DCO Systems Administrator

Clearance Level
Top Secret/SCI
Category
Information Security
Location
Peterson AFB, Colorado
(Onsite Workplace)
Key Skills For Success

ACAS

Cybersecurity

Splunk Administration

REQ#: RQ198458
Public Trust: None
Requisition Type: Regular
Your Impact

Own your opportunity to work with the largest government agency in the nation. Make an impact by advancing the Department of Defense’s mission to keep our country safe and secure.

Job Description

Please take this opportunity to join one of GDIT’s fastest long-standing growing programs!  US Battlefield Information Collection and Exploitation System eXtended (US BICES-X) is a cutting edge program supporting DoD intelligence information sharing on current and emerging global threats to mission and coalition partners and emerging nations. With an internationally dispersed team supporting each combatant command, the US BICES-X team is in direct support of the war fighter and their missions. We are seeking a creative and driven professional with a passion for solving real world issues on a cross-functional, fast paced team. 

As part of the Defensive Cyber Operations Team, you’ll be charged with maintaining the Cyber Security Posture for Enterprise data centers, workstations, and remote locations across the globe.

Responsibilities:

  • Performs Defensive Cybersecurity Operations activities (formally known as Cyber Network Defense) for a large Program; coordinates with government Program staff, USAF, and other government agencies to assist in the creation, dissemination, direction, and auditing of program policy, standards, and operating procedures
  • This position will be working within our Cybersecurity infrastructure environment providing but not limited to; Implementation and Administration of Security Ops, SPLUNK, ACAS, ESS, and security related activities to secure and harden the DCO systems.
  • Uses defensive measures and information collected from a variety of sources to identify, analyze, and report events that occur or might occur within the network in order to protect information, information systems, and networks from threats.
  • Utilize available resources to conduct Cybersecurity activities, and report to senior GDIT and government personnel on overall program security posture
  • Conduct network and system audits for vulnerabilities using Security Technical Implementation Guides (STIGs), ACAS vulnerability scanner, and Evaluate-STIG to mitigate those findings for Linux, Windows, and associated network operating systems
  • Ensures the integrity and protection of networks, systems, and applications by technical enforcement of organizational security policies, through monitoring of vulnerability scanning devices
  • Performs periodic and on-demand system audits and vulnerability assessments, including user accounts, application access, file system and external Web integrity scans to determine compliance
  • Provides guidance and work leadership to less-experienced technical staff members
  • Maintains current knowledge of relevant technology as assigned
  • Participates in special projects as required.

Required Qualifications:

  • 6+ years of experience required.
  • Must possess and maintain a TS/SCI clearance.
  • BA/BS degree required or equivalent work experience.
  • Comprehensive knowledge of data security administration principles, methods, and techniques
  • Must meet DoD 8570 requirements and be eligible for IAT level II (including vendor cert for firewall or networking) and CSSP Infrastructure Support access upon hire for positions with elevated privileges and maintain ITIL V3 Foundation certification.
  • Requires familiarity with network concepts, user authentication, and digital signatures
  • Requires understanding of DOD RMF
  • Requires understanding of DHS/DoD policies and procedures, including FIPS 199, FIPS 200, NIST 800-53, DHS 4300A SSH and other applicable policies.

Preferred Qualifications:

  • ESS Proficiency with a focus on back-end maintenance, policy management and deployment.
  • ACAS Proficiency with a focus on Vulnerability Scan policy, DISA Best Practices and Agent manager deployment.
  • Ability to work with Splunk to ensure Log collection and retention is met, to include administering the server and application.
  • The ability to work and set priorities on multiple projects/tasks at once and operate in a dynamic, fast-paced team-oriented environment
  • Depending on job assignment, additional specific certifications may be required; CISSP preferred.
  • The work is typically performed in an office environment, which requires normal safety precautions; work may require some physical effort in the handling of light materials, boxes, or equipment.

The above-listed job description is not intended to be, nor should it be construed as, exhaustive of all responsibilities, skills, efforts, or working conditions associated with this job. Requests for reasonable accommodations will be considered to enable individuals with disabilities to perform the principal (essential) functions of this job.

Work Requirements
Years of Experience

6 + years of related experience

* may vary based on technical training, certification(s), or degree

Certification

Travel Required

None

Citizenship

U.S. Citizenship Required

Salary and Benefit Information

The likely salary range for this position is $83,429 - $112,700. This is not, however, a guarantee of compensation or salary. Rather, salary will be set based on experience, geographic location and possibly contractual requirements and could fall outside of this range.
View information about benefits and our total rewards program.

About Our Work

We are GDIT. A global technology and professional services company that delivers technology and mission services to every major agency across the U.S. government, defense and intelligence community. Our 30,000 experts extract the power of technology to create immediate value and deliver solutions at the edge of innovation. We operate across over 50 countries worldwide, offering leading capabilities in digital modernization, AI/ML, Cloud, Cyber and application development. Together with our clients, we strive to create a safer, smarter world by harnessing the power of deep expertise and advanced technology.

Join our Talent Community to stay up to date on our career opportunities and events at gdit.com/tc.

Equal Opportunity Employer / Individuals with Disabilities / Protected Veterans