Cyber Operations Lead

Engility Corporation Doral , FL 33166

Posted 2 months ago

SAIC is seeking an experienced individual to join SAIC's team, in support of the U.S. Southern Command's Cyber IT Enterprise Services (SCITES), to help provide our Nation for contingency planning, operations, and security operations to Central America, South America, the Caribbean areas.

The candidate selected for this position shall:

  • Oversee all technical aspects of the operations that involve engineering development, architecture, integration and interface design analysis, installation, integration, fielding and field analysis, O&M, and testing of hardware and software

  • Ensure that technical planning, leading, organizing, and motivating of teams of contractors and subcontractors for all NOSC activities for USSOUTHCOM constructed networks, to include, but not be limited to, the oversight and management of NOSC functions such as network monitor and management; Tier 3 CSSP management, analysis, infrastructure support, incident response, and auditing; JRSS O&M; SIEM O&M; and support to full-spectrum cyber operations

  • Responsible for researching, cost-justifying, recommending, and establishing current and future hardware and software architectures for all aspects of IT, from networks to operating systems and shared software services

  • Support system-level design and configuration of products including determination of hardware, operating system, and other platform specifications to meet requirements while maintaining interoperability with existing sponsor network(s)

  • Perform a variety of network engineering tasks and activities concerned with major systems design, integration, and implementation, and shall often be called on to troubleshoot unique or complex problems

  • Provide correlation and analysis of cyberspace incident reports derived from reliable sources, network sensors, vulnerability management devices, open source information, and Industry/ Government provided situational awareness of known adversary activities

  • Apply expert knowledge of Named Areas of Interest (NAI) and advanced persistent threats to review, analyze, and maintain the content of an indicator database to aid in the detection and mitigation of threat activity

  • Be able to assist the customer with developing metrics and trending/analysis reports of malicious activity and develop signatures for threat detection

  • Apply advanced technical principles, theories, and concepts

  • Contribute to development of new principles and concepts

  • Participate with senior managers to establish strategic plans and objectives

  • Recommend/make decisions on administrative or project work matters and ensures effective achievement of program, project, or organizational objectives

  • Work under consultative direction toward pre-determined long-range goals and objectives. Assignments are often self-initiated

  • Determine and pursue courses of action necessary to obtain desired results

  • Work checked through consultation and agreement with others rather than by formal review of supervisor

  • Exercise independent judgment in methods, techniques and evaluation criteria for obtaining results

  • Serve as organization spokesperson on advanced projects and/or programs

  • Act as advisor to management and customers on advanced technical research studies and applications

  • Apply a combination of expert engineering knowledge of enterprise IT and security solutions to design, develop and/or implement solutions to ensure they are consistent with enterprise architecture security policies and support full spectrum military cyberspace operations


  • Possess a TS clearance with SCI eligibility

  • Work location Doral, Florida


  • Bachelors and fourteen (14) years or more experience; Masters and twelve (12) years or more experience; PhD or JD and nine (9) years or more experience

  • A minimum of six years of leadership over cyber analysts responding to cyber incidents caused by internal and external threats to Combatant Command constructed networks

  • A minimum of five years of leadership experience executing command and control in any warfighting domain

  • A minimum of five years of experience operationalizing JFHQ DODIN CTOs

  • Possess an Information Assurance Management (IAM) Level III qualifying certification or set of certifications

  • A minimum of five years of experience with DISA's Joint Regional Security Stack

  • A minimum of five years of experience with network defense tools such as routers, firewalls, intrusion prevention system (IPS), intrusion detection system (IDS), log correlations tools etc.

  • A minimum of five years of experience with endpoint security such as anti-virus, vulnerability scanning and patch management

icon no score

See how you match
to the job

Find your dream job anywhere
with the LiveCareer app.
Mobile App Icon
Download the
LiveCareer app and find
your dream job anywhere
App Store Icon Google Play Icon

Boost your job search productivity with our
free Chrome Extension!

lc_apply_tool GET EXTENSION

Similar Jobs

Want to see jobs matched to your resume? Upload One Now! Remove
Sr Principal Cyber Intelligence Analyst

Northrop Grumman

Posted 4 days ago

VIEW JOBS 9/25/2020 12:00:00 AM 2020-12-24T00:00 Discover careers that change the world and further advancements in defense, technology, and engineering today at Northrop Grumman. Use your experience to grow your career and support our global customers with the technology, systems, and solutions they need to enable their missions on the front lines and secure our world every day. With Northrop Grumman, you'll discover a culture built on diversity, respect, and above all teamwork. Together with our group of experts across the technical spectrum, you'll discover opportunities to make a difference in our world and start solving some of the world's most critical problems in the most innovative ways. The Northrop Grumman Defense Systems sector is hiring an experienced Cyber Intelligence Analyst for the USSOUTHCOM program. This is located in Doral, FL (Miami, FL area). Role & Responsibilities: In this role, you will: * Conduct research and evaluate technical and all-source intelligence with specific emphasis on network operations and cyber warfare tactics, techniques, and procedures focused on the threat to networked weapons platforms and U.S. and DoD information networks. * Analyze network events to determine the impact on current operations and conduct all-source research to determine advisory capability and intent. * Prepare assessments and cyber threat profiles of current events based on the sophisticated collection, research and analysis of classified and open source information. * Correlate threat data from various sources. * Develop and maintain analytical procedures to meet changing requirements and ensure maximum operations. * Collect data using a combination of standard intelligence methods and business processes. * Produce high-quality papers, presentations, recommendations, and findings for senior US government intelligence and network operations officials. Basic Qualifications: * Bachelors in Science with a minimum of 9 years of relevant experience; 7 years of relevant experience with Masters; 4 years with PhD. * Must have a DoD 8570 IAM level 1 security certification (example: Security CE); OR must have the ability to obtain and maintain one within 6 months of start date. * U.S. citizenship and an active DoD Top Secret clearance w/ SCI eligibility in order to be considered. Preferred Qualifications: * Experience with ACAS, NESSUS, SPLUNK, SCAP, WireShark, NIST 800-53 rev4, system audits using an SIEM, vulnerability scanning, system audits, POA&Ms, and DSS and/or JSIG system security package development are highly desirable. * Experience in Active Directory configuring user and computer accounts. * Cross-platform experience (i.e. two or more: Windows, Linux, Solaris, OSX, UNIX, etc.). * Experience supporting VMware VDI (Virtual Desktop Infrastructure). * Previous experience at USSOUTHCOM, other Combatant Command, or similar sized DoD organization desired. * Previous experience supporting a large-scale enterprise information technology effort desired. Northrop Grumman is committed to hiring and retaining a diverse workforce. We are proud to be an Equal Opportunity/Affirmative Action Employer, making decisions without regard to race, color, religion, creed, sex, sexual orientation, gender identity, marital status, national origin, age, veteran status, disability, or any other protected class. For our complete EEO/AA and Pay Transparency statement, please visit U.S. Citizenship is required for most positions. Northrop Grumman Doral FL

Cyber Operations Lead

Engility Corporation