Own your opportunity to work with the largest government agency in the nation. Make an impact by advancing the Department of Defense’s mission to keep our country safe and secure.
Mission and Common User Communications System Administration Services:
Assist with oversight of all aspects of day-to-day operations as required, including mission and common user communications system administration, configuration management, maintenance, and training.
Common user communications Services security enclaves includes, the following:
a. NIPRNet as required for weapon system(s) accreditation
b. SIPRNET (Secret Internet Protocol Router Network)
c. JWICS (Joint Worldwide Intelligence Communications System)
d. CENTRIXS (Combined Enterprise Regional Information Exchange System)
e. NSANet (National Security Agency Network)
Actively pursue mitigation of all Plan of Action and Milestone (POA&M) findings on a continuous basis for all systems.
Protect the root or super-user authenticator at the highest level of data it secures based on security enclave.
Usespecial access or privileges granted only to perform authorized tasks and functions.
Provide system administration.
User-level information shall be backed up weekly.
System-level information shall be backed up weekly, systems shall be restored as needed.
Database maintenance shall be conducted as needed
Audit records shall be archived onto different media or a different system at least every 30 days.
Data integrity checks shall be conducted at least daily to keep the weapons systems up-to-date, secure and operational in accordance with NIST 800-53 REV 4.
Perform user account creation and maintenance, account unlocking and password resets (with government oversight); within approved information systems to maintain user access to the systems within one week of the request.
Review at least annually all ports, protocols and services to ensure they are in compliance with approved configurations.
Support Time Compliance Technical Order (TCTO) or Time Compliance Network Order (TCNO) instruction compliance activities (including software baseline upgrade support) in accordance with TO 00-5-15 Technical Manual Air Force Time Compliance Technical Order Process dated 14 February 2016.
Support network administrators with cabling and configuration when adding and removing communications equipment such as routers, and switches.
Immediately initiate trouble tickets in the approved maintenance data collection system to address maintenance issues.
Incident Response and Vulnerability Services: Ensure proper protection or corrective measures are immediately taken when an incident or vulnerability is discovered within a system.
Provide limited emergency operational support if the system is down hard for information system security events involving information systems within their purview.
Report all suspected or actual security-related incidents to the site Information System Security Manager (ISSM) for up-channeling to the ANG Chief Information Security Officer (CISO) and the Air Force Intelligence Community Security Coordination Center (AF IC SCC) in accordance with NIST 800-53 REV 4, Incident Response (IR) control family.
Perform sanitation, protective, or corrective actions following guidance provided by AF IC SCC, when a security incident or vulnerability is discovered.
Complete and submit initial security incident reports to the site ISSM within 2 hours after an event.
Ensure after-action security incident reports are complete, accurate, and provided in accordance with AF IC SCC direction.
Configuration Management Services: Support site Configuration Manager with ensuring information systems are documented, operated, maintained, and configured in accordance with internal security policies and practices outlined in pertinent information systems CONOPS, Configuration Management Plans (CMP), local Standard Operating Procedures (SOPs) and System Security Plans (SSP) as provided by the government.
Follow procedures identified in the CMP, authorizing installation of software, hardware, and firmware use before implementation on the information system in accordance with the Program and Site Configuration Management Plans.
Provide technical feedback to CM for updates to site drawings, hardware, and software configuration.
Provide system administrator support as directed for system maintenance.
Immediately notify the ISSM of any system configuration changes adversely impacting system security.
Maintenance Services: Perform and support installation, integration, and maintenance of a wide variety of Commercial off the Shelf (COTS) computer systems, hardware, and software applications and provide replacement options to the Government.
Provide routine maintenance, in conjunction with site maintenance personnel for prescribed COTS network architecture and equipment.
Once the equipment is installed and configured, support the management of all network infrastructure for AF DCGS and mission partner networks (i.e. SIPRNET, JWICS, NSANet, CENTRIXS, etc.).
Use system diagnostic tools to determine the cause of hardware, firmware, and network problems and provide possible solutions. Upon government approval, implement the solutions. All solutions shall conform to form, fit and function criteria.
Support the government and other contractors to ensure network configurations meet security requirements.
DoD 8570.01-M IAT Level II Certification is required, i.e. Security+
Candidates should have, or be able to obtain, a Polygraph
Candidates should have, or be able to obtain, the MADO security clearance caveat.
BA/BS, 2+ years experience
Years of Experience
1 + years of related experience
* may vary based on technical training, certification(s), or degree
Security+ - Comptia
U.S. Citizenship Required
About Our Work
We are GDIT. A global technology and professional services company that delivers consulting, technology and mission services to every major agency across the U.S. government, defense and intelligence community. Our 30,000 experts extract the power of technology to create immediate value and deliver solutions at the edge of innovation. We operate across 30 countries worldwide, offering leading capabilities in digital modernization, AI/ML, Cloud, Cyber and application development. Together with our clients, we strive to create a safer, smarter world by harnessing the power of deep expertise and advanced technology.
GDIT is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status, or any other protected class.