Description
SAIC is seeking an experienced individual to join SAIC's team, in support of the U.S. Southern Command's Cyber IT Enterprise Services (SCITES), to help provide our Nation for contingency planning, operations, and security operations to Central America, South America, the Caribbean areas.
The candidate selected for this position shall:
Oversee all technical aspects of the operations that involve engineering development, architecture, integration and interface design analysis, installation, integration, fielding and field analysis, O&M, and testing of hardware and software
Ensure that technical planning, leading, organizing, and motivating of teams of contractors and subcontractors for all NOSC activities for USSOUTHCOM constructed networks, to include, but not be limited to, the oversight and management of NOSC functions such as network monitor and management; Tier 3 CSSP management, analysis, infrastructure support, incident response, and auditing; JRSS O&M; SIEM O&M; and support to full-spectrum cyber operations
Responsible for researching, cost-justifying, recommending, and establishing current and future hardware and software architectures for all aspects of IT, from networks to operating systems and shared software services
Support system-level design and configuration of products including determination of hardware, operating system, and other platform specifications to meet requirements while maintaining interoperability with existing sponsor network(s)
Perform a variety of network engineering tasks and activities concerned with major systems design, integration, and implementation, and shall often be called on to troubleshoot unique or complex problems
Provide correlation and analysis of cyberspace incident reports derived from reliable sources, network sensors, vulnerability management devices, open source information, and Industry/ Government provided situational awareness of known adversary activities
Apply expert knowledge of Named Areas of Interest (NAI) and advanced persistent threats to review, analyze, and maintain the content of an indicator database to aid in the detection and mitigation of threat activity
Be able to assist the customer with developing metrics and trending/analysis reports of malicious activity and develop signatures for threat detection
Apply advanced technical principles, theories, and concepts
Contribute to development of new principles and concepts
Participate with senior managers to establish strategic plans and objectives
Recommend/make decisions on administrative or project work matters and ensures effective achievement of program, project, or organizational objectives
Work under consultative direction toward pre-determined long-range goals and objectives. Assignments are often self-initiated
Determine and pursue courses of action necessary to obtain desired results
Work checked through consultation and agreement with others rather than by formal review of supervisor
Exercise independent judgment in methods, techniques and evaluation criteria for obtaining results
Serve as organization spokesperson on advanced projects and/or programs
Act as advisor to management and customers on advanced technical research studies and applications
Apply a combination of expert engineering knowledge of enterprise IT and security solutions to design, develop and/or implement solutions to ensure they are consistent with enterprise architecture security policies and support full spectrum military cyberspace operations
Qualifications
Required:
Possess a TS clearance with SCI eligibility
Bachelors and fourteen (14) years or more experience; Masters and twelve (12) years or more experience; PhD or JD and nine (9) years or more experience
A minimum of six years of leadership over cyber analysts responding to cyber incidents caused by internal and external threats to Combatant Command constructed networks
A minimum of five years of leadership experience executing command and control in any warfighting domain
A minimum of five years of experience operationalizing JFHQ DODIN CTOs
Possess an Information Assurance Management (IAM) Level III qualifying certification or set of certifications
A minimum of five years of experience with DISA's Joint Regional Security Stack
A minimum of five years of experience with network defense tools such as routers, firewalls, intrusion prevention system (IPS), intrusion detection system (IDS), log correlations tools etc.
A minimum of two years of experience in a DoD Cyber Security Service Provider (CSSP) and CORA on IT networks, in the past seven years, as lead or management position.
A minimum of five years of experience with endpoint security such as anti-virus, vulnerability scanning and patch management
SAIC accepts applications on an ongoing basis and there is no deadline.
Covid Policy: SAIC does not require COVID-19 vaccinations or boosters. Customer site vaccination requirements must be followed when work is performed at a customer site.
REQNUMBER: 2410149
SAIC is a premier technology integrator, solving our nation's most complex modernization and systems engineering challenges across the defense, space, federal civilian, and intelligence markets. Our robust portfolio of offerings includes high-end solutions in systems engineering and integration; enterprise IT, including cloud services; cyber; software; advanced analytics and simulation; and training. We are a team of 23,000 strong driven by mission, united purpose, and inspired by opportunity. Headquartered in Reston, Virginia, SAIC has annual revenues of approximately $6.5 billion. For more information, visit saic.com. For information on the benefits SAIC offers, see Working at SAIC. EOE AA M/F/Vet/Disability
S:SKINTIAGP11