Description
SAIC is seeking an experienced individual to join SAIC’s team, in support of the U.S. Southern Command’s Cyber IT Enterprise Services (SCITES), to help provide our Nation for contingency planning, operations, and security operations to Central America, South America, the Caribbean areas.
The candidate selected for this position shall:
- Oversee all technical aspects of the operations that involve engineering development, architecture, integration and interface design analysis, installation, integration, fielding and field analysis, O&M, and testing of hardware and software
- Ensure that technical planning, leading, organizing, and motivating of teams of contractors and subcontractors for all NOSC activities for USSOUTHCOM constructed networks, to include, but not be limited to, the oversight and management of NOSC functions such as network monitor and management; Tier 3 CSSP management, analysis, infrastructure support, incident response, and auditing; JRSS O&M; SIEM O&M; and support to full-spectrum cyber operations
- Responsible for researching, cost-justifying, recommending, and establishing current and future hardware and software architectures for all aspects of IT, from networks to operating systems and shared software services
- Support system-level design and configuration of products including determination of hardware, operating system, and other platform specifications to meet requirements while maintaining interoperability with existing sponsor network(s)
- Perform a variety of network engineering tasks and activities concerned with major systems design, integration, and implementation, and shall often be called on to troubleshoot unique or complex problems
- Provide correlation and analysis of cyberspace incident reports derived from reliable sources, network sensors, vulnerability management devices, open source information, and Industry/ Government provided situational awareness of known adversary activities
- Apply expert knowledge of Named Areas of Interest (NAI) and advanced persistent threats to review, analyze, and maintain the content of an indicator database to aid in the detection and mitigation of threat activity
- Be able to assist the customer with developing metrics and trending/analysis reports of malicious activity and develop signatures for threat detection
- Apply advanced technical principles, theories, and concepts
- Contribute to development of new principles and concepts
- Participate with senior managers to establish strategic plans and objectives
- Recommend/make decisions on administrative or project work matters and ensures effective achievement of program, project, or organizational objectives
- Work under consultative direction toward pre-determined long-range goals and objectives. Assignments are often self-initiated
- Determine and pursue courses of action necessary to obtain desired results
- Work checked through consultation and agreement with others rather than by formal review of supervisor
- Exercise independent judgment in methods, techniques and evaluation criteria for obtaining results
- Serve as organization spokesperson on advanced projects and/or programs
- Act as advisor to management and customers on advanced technical research studies and applications
- Apply a combination of expert engineering knowledge of enterprise IT and security solutions to design, develop and/or implement solutions to ensure they are consistent with enterprise architecture security policies and support full spectrum military cyberspace operations
Qualifications
Required:
- Possess a TS clearance with SCI eligibility
- Bachelors and fourteen (14) years or more experience; Masters and twelve (12) years or more experience; PhD or JD and nine (9) years or more experience
- A minimum of six years of leadership over cyber analysts responding to cyber incidents caused by internal and external threats to Combatant Command constructed networks
- A minimum of five years of leadership experience executing command and control in any warfighting domain
- A minimum of five years of experience operationalizing JFHQ DODIN CTOs
- Possess an Information Assurance Management (IAM) Level III qualifying certification or set of certifications
- A minimum of five years of experience with DISA’s Joint Regional Security Stack
- A minimum of five years of experience with network defense tools such as routers, firewalls, intrusion prevention system (IPS), intrusion detection system (IDS), log correlations tools etc.
- A minimum of two years of experience in a DoD Cyber Security Service Provider (CSSP) and CORA on IT networks, in the past seven years, as lead or management position.
- A minimum of five years of experience with endpoint security such as anti-virus, vulnerability scanning and patch management
SAIC accepts applications on an ongoing basis and there is no deadline.
Covid Policy: SAIC does not require COVID-19 vaccinations or boosters. Customer site vaccination requirements must be followed when work is performed at a customer site.