Performs forensic analysis of digital information and gathers and handles evidence. Identifies network computer intrusion evidence and perpetrators. Investigates computer fraud or other electronic crimes, crack files and system passwords, detects steganography and recovers deleted, fragmented and corrupted data from digital media of all types. Ensures chain of custody and control procedures, documents procedures and findings in a manner suitable for courtroom presentation and prepares comprehensive written notes and reports. May be required to testify in court as expert witnesses.
Applies knowledge of current IA policy at the national IA structure
roles of major organizations how they interrelate and interact, and
shortcomings in this structure. Reviews and recommends IA solutions
to customer problems based on an understanding of how products and
services interrelate and support the IA mission and the viewpoints
of the consumers of those products and services. Analyzes and
recommends resolution of IA problems based on knowledge of the
major IA products and services, an understanding of their
limitations, and a working knowledge of the disciplines of IA.
Input unclassified and classified network devices and servers in
VMS. All assets shall be assigned to a network, system or database
administrator in VMS.
Review Information Assurance Vulnerability Alerts (IAVAs),
Information Assurance Vulnerability Bulletins (IAVBs) and other
identified security vulnerabilities in the unclassified and
Coordinate IAVAs, IAVBs and fixes with the Infrastructure Support
network, system and database administrators as well as maintaining
IAVA and IAVB status in VRAM.
Direct the testing of each software patch released with an IAVA,
IAVB or other security patch to ensure it will not adversely impact
the functionality of the network(s) and applications(s).
Implement security procedures and patches as required and update
all system and configuration management documentation to reflect
the software patches.
Ensure the IAVAs, IAVBs and other security vulnerabilities are
coordinated with the MSC IA Team and corrected by the compliance
due date. Support the Afloat IAM regarding system vulnerability and
status of fixes (number done, estimated time to completion, etc.)
and provide information to complete the required mitigation plan
if the compliance due date cannot be met. The information provided
as part of the mitigation plan must include the reason for the
mitigation plan, number of affected assets, estimated completion
date for fixing the vulnerability, and a description of the
mitigating controls being implemented to manage the vulnerability
until the actual documented fix is implemented.
Accomplish IA vulnerability scanning of the local ATAC network
using approved IA tools (e.g. ACAS). Direct the
correction/mitigation of all identified vulnerabilities.
Assist with research, data gathering, data collation for ad hoc
reports, data calls and special projects. Assist with other special
projects and duties as assigned.
Coordinate the daily activities of the IA Team towards satisfaction
of all mandated tasking.
BS or equivalent + 2 yrs related experience, or MS + 0 yrs experience
May substitute experience for degree.
Has and can apply, in an operational setting, knowledge of DoD IA
products and services, an understanding of their limitations and a
working knowledge of the disciplines of IA, as well as the
generalized knowledge of the underlying Operating Systems and/or
COTS/GOTS/Custom S/W and its peculiarities. Applies knowledge of
current IA policy, tactics, techniques, policy, and doctrine, and
relationship to IA reporting requirements and structure.
Knowledge of, familiarity and experience with Microsoft Server 2003, 2008, 2012 and Windows 7/10; networks, servers, routers, printers, associated and related hardware, software, and peripheral devices.