Dahlgren, VA
Education/Certifications: Bachelor’s Degree (desired); Requires GCFE certification (within 90 days); IAT Level III
Years of Experience: 6+ years software, hardware, & wireless support
Clearance Level & Investigation: TS with SCI eligibility / T5
IA Cert Level (DoD 8570.01): IAT III
Qualifications:
The Senior Forensic Technician/Analyst must have the following minimum qualifications:
- Six (6) years’ professional experience providing software, hardware, and wireless support, including mobile forensic examination based on submitted requirements for functionality and use of developed tools.
- Skilled in developing, testing, and implementing network infrastructure contingency and recovery plans.
- Skilled in performing packet-level analysis.
- Display technical comprehension of relationships, dependencies, and hardware and software component requirements.
- Interpret submitted documentation, including user and functional requirements, and develop forensic examination reports.
- Possess knowledge of risk management processes.
- Knowledge of cybersecurity principles, cyber threats, cyber vulnerabilities.
- Knowledge of computer networking concepts and protocols, network security methodologies, cloud computing service models, and cloud deployment models in private, public, multi-cloud, and hybrid environments.
- Works independently, may supervise/manage junior analysts.
- Global Information Assurance Certification (GIAC) Certified Forensic Examiner (GCFE) certification required within 90 days.
- Designated as IAT III level with T5.
- Bachelor’s Degree desired but not required.
Responsibilities:
The Senior Forensic Technician/Analyst will perform the following tasks, including, but not limited to:
- Monitor ISs’ activity occurring on continuing basis, perform first order security analysis of data, interpret and report results to ISSM.
- Operate, maintain, and perform upgrades to Network Intrusion-Detection Systems.
- Perform Technical Assistance functions, as directed by Government, for issuance or enabling, inventorying, and use of tokens, and public and private certificates.
- Collaborate with Government to perform TA functions for issuance or enabling, inventorying, and use of tokens, and public and private certificates.
- Conduct host and network-based vulnerability assessments on RDTE and SDREN computers and networks.
- Employ N approved applications for vulnerability scanning, configuration assessment, and security control compliance evaluation (and document, report, and maintain results.
- Conduct and confidentially report forensic analysis on unclassified and classified computers, peripherals, and network entities; provide software, hardware, and wireless support, including mobile forensic examination; interpret submitted documentation, including user and functional requirements, and develop forensic examination reports.
- Monitor and verify adherence to applicable acceptable-use policies; forward reports and documentation to ISSM.
- Develop training materials and provide training for Cybersecurity initiatives; elicit student evaluations of training using Government-approved method(s), evaluation questionnaires, or both.
- Review, verify, and maintain A&A and related records, documentation, and artifacts for IT and network systems for ISSM.
- Identify and report Cybersecurity metrics to ISSM.
- Provide risk management and mitigation for electronic spillages and incident handling, Internet Protocol conflict resolution, media sanitation, response to and tracking and recording of cybersecurity data calls, and reporting within established timelines.
- Serve as ISSOs for system accreditations to create and maintain concept of operations, create and maintain documentation and associated artifacts in accordance with current Government standard requirements for A&A packages, and maintain records of IT equipment in Government databases and repositories.
- Provide A&A information, updates, and documentation in maintenance of uRDTE, cRDTE, and SDREN and other networks, systems, solutions, and labs.
- Perform routine systems maintenance on networks, systems, and other associated IT equipment.
- Prepare RMF or current guidance and applicable requirement documentation for classified and unclassified computers and equipment for ISSM review and other actions.
- Complete data calls and attend meetings as needed for ISSM, ACIO, and Cybersecurity Branch Head.
- Manage Internet Protocol network address schemes and allocations in accordance with SOPs; includes but is not limited to modifying field entries to reflect current information and granting access to new users.
- Conduct thorough assessments of IT systems, applications, and networks to ensure compliance with DoD and DON security standards and practices.
- Perform testing and risk assessment of IT assets and provide results and reports to Government.
- Perform classified and unclassified tasking and actions to support A&A activities.
- Utilize tools and repositories such as, but not limited to, eMASS, eMASSTer, STIG Manager, Evaluate STIG, Findings Management and Tracking System, Authoritative A&A Database, Flank Speed, ITSM tools, and applications developed for Package creation and maintenance.