user avatar

Information Assurance II

General Dynamics Information Technology

Today
Secret
Unspecified
Unspecified
IT - Security
Doha (On-Site/Office)

Information Assurance Technician II CLC 16

Transform technology into opportunity as an Information Assurance Technician II with GDIT. A career in enterprise IT means connecting and enhancing the systems that matter most. At GDIT you'll be at the forefront of innovation and play a meaningful part in improving how agencies operate.

At GDIT, people are our differentiator. As an Information Assurance Technician II you will help ensure today is safe and tomorrow is smarter. Our work depends on IA Technician IIs joining our team to ensure the safety of information systems assets.

HOW AN INFORMATION ASSURANCE TECHNICIAN II WILL MAKE AN IMPACT

Performs all procedures necessary to ensure the safety of information systems assets and to protect systems from intentional or inadvertent access or destruction

Monitor, evaluate, and maintain systems and procedures to safeguard internal information systems, network, databases, and Web-based security

Assists with implementation of countermeasures or mitigating controls

Ensures the integrity and protection of networks, systems, and applications by technical enforcement of organizational security policies, through monitoring of vulnerability scanning devices

Performs periodic and on-demand system audits and vulnerability assessments, including user accounts, application access, file system and external Web integrity scans to determine compliance

Safeguards the network against unauthorized infiltration, modification, destruction, or disclosure

WHAT YOU'LL NEED TO SUCCEED:

Certification: CISSP

Required Experience: 2 yrs related experience

Required Technical Skills: (see below)

Security Clearance Level: Top Secret

Required Skills and Abilities: (see below)

Location: On Customer Site

US Citizenship Required - CLEARANCE

GDIT IS YOUR PLACE:

401K with company match

Comprehensive health and wellness packages

Internal mobility team dedicated to helping you own your career

Professional growth opportunities including paid education & certifications

Cutting-edge technology you can learn from

Rest and recharge with paid vacation and holidays

***

#DefenseOCONUS

***

Performs all procedures necessary to ensure the safety of information systems assets & to protect systems from intentional or inadvertent access or destruction. Monitor, evaluate, & maintain systems & procedures to safeguard internal information systems, network, databases, & Web-based security

Monitors & analyzes Intrusion Detection Systems (IDS) to identify security issues for remediation

Recognizes potential, successful, & & intrusion attempts & compromises thorough reviews & analyses of relevant event detail & summary information

Evaluates firewall change requests & assesses organizational risk

Communicates alerts to agencies regarding intrusions & compromises to their network infrastructure, applications, & operating systems

Assists with implementation of countermeasures or mitigating controls

Conducts regular audits to ensure that systems are being operated securely, & information systems security policies & procedures are being implemented as defined in security plans

Develops, tests, & operates firewalls, intrusion detection systems, enterprise anti-virus systems & software deployment tools

Safeguards the network against unauthorized infiltration, modification, destruction, or disclosure

Researches, evaluates, tests, & implements new security software or devices

Conducts routine investigations of information systems security violations & incidents, reporting as necessary to management

Ensures the integrity & protection of networks, systems, & applications by technical enforcement of organizational security policies, through monitoring of vulnerability scanning devices

Implements, enforces, communicates, & develops security policies or plans for data, software applications, hardware, telecommunications, & information systems security education/awareness programs

Performs periodic & on-demand system audits & vulnerability assessments, including user accounts, application access, file system & external Web integrity scans to determine compliance

Prepares incident reports of analysis methodology & results. Ensure compliance with regulations & privacy laws

EDUCATION & EXPERIENCE: Technical Training, Certification(s) or Degree, 1+ years of experience

CERTIFICATIONS:

Must meet the certification requirement of DoD 8570.01-M or otherwise stated in SPIN-C or individual task order. The contractor is expected to have, but is not limited to, one or more IT certifications from each group:

Group 1: Information Technology Certification Requirements

• MCSE - Microsoft Exchange/Windows Server or equivalent

• CCNA

• CCNP

• CompTIA Linux +

• LPIC

• RHCE

Group 2: IA Technology Certification Requirements (GIAC items)

• GPPA

• GCIA

• GCWN

• GCUX

• GSNA

• GSAE

• GICSP

• GCIH

Group 3: IAT Level II Requirements

• GIAC - GSEC

• CompTIA Security +

• SCNP

• SSCP

• CISA

• GIAC - GSE

Security Certified Network Architect (SCNA)

• CISSP or Associate

• CAP

• GISF

• GSLC

• CISM

GENERAL EXPERIENCE:

Intermediate level of experience in design, maintenance, & operation of small to medium networks. This experience must include administrating corporate or business' user accounts managing mail servers, printer servers, WWW servers, and/or firewalls. Must have experience in reviewing & recommending software applications as well as identifying hardware salient characteristics & any add on devices. Experience in systems management, monitoring & sustainment; hardware repair for servers, PCs, peripheral equipment; software installation, maintenance & sustainment.

SPECIALIZED EXPERIENCE:

Must have intermediate level of experience working with the following:

• Tactical & strategic security issues of systems & networks, & associated requirements specific to deployed architecture

• Network security, network & systems intrusion detections, advanced devices, firewalls, & software specific to the Department of Defense

• Server operations including installation, configuration, optimization, & analyzing logs on Windows operating systems (including Server 2008/2012 & modern desktop versions)

• Cisco IOS, CAT OS, configuration of Cisco routers & switches

• Server operations including installation, configuration, optimization, & analyzing logs on Unix operating systems (including Linux & Solaris)

• Mastery of DoD 8570-defined IAT Level I position functions

Work Requirements
group id: 90979310

Explore the Art of the Possible | GDIT

job ad image
Find General Dynamics Information Technology on Social Media
Network Employers
user avatar
About Us
We are GDIT. The people supporting and securing some of the most complex government, defense, and intelligence projects across the country. We ensure today is safe and tomorrow is smarter. Our work has meaning and impact on the world around us, but also on us, and that’s important.

GDIT is your place. You make it your own by embracing autonomy, seizing opportunity, and being trusted to deliver your best every day

GDIT
Opportunity Owned
job ad2 image

General Dynamics Information Technology Jobs


Job Category
IT - Security
Clearance Level
Secret