Sr Cyber Space Operatorother related Employment listings - Fort Belvoir, VA at Geebo

Sr Cyber Space Operator

KBR is a system engineering company operating principally in the Federal Government sector, and headquartered in Houston, Texas with offices Nationwide.
KBR offers challenging work, competitive salaries, an incentive bonus program and one of the most competitive health and welfare benefits packages in the region for you and your family.
KBR is seeking energetic candidates to join our team supporting the KBR NTG business unit.
This position is located in Fort Belvoir, VA.
Job Description:
The Senior Cyber Space Operator is an integral member of the Defense Threat Reduction Agency (DTRA) Mission Assurance/Vulnerability Assessment Team.
As such, they assess the survivability of critical US and allied national/theater mission systems, networks, architectures, infrastructures, and assets.
The Assessment teams aim to ensure continuity to critical DoD missions and infrastructure by assessing the vulnerabilities and survivability against a broad spectrum of threats including accidents, natural disasters, technological failure, cyber-attacks, terrorists/Nation-state actors, radio frequency (RF) weapons, sabotage, and weapons of mass destruction (WMD).
Assessment teams may deploy to high threat but permissive environments anywhere in the world.
CONUS and OCONUS travel required up to 33% of the time for durations of up to two weeks per trip.
Security Clearance Requirements:
Top Secret/SCI Security Clearance eligibility requiredPrimary
Responsibilities:
Agnostic of threat, the SCO will review and assess all cyber-related issues for networks, systems, and applications supporting mission-critical operations in the following areas:
Computer Network Operations (CNO) and Computer Network Defense (CND)Cybersecurity Service Provider (CSSP) policy and operationsSystem and Network Administration Implementation and Management, in concert with Cyber Transport Specialist (CT)Cyber support to Continuity of Operations (COOP) and Disaster Recovery (DR)Electronic Security and Access Control Systems (ESS and ACS, respectively)Controls Systems and Supervisory Control and Data Acquisition systems (CS and SCADA, respectively)Operations Security (OPSEC)Radio Frequency (RF) detectionProvide operational cyber space operations-related vulnerability mission impacts and mitigation/remediation recommendations to the customerMinimum
Qualifications:
Possess Bachelor's degree or higher in Computer Science, Cybersecurity, or related technical discipline; commensurate operational experience can serve as a substitute for degree requirementsPossess 7-10 years operational experience in the military, other Federal Government, or comparable civilian position in Cyberspace operationsPossess IAT Level II and CSSP Auditor certifications as defined and 8570.
01-M, or ability to obtain certifications within 180 days of hirePrevious assessment experience desiredWorking knowledge of the DoD Information Network (DODIN), DoD IT system and network certification and accreditation processes (ie, RMF), to include system security authorization agreements and current and emerging cybersecurity threatsPossess working knowledge of DoD's IT systems and network certification and accreditation processes to include system security authorization agreementsPossess working knowledge of the DoD Information Assurance Vulnerability Alert (IAVA) processesWorking knowledge of network vulnerability scanning toolsWorking knowledge of network mapping toolsPossess excellent written and verbal communication skillsPossess expert knowledge of Microsoft Office Suite (Word, Excel, PowerPoint, Visio) to prepare presentations, reports, and white papers.
Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.