Posted today
Unspecified
Early Career (2+ yrs experience)
Unspecified
Unspecified
Intelligence
Fort George G Meade, MD (On-Site/Office)
Security and Counterintelligence organization is responsible for the protection of the National Security Agency's information, people, and facilities worldwide. In support of this mission, Security Technologists oversee the development, installation and maintenance of physical security systems. These systems and installations must meet stringent national security directives, UL standards and various national and local codes. These systems are an integral element of an overall security theory, posture and infrastructure designed to efficiently deter, delay, detect and identify threats to NSA's employees, resources and facilities. The Security Technologist work role supports the Physical Security division.
Desirable candidates for this particular position shall have knowledge/skills in at least one of the following areas:
1) The System Administrator function is responsible for planning and coordinating the installation, testing, operation, troubleshooting, and maintenance of hardware and software systems for enterprise computer networks. Specific responsibilities include:
- Planning and scheduling the installation of new or modified hardware and operating systems and application software;
- Managing accounts, network rights, and access to systems and equipment;
- Managing system resources including performance, capacity, availability, serviceability, and recoverability;
- Implementing security procedures and tools; (STIG/STE/STN)
- Developing and documenting systems administration standard operating procedures;
- Resolving hardware/software interface and interoperability problems;
- Ensuring systems availability, functionality, integrity, and efficiency;
- Maintaining system configurations;
- Managing the installation and integration of systems fixes, updates, and enhancements
- Provide remote customer support to resolve specific physical security issues
2) The Database Administrator function is responsible for planning, development, implementation, and administration of systems for the acquisition, storage, and retrieval of data for enterprise computer networks.
- Analyzing and defining data requirements and specifications
- Designing, normalizing, developing, installing, and implementing databases
- Maintaining, monitoring, performance tuning, backup, and recovery of databases
- Installing, configuring, and maintaining database management systems software;
- Analyzing and planning for anticipated changes in data capacity requirements;
- Developing and administering data standards, policies, and procedures;
- Developing and implementing data mining and data warehousing programs;
- Evaluating and providing recommendations on new database technologies and architectures
3) The Network Administrator function is responsible for planning, analysis, design, development, testing, quality assurance, configuration, installation, implementation, integration, maintenance, and/or management of information in data, and/or video formats for enterprise computer networks.
- Analyzing and defining network requirements;
- Defining and maintaining network architecture and infrastructure;
- Configuring and optimizing network servers, hubs, firewalls, routers, and switches;
- Analyze network workload;
- Monitoring network capacity and performance;
- Diagnosing and resolving network problems;
- Developing network backup and recovery procedures;
- Installing, testing, maintaining, and upgrading network operating systems software
4) The Information Systems Security Specialist function is responsible for ensuring the confidentiality, integrity, availability of systems, networks, and data through the planning, analysis, development, implementation, maintenance, and enhancement of information systems security programs, policies, procedures, and tools for enterprise computer networks.
- Developing policies and procedures to ensure information systems reliability and accessibility and to prevent and defend against unauthorized access to systems, networks, and data;
- Conducting risk and vulnerability assessments of planned and installed information systems to identify vulnerabilities, risks, and protection needs;
- Promoting awareness of security issues among management and ensuring sound security principles are reflected in organizations visions and goals;
- Conducting systems security evaluations, audits, and reviews;
- Developing systems security contingency plans and disaster recovery procedures;
- Developing and implementing programs to ensure that systems, network, and data users are aware of, understand, and adhere to systems security policies and procedures;
- Participating in network and systems design to ensure implementation of appropriate systems security policies;
- Facilitating the gathering. Analysis, and preservation of evidence used in the prosecution of computer crimes;
- Assessing security events to determine impact and implementing corrective actions
The qualifications listed are the minimum acceptable to be considered for the position.
A degree in any field is acceptable.
Relevant experience must be in one or more of the following: computer systems administration; systems networking; building, installing, maintaining, or training on technology-based security systems or equipment (for example, alarms, access control, closed circuit TV, and cipher locks).
ENTRY/DEVELOPMENTAL
Entry is with a high school diploma or GED plus 4 years of relevant experience, or an Associate's degree plus 2 years of relevant experience, or a Bachelor's degree and no experience.
FULL PERFORMANCE
Entry is with a high school diploma or GED plus 7 years of relevant experience, or an Associate's degree plus 5 years of relevant experience, or a Bachelor's degree plus 3 years of relevant experience, or a Master's degree plus 1 year of relevant experience, or a Doctoral degree and no experience.
The ideal Security Technologist candidate is someone with a desire for continual learning, as well as strong communication (oral and written), problem-solving, analytic, interpersonal skills who is:
- Accountable
- Detail-oriented
- Adaptable
- Customer and results-oriented
- Able to manage multiple tasks with competing timelines and deliverables
- Able to work effectively (independently and/or within teams) across functional areas in a collaborative environment
- Able to distinguish basic colors; able to climb, use of legs and arms; crawling (hours); able to kneel (hours); moderate carrying, 15-45 pounds; able to operate a motor vehicle; able to pull hand over hand (hours); able to push (hours); able to reach above shoulder; able to operate lifts to more than 50 feet above ground.
- Capable of travel to overseas locations to include hostile areas (e.g. ability to successfully complete deployment processing)
- Maintains a valid driver's license
The following knowledge and experience is preferred:
- Installation and maintenance of Intrusion Detection and Physical Access Control Systems software applications
- Installation and maintenance of Video over IP/CCTV systems
- System Administration experience with Windows or Linux based operating systems and servers
- Network Administration experience
- Nutanix, Citrix, or Red Hat Linux is not required but would be desirable
- CCNA Certification
- SolarWinds
- CompTIA Security+
- Proficient understanding of SQL databases and database technology
-Install, configure, and maintain switches and firewalls from major manufacturers (Cisco, Sonic Wall, Dell, etc.)
Desirable candidates for this particular position shall have knowledge/skills in at least one of the following areas:
1) The System Administrator function is responsible for planning and coordinating the installation, testing, operation, troubleshooting, and maintenance of hardware and software systems for enterprise computer networks. Specific responsibilities include:
- Planning and scheduling the installation of new or modified hardware and operating systems and application software;
- Managing accounts, network rights, and access to systems and equipment;
- Managing system resources including performance, capacity, availability, serviceability, and recoverability;
- Implementing security procedures and tools; (STIG/STE/STN)
- Developing and documenting systems administration standard operating procedures;
- Resolving hardware/software interface and interoperability problems;
- Ensuring systems availability, functionality, integrity, and efficiency;
- Maintaining system configurations;
- Managing the installation and integration of systems fixes, updates, and enhancements
- Provide remote customer support to resolve specific physical security issues
2) The Database Administrator function is responsible for planning, development, implementation, and administration of systems for the acquisition, storage, and retrieval of data for enterprise computer networks.
- Analyzing and defining data requirements and specifications
- Designing, normalizing, developing, installing, and implementing databases
- Maintaining, monitoring, performance tuning, backup, and recovery of databases
- Installing, configuring, and maintaining database management systems software;
- Analyzing and planning for anticipated changes in data capacity requirements;
- Developing and administering data standards, policies, and procedures;
- Developing and implementing data mining and data warehousing programs;
- Evaluating and providing recommendations on new database technologies and architectures
3) The Network Administrator function is responsible for planning, analysis, design, development, testing, quality assurance, configuration, installation, implementation, integration, maintenance, and/or management of information in data, and/or video formats for enterprise computer networks.
- Analyzing and defining network requirements;
- Defining and maintaining network architecture and infrastructure;
- Configuring and optimizing network servers, hubs, firewalls, routers, and switches;
- Analyze network workload;
- Monitoring network capacity and performance;
- Diagnosing and resolving network problems;
- Developing network backup and recovery procedures;
- Installing, testing, maintaining, and upgrading network operating systems software
4) The Information Systems Security Specialist function is responsible for ensuring the confidentiality, integrity, availability of systems, networks, and data through the planning, analysis, development, implementation, maintenance, and enhancement of information systems security programs, policies, procedures, and tools for enterprise computer networks.
- Developing policies and procedures to ensure information systems reliability and accessibility and to prevent and defend against unauthorized access to systems, networks, and data;
- Conducting risk and vulnerability assessments of planned and installed information systems to identify vulnerabilities, risks, and protection needs;
- Promoting awareness of security issues among management and ensuring sound security principles are reflected in organizations visions and goals;
- Conducting systems security evaluations, audits, and reviews;
- Developing systems security contingency plans and disaster recovery procedures;
- Developing and implementing programs to ensure that systems, network, and data users are aware of, understand, and adhere to systems security policies and procedures;
- Participating in network and systems design to ensure implementation of appropriate systems security policies;
- Facilitating the gathering. Analysis, and preservation of evidence used in the prosecution of computer crimes;
- Assessing security events to determine impact and implementing corrective actions
The qualifications listed are the minimum acceptable to be considered for the position.
A degree in any field is acceptable.
Relevant experience must be in one or more of the following: computer systems administration; systems networking; building, installing, maintaining, or training on technology-based security systems or equipment (for example, alarms, access control, closed circuit TV, and cipher locks).
ENTRY/DEVELOPMENTAL
Entry is with a high school diploma or GED plus 4 years of relevant experience, or an Associate's degree plus 2 years of relevant experience, or a Bachelor's degree and no experience.
FULL PERFORMANCE
Entry is with a high school diploma or GED plus 7 years of relevant experience, or an Associate's degree plus 5 years of relevant experience, or a Bachelor's degree plus 3 years of relevant experience, or a Master's degree plus 1 year of relevant experience, or a Doctoral degree and no experience.
The ideal Security Technologist candidate is someone with a desire for continual learning, as well as strong communication (oral and written), problem-solving, analytic, interpersonal skills who is:
- Accountable
- Detail-oriented
- Adaptable
- Customer and results-oriented
- Able to manage multiple tasks with competing timelines and deliverables
- Able to work effectively (independently and/or within teams) across functional areas in a collaborative environment
- Able to distinguish basic colors; able to climb, use of legs and arms; crawling (hours); able to kneel (hours); moderate carrying, 15-45 pounds; able to operate a motor vehicle; able to pull hand over hand (hours); able to push (hours); able to reach above shoulder; able to operate lifts to more than 50 feet above ground.
- Capable of travel to overseas locations to include hostile areas (e.g. ability to successfully complete deployment processing)
- Maintains a valid driver's license
The following knowledge and experience is preferred:
- Installation and maintenance of Intrusion Detection and Physical Access Control Systems software applications
- Installation and maintenance of Video over IP/CCTV systems
- System Administration experience with Windows or Linux based operating systems and servers
- Network Administration experience
- Nutanix, Citrix, or Red Hat Linux is not required but would be desirable
- CCNA Certification
- SolarWinds
- CompTIA Security+
- Proficient understanding of SQL databases and database technology
-Install, configure, and maintain switches and firewalls from major manufacturers (Cisco, Sonic Wall, Dell, etc.)
group id: 10470536