OBXtek is an award winning Service Disabled Veteran Owned Small Business providing information technology and management services to the federal government. As the prime contractor on over 85% of its work, OBXtek is a leader in its field and has a robust corporate infrastructure that provides support for all of its programs.
OBXtek is looking for a Computer Forensics & Intrusion Specialist who possesses and applies expertise on multiple complex work assignments. Assignments may be broad in nature, requiring originality and innovation in determining how to accomplish tasks. Operates with appreciable latitude in developing methodology and presenting solutions to problems. Contributes to deliverables and performance metrics where applicable.
The baselines are as follows:
(a) Determines enterprise information assurance and security standards.
(b) Develops and implements information assurance/security standards and procedures.
(c) Coordinates, develops, and evaluates security programs for an organization. Recommends information assurance/security solutions to support customers’ requirements.
(d) Identifies, reports, and resolves security violations.
(e) Establishes and satisfies information assurance and security requirements based upon the analysis of user, policy, regulatory, and resource demands.
(f) Supports customers at the highest levels in the development and implementation of doctrine and policies.
(g) Applies know-how to government and commercial common user systems, as well as to dedicated special purpose systems requiring specialized security features and procedures.
(h) Performs analysis, design, and development of security features for system architectures.
(i) Analyzes and defines security requirements for computer systems which may include mainframes, workstations, and personal computers.
(j) Designs, develops, engineers, and implements solutions that meet security requirements.
(k) Provides integration and implementation of the computer system security solution.
(l) Analyzes general information assurance-related technical problems and provides basic engineering and technical support in solving these problems.
(m) Performs vulnerability/risk analyses of computer systems and applications during all phases of the system development life cycle.
(n) Ensures that all information systems are functional and secure.
Additional details, applying information in the following areas of security:
~ Assured Information Sharing and Management ~ Access Control ~ Cross-Domain Security ~ Information Environment Protection ~ Certification and Accreditation ~ Risk Analysis ~ IA Awareness ~ Auditing ~ Emanations Security (EMSEC) /TEMPEST for classified environments ~ Communication Security (COMSEC) ~ Computer Security (COMPUSEC) ~ Operation Security (OPSEC) ~ Information Protection ~ Authentication ~ Resource Protection ~ Federated Identity Management ~ Virtual Private Networking ~ Network Protection ~ Filtering ~ Intrusion Detection and Prevention ~ Cryptographic Services ~ Key and Certificate Services ~ Insider Threat Protection ~ Anomalous behavior detection ~ Time Compliance Network Order (TCNO) ~ Computer Incident Response Team (CIRT) ~ AF Computer Emergency Response Team (AFCERT) ~ Telecommunications Monitoring and Assessment Program (TMAP) ~ DoDIN Web Content Management ~
Candidate must be able to have a Secret clearance upon job start and obtain and retain a Top Secret clearance if job later requires it.
Professional experience supporting any of the following Operating Systems:
DOS ~ LINUX ~ MAC OSX ~ OTHER/Juniper NSRP 6.2.0R3.0 ~ OTHER/TERMINAL SERVER 3.9 ~ SGI UNIX ~ SOLARIS ~ SUN UNIX ~ VMWARE ESXI ~ WINDOWS 2008 ~ Windows 2012 ~ Windows 7/10
Professional experience supporting any of the following downward systems:
ACAS ~ ACES ~ CITS ~ HBSS ~ Remedy