Gathering your results ...
30+ days
Not Specified
Not Specified
Not Specified
<p>Employee Type: Regular Required: 1. Ability to obtain an Interim Secret clearance prior to start date. 2. Associates in related field and 3 or more years' relevant IT experience OR 5 or more years' relevant IT experience. 3. Relevant experience: ability to demonstrate understanding with installation of Microsoft Windows Server in Host and Compute Environments, and Windows Server 2012 using server images; implementation of storage solutions, window containers, high availability, Domain Name Systems (DNS), Dynamic Host Configuration Protocol (DHCP), network connectivity and remote access solutions, core and distributed network solutions, advance network infrastructure, and maintain and monitor server environments. 4. DoD 8570 IAM II Baseline Certification (CAP, CASP+CE, CISM, CISSP (or Associate), GSLC, CCISO or HCISPP). 5. 6. ITIL Foundation within 60 days from start date. Desired: 1. Experience working in DoD, Air Force, and local base environments. - What You Can Expect: 1. Research, analyze, document, and write systems security accreditation and certification requirement packages. 2. Analyze, evaluate, and recommend application of Air Force systems accreditation and certification procedures for existing and planned USAFCENT network architecture. 3. Research, process, and recommend approval for Firewall and Bluecoat Exception Requests. 4. Process exception requests for US and Friendly Foreign Nationals, such as write to CD, USB use. 5. Complete accreditation documents as outlined by DISA Risk Management Framework (RMF), Cybersecurity Service Provider (CSSP), command, and Authorizing Official (AO) guidance. 6. Maintain Enterprise Products List (EPL) and Accreditation Library for approved products and systems and evaluate service level agreements (SLAs). 7. Prepare and process accreditation documents for Cross Domain Solutions as outlined IAW DoD and command regulations. 8. Research, analyze and document command Information Assurance and Security polices IAW DISA, command, and AF regulations and guidance; and assist in interpreting local policies. 9. Track, document, and report security related events. 10. Coordinate and track Information Assurance Vulnerabilities Alerts (IAVAs); review and report compliance; and develop and implement associated Plans, Objectives, Actions and Milestones (POA&Ms). 11. Assist staff with researching, documenting, and presenting security posture changes based on analysis and changes in threat indicators.</p>
POST A JOB
It's completely FREE to post your jobs on ZiNG! There's no catch, no credit card needed, and no limits to number of job posts.
The first step is to SIGN UP so that you can manage all your job postings under your profile.
If you already have an account, you can LOGIN to post a job or manage your other postings.
Thank you for helping us get Americans back to work!
It's completely FREE to post your jobs on ZiNG! There's no catch, no credit card needed, and no limits to number of job posts.
The first step is to SIGN UP so that you can manage all your job postings under your profile.
If you already have an account, you can LOGIN to post a job or manage your other postings.
Thank you for helping us get Americans back to work!