Description
SAIC has an immediate need for an HBSS Administrator to support an Air Force contract. The administrator will Install, operate, maintain, troubleshoot, and upgrade HBSS. Serve as Serve as Global Administrator to operate, configure, and maintain the HBSS infrastructure per industry best practices, DoD and USCYBERCOM guidance.
Minimum Requirements:
Secret security clearance; TS/SCI desired
Identify network, system, and/or user cyber threat activity
Administration of this tool includes, but is not limited to the implementation of all mandated requirements, industry best practices, policy development and enforcement, dashboard development, tuning, waiver/policy exception requirements, and analysis of user activity.
As the Global Administrator, responsible for advisement for all N&NC subordinates, regions, and sectors for the maintenance and compliancy of the HBSS infrastructure as Tier 2 support.
Within 180 days of contract start, develop, implement, and tune local SIPRNET McAfee ePolicy Orchestrator (ePO) server architecture. Once established, migrate systems presently connected at the DISA hosted ePO to internal solution sustain architecture thereafter, mirroring the current NIPRNet HBSS architecture and sustainment. Solution is to meet all mandated requirements for compliancy and reporting.
Perform event configurations (rules/threshold) and dashboard development to facilitate monitoring, reporting, and cybersecurity actions in Splunk and Host Based Security System (HBSS)
Qualifications
Required Qualifications:
Usually has at least 3 years of related experience with HBSS or similar technologies
IAM/IAT Level II certification CAP, GSLC, Security+ CE
CSSP Infrastructure requirement CEH, CFR, GICSP, SSCP or equivalent
Knowledge of SIEM, ACAS, HBSS, eMASS and other DOD cybersecurity tools
Desired Qualifications:
Knowledge in computer and network forensics
Knowledge of vulnerability assessments/penetration tests of information systems
Knowledge of techniques, countermeasures, and trend in computer and network vulnerabilities, data hiding, and encryption
Education and Experience: Bachelors degree in Information Technology or equivalent required, MS in Information Technology preferred. Five (5) years or more of related experience; Masters and three (3) years or more of related experience. In lieu of a degree an additional 4 years of experience is required. A secret security clearance is required and a top secret/SCI security clearance is desired.