What are the responsibilities and job description for the Senior Cyber Intelligence Specialist position at Veterans Enterprise Technology Solutions (VETS) Inc.?
Staffing Pros, a division of VETS Inc., is recruiting for a full-time Senior Cyber Intelligence Specialist onsite in Salt Lake City, UT. An Active Secret clearance is required for this role.
If you have additional questions not answered by the information contained within this posting, please contact our team directly at StaffingPros@vets-inc.com.
Our client is seeking an experienced Information Systems Security professional to join their team in a full-time, on-site, and in-plant role based in Salt Lake City, UT. This role is responsible for ensuring compliance with various security frameworks, conducting assessments, and supporting system security operations.
The contractor will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. However, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by the employer, or (c) consistent with the contractor’s legal duty to furnish information.
If you have additional questions not answered by the information contained within this posting, please contact our team directly at StaffingPros@vets-inc.com.
Our client is seeking an experienced Information Systems Security professional to join their team in a full-time, on-site, and in-plant role based in Salt Lake City, UT. This role is responsible for ensuring compliance with various security frameworks, conducting assessments, and supporting system security operations.
- Prepare for and participate in security assessments and audits.
- Configure various operating systems (Windows, Linux, UNIX) to comply with 32 CFR Part 117 - National Industrial Security Program Operating Manual (NISPOM), Defense Security Service Assessment and Authorization Process Manual (DAAPM), Joint Special Access Program (SAP) Implementation Guide (JSIG), National Institute of Standards and Technology (NIST) standards, and Command Cyber Readiness Inspection (CCRI) requirements.
- Develop documentation for authorization of new and existing systems in accordance with NISPOM, JSIG, NIST, and Risk Management Framework (RMF).
- Utilize and maintain multiple security databases and sites, including SIMS and eMASS.
- Manage network architecture with layer 3 to layer 7 switching and IP address schemes for an EWAN.
- Configure VMWARE NSX setup with micro-segmentation.
- Establish VOIP/VTC using Cisco Unified Call Manager.
- Conduct vulnerability and compliance assessments on systems and networks to evaluate risk posture.
- Review electronic and manual audit logs, investigating anomalies and security incidents.
- Assist in security investigations and incident response.
- Develop and deliver information security training materials and training sessions for general and privileged users.
- Stay informed of evolving security requirements and respond to security issues.
- Coordinate with the Information System Security Manager (ISSM) and Facility Security Officer (FSO) on system security compliance.
- Maintain a current and active Secret security clearance with the ability to obtain a Top Secret clearance post-hire.
- Bachelor’s Degree and a minimum of 6 years of relevant experience; or a Graduate Degree with a minimum of 4 years of related experience.
- In lieu of a degree, a minimum of 10 years of prior related experience.
- Previous experience with RMF as an Information Systems Security Manager (ISSM) or Information Systems Security Officer (ISSO).
- System Administrator experience.
- Familiarity with NISPOM, DAAPM, JSIG, and ICD.
- Certifications such as Network , CCNA, CISSP, RHCSA.
- At least 2 years of direct and relevant experience in Information Security and Cyber Intelligence.
- At least 2 years of direct experience with Risk Management Framework (RMF).
- 8570/8140 IAM Level 1 (or higher) compliant certification (Security ).
- Active Top Secret security clearance with polygraph preferred.
The contractor will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. However, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by the employer, or (c) consistent with the contractor’s legal duty to furnish information.