1100 Market Street

Chattanooga, TN 37402

  • Facebook Social Icon
  • Twitter Social Icon
  • LinkedIn Social Icon

info@ic-cap.com

(304) 804-3130

Cybersecurity Network Defense (CND) Professionals

Apply at the bottom of the page

IC-CAP is looking for highly talented, energetic, and dynamic CND professionals that are interested in protecting the defense of our nation.  We have immediate needs in Virginia, Maryland, Washington DC, Colorado, and Hawaii.   The positions are listed below with specific duties below that.  
 

 

  • Cyber Systems Administrator (HBSS) Level 3 and 4

  • Cyber Systems Engineer (Splunk) Level 3 and 4

  • Cyber Systems Engineer (Firewall)

  • Cyber Systems Administrator (Project Management)

  • Cyber Auditor/Inspector – Security Auditing

  • Cyber Incident Responder – Fusion

  • Cyber Incident Responder – Detect/Response

  • Cyber Incident Responder – Defense Counter Measures

All candidates must have DoD 8570 compliance or informatoin assurance certification commensurate with technical objectives and services required.

All candidates must have a TS/SCI clearance with CI poly or be willing to submit to a CI poly.


Cyber Systems Administrator (HBSS)

 

  • Manage the functionality and efficiency of systems associated with the HBSS framework and product suites.

  • Apply project management and system administration expertise in the system administration lifecycle, integration, risk management, incident handling, and change management.

  • Support system installation, configuration maintenance, account maintenance, signature maintenance, patch management, and troubleshooting of operational CND systems.

  • Set up administrator and service accounts.

  • Provide O&M support to Linux-based appliances and servers.

  • Provide guidance and work leadership to less-experienced staff members.

  • Provide advice and training to end-users.

  • Manage the functionality and efficiency of Cyber systems.

  • Maintain the integrity and security of network devices.

  • Maintain system documentation.

  • Maintain current knowledge of relevant technologies as assigned.

  • Interacting with users and evaluates vendor products.

  • Developing and monitoring policies and standards for allocation related to the use of computing resources.

  • Developing and implement testing strategies and document results.

  • Make recommendations to purchase hardware and software, coordinates installation and provide backup recovery.

  • Participate in special projects as required.

Cyber Systems Engineer (Splunk)

 

  • Performing complex system development, design, modeling, analysis, integration, and sustainment of Splunk systems for new or existing computer systems within an Enterprise.

  • Developing dashboards, data models, reports and performance optimization.

  • Designing and customizing complex search queries and promoting advance searching, forensics, and analytics.

  • Developing and documenting configuration standards, policies, and procedures for operating, managing and ensuring the security of a Splunk infrastructure.

  • Participating in incident, problem, and change management processes related to Splunk.

  • Providing Splunk O&M and User access.

  • Planning and directing upgrades and system enhancements.

  • Developing and implementing testing strategies and documenting results.

  • Developing documentation on new or existing systems.

  • Providing system/equipment/specialized training and technical guidance.

  • Serving as liaison with clients, participating in meetings to ensure client needs are met.

  • Providing guidance and work leadership to less-experienced staff.

  • Communicating with customers and teammates clearly and concisely.

  • Maintaining current knowledge of relevant technology as assigned and may have supervisory responsibilities.

  • Participating in special projects as required.


Cyber Systems Engineer

 

  • Design, document, test, and deploy new Cyber Defense systems.

  • Research, analyze, document and brief written products outlining new and emerging Cyber Defense technologies.

  • Produce and disseminate build of Materials, cost analysis, and procurement recommendations of Cyber Defense technologies.

  • Operate independently to deliver Cyber Defense Solutions that meet customer requirements.

  • Execute pilot(s) and demonstrations of new, existing, or emerging Cyber Defense Technologies.

  • Provide Tier-3 operation and maintenance of Windows and Linux Operating Systems, as well as Cyber Defense systems such as, Fire-Eye, Fidelis, Gigamon, Suricata, and others.

  • Planning and directing upgrades and system enhancements.

  • Developing and implementing testing strategies and documenting results.

  • Developing documentation on new or existing systems.

  • Providing system/equipment/specialized training and technical guidance

  • Serving as liaison with clients, participating in meetings to ensure client needs are met.

  • Providing guidance and work leadership to less-experienced staff.

  • Communicating with customers and teammates clearly and concisely.

  • Maintaining current knowledge of relevant technology as assigned and may have supervisory responsibilities.

  • Participating in special projects as required.


Cyber Systems Engineer (Firewall)

 

  • Provide leadership to team members and colleagues.

  • Perform system design, modeling, analysis, and sustainment of network-based sensor systems.

  • Remain proactive in identifying, analyzing, and resolving technical issues involving Palo Alto firewalls.

  • Plan and direct upgrades and system enhancements.

  • Develop and implement test strategies and document results.

  • Provide technical OJT training and guidance to less experienced team members.

  • Serve as liaison with clients, participating in meetings to ensure client needs are met.

  • Maintain current knowledge of relevant technology as assigned.

  • Participate in special projects as required.

  • Develop documentation on new or existing systems.

  • Manage the functionality and efficiency of Palo Alto firewalls.

  • Remain proactive in identifying, analyzing, and resolving technical issues involving Palo Alto firewalls.

  • Maintain current knowledge of relevant technology as assigned.

  • Participate in special projects as required.

  • Assist in the planning of system enhancements and upgrades.

  • Assist in the development of documentation on new or existing systems.

  • May provide technical OJT training and guidance to less experienced team members.

  • May serve as liaison with clients, participating in meetings to ensure client needs are met.

  • May provide leadership to less-experienced team members.


Cyber Auditor/Inspector – Security Auditing

  • Identify and manage network computer and system security events relative to fraud, waste and abuse, including content inappropriate to the workplace, Illegal Activity, Productivity Loss and Non-Compliant Activity, as well as Identity Leakage (PII).

  • Perform forensic analysis of digital information and gathers and handles evidence.

  • Utilization of tools such as Archer, Splunk, Fidelis, Solera, Proofpoint, etc.

  • Prepare case evidence and incident reports.

  • Work on special projects as assigned.

  • May provide guidance and work leadership to less-experienced technical staff members.

  • Position may require evening, weekend or shift-work (depending on operational tempo)


Cyber Incident Responder – Fusion

 

  • Performs forensic analysis of digital information and gathers and handles evidence.

  • Identifies network computer intrusion evidence and perpetrators, and coordinates with other government agencies to record and report incidents.

  • Participate in collaborative sessions with other CNDSPs and IC agencies on malicious intrusions, attacks or suspicious activities, as well as share emerging Cyber Threat Intel data.

  • Assist in the development of Indicators of Compromise for active defensive countermeasures and passive detection signatures.

  • Position may require evening, weekend or shift-work (depending on operational tempo).


Cyber Incident Responder – Detect/Response

 

  • Performs forensic analysis of digital information and gathers and handles evidence. Identifies network computer intrusion evidence and perpetrators, and coordinates with other government agencies to record and report incidents.

  • Monitors Intrusion Detection Systems (IDS) to identify security issues for remediation.

  • Ensures the integrity and protection of networks, systems, and applications by technical enforcement of organizational security policies, through monitoring of vulnerability scanning devices.

  • Prepare incident reports of analysis methodology and results.

  • Provide guidance and work leadership to less-experienced technical staff members.

  • Participate in special projects as required.


Cyber Incident Responder – Defense Counter Measures

 

  • Performing Enterprise Defense Countermeasure (DC) activities and coordination with other government agencies to record and prepare incident reports and analysis methodology and results.

  • Monitoring and analyzing signature alerts from Intrusion Detection/Prevention Systems (IDS/IPS) for false positives

  • Providing technical enforcement of organizational security policies.

  • Providing “tune-or-drop” recommendations towards the DC team’s Signature Lifecycle Review procedure.

  • Provide insight to Detection and Response teams on signature functionality and providing signature tuning as needed.

  • Performing periodic and on-demand system audits and vulnerability assessments, including user accounts, applications access, file system and external Web integrity scans to determine compliance.

  • Providing guidance and work leadership to less-experienced staff.

  • Communicating with customers and teammates clearly and concisely.

  • Maintaining current knowledge of relevant technology as assigned and may have supervisory responsibilities.

  • Participating in special projects as required.

  • May serve as a technical team or task leader.