JOB TITLE: Zero-Day Defense Network Defense Engineer

SUMMARY: This position helps to design the requirements in such a way that zero-day attacks can be prevented and detected, avoiding unauthorized access to the company’s critical information. This position is responsible for planning, collecting, implementing, and hardening the networks of organizations across DoD to prevent unauthorized access. The Zero-Day Defense Network Defense Engineer is focused on providing network designs of requirements that have high availability and efficiency characteristics. The Network Engineer possesses extensive knowledge of the systems of networks, telecommunications, tools of administration, and security across an Enterprise Network infrastructure in a multi-vendor environment

DUTIES and RESPONSIBILITIES:

Job Description:

  • Designs and defines system architecture for new or existing computer systems.
  • Performs systems development and design work that may include logic design, I/O design, firmware development, model formulation, manufacturing and development cost projections, computer architecture analysis and design, and analog or digital systems engineering.
  • Performs systems modeling, simulation, and analysis.
  • Participates in the upgrading of operating systems and design of systems enhancements.
  • Provides input for documentation on new or existing systems.
  • Develops and conducts tests to ensure systems meet documented user requirements.
  • Identifies, analyzes, and resolves operating/hardware system problems.
  • Provides system/equipment/specialized training and technical guidance.
  • Determines system specifications, input/output processes, and working parameters for hardware/software compatibility.
  • Maintains current knowledge of relevant technology as assigned.
  • Knowledge of systems engineering principles, methods, and techniques.
  • Knowledge of the associated hardware, software, and equipment.
  • Professional certification in one or more specific technologies may be required, depending on job assignment.
  • Requires familiarity with domain structures, user authentication, and digital signatures.
  • Participates in special projects as required.
  • Administer computer network defense (CND) infrastructure for networks to test and evaluate new CND applications, rules/signatures, access controls, and configurations to manage and administer the updating of rules and signatures (e. g., intrusion detection/protection systems, anti-virus, and content blacklists) for specialized computer network defense (CND) applications
  • Create, edit, and manage changes to network access control lists on specialized computer network defense (CND) systems (e. g., firewalls and intrusion prevention systems) Identify potential conflicts with implementation of any computer network defense (CND) tools within the area of responsibility (e. g., tool/signature testing and optimization) Perform system administration on specialized computer network defense (CND) applications and systems (e. g., anti-virus, audit/ remediation) or Virtual Private Network [VPN] devices, to include installation, configuration, maintenance, and backup/restoration Assist in identifying, prioritizing, and coordinating the protection of critical computer network defense (CND) infrastructure and key resources.
  • Must have a good understanding of networks at the packet level and be able to analyze packet captures at the expert level.
  • Basic experience administering and automating Linux systems. Scripting experience in Powershell/BASH Programming and Automation experience utilizing Ruby/Python/Perl, Gigamon. Virtualization experience: VMware ESXi, HBSS operations. In-depth experience with configuring and analyzing results from, but not limited to: HIPS, DLP and VSE, ACAS Operations (Security Center, Nessus Scanner and PVS), SPLUNK operations, Fidelis. In-depth operational work with network IDS and incident response including but not limited to Fidelis.
  • HBSS Operations, In-depth experience with configuring and analyzing results from but not limited to HIPS, DLP and VSE Maintain and administer the HBSS operations for networks. Install HBSS agent and modules to servers and end user machines. Respond to escalated support requests for technical assistance Validate and coordinate HBSS scheduled maintenance Create custom queries to meet varying informational demands Maintain and administer the computing systems to meet the DoD mandated security requirements and directives Create custom Firewall policies and work with Cybersecurity and incident teams to identify, configure and apply host based IPS signatures to protect against zero-day threat Create firewall and IPS exclusions based on customer demand and the A&A approval process Work with the trouble ticket system to coordinate troubleshooting efforts with the end user and their varying issues Troubleshoot VM and SQL issues that conflict with the basic functionality of ePO Understand client’s operational and sustainment methodologies and processes. Monitor HBSS to detect faulty operation, anomalies, and security events. Develop, run, analyze, and maintain reports using SQL and HBSS reporting. Develop sorting rules, dashboards, data monitors, and filters using HBSS.
  • Provide cyber security remote scanning and remediation support, as necessary, to sites preparing for CCRIs. Assist the PMO with maintenance of base/site lists and Internet Protocol host counts. Maintain effective communications with other teams essential to ACAS operation (e. g., Base Boundary, Server Consolidated Environment,etc.). Support the reporting of compliance data via ACAS to the e-MASS Facilitate, as necessary, the transition of ACAS Security Centers new virtual infrastructure; as needed Author custom security policies. Perform systems analysis, design review, programming, documentation and implementation of complex system applications and related IT/ADP systems concepts. Participate in all phases of the software life cycle with emphasis on the planning, analysis, programming, testing and acceptance phases. Author and/or assist in the authoring of configuration files, signatures and other such files necessary to add new vulnerability discovery capabilities into the ACAS system tool. Assist vulnerability personnel in the implementation of the DISA Information Assurance and Vulnerability Management programs including vulnerability tracking and compliance reporting. Assist with implementation of DISA-released software patches, updates, and upgrades. Passive Vulnerability Scanner on ACAS. Experience with Microsoft SQL 2012 Experience with Windows Server 2012 R2 and 2016, Scripting experience (Perl, JavaScript, HTML) Knowledge of data communications, local-area networking, wide-area networking, routers, and switches Thorough understanding of Internet Protocol (IP) routing, switching and the OSI model.

REQUIREMENTS:

  • Secret DoD security clearance, T5 investigation
  • DoD 8570/8140 IAT-II level access certification, vendor network certification (professional or higher)
  • Current Security + or comparable certification (IAW DoDD 8570)
  • Minimum 5+ years’ experience in the design and implementation of complex Datacenter and Enterprise Network infrastructure in a multi-vendor environment.

DESIRABLE:

  • Bachelor’s degree in a comparable technical field
  • ITIL Foundation certification

TYPE POSITION: Full Time, Contractor

LOCATION: Columbus, OH; Oklahoma City, OK and Montgomery, AL

START DATE: June 1st, 2019

DURATION: 3 years

*All cover pages, resumes, and questions can be sent to jobs@akira-tech.com