Senior Cybersecurity Information Assurance Security Specialist

Homestead, Florida, United States

Applications have closed

Lucayan Technology Solutions LLC

View company page


OUR COMPANY REVOLVES AROUND MISSION-DRIVEN ENGINEERING

At Lucayan Technology Solutions LLC, we strive to solve our customer's hardest problems. Our highly focused customer-centric approach is crucial to our customer's success; and ultimately ours. We aim to be a breath of fresh air: to be the most innovative organization in the Government contracting space. Sounds cliche? No worries, the proof is in the pudding! To get there, we need exceptionally talented, bright, and driven people. Join us if you'd like to be a part of our journey. Right here, right now, this is your chance to make history and put a ding in the universe.

Lucayan Technology Solutions LLC is hiring an Information Assurance Security Specialist to join our team supporting the United States Special Operations Command (USSOCOM). The Senior IASS will be responsible for performing ports, protocols, and services management (PPSM) for IT systems to support the Cybersecurity program at USSOCOM, its Component Commands, TSOCs, and deployed forces. Ensure Defense in Depth is maintained by validating premise router configurations and firewall configurations meet Defense Information Systems Agency Security Technical Implementation Guides (STIGs) compliance. Key activities include validation scanning; remediation; and support of emerging technologies, including, but not limited to, WLAN, VPN, Mobility Access, Data at Rest, and Enterprise Gray network solutions. Responsible for performing duties in accordance with policies, procedures, regulations, directives, and software development guidelines from USSOCOM and Joint Staff, DoD, DIA, DISA, NSA, and USCYBERCOM.

General duties include:

  • Provide subject matter expertise for operational network security (e.g. Ports, Protocols and Services Management (PPSM), configuring internal and external sensors, creating and maintaining access control lists (ACLs), configuring the security settings of routers and firewalls, etc.).
  • Track and maintain A&A databases, websites, and tools to ensure that networks, systems, and devices are properly documented and managed from a security perspective. These databases, websites, and tools include, but are not limited to Ports, Protocols, and Services Management (PPSM) and Information Assurance Vulnerability Management (IAVM) databases.
  • Evaluating CND tools; conducting functionality analyses and developing CND architectures; assisting in the creation of CONOPs and policies for the appropriate use of defensive tools.
  • Evaluating, assessing, and ensuring the compliance of ports and protocols utilized by IT infrastructures, systems, platforms, products, applications, and network security devices (e.g. router ACLs, firewall configuration, ports and protocol nodes, network cabling, etc.). Researching and recommending network security guidance based upon DoD, DIA, USCYBERCOM, Joint Force Headquarters - Department of Defense Information Networks (JFHQ-DODIN), and other-directed guidance.
  • Assist Component Commands, TSOCs, and deployed forces with required scanning and vulnerability management programs.
  • Assess the organizational security posture of USSOCOM’s Component Commands, TSOCs, and deployed forces and verify their compliance with DoD, DIA, and USSOCOM guidance.
  • Validate the patching of systems, perform validation scanning using ACAS, develop Plans of Action & Milestone (POA&Ms), and report as directed by applicable policies, procedures, and regulations.
  • Execute USSOCOM, Component Command, TSOC, and deployed forces’ Information Assurance Vulnerability Management (IAVM) programs; track and report compliance with Information Assurance Vulnerability Alerts (IAVA's) and Information Assurance Vulnerability Bulletins (IAVBs). Coordinate with subordinate organizations for required reporting and compliance status. Track and report the status of POA&Ms through their completion.
  • Other support duties as needed/directed.

Requirements

  • Active Top Secret clearance
  • Eight (8) years of progressive, relevant experience or equivalent combination of education and experience.
  • Knowledge and experience with DoD IA processes and policies (e.g., CJCSM 6510.01, Incident Response and other IA policies).
  • Working knowledge of the DISA Security Technical Implementation Guides.
  • Must have excellent communication skills (written and oral) and interpersonal skills.
  • Experience with the US Combatant Commands (USCENTCOM/USSOCOM) is desired

Education:

  • Bachelor’s degree in Computer or Systems Science discipline
  • Certifications:

    IAT/IAM III is required (CISSP, CASP, CISA, CCNP Security or GCED)

Benefits

  • Medical/dental plans w/FSA & HSA options
  • Vision Plan
  • Short-Term Disability Insurance
  • Long-Term Disability Insurance
  • 401k
  • 2 weeks PTO
  • 5 days of sick leave
  • 10 Paid Federal Holidays
  • Workers Compensation
  • Commuter Benefits

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Tags: ACAS CASP+ CCNP CISA CISSP Clearance CND Compliance ConOps DISA DoD Firewalls GCED IAM Incident response Network security STIGs Top Secret Top Secret Clearance VPN Vulnerability management

Perks/benefits: 401(k) matching Health care Insurance Medical leave

Region: North America
Country: United States
Job stats:  4  0  0

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.