Vacancy expired!
DescriptionSAIC has a potential opportunity for a Cyber Security Operations Manager to support the United States Army Reserve Command (USARC) G-6 that owns and operates the Army Reserve Network (ARNet) and Secure Army Reserve Network (SARNet).USARC provides continuous secure and non-secure data, voice, and video transport, data center services, hosted applications, file services, collaboration tools, cybersecurity, remote access, continuity of operations, and customer service across the United States Army Reserve (USAR) enterprise.These services are provided to 65,000 users with network accounts at approximately 700 locations, primarily in the continental United States with a few sites in Puerto Rico, Europe, Asia, and the Pacific region.USAR plays a critical role in defending our nation. Under Title 10 of the U.S. Code, the mission of the USAR is to provide trained, equipped, and ready Soldiers and cohesive units to meet the global requirements across the full spectrum of operations. The purpose of this contract is to provide Command, Control, Communications, Computers, and Information (C4IM) Information Technology (IT) Support Services.Work must be performed on site at Ft. Bragg, NC.Performs Cybersecurity Defense Analysis, Incident Response, Threat Analysis, Exploitation Analysis and Cyber Investigations from the National Initiative for Cybersecurity Education (NICE) Framework. Work is typically performed in a Security Operations Center (SOC), Network Operations Security Center (NOSC), Joint Operations Center (JOC), or similar, and can be categorized as primarily Incident Investigation and Response, Security Operations, Incident Management, or similar. Duties may include Identity and Access Management operations, or the use of Cyber tools to perform cyber work. Utilizes COTS/GOTS applications, ticketing systems, lab systems, forensic applications and/or custom tools, techniques, and procedures (TTPs) to monitor systems for abnormal events. Determines if events are to be deemed an incident. Determines if incidents are due to malicious or nefarious actions by one or more threat actors. Utilizes threat intelligence to determine if the incident is part of a named campaign in order to determine appropriate levels of response, or provide new intelligence based on investigative actions to threat intelligence teams, organizations, and/or external parties. Obtains information and evidence to be utilized in legal proceedings or to provide to government counterparts for possible military, law enforcement, and/or counter-intelligence response actions/activities, Human Resources investigations, and/or management action. Works with system owners to restore affected systems to secure baseline configurations. Maintains chain of custody on items of evidentiary value. Works with legal, HR, and other non-technical personnel to recommend formal proceedings against personnel. Researches, evaluates, and recommends new security tools, techniques, and technologies. Supports cyber metrics development, maintenance and reporting. Provides briefings to senior staff.SCOPE: Receives assignments in the form of objectives and determines how to use resources to meet schedules and goals. Provides guidance to subordinates within the latitude of established company policies. Recommends changes to policies and establishes procedures that affect immediate organization.PROBLEM COMPLEXITY: Interprets and administers policies, processes, and procedures that may affect sections and subordinate work units.FREEDOM TO ACT: Assignments are defined in terms of activities and objectives. Work is reviewed upon completion for adequacy in meeting objectives.IMPACT: Decisions have an impact on work processes and outcomes. Erroneous decisions or recommendations or failure to complete assignments normally result in serious delays and considerable expenditure of additional time, workforce, and funds.LIAISON: Interacts frequently with internal personnel and outside representatives at various levels. Participates and presents at meetings with internal and external representatives. Interaction typically concerns resolutions of operational and scheduling issues. Often plays a key role in cooperative effort among members of a project team made up of representatives from other departments.QualificationsEDUCATION AND EXPERIENCE:
Bachelors Degree and at least 7 years’ experience (additional four years of experience may be substituted in lieu of degree)
CERTIFICATION REQUIREMENT:
Certified Ethical Hacker (CEH) preferred, CISSP certification in lieu of CEH may be substituted
Must have ITIL Foundation Certificate
Must have CompTIA Security Plus
CLEARANCE REQUIREMENT:
Can start work with an Interim Secret clearance
Must obtain a Secret clearance within 6 months
Covid Policy: SAIC does not require COVID-19 vaccinations or boosters. Customer site vaccination requirements must be followed when work is performed at a customer site.
REQNUMBER: 2312215SAIC is a premier technology integrator, solving our nation’s most complex modernization and systems engineering challenges across the defense, space, federal civilian, and intelligence markets. Our robust portfolio of offerings includes high-end solutions in systems engineering and integration; enterprise IT, including cloud services; cyber; software; advanced analytics and simulation; and training. We are a team of 23,000 strong driven by mission, united purpose, and inspired by opportunity. Headquartered in Reston, Virginia, SAIC has annual revenues of approximately $6.5 billion. For more information, visit saic.com. For information on the benefits SAIC offers, see Working at SAIC. EOE AA M/F/Vet/Disability
Full-time- ID: #50271253
- State: North Carolina Fortliberty 00000 Fortliberty USA
- City: Fortliberty
- Salary: USD TBD TBD
- Showed: 2023-09-03
- Deadline: 2023-11-02
- Category: Et cetera