Cybersecurity Technical Administrator- Cloud with Security Clearance Education, Training & Library - Manassas, VA at Geebo

Cybersecurity Technical Administrator- Cloud with Security Clearance

IntroductionA career in IBM Consulting is rooted by long-term relationships and close collaboration with clients across the globe.You'll work with visionaries across multiple industries to improve the hybrid cloud and AI journey for the most innovative and valuable companies in the worldYour ability to accelerate impact and make meaningful change for your clients is enabled by our strategic partner ecosystem and our robust technology platforms across the IBM portfolio; including Software and Red Hat.Curiosity and a constant quest for knowledge serve as the foundation to success in IBM ConsultingIn your role, you'll be encouraged to challenge the norm, investigate ideas outside of your role, and come up with creative solutions resulting in ground breaking impact for a wide network of clientsOur culture of evolution and empathy centers on long-term career growth and development opportunities in an environment that embraces your unique skills and experienceYour Role and Responsibilities PD ALTESS provides Information Management policy, guidance, automation, support and services to the Army Acquisition Executive (AAE) and the Office of the Assistant Secretary of the Army for Acquisitions, Logistics and Technology (ASA(ALT)) and provides information management support and services to other DOD and Army elements, and the Acquisition Community in support of the AAE missionThis Remote position is for a Cybersecurity Technical Administrator supporting the ALTESS commercial cloud customers who reside in Microsoft Azure and/or Amazon AWS (Gov/DoD)ALTESS is a managed service provider (MSP) for Army IT systems and we support enterprise applications owners in migrating their systems into the cloud and also provide sustainment services to support their applicationsThis position is for a cybersecurity technical administrator role to support a full range of cybersecurity services that ALTESS provides to all customers.o Serve as overall subject matter expert on Cybersecurity Technical Administrator technology and market capabilities/trends. Conduct security scans against the organization's cloud-deployed infrastructure, produce and interpret compliance reportsThe Army's Assured Compliance Assessment Solution (ACAS) is used to accomplish this. Validate technical security controls are in place for operating systems, applications, and network appliances, and recommend enhancements Review proposed configuration changes for security impact Operate endpoint-protection mechanisms, including high-level reporting and day-to-day administration activities Work between technical and policy teams to implement, maintain, and monitor technical security configuration controls, including:
STIGs, SRGs, and other industry security hardening guidance. Work between technical and policy teams to successfully implement and manage requirements for maintaining cloud P-ATO, ATO, and security control inheritance capabilities. Collaborate with internal and external parties to transform high-level technical objectives into comprehensive technical requirements. Use results of vulnerability scans to determine vulnerabilities and develop operational plans to remediate or mitigate vulnerabilities as they are discovered. Install, operate, and maintain Army Endpoint Security System (AESS). Manage ALTESS Cybersecurity training and certification program using the Army Training and Certification Tracking System. Assist hosted customers in obtaining and maintaining Risk Management Framework (RMF) and other certifications as required. Review and document change requests and determine approval or denial of requests. Update and/or assist the hosted system's personnel in updating artifacts of the RMF; i.e., system diagrams (logical and physical) Hardware/Software/Firmware Inventory, Interface & Ports, Protocols and Services listing, etc. Interact with the Army CSSP, C5ISR, and customer ISSOs/ISSMs on a regular basis. Primary position duties will involve cloud systemsOccasional support of on-premises systems may be required (in a remote capacity). May require occasional on-call duties This position requires the ability to obtain a Secret Security clearanceor higher (US Citizenship is required) Required Technical and Professional ExpertiseRequired Certifications:
1CompTIA Security+2DoD 8570.01-M IAT level II certificationo Mid to senior level Cybersecurity Technical Administrator experience in a cloud environment.o Mid-level functional knowledge of both Windows and Unix operating systems is preferred.o Experience using the Azure Portal and AWS Management Console to manage cloud resources.o Strong understanding of common cyber threat patterns, indicators of compromise, and defenses.o Understanding of network, storage, server, and application technologiesClearance:
Ability to obtain and maintain a Secret Security clearance or higher (US Citizenship required). Must not have dual citizenshipPreferred Technical and Professional Expertiseo Self-starter, must be able to initiate and complete tasks without significant external prompting.o Strong verbal and written communication skills.o Understanding of DOD Risk Management Framework Assessment & Authorization (RMF A&A), FedRAMP, the DOD cloud provisional authorization (PA) process, and the processes to successfully acquire and maintain an Authorization to Operate (ATO).o Mid-level functional knowledge of both Windows and Unix operating systems is preferred.o Experience using the Azure Portal and AWS Management Console to manage cloud resources. Recommended Skills Administration Artificial Intelligence Automation Cloud Platform System Communication Comp Tia Security
Apply to this job. Think you're the perfect candidate? Apply on company site $(document).ready( function() $(#ads-desktop-placeholder).html(
n
n
n Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.