Network Tech II

Clearance Level
None
Category
SCA
Location
Fort Drum, New York

REQ#: RQ45658

Travel Required: Less than 10%

Principle Duties and Responsibilities: (application of General Summary attributes)

Leadership - Not a normally a supervisory position. May be tasked to temporarily supervise certain functions as needed.

Network Admin Tasks –

Establishes and maintains training and exercise networks for both local area and wide area networks (LAN and WAN).

Analyze local and wide area network systems, including planning, designing, evaluating, selecting, and upgrading operating systems and protocol suites and configuring communication media such as Cisco integrated services routers, Cisco model 6500 and 4500 series network backbone switches, Cisco model 5500 series security appliances, Cisco model 3500 and 3700 series level-2 and level-3 switches, and other devices.

Coordinate network operations for maximum flexibility and responsiveness to ensure that all technical and operational requirements are met for networking systems hardware and software designated for use in Mission Command training exercises and events.

Supports data and communications links to live, virtual, and constructive training environments consistent with government furnished equipment. This includes networks, communications, C2, and simulations architectures.  Communications network support may also require links to joint, coalition and homeland security agencies from within the MTC.

Operates the MTC local and wide area networks.  The network(s) shall be operational 99% of the time during exercises. The operational percentage excludes scheduled downtimes, system and software upgrades, and network problems caused by outside elements.

Monitor and respond to technical support requests and requirements related to the installation, configuration, and maintenance of network systems.

Establishes and maintains Ethernet networking and configuration of associated hardware devices and the various protocols employed in networked data communications at various levels of the protocol stack.

Establish and maintain Ethernet networking and configuration of associated hardware devices and the various protocols employed in networked data communications at various levels of the protocol stack.

Employ configuration guidance based on Defense Information Systems Agency (DISA) Security Technical Implementation Guides (STIG).  An in-depth knowledge of Cisco integrated operating systems and experience with network management systems such as Solarwinds network management suite or Ipswitch What’s Up Gold is essential to performing this task.

Network Management (Non-Exercise Support) –

Setup and maintain the physical network security for the site enclave. Maintain knowledge of the Risk Management Framework (RMF) Assess and Authorize (A&A) process. Perform and/or evaluate vulnerability scans on production and integration systems utilizing approved network scanning tools and appropriate government provided software such as Retina, DISA Gold Disk, and UNIX and Oracle SRR scripts.  Experience performing security test and evaluation, directing remediation efforts, building residual risk reports and tracking POA&M as well as experience performing privacy impact assessments and knowledge of best practices protecting sensitive Information is essential to performing this task.

Performs routine maintenance of all network systems, software and licenses insuring that systems have been installed with the most current supported revision of the system software.

Maintains current knowledge of relevant computer hardware/software applications and participates in special projects as required.  Possesses the ability to put all of essential pieces together to form a coherent mental picture of the combined JLCCTC-MRF/ERF, instrumentation, and tactical MCS network and be able to determine where to focus efforts to solve problems or conceive of new solutions.

Establish internal procedures for review of system logs, event files, and critical systems file management in order to assess system network systems and network support systems integrity.

Perform backup and storage of critical files and logs on monthly basis.  Employ network intrusion detection systems such as Snort as well as intrusion prevention systems and anti-virus deployment systems such as Host Based Security Systems (HBSS) utilizing McAfee ePolicy Orchestrator.

Network Management (Exercise Support) –

Work directly with internal and external customers to develop and report present network activity and status.

Has at least a minimal knowledge of Army staff procedures, TOC/OP operations and individual MCS data threads and how they are managed to ultimately form the Common Operating Picture.

Work with MTC staff and supported units to provide the network capabilities required to pass tactical data from the simulation interfaces to tactical systems in support of exercises.

Work with remote locations to enable wide area network connectivity to MTC assets.

Resolve interoperability problems to obtain operations across all platforms utilizing various data exchange and file transfer methods.

Configure systems to meet user requirements.  Perform various tests to analyze network performance and document results.  Provide technical support and troubleshooting to users. Maintain current knowledge of relevant computer hardware/software applications.

Security Requirements:

Complies with MTC security requirements.  Performs physical security, classified information security, and information assurance security tasks in order to safeguard classified information/equipment and high value government purchased and owned equipment and software.

Ensures that data security, including data retrieval, transmission, and storage is conducted IAW applicable government standards to ensure that data transmission and storage are secure and free from unauthorized access IAW AR 380-5 and AR 25-2.

  Under the guidance of the Information Assurance Manager (IAM) shall ensure RMF accredited database and network security measures remain in place to protect information and systems from unauthorized access IAW AR 25-2 and all RMF regulations.

We are GDIT. The people supporting some of the most complex government, defense, and intelligence projects across the country. We deliver. Bringing the expertise needed to understand and advance critical missions. We transform. Shifting the ways clients invest in, integrate, and innovate technology solutions. We ensure today is safe and tomorrow is smarter. We are there. On the ground, beside our clients, in the lab, and everywhere in between. Offering the technology transformations, strategy, and mission services needed to get the job done.

GDIT is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status, or any other protected class.