Information Assurance Technician/FSR with Security Clearance Professional Services - Tampa, FL at Geebo

Information Assurance Technician/FSR with Security Clearance

Top Skills' Details1Critical skills are self-motivation, great communication, and ability to work unsupervised.
2Experience with ACAS Scans3General IT skills 50% TravelPaid for by clientMust Have:
- Minimum 5 years of experience- Bachelors Degree in Computer Science or a related technical discipline- Must have Active Interim Secret Clearance before walking on site.
- Minimum IAT Level II per DoD 8570 This is a critical position requiring the individual to reach out to a multitude of different people and maintain working relationships with themJob DescriptionHigh Level Position Overview:
This technician is going to be performing two primary tasksThey are taking inventory of all industrial control systems on the base in order to begin the assessment processFrom there, the individual will build an Authority to Operate (ATO) package in eMASSThis package will be vetted by the Compliance Team at TyndallIdeally, they are looking for someone with 5 - 8 years of IT experience that also has Information Assurance experienceThis individual will go to Tyndall for their first week for training___________________________________________________________________________ Responsible for Cyber Security:
- Appointed in writing by the Enterprise Information System Security Manager (ISSM) as the Information System Security Officer (ISSO) for the CE control system Community of Interest Network Enclave (COINE).
- Responsible for creating and maintaining a complete and accurate inventory FRCS and components.
- Assist CES personnel with security control implementation and assessment of FRCS.
- Register systems in Enterprise Mission Assurance Support Service (eMASS) with all necessary artifacts to attain Authority to Operate (ATO).
- Recognize potential, successful, and unsuccessful intrusion attempts and compromises through reviews and analysis of relevant event detail and summary information.
- Assist with implementation of counter-measures or mitigating controls.
- Ensure the integrity and protection of networks, systems, and applications by technical enforcement of organizational security policies, through monitoring of vulnerability scanning devices.
- Perform periodic and on-demand system audits and vulnerability assessments, including user accounts, application access, file system and external Web integrity scans to determine compliance.
- Ensure the safety of information systems assets and protect systems from intentional or inadvertent access or destruction.
- Perform Computer Security Incident Response activities Additional Skills & QualificationsThese candidates need to be a self-starterThey will be the only Field Service Representative for the program and will be interfacing with customer directlyMust have great communication skillsBachelor's Degree in Computer Science or a related technical discipline, or the equivalent combination of education, professional training or work experience.
- 5-8 years of IT experience- Experience with ACAS scans.
- Cyber security certification is required (minimum IAT Level II per DoD 8570.
01-M).
- DoD SECRET clearance required.
- Knowledge of Industrial Control Systems (ICS) security highly desired.
- Familiarity with NIST 800 series, DoDI 8510.
01, and AF 17-101 desired.
- Experience with DoD and US Air Force (USAF) desired.
Recommended Skills Auditing Business Informatics Communication Control Systems Field Service Management File Systems Apply to this job.
Think you're the perfect candidate? Apply on company site Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.