Vision Information Technology Consultants  LLC
  • Honolulu, HI, USA
  • Full Time

Vision IT is a fast growing, woman-owned business that's supported DoD and Federal Sector IT initiatives for two decades. We work side-by-side with our clients as a trusted, long-term partner offering innovative consultation and leadership to solve their most pressing and complex problems. We orchestrate people, strategies, technologies and best-of-breed business processes.

Vision IT seeks the services of a Senior Cyber Security Engineer in support of Cyber Defense Activities for our Ft Shafter Flats, HI client

Responsibilities May Include (but are not limited to) the following:

  • Provide necessary infrastructure and management services to protect information systems from unauthorized access and to protect the data within the systems.
  • Support the command's Cyber Security/CND Program through active implementation of DoD, Cyber Security and Theater Cyber Security Cyber directives and policies.
  • Implement a patch management and vulnerability mitigation program in order to ensure compliance with current Information Assurance Vulnerability Alert (IAVA) directives.
  • Develop security training plans and packages to facilitate the training of all 9th MSC and US Army Reserve Pacific personnel in accordance with public law and DoD instructions with COR approval and oversight. These plans will include requirements for new user training and annual refresher training approved by the COR. The Cyber Security Engineer shall make use of existing training resources in developing training plans approved by the COR. The Cyber Security Engineer shall develop training materials based upon local policies that might not otherwise be covered in regulatory requirements. The security curriculum shall be delivered in a classroom setting and shall cover topics in Information Security (INFOSEC), Personnel Security, Physical Security, and Operations Security (OPSEC). The Contractor shall ensure Cyber Security training requirements are met, and shall deny user access to any prospective user who does not complete the mandatory IA awareness training.
  • Conduct weekly vulnerability assessment of all 9th MSC and US Army Reserve Pacific managed assets (to include web applications, Operating Systems, wireless devices and business application software) using an IAM or DoD approved vulnerability assessment tool with COR approval and oversight. The vulnerability assessments shall be conducted IAW the DoDI 8500.2 and/or best practices issued by the Authorizing Official (AO) or DoD. The Cyber Security Engineer shall report the results to the 9th MSC Information Systems Security Manager (ISSM) and COR using the built-in reporting features of the vulnerability assessment tool, and will manage and track mitigation actions for the vulnerabilities identified in the report generated by the vulnerability assessment scan.
  • Submit vulnerability reports to the ISSM and COR to have all identified vulnerabilities mitigated by having vulnerable workstations patched with the appropriate security patches.
  • Monitor G6 progress and will ensure that all mitigating actions are completed within three (3) working days. If mitigating actions cannot be completed within seven (7) days the Cyber Security Engineer shall report on the following:
    • Vulnerability identified
    • Number of vulnerable systems
    • Plan to mitigate vulnerabilities and estimated time to resolution
    • A daily status report detailing the progress made toward mitigating the vulnerabilities identified the week vulnerability scan
  • Conduct weekly vulnerability scans and manage the actions necessary to mitigate vulnerabilities revealed by the scan to ensure that all mitigating actions are completed within seven (7) working days. The weekly scans and mitigating actions will be logged, documented, and then reported
  • Conduct monthly wireless scan using a DoD approved tool to identify the presence of any unauthorized network in the 9th MSC's managed network area. Identify the source of the unauthorized wireless network. Attempt to have the system owner remove the unauthorized wireless network on the spot and provide a monthly report with detailed findings of the wireless scan and actions taken to remove the unauthorized wireless network.
  • Conduct weekly malware defense assessments of all 9th MSC managed workstation and laptop assets using McAfee Antivirus included in the Host-Based Security System (HBSS) tool. Weekly malware defense assessments of all 9th MSC managed servers shall be conducted using Symantec Antivirus. Patch management for workstations will be monitored weekly and are utilized by Microsoft System Center Configuration Manager (SCCM) are completed manually.
  • manage all actions necessary to implement Strategic Command Directive SD 527- 1(DoD Information Operations Conditions INFOCON System Procedures. Be consistently aware of the prevailing INFOCON level and tasks performed in accordance with that level using the approved HBSS tool to facilitate INFOCON level compliance. INFOCON implementation tasks will be tracked as a project and the Cyber Security Engineer shall submit project status reports on a weekly basis.
  • Ensure all 9th MSC managed servers, workstations, printers and multi-purpose devices are compliant to all IA notices issued by the PLWN, KLWN and ARNET. IAVM notices include alerts, bullitins and tech-tips.
  • Utilize AO or DoD approved scanner software to verify all 9th MSC managed servers, workstations, printers and network appliances (routers, switches, firewalls, and intrusion detection systems) conform to the security requirements mandated in 9th MSC IAVM notices by their respective due date.
  • Establish 100 percent IAVA compliance to at least 90 percent of the total number of assets used as the basis for a given scan. The 90 percent figure represents a satisfactory figure for the number of available assets (as a percentage of the number of total assets) and report the IAVA compliance process.
  • Submit current, accurate, and complete reports on a weekly basis to the 9th MSC G6 IAM, ISSM, and COR. Scanned data must be no more than seven (7) days old in the weekly IAVM compliance report. Data must reflect actual IAVA compliance for each and every asset reported. To be completed, data must reflect 100 percent of all assets actually scanned.
  • Prepare and submit and acceptable Plan of Action and Milestones (POA&M) to the 9th MSC Army Reserve Network Operations Center (ARNOC) for all IAVM alerts for which compliance is not yet attained. All POA&Ms must state at a minimum
    • Reason why the assets are non-compliant.
    • When the assets will become compliant.
    • The work-around solutions and defense mechanisms in place to reduce the risk of non-compliance.
  • Provide situational awareness for adversary cyber capabilities and intentions; build and manage Indications and Warning (IW) to support the 9th MSC Commanders Critical Information Requirements (CCIRs) and operational decision points.
  • Provide the resolution of all security incidents reported against 9th MSC managed assets with COR approval. Support requires possession of Secret security clearance. The 9th MSC requires use of a wide variety of Attack Warning and Sensing (ASW) data. This data can come from the Cyber Security Personnel, IDS logs, IPS logs, Firewall logs, CYBERCOM Situational Awareness Reports (SARs), DISA Security Briefings and other pertinent sources.
  • Collect forensic computer evidence relating to the security incident and any other suspect activity uncovered while investigating the security incident, in responding to computer security incidents when tasked.
  • Perform RMF requirements when preparing System Security Authorization Agreements (SSAAs) for 9th MSC-managed information systems.
  • Perform a risk analysis and ensure all requisite certification tasks are performed as required. The SSAA is to be embodied in a DoD-approved certification and accreditation tool (such as eMASS).
  • Provide technical expertise on all TEMPEST, Red/Black separation, and PDS installations, certifications, and maintenance requirements.
  • Provide consultative support to the government when requested. The 9th MSC G6 is often called upon to render an expert opinion, evaluation, or decision related to the security considerations surrounding a product or a process. Most opinions and/or evaluations are easily provided with a minimal amount of research; other evaluations may take a substantial amount of research to formulate.
  • Establish audit trails, conduct reviews, and create archives as tasked.
  • Request, receive, and distribute COMSEC products as described in AR 380-40, TB 380-41, and other applicable regulations and policies.
  • Support and maintain secure voice assets within the command to include STE, Iridium, SECTERA Wire Line, SECTERA vIPer, INMARSAT, OMNIxi, and conduct monthly communication inspections to validate and report operational status.

Required Education, Experience, Clearance and Certification(s):

  • 8+ years of experience in a cybersecurity IA environment, auditing, vulnerability assessment analysis, threat identification and remediation. IA policy recommendations, physical security, and patch management strategies.
  • Extensive working knowledge in RMF assessment and authorization and accreditation requirements (DoD 8510.1 and 8500.2), IAVA compliancy (Retina), STIG enforcement and auditing (DISA Gold Disk), and other IA tools (QTip, Log Collector, HBSS, etc.)
  • IAM Level III per DoD 8570
  • Active DoD Secret Security Clearance.

Desired Education, Experience and Certifications:

  • Experience as a certificate authority (manage security credentials, private/public keys, etc.) IASO, IANO, IANM, etc.
  • Experience in obtaining ATC/ATO for VTC specific systems.
  • Completed RMF/eMASS training courses.

Vision IT provides equal employment opportunities (EEO) to all employees and applicants for employment without regard to race, color, religion, sex, national origin, age, disability or genetics. In addition to federal law requirements, Vision IT complies with applicable state and local laws governing nondiscrimination in employment in every location in which the company has facilities. This policy applies to all terms and conditions of employment, including recruiting, hiring, placement, promotion, termination, layoff, recall, transfer, leaves of absence, compensation and training.

Vision IT expressly prohibits any form of workplace harassment based on race, color, religion, gender, sexual orientation, gender identity or expression, national origin, age, genetic information, disability, or veteran status. Improper interference with the ability of Vision IT's employees to perform their job duties may result in discipline up to and including discharge.

Vision Information Technology Consultants LLC
  • Apply Now

    with our quick 3 minute Application!

  • * Fields Are Required

    What is your full name?

    How can we contact you?

  • Sign Up For Job Alerts!

  • Share This Page
.
SBA Hubzone Logo Home About Us Capabilities Contracts Careers Community Contact Us Why Vision It Current Job Openings Benefits