This position will be a focal point for supporting the effort to develop and implement a cybersecurity support lab within the Industrial Control System (ICS) environment located at Letterkenny Army Depot (LEAD) and then be an integral part of leveraging the cyber security lab to support life-cycle efforts in maintaining ICS Test Systems moving forward. The current environment includes a variety of operating systems and different security postures spanning several different LEAD customers to include Cruise Missile Defense Systems (CMDS), Integrated Fires Mission Command (IFMC), Precision Fires (PF), and Close Combat Weapon Systems (CCWS).
Provide network and stand-alone cyber security guidance to include intrusion-detection, monitoring, assessment, and reporting for the ICS Test System Community
Provide support to process and procedure development with regard to maintaining ICS Test Systems, to include process writing
Provide monitoring of LEAD ICS Test System user activities that violate Network Enterprise Technology Command (NETCOM) Army IA and Internet usage policies like online gaming, adult content sites, chat rooms, large file downloads (i.e. MP3), Peer to Peer (P2P), Personally Identifiable Information (PII), malware and other personal use actions. Report incidents IAW AR 25-2 and local policy.
Evaluate Regional Computer Emergency Response Team-Continental US
(RCERT-CONUS) and Army Computer Emergency Response Team (ACERT)
alerts and provide local assessments of vulnerability to IAM and local DOIM
Perform technology and event assessments utilizing a wide variety of cyber security tools to include intrusion detection/prevention software such as “IntruShield” and “ArcSight”, scanning applications such as Assured Compliance Assessment Solution (ACAS), Security Compliance Automation Protocol (SCAP), and Ekahau.
Perform preliminary technology assessments, report generation, and statistical
analysis for trend evaluation.
Provide technical support to and coordinate actions with military, local, state and federal law enforcement
and criminal investigative agencies as needed.
Bachelor’s degree in Information Systems and three (3) years of Information
Technology experience or five (5) years technical experience with Information
GSEC, Security+, SSCP or CCNA-security Certification (IAT-II)
CAP, GSLC, or Security + (IAM-I)
Secret Clearance (IT-II background checks)
Understanding of Host-based Security Solutions
Understands the issues, technology, emerging trends, and available tools and techniques and is responsible
for providing technical advice to the Government lead.
Has a working knowledge of Security Technical Implementation Guides (STIGs) and applicable NIST
Possesses a basic understanding of configuration management (CM) processes