Job Description :
Barrister Global Services Network Inc. is currently looking for a motivated, highly detailed, organized and outgoing individual to support one of our major nationwide clients. The successful applicant should be able to quickly adapt their knowledge to the current IT environment and be able to enhance the current systems in place. They should also possess excellent verbal and written communication skills so as to be understood by technical and non-technical personnel.

Job Summary :

The Computer Network Defense Engineer must be an IT Security professional with a strong background in engineering, implementing, and supporting security infrastructure to include web proxy/content filter, IPS/IDS, SIEM, firewall and vulnerability scanning tools. The right candidate should be comfortable working in a large and complex enterprise environment with a sound understanding of LAN/WAN. Familiarity with DoD cyber security requirements including policies, STIG remediation, inspections, and reporting are key qualities. While part of a team of highly skilled security professionals, this position requires that the candidate have the ability to work independently and be able to own, manage, and drive security engineering projects from beginning to end to include managing schedule, producing detailed documentation, testing, implementation, and ongoing support. Strong written and verbal communication skills are critical as this position requires daily interaction with client and contract technical and management staff in support of DFAS, as well as mentoring less experienced cyber security professionals.



Essential Job Functions :

Determine enterprise information assurance and security standards.
Develop and implement information assurance/security standards and procedures.
Coordinate, develop, and evaluate security programs for an organization.
Recommend information assurance/security solutions to support requirements.
Identify, report, and resolve security violations.
Establish and satisfy information assurance and security requirements based upon the analysis of user, policy, regulatory, and resources demands.
Work 2nd or 3rd shift or weekend hours
Author security analysis and recommendations (e.g. Google Appliance, wireless headsets)
Provide monitoring and risk analysis of zero-day and other vulnerabilities
Evaluate of NIST, Federal and DoD guidelines, policies, directives, memos, etc. as it relates to cybersecurity
Monitor 24/7 of DFAS security landscape .
24/7 contact with JFHQ-DODIN, Cybercomm, NSA, et al for receiving and triaging threat indicators

Requirements :
Must have Secret Clearance, or higher. Must have CEH or GCIH on Day 1. Can''t start without both. (Interim acceptable on Day 1)
GCIH, CEH or equivalent (ref DoD 8570 IA Baseline, CND- Incident Responder)
3 years of experience with incident handling, forensics, sensor alert tracking, or Cybersecurity case management
Experience with Cybersecurity tools, including ArcSight, ACAS, or other SIEM tools
Experience with Cybersecurity forensics tools and methodologies
Experience with Network Ports and protocols
Experience with log review and analysis

Preferred :
A background in incident response, forensic tools, Windows Server/Desktop OS and WAN compression are a strong plus.


Estimated initial contract period : 13 months
Subject for renewal