Cyber Operations in Offutt Air Force Base, NE at honor foundations

Date Posted: 11/26/2024

Job Snapshot

Job Description

Job Profile:

Cyber Security T3

JR Type:

Evergreen

Job Category:

Information Technology

Minimum Clearance Required to Start:

TS/SCI

Percentage of Travel Required:

Up to 10%

Type of Travel:

Continental US

Program/Opportunity Name:

Opportunity | USSTRATCOM SCITLS (Formerly ITCC II)

Referral Bonus Plan:

* * *

Job Description:

The Opportunity:

CACI is looking for experienced, innovative, and motivated Cyber Operations personnel to support the mission objectives and needs of the customer, U.S. Strategic Command (USSTRATCOM) in Omaha, Nebraska.  This position is contingent upon award of the United States Strategic Command Information Technology and Logistics Support (SCITLS) contract.

Responsibilities:

  • Install, manage, and operate multiple enterprise security devices (physical and virtual) including, but not limited to, firewalls, intrusion detection devices, intrusion protection devices, endpoint protection devices, wireless security systems, and insider threat protection systems.

  • Provide analysis of threats, response to threats, rules creation, security level evaluation, and penetration vulnerability assessments.

  • Install, manage, and operate the STRATCOM SIEM solution.

  • Perform analysis and reporting on data collected by the log management solutions, accurately detect and respond to problems, outages, and security threats across the STRATCOM enterprise environment and provide intelligent insights that enable quick response measures to reduce the impact of incidents.

  • Configure, test, fin-tune, and maintain all rule sets within the SIEM and ensure rule sets exhibit fluidity to adapt to changes within the STRATCOM environment.

  • Install, manage, and operate all endpoint protections tools (e.g. Host-Based Security System/Endpoint Security Solution (HBSS/ESS)) on the STRATCOM mission networks.

  • Provide effective situational awareness of the cyber domain and defense techniques with a broader view of actor activity, motives, and attribution. Combine traditional cyber data sources such as attack and malware signatures, threat actor IP address, and malicious domains, with more advanced sources including unsupervised learning, memory analytics, system integrity validation metrics, and automated malware decomposition and analysis.

  • Provide A&A services to create and maintain A&A packages for all enterprise devices, systems, networks, and systems of systems. Develop, deploy, operate, and maintain approved solutions to monitor for A&A compliance.

  • Provide services for monitoring, management, analysis, auditing (e.g. vulnerability reports, scorecards, Security Technical Implementation Guides (STIGs), and CTOs), forensics, and incident response.

  • Support DevSecOps development.

  • Support end-to-ed cyberspace exercise services including scheduling, coordinating, and conducting planning meetings, work group meetings, and exercise facilitation.

  • May provide work direction and guidance to others.

Qualifications:

Required: 

  • Currently hold an adjudicated Top Secret clearance and be SCI eligible.

  • BA/BS + 4-8 years experience, depending on skill level. AA/AS and additional years of experience may be accepted.

  • Current DoD 8140 Cybersecurity Certification (e.g. CompTIA Security+)

    • CSSP or equivalent certification may be required based on assigned position.

  • Experience with the Risk Management Framework (RMF) and Enterprise Mission Assurance Support Services (eMASS).

  • Experience responding to cyber incidents caused by internal and/or external threats to Combatant Command constructed networks.

  • Experience with network defense tools/devices such as routers, firewalls, IPS, IDS, and log correlation tools.

  • Experience with endpoint security tools such as anti-virus, vulnerability scanning, and patch management.

  • In-depth knowledge of architecture, engineering, and operations of at least one enterprise SIEM platform (e.g. ArcSight, Splunk, Nitro/McAfee Enterprise Security Manager, QRadar, LogLogic).

  • Customer service-oriented and proactive in anticipating and resolving problems while maximizing efficient use of resources.

  • Experience in interfacing with both client managers and system users.

 Desired: 

  • Knowledge of and experience with USSTRATCOM

  • Adaptable to changing circumstances and operational needs.

  • Understanding of Department of Defense Military standards.

Company Overview:

CACI is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, pregnancy, sexual orientation, gender identity, age, national origin, disability, status as a protected veteran, or any other protected characteristic. Pay Range: There are a host of factors that can influence final salary including, but not limited to, geographic location, Federal Government contract labor categories and contract wage rates, relevant prior work experience, specific skills and competencies, education, and certifications. Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives. We offer competitive compensation, benefits and learning and development opportunities. Our broad and competitive mix of benefits options is designed to support and protect employees and their families. At CACI, you will receive comprehensive benefits such as; healthcare, wellness, financial, retirement, family support, continuing education, and time off benefits. Learn more here.

Since this position can be worked in more than one location, the range shown is the national average for the position.

The proposed salary range for this position is:

$68,400-$143,700

',