ISS, Inc

Returning Candidate?

Subject Matter Expert

Subject Matter Expert

Req # 
2147
Position Type 
Full Time
FLSA Status 
Exempt
Category 
Engineering - System Engineering
Security Clearance 
Preferred Top Secret/SCI
Location 
Camp Lejeune, NC

More information about this job

Benefits

In addition to a competitive salary, ISS – Polaris Alpha offers excellent benefits to full-time employees:

  • Medical, Dental, and Vision premiums are paid 100% by ISS for employee and their family
  • Life and AD&D insurance premiums are paid 100%, by ISS for employee at 3x annual salary
  • 401k plan, ISS matches up to 3% of employee contributions and participants are 100% vested in plan from date of enrollment
  • 4+ weeks of PTO and 8 Paid Holidays observed
  • Education Assistance Program
  • Relocation may be considered

Benefits are subject to change

Job Description

Polaris Alpha (“Polaris”) provides advanced technical capabilities, specialized domain expertise and mission critical solutions to Department of Defense and Intelligence Community customers. The Company has approximately 1,100 employees with major offices in Colorado Springs, CO, Fredericksburg, VA, Annapolis Junction, MD, Aberdeen Proving Ground, MD, and Alexandria, VA as well as customer sites both domestically and internationally. Polaris Alpha is a highly technical industry leader uniquely positioned to address customers’ most complex challenges across the full spectrum of air, land, sea, cyber and space domains.
This position is in the Technical Services Department, and is focused on providing the II MEF with an experienced cyber security professional with a strong background in network security. This professional must qualify and obtain a U.S. Top Secret/SCI security clearance. This position requires an active Department of Defense level security clearance which requires US citizenship while working in support of a government contract. The successful candidate will be a self-starter with a strong work ethic who can thrive in a fast-paced environment employing agile methodologies. Travel may be required.

• As a part of cyber operations, this person must work with surveillance, reporting and network management systems. Duties can include advising readiness of capabilities, status reports, and evaluation results.

• Will evaluate the operational readiness of communications, sensors, intrusion detection, and related support equipment.
• Will coordinate with other operators performing control and surveillance of network activities.
• Will work to protect data and network systems in ways of passive defense measures such as firewalls.
• Must be able to interpret directives into specific guidance and procedures for operator actions and develop and execute operation plans.
• Contributes cyber-related input to CONOPS and TTPs. Supports implementation of cyber/network security requirements consistent with II MEF IW Cyber Security COE.
• Interfaces with the II MEF G-2, MIG, G-6, and C2CoreCyber team at 2d MAW to establish CONOPS and TTPs for use of C2 Core Cyber across II MEF and subordinate units.
• Interfaces with the II MEF G-Staff to identify end-user systems, networks, and communication equipment vulnerabilities and maintenance requirements and ensure that information is properly cataloged and coordinated within the 2d MAW C2CoreCyber for effective and efficient resolution of technical issues.
• Provides detailed query metrics and reports from 2d MAW C2CoreCyber to II MEF staff for cyber operations and status.
• Must understand cyber operation laws.

This field requires knowledge of computer operating systems, hardware, software, databases, and programming languages. It is essential the candidate understand networking fundamentals, networking protocols, network addressing and infrastructure, telecommunications theory and data communications. Must be proficient on wireless networking as well as delivery to personal wireless devices; also must understand and apply cryptography, including utilization and exploitation techniques.

Physical Demands and Working Conditions:
Normal office setting, therefore the noise level in the work environment is usually moderate. Work is generally sedentary in nature, but may require standing and walking. Use of hands to operate computer equipment. Frequent near vision use for reading and computer use. Reasonable accommodations may be made to enable individuals with disabilities to perform essential functions.
Polaris Alpha is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, age, protected veteran status, genetic information or disability status. Reasonable accommodations may be made to enable individuals with disabilities to perform essential functions.

Required Skills

Bachelor’s Degree and minimum 5 years of experience in cyber security fields, including a minimum of 3 years of experience with tactical data links and network defense. Eight (8) years of additional experience, applicable training and/or certifications may be substituted for the Bachelor’s Degree.
Ability to learn and apply skills related to new functional areas
Ability to communicate effectively with both technical and non-technical personnel.
Brigade, Division or above staff level experience.

Desired Skills

Familiarity with Information Assurance Vulnerability Management (IAVM) and Information Assurance Vulnerability Alerts and Software Updates.
Familiarity with cyber defense tactics and techniques, such as computer security management, DoD Cybersecurity Discipline, Defense-In-Depth Software Application Security, compartmentation, micro-segmentation, geofencing, virtual private networking services, SSL encryption, malware detection and mitigation, monitoring for malicious behavior detection, automated penetration testing, and authentication gateway/reverse proxies. This list provides examples of desired experience and skills and is not conclusive.
Experience with cyber defense tools, such as Block All Drive-By Download Exploits (BLADE), Open Source Tripwire, Change Tracker Enterprise, StackDefender, BufferShield, Security Administrator's Tools for Analyzing Networks (SATAN), anti-keylogging tools, dynamic program analysis tools, intrusion detection systems/intrusion prevention systems (IDS/IPS), and vulnerability scanning.
Current professional cyber security certification, such as CompTIA Security+, GIAC Security Essentials Certification, Systems Security Certified Practitioner, and Certified Information Systems Security Professional (CISSP).

Connect With Us!

Not ready to apply? Connect with us for general consideration.