Cybersecurity Systems Administrator/Engineer with Security Clearance

at CSIOS Corporation
Published November 29, 2022
Location Scott Air Force Base, IL
Category Default  
Job Type Full-time  


Duties and Responsibilities * Maintain existing configuration and integrity of the cybersecurity tool suite IAW applicable policies and instructions Perform tuning and optimization tasks to include appliance rule review and log aggregation/visibility * Operate and maintain a service assurance capability for cybersecurity service tools * Ensure Business Continuity Management plans are in place, executable and followed for cybersecurity defense operations * Provide risk-based recommendations related to change requests for cybersecurity defense configurations * Perform reviews of implemented cybersecurity defense filtering rules, exceptions, and log availability and content * Maintain whitelist/Boundary Cloud Access Point * Maintain web application firewall (WAF) rule sets to ensure secure communications minimizing impact to host applications * Troubleshoot user and program related issues associated with cybersecurity defense infrastructure tools * Build and configure operating systems IAW STIGs and apply service packs and security patches * Provide application support, including troubleshooting, maintaining, updating, testing, customer support, incident resolution, use of configuration management policies and procedures, whitelisting capabilities, compliance management, creating security accreditation documentation, vulnerability remediation and validation, and software problem diagnosis and resolution Certifications One or more DoD approved 8570 baseline certifications for: IAT II, CSSP Incident Responder, and CSSP Infrastructure Support. Link to approved certifications: Degrees N/A Years of Experience 5 Position Type Full Time Other Qualifications Preferred knowledge and experience with the following: * NIST and DoD security policies * Zero trust architecture and design * Border device security (e.g., firewall, HTTP Proxy, WAF, VLANs, IP Subnetting, Ports and protocols) * Securing virtualization/cloud infrastructure concepts, technologies, and services * Auditing (e.g., system accounts, security logs, and anomalies) * Cybersecurity Metrics - capture & documentation Shift Day