardware salient characteristics & any add on devices. Experience in systems management, monitoring & sustainment; hardware repair for servers, PCs, peripheral equipment; software installation, maintenance & sustainment.
SPECIALIZED EXPERIENCE:
Must have intermediate level of experience working with the following:
• Tactical & strategic security issues of systems & networks, & associated requirements specific to deployed architecture
• Network security, network & systems intrusion detections, advanced devices, firewalls, & software specific to the Department of Defense
• Server operations including installation, configuration, optimization, & analyzing logs on Windows operating systems (including Server 2008/2012 & modern desktop versions)
• Cisco IOS, CAT OS, configuration of Cisco routers & switches
• Server operations including installation, configuration, optimization, & analyzing logs on Unix operating systems (including Linux & Solaris)
• Mastery of DoD 8570-defined IAT Level I position functions
Work Requirements
Transform technology into opportunity as an Information Assurance Technician II with GDIT. A career in enterprise IT means connecting and enhancing the systems that matter most. At GDIT you'll be at the forefront of innovation and play a meaningful part in improving how agencies operate.
At GDIT, people are our differentiator. As an Information Assurance Technician II you will help ensure today is safe and tomorrow is smarter. Our work depends on IA Technician IIs joining our team to ensure the safety of information systems assets.
HOW AN INFORMATION ASSURANCE TECHNICIAN II WILL MAKE AN IMPACT
Performs all procedures necessary to ensure the safety of information systems assets and to protect systems from intentional or inadvertent access or destruction
Monitor, evaluate, and maintain systems and procedures to safeguard internal information systems, network, databases, and Web-based security
Assists with implementation of countermeasures or mitigating controls
Ensures the integrity and protection of networks, systems, and applications by technical enforcement of organizational security policies, through monitoring of vulnerability scanning devices
Performs periodic and on-demand system audits and vulnerability assessments, including user accounts, application access, file system and external Web integrity scans to determine compliance
Safeguards the network against unauthorized infiltration, modification, destruction, or disclosure
WHAT YOU'LL NEED TO SUCCEED:
Certification: CISSP
Required Experience: 2 yrs related experience
Required Technical Skills: (see below)
Security Clearance Level: Top Secret
Required Skills and Abilities: (see below)
Location: On Customer Site
US Citizenship Required - CLEARANCE
GDIT IS YOUR PLACE:
401K with company match
Comprehensive health and wellness packages
Internal mobility team dedicated to helping you own your career
Professional growth opportunities including paid education & certifications
Cutting-edge technology you can learn from
Rest and recharge with paid vacation and holidays
***
#DefenseOCONUS
***
Performs all procedures necessary to ensure the safety of information systems assets & to protect systems from intentional or inadvertent access or destruction. Monitor, evaluate, & maintain systems & procedures to safeguard internal information systems, network, databases, & Web-based security
Monitors & analyzes Intrusion Detection Systems (IDS) to identify security issues for remediation
Recognizes potential, successful, & & intrusion attempts & compromises thorough reviews & analyses of relevant event detail & summary information
Evaluates firewall change requests & assesses organizational risk
Communicates alerts to agencies regarding intrusions & compromises to their network infrastructure, applications, & operating systems
Assists with implementation of countermeasures or mitigating controls
Conducts regular audits to ensure that systems are being operated securely, & information systems security policies & procedures are being implemented as defined in security plans
Develops, tests, & operates firewalls, intrusion detection systems, enterprise anti-virus systems & software deployment tools
Safeguards the network against unauthorized infiltration, modification, destruction, or disclosure
Researches, evaluates, tests, & implements new security software or devices
Conducts routine investigations of information systems security violations & incidents, reporting as necessary to management
Ensures the integrity & protection of networks, systems, & applications by technical enforcement of organizational security policies, through monitoring of vulnerability scanning devices
Implements, enforces, communicates, & develops security policies or plans for data, software applications, hardware, telecommunications, & information systems security education/awareness programs
Performs periodic & on-demand system audits & vulnerability assessments, including user accounts, application access, file system & external Web integrity scans to determine compliance
Prepares incident reports of analysis methodology & results. Ensure compliance with regulations & privacy laws
EDUCATION & EXPERIENCE: Technical Training, Certification(s) or Degree, 1+ years of experience
CERTIFICATIONS:
Must meet the certification requirement of DoD 8570.01-M or otherwise stated in SPIN-C or individual task order. The contractor is expected to have, but is not limited to, one or more IT certifications from each group:
Group 1: Information Technology Certification Requirements
• MCSE - Microsoft Exchange/Windows Server or equivalent
• CCNA
• CCNP
• CompTIA Linux +
• LPIC
• RHCE
Group 2: IA Technology Certification Requirements (GIAC items)
• GPPA
• GCIA
• GCWN
• GCUX
• GSNA
• GSAE
• GICSP
• GCIH
Group 3: IAT Level II Requirements
• GIAC - GSEC
• CompTIA Security +
• SCNP
• SSCP
• CISA
• GIAC - GSE
Security Certified Network Architect (SCNA)
• CISSP or Associate
• CAP
• GISF
• GSLC
• CISM
GENERAL EXPERIENCE:
Intermediate level of experience in design, maintenance, & operation of small to medium networks. This experience must include administrating corporate or business' user accounts managing mail servers, printer servers, WWW servers, and/or firewalls. Must have experience in reviewing & recommending software applications as well as identifying hardware salient characteristics & any add on devices. Experience in systems management, monitoring & sustainment; hardware repair for servers, PCs, peripheral equipment; software installation, maintenance & sustainment.
SPECIALIZED EXPERIENCE:
Must have intermediate level of experience working with the following:
• Tactical & strategic security issues of systems & networks, & associated requirements specific to deployed architecture
• Network security, network & systems intrusion detections, advanced devices, firewalls, & software specific to the Department of Defense
• Server operations including installation, configuration, optimization, & analyzing logs on Windows operating systems (including Server 2008/2012 & modern desktop versions)
• Cisco IOS, CAT OS, configuration of Cisco routers & switches
• Server operations including installation, configuration, optimization, & analyzing logs on Unix operating systems (including Linux & Solaris)
• Mastery of DoD 8570-defined IAT Level I position functions
Work Requirements
group id: 90979310
Explore the Art of the Possible | GDIT