Sensor Technician with Security Clearance Law Enforcement & Security - San Antonio, TX at Geebo

Sensor Technician with Security Clearance

Come be a part of our Nation's defense history.
FWG Solutions is looking for qualified individuals ready to support the 33rd Network Warfare Squadron (NWS) Defensive Cyber Operations Team at Lackland Air Force Base, San Antonio, TX.
The 33rd NWS has a storied history dating back to World War II.
The 33rd NWS serves as the US Air Force's principal network defense element under the 16th Air Force's Cyber Security Service Provider (CSSP) mission.
Being an active part of this unit means monitoring, securing, and protecting Air Force and Central Command global networks, ensuring network integrity, reliability, availability, confidentiality and responding to hostile network threats and attacks.
Responsibilities:
Candidate will install, configure, maintain and manage the Air Force Intrusion Detection/Intrusion Prevention (IDS/IPS) sensor fleet, Full Packet Capture/Network Technology and Systems Administration (FPC/NTSA) systems, ArcSight Correlator, and associated Virtual Private Network (VPN) equipment/configurations.
Support the development and documentation of processes and checklists for maintenance associated with those systems.
Maintain and manage the capability to upgrade software and perform system changes for the IDS/IPS and FPC/NSTA sensor fleet and associated equipment.
Deploy to any DoD network with necessary equipment to provide direct support for the installation of IDS/IPS sensor(s) and VPN hardware.
Support the conduct of the daily private key management.
Supports a 24 hour-a-day / 7 days a week operation.
A successful candidate should be able to perform, have experience with or have knowledge and understanding of:
Use of the following UNIX functions:
general Unix operating system file locations; maneuvering through Unix-based directory file structures; use of a Unix-based editor (vi, tedi, emacs, elm, EDT, EVE, etc); and generic Unix operating system file locations; changing file mode and privileges and how to gain access, reference, and print Unix-based help on-line.
Familiarity with installing, configuring, administering, operating and troubleshooting SIEM technologies.
The ability to install, configure, troubleshoot, maintain and manage IPS/IDS and FPC/NTSA technologies.
Understanding of VMware technologies and its possible integration and use with Third-Party sensor deployments.
Implemented software upgrades and patches and performed system changes to IDS/IPS and FPC/NTSA sensors ensuring proper configuration to Defense Information Systems Agency Security Technical Implementation Guide (DISA (STIG)) and AF (TO/TCTO) standards.
Deploy new string matches, vendor signatures, custom signatures and alerts to all deployed IDS/IPS and FPC/NTSA sensors in support of mission requirements.
Have at least 4 years operations and maintenance experience with one or more of the IDS/IPS and FPC/NTSA systems currently in use by the Department of Defense (DoD) (i.
e.
, Air Force, Army, DISA) or Federal Government and at least five (5) years' experience in the following areas:
IP addressing and domain name service; network components; TCP/UDP, FTP, SMTP, and HTTP; and the network OSI model.
Work with field units to resolve network issues and perform actions necessary to ensure IDS/IPS and FPC/NTSA sensors are collecting and reporting network activity.
Understanding of Intel-based computers using Microsoft based operating systems.
Use of Microsoft Office software applications to include Word, Excel, and PowerPoint.
Possession of appropriate DoD 8570.
01-M certifications Certified Ethical Hacker (CEH) and CompTIA Security
Certified Professional.
Possession of one of the following certifications:
CISCO certification (CCNA, CCNP, CCIE) or Linux+Active TS/SCI security clearance.
Recommended Skills Certified Ethical Hacker Cisco Certified Cisco Certified Network Associate Cisco Certified Network Professional Comp Tia Security
Computer Networks Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.