Comtech Command & Control Technologies (www.telecomsys.com)
Full Time Employee
Command & Control Technologies, a Comtech TCS division, provides cyber investigations training to Forensic Examiners, Investigators, System Administrators, or any other DoD members. that must ensure the defense information systems are secure from unauthorized use, counterintelligence, and criminal activities. DCITA develops state-of-the-art computer investigations training courses for use by all Defense Criminal Investigations organizations, Military Counterintelligence Agencies, other DoD elements, and law enforcement organizations. Currently the primary customers of DCITA include: Defense Computer Forensic Laboratory (DCFL), Defense Cyber Crime Institute (DCCI), Defense Industrial Base Collaborative Information Sharing Environment (DCISE), National Security Agency (NSA), Air Force Office of Special Investigations (AFOSI), Naval Criminal Investigative Service (NCIS), Army Criminal Investigations Division (CID), 902 Military Intelligence Group (Army MI), Defense Criminal Investigative Service (DCIS), DoD and other Federal Organizations.
The Cyber SME/Instructor designs, develops and conducts technical training programs in support of highly complex products, applications and systems to train and provide continual learning for employees. Designs and develops technical training programs and curriculums.
Must hold or be eligible to obtain and maintain a Secret-level security clearance.
Essential Job Functions
•Deliver cyber training in several technical areas to a wide range of audiences.
•Conduct research in order to develop technical manuals for training
•Stay current on and maintain proficiency with current products and technologies in the cyber domain
•Work with instructional designers and technical support teams to ensure material is accurate and reflects current technologies and TTPs.
•Conduct advanced training courses in cyber operations such as; intrusion detection, intrusion investigation, log analysis, malware analysis, network exploitation and other relevant topics.
•Provide students with experience and knowledge aligned with course learning objectives.
•Analyze course evaluations to assess training effectiveness and provide feedback and recommendations to curriculum developers.
•Revise course materials as necessary to improve training effectiveness.
•Work with other program teams to conduct needs assessments to ensure stakeholders' training requirements are met.
•Provide leadership and guidance to less experienced personnel.
•Designs audits of computer systems to ensure they are operating securely and that data is protected from both internal and external attack. Makes recommendations for preventive measures as necessary.
•Assesses assigned system to determine system security status. Designs and recommends security policies and procedures to implement; ensures compliance to policies and procedures.
•Designs training materials for computer security education and awareness programs.
•Evaluates highly complex security systems according to industry best practices to safeguard internal information systems and databases.
•Defines and reviews security requirements and subsequently reviews complex systems to determine if they have been designed and established to comply with established standards.
•Leads investigations of security violations and breaches and recommends solutions; prepares reports on intrusions as necessary and provides analysis summary to management.
•Responds to more complex queries and request for computer security information and reports from both internal and external customers.
•Provides technical consultation on highly complex tasks; may assist and/or provide limited direction to lower level technical personnel.
•Provides product recommendations of security packages to customers; Reviews vendor products and makes recommendations as appropriate. Conducts cost analyses to determine feasibility of new products for clients.
•Bachelor's degree or equivalent combination of education and experience
•Bachelor's degree in computer science, management information systems, or related field preferred
•CISSP certification preferred
•Seven or more years of experience in computer science, management information systems, or data security experience
•Experience working with information security practices, networks, software, and hardware
•Experience working with computer programming
•Experience working with operating systems
•Experience working with computer desktop packages such as Microsoft Word, Excel, etc.
•Experience working with security architecture
•Five or more years of experience in computer network operations
•Experience working with systems infrastructure including hardware configuration, operating system and networks
•Operational experience in any of these areas: Network intrusion analysis, forensic analysis, network monitoring, incident response, security operations, network defense, network exploitation and attack, penetration testing
•Comfortable working from a command line interface in Windows and UNIX-based systems
• Ability to effectively communicate highly technical information in written and spoken form
•Ability to apply computer security best practices
•Understanding of network security devices such as IDS/IPS, network sniffers, firewalls, routers and how information from these devices is leveraged during an intrusion investigation
•Solid understanding of network communications protocols
•Experience with tools such as EnCase Enterprise, log2timeline, Wireshark, The Sleuth Kit, Kali and Metasploit.
•Ability to work in a dynamic environment
•Strong communication skills to develop training manuals and procedures
•Strong presentation skills to train and educate employees on technical material and applications
•Strong interpersonal skills for interacting with employees at all levels of the organization
•Strong comprehension skills for understanding products and applying knowledge to presentations
•Strong analytical and problem-solving skills
•Strong organization and time-management skills
•Ability to prioritize and meet deadlines
•Ability to maintain high level of confidentiality regarding employee information
•Ability to work independently and as part of a team
•Willingness to travel
•Strong analytical and problem solving skills for resolving security issues
•Good organization skills to balance work and lead projects
•Basic leadership skills to effectively mentor and lead junior level personnel
•Good interpersonal skills to interact with customers and team members
•Strong communication skills to interact with team members and support personnel
•Strong skills implementing and configuring networks and network components
•Ability to work with relational databases
•Ability to work in a team environment
•Must have CTT+ certification within 1st year (training will be provided0
•Must have IAT level II within 90 days of hire
•There will be travel
To apply for this job, contact: