Performs Computer Security Incident Response activities for a large organization, coordinates with other government agencies to record and report incidents. Monitor and analyze Intrusion Detection Systems (IDS) to identify security issues for remediation. Recognizes potential, successful, and unsuccessful intrusion attempts and compromises thorough reviews and analyses of relevant event detail and summary information. Evaluate firewall change requests and assess organizational risk. Communicates alerts to agencies regarding intrusions and compromises to their network infrastructure, applications and operating systems. Assists with implementation of counter-measures or mitigating controls. Ensures the integrity and protection of networks, systems, and applications by technical enforcement of organizational security policies, through monitoring of vulnerability scanning devices. Performs periodic and on-demand system audits and vulnerability assessments, including user accounts, application access, file system and external Web integrity scans to determine compliance. Prepares incident reports of analysis methodology and results. Provides guidance and work leadership to less-experienced technical staff members. Participates in special projects as required.
Requires comprehensive knowledge of data security administration principles, methods, and techniques. Professional Certification in one or more specific technologies may be required to meet DoD Approved RMF Baseline Certifications. Requires familiarity with domain structures, user authentication, and digital signatures. Requires understanding of firewall theory and configuration. Requires understanding of DHS/DoD policies and procedures, including FIPS 199, FIPS 200, NIST 800-53, DHS 4300A SSH and other applicable policies. IAT/M baseline certified
Responsible for performing system management and system administration functions on a variety of Joint Land Component Constructive Training Capability (JLCCTC) simulation systems, networking systems, and related hardware and software employed at the Mission Training Complex (MTC) in support of digital Mission Command training events and exercises. These functions include the installation, maintenance, and control of simulation system applications for logistics, fire support, and maneuver as well as the underlying computer operating systems. Likewise, it includes the installation, maintenance, and control of local area networks that support the flow of data between simulation systems and battle command systems.
Applies advanced technical principles, theories, and concepts. Contributes to the development of new principles and concepts. Develops advanced technological ideas and guides their development into a final product.
2) Principle Duties and Responsibilities: (application of General Summary attributes)
a) Leadership -
Supervises and directs other system analysts in the planning, preparation and delivery of Mission Command training technical support. Develops advanced concepts, techniques, and standards. Provides analytical and technical support to projects involving training, tactical/operational documentation or other efforts requiring technical operations expertise.
The Network Engineer shall act as the overall communications architect for the MTC with coordination responsibility with outside agencies and MTC branches. The Team Leader shall create/establish communications architecture, coordinate communications plans, configure communications equipment, and assist in installing equipment and circuitry in support of distributed exercises. The Team Leader coordinates all aspects of the communications architecture and exercise support plans with communications planners at other simulation facilities, the local NEC, and participating tactical units. Plans include distribution of data, voice, and VTC over both LAN and WAN in both classified and unclassified modes for simulations/stimulation networks; NIPRNET, SIPRNET, and tactical networks.
The supervisors primary duties consist of performing manual work directly related to the general business operations of the MTC Director as detailed in the statement of work (SOW) and the MTC Directors customers, military units. Performance of these duties requires supervisors to exercise discretion and independent judgment with respect to matters of significance within the framework of the approved Event Life Cycle Management (ELM) process.
b) Network Management (Non-Exercise Support) –
Operates the MTC local and wide area networks. The network(s) shall be operational 99% of the time during exercises. The operational percentage excludes scheduled downtimes, system and software upgrades, and network problems caused by outside elements.
Acts as liaison with external organizations to ensure that all networks, communications, data, security, and training and exercise models and simulations (M&S) are working IAW the most current applicable standards.
Tests new software and hardware compatibilities and applications as they are updated and released. Modifies computer systems and program documentation, identifies flaws in system configuration, software inconsistencies and implements corrections.
c) Network Management (Exercise Support) –
Supports data and communications links to live, virtual, and constructive training environments consistent with government furnished equipment. This includes networks, communications, C2, and simulations architectures. Communications network support may also require links to joint, coalition and homeland security agencies from within the MTC.
Maintains, operates, and improves existing networks and systems necessary for distributed training between Hub and Spokes.
Configures, documents, tests, troubleshoots, creates, and/or modifies computer documentation related to MS Windows 7, MS Windows Servers, RedHat Linux and SUN Solaris based simulation systems, to include Joint Conflict and Tactical Simulation (JCATS) Server/Bridge, Fire Support Simulation, Joint Simulation Protocol Analyzer (JSPA), Joint Deployment Logistics Model (JDLM) Gateway/Server/Workstations and the Simulation Interchange Module for Plans Logistics and Exercises (SIMPLE).
Designs, develops and documents network configuration, to include local area networks, virtual networks, and subnet strategies. Analyzes, tests, and/or modifies computer systems, networking protocols and software programs, in order to provide pertinent solutions to system users, based on and related to user or system design specifications.
Develops hardware infrastructure to provide effective network and operating systems setup and configuration using CISCO networking products. Troubleshoots and tests hardware, software and networks prior to all training events and exercises to ensure minimal downtime of systems, including thread testing of data over network connections between virtual local area networks and subnets, timely data flow,C2 message retrieval between simulation systems and battle command systems.
Analyzes, evaluates and modifies software applications and hardware on the systems listed above to adhere to the dynamic training specifications of end users. Ensure that copies of said systems software and hardware are up-to-date.
Consults with Training Branches and end-users to design, create, configure systems, and document progress of set up and use to meet their training requirements based upon available software and hardware systems. Performs hardware, software and network setup, and designs system and network configuration of classrooms for all systems listed above, providing software systems, applications, network and hardware support during all training events.
d) Security Requirements -
i) Complies with MTC security requirements. Performs physical security, classified information security, and information assurance security tasks in order to safeguard classified information/equipment and high value government purchased and owned equipment and software.
ii) Ensures that data security, including data retrieval, transmission, and storage is conducted IAW applicable government standards to ensure that data transmission and storage are secure and free from unauthorized access IAW AR 380-5 and AR 25-2.
iii) Under the guidance of the Information Assurance Manager (IAM), ensures RMF/DIACAP accredited database and network security measures remain in place to protect information and systems from unauthorized access IAW AR 25-2 and all DIACAP regulations.
iv) Picks up, handles, transports, installs, inventories, stores, and destroys COMSEC equipment, devices, and keying material IAW all DA and National Security Agency (NSA) procedures and regulations when required.
e) Training –
Maximizes technical cross training of individual employees in related and progressive skills. Cross training of subcontractor personnel is essential to the efficient and cost effective execution of the MTCs mission.
3) Systems and Applications supported:
a) US Army Mission Command capabilities to include but not limited to:
i) Advanced Field Artillery Tactical Data System (AFATDS)
ii) Air and Missile Defense Work Station (AMDWS)
iii) Battle Command Sustainment Support System (BCS3)
iv) Command Post of the Future (CPOF)
v) Command Post Computing Environment (CPCE)
vi) Force Battle Command Brigade and Below (FBCB2) – Joint Capabilities Release (JCR)
vii) Tactical Airspace Integration System (TAIS)
viii) Tactical Ground Reporting (TIGR)
ix) Tactical Mission Command servers (TMC)
b) Collaboration (voice and data) capabilities to include but not limited to:
iv) Voice communications
vi) Gaming and Virtual training capabilities to include but not limited to:
vii) Virtual Battle-space 3 (VBS3)
c) LVCG, Constructive Simulations / Stimulations (G&S) to include but not limited to:
i) Joint Conflict and Tactical Simulation (JCATS)
ii) Joint Defense Logistics Model (JDLM)
iii) Virtual Reality Scene Generator (VRSG) / Multiple Unified Simulation Environment (MUSE)
iv) Fires Simulation (FireSim)
v) After Action Review System (AARS)
vi) One Semi-Automated Forces (OneSAF)
vii) Joint Land Component Constructive Training Capability (JLCCTC) Multi Resolution Federate (MRF)
viii) War Fighters Simulation (WARSIM)
ix) Live Virtual Constructive – Integrating Architecture (LVC-IA) components
x) Virtual Battle Space 3 (VBS3)
Have a minimum BA or BS degree in Network management or a related field and a minimum of 8 years experience in Network architecture design and implementation
a) Have a minimum BA or BS degree in Network management or a related field and a minimum of 8 years experience in Network architecture design and implementation. Shall possess advanced planning, troubleshooting and maintenance skills on the Microsoft server platform and CISCO router, switch and firewall configuration and SONET configuration/architecture. (MCSE/MCSA) Will have a strong understanding of technology integration and information flow including LAN/WAN, firewalls, virtualization, security, storage, and backup methodologies. Understand the Risk Management Framework (RMF) Certification & Accreditation process and Information Assurance requirements. This position requires a Top Secret Security Clearance.
b) Security Clearance: TS/SCI
c) DoD Certification and Training Requirements: As a condition of initial and continuing employment, obtains and maintains required certifications.
i) Baseline Certification: Security + CE
ii) Computing Environment Certification: CompTIA Advanced Security Practitioner (CASP)
iii) Mandatory Training / Local Training Plan: Complies with all DoD, Army, and company training requirements IAW Government policy, DoD 8570.01-M IA Workforce Improvement Program, Army Regulation, and company and site policy.
For more than 50 years, General Dynamics Information Technology has served as a trusted provider of information technology, systems engineering, training and professional services to customers across federal, state, and local governments, and in the commercial sector. Over 40,000 GDIT professionals deliver enterprise solutions, manage mission-critical IT programs and provide mission support services worldwide. GDIT is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status, or any other protected class.