Nl-22-059 Junior FBI IT Specialist

New!

Nlogic Huntsville , AL 35896

Posted Today

Typical duties include installing, maintaining, and administering desktop computer systems and associated peripherals including printers, monitors, switchboxes, business application software, and various operating systems.
Install desktops, portable computers, peripherals, and software products for networked, classified, and unclassified, and standalone environments.
Detect, diagnose, research solutions, and resolve desktop and portable computer software and hardware failures.
Provide users with information, guidance, and instruction on use of desktop and portable computer hardware and software.
Analyze and assess customer service requests and provide prompt technical solutions.
Conduct IT audits as assigned, in compliance with policies governing the administration, utilization, and acquisition of desktop and portable computer products.
Prepare progress/status reports and submit to team leads as required.
Utilize trouble-ticketing software for opening/updating/closing tickets in a timely and appropriate manner.
Identify and document areas for process improvements.
Contact and effectively communicate with users by telephone, electronic communications, or in person.
Prepare equipment for reuse or surplus of property actions.
Provide technical support for customers assigned to remote locations as required.
Perform software and hardware upgrades and installations involving multiple computers, printers, multi-printers, and peripherals.
Coordinate the disassembly and reinstallation of IT equipment in support of office relocations and new buildings/locations.
Ability to lift up to 50lbs, must be physically able to walk, squat, bend, twist, lift, crawl under desks, reach out and above head, carry items, push and pull carts loaded with equipment.Required: High school diploma and 3 years of experience working with IT equipment OR an Associate degree and 2 years of experience OR a Bachelors degree and 0 years of experience. Demonstrated proficiency installing, maintaining, repairing desktop operating systems, business applications, desktop computer hardware, peripherals, and printers.Desired: IT Certifications applicable to desktop and mobile computer support. Experience providing excellent customer service.
Candidate must be a U.S. Citizen.An active final Top Secret clearance is required (Interim Top Secret will not be accepted).This is a full-time position located in Huntsville, AL.Must be available to work some weekends and after-hours
icon no score

See how you match
to the job

Find your dream job anywhere
with the LiveCareer app.
Mobile App Icon
Download the
LiveCareer app and find
your dream job anywhere
App Store Icon Google Play Icon
lc_ad

Boost your job search productivity with our
free Chrome Extension!

lc_apply_tool GET EXTENSION

Similar Jobs

Want to see jobs matched to your resume? Upload One Now! Remove
Nl22102 Junior Computer Analyst
New!

Nlogic

Posted Today

VIEW JOBS 7/6/2022 12:00:00 AM 2022-10-04T00:00 <span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><b><span style="font-size:11.5pt"><span style="line-height:107%"><span style="font-family:"Helvetica",sans-serif">Responsibilities And Duties:</span></span></span></b></span></span></span> <ul> <li style="padding: 0; margin: 0;"><span style="font-size:11pt"><span style="tab-stops:list .5in"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:11.5pt"><span style="line-height:107%"><span style="font-family:"Helvetica",sans-serif">Install, Secure, Configure and Maintain the DoD approved versions of United States Department of Defense commercial off-the-shelf suite of software applications used within the DOD to monitor, detect, and defend the DOD computer networks and systems.</span></span></span></span></span></span></span></li> <li style="padding: 0; margin: 0;"><span style="font-size:11pt"><span style="tab-stops:list .5in"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:11.5pt"><span style="line-height:107%"><span style="font-family:"Helvetica",sans-serif">Test and evaluate new/updated end point products before approval.</span></span></span></span></span></span></span></li> <li style="padding: 0; margin: 0;"><span style="font-size:11pt"><span style="tab-stops:list .5in"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:11.5pt"><span style="line-height:107%"><span style="font-family:"Helvetica",sans-serif">Develop and implement plans to apply patches, hot fixes, and other critical updates as needed.</span></span></span></span></span></span></span></li> <li style="padding: 0; margin: 0;"><span style="font-size:11pt"><span style="tab-stops:list .5in"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:11.5pt"><span style="line-height:107%"><span style="font-family:"Helvetica",sans-serif">Develop and maintain policies and tasks for all related endpoint products.</span></span></span></span></span></span></span></li> <li style="padding: 0; margin: 0;"><span style="font-size:11pt"><span style="tab-stops:list .5in"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:11.5pt"><span style="line-height:107%"><span style="font-family:"Helvetica",sans-serif">Create and tune policy exemptions for Host Intrusion Prevention, Endpoint Security and Data Loss Prevention.</span></span></span></span></span></span></span></li> <li style="padding: 0; margin: 0;"><span style="font-size:11pt"><span style="tab-stops:list .5in"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:11.5pt"><span style="line-height:107%"><span style="font-family:"Helvetica",sans-serif">Maintain security status of Patriot Testbed Enclave infrastructure, including OS and STIG compliance.</span></span></span></span></span></span></span></li> <li style="padding: 0; margin: 0;"><span style="font-size:11pt"><span style="tab-stops:list .5in"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:11.5pt"><span style="line-height:107%"><span style="font-family:"Helvetica",sans-serif">Develop Tactics, Techniques and Procedures (TTPs) for Operation and Maintenance of United States Department of Defense commercial off-the-shelf software applications.</span></span></span></span></span></span></span></li> <li style="padding: 0; margin: 0;"><span style="font-size:11pt"><span style="tab-stops:list .5in"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:11.5pt"><span style="line-height:107%"><span style="font-family:"Helvetica",sans-serif">Participate in Change Management process as required for all software related changes.</span></span></span></span></span></span></span></li> <li style="padding: 0; margin: 0;"><span style="font-size:11pt"><span style="tab-stops:list .5in"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:11.5pt"><span style="line-height:107%"><span style="font-family:"Helvetica",sans-serif">Conducts risk and vulnerability assessment at the network, system, and application level.</span></span></span></span></span></span></span></li> <li style="padding: 0; margin: 0;"><span style="font-size:11pt"><span style="tab-stops:list .5in"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:11.5pt"><span style="line-height:107%"><span style="font-family:"Helvetica",sans-serif">Involved in a wide range of security issues including architectures, firewalls, electronic data traffic, and network access.</span></span></span></span></span></span></span></li> <li style="padding: 0; margin: 0;"><span style="font-size:11pt"><span style="tab-stops:list .5in"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:11.5pt"><span style="line-height:107%"><span style="font-family:"Helvetica",sans-serif">Researches, evaluates, and recommends new security tools, techniques, and technologies and introduces them to the enterprise in alignment with IT security strategy.</span></span></span></span></span></span></span></li> <li style="padding: 0; margin: 0;"><span style="font-size:11pt"><span style="tab-stops:list .5in"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:11.5pt"><span style="line-height:107%"><span style="font-family:"Helvetica",sans-serif">Utilizes COTS/GOTS and custom tools and processes/procedures to scan, identify, contain, mitigate, and remediate vulnerabilities, and intrusions.</span></span></span></span></span></span></span></li> <li style="padding: 0; margin: 0;"><span style="font-size:11pt"><span style="tab-stops:list .5in"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:11.5pt"><span style="line-height:107%"><span style="font-family:"Helvetica",sans-serif">Assists in the implementation of the required government policy (i.e., Risk Management Framework (RMF)), and makes recommendations on process tailoring.</span></span></span></span></span></span></span></li> <li style="padding: 0; margin: 0;"><span style="font-size:11pt"><span style="tab-stops:list .5in"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:11.5pt"><span style="line-height:107%"><span style="font-family:"Helvetica",sans-serif">Performs analyses to validate established security requirements and to recommend additional security requirements and safeguards.</span></span></span></span></span></span></span></li> </ul> <br /> <span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><b><span style="font-size:11.5pt"><span style="line-height:107%"><span style="font-family:"Helvetica",sans-serif">Requirements And Qualifications:</span></span></span></b></span></span></span> <ul> <li style="padding: 0; margin: 0;"><span style="font-size:11pt"><span style="tab-stops:list .5in"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:11.5pt"><span style="line-height:107%"><span style="font-family:"Helvetica",sans-serif">Bachelor's degree and 2+ years of relevant experience or High school degree with 5 years of relevant experience. </span></span></span></span></span></span></span></li> <li style="padding: 0; margin: 0;"><span style="font-size:11pt"><span style="tab-stops:list .5in"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:11.5pt"><span style="line-height:107%"><span style="font-family:"Helvetica",sans-serif">Experience with United States Department of Defense commercial off-the-shelf software applications and ACAS.</span></span></span></span></span></span></span></li> <li style="padding: 0; margin: 0;"><span style="font-size:11pt"><span style="tab-stops:list .5in"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:11.5pt"><span style="line-height:107%"><span style="font-family:"Helvetica",sans-serif">Experience with RSA MFA</span></span></span></span></span></span></span></li> <li style="padding: 0; margin: 0;"><span style="font-size:11pt"><span style="tab-stops:list .5in"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:11.5pt"><span style="line-height:107%"><span style="font-family:"Helvetica",sans-serif">Current DoD 8570 IAT II certification or equivalent.</span></span></span></span></span></span></span></li> <li style="padding: 0; margin: 0;"><span style="font-size:11pt"><span style="tab-stops:list .5in"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:11.5pt"><span style="line-height:107%"><span style="font-family:"Helvetica",sans-serif">Must have an active CompTIA Security+ certification</span></span></span></span></span></span></span></li> <li style="padding: 0; margin: 0;"><span style="font-size:11pt"><span style="tab-stops:list .5in"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:11.5pt"><span style="line-height:107%"><span style="font-family:"Helvetica",sans-serif">Experience with Windows Servers and VM applications</span></span></span></span></span></span></span></li> <li style="padding: 0; margin: 0;"><span style="font-size:11pt"><span style="tab-stops:list .5in"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:11.5pt"><span style="line-height:107%"><span style="font-family:"Helvetica",sans-serif">Familiarity with DISA STIG and U.S. Cyber Command OPORD requirements.</span></span></span></span></span></span></span></li> <li style="padding: 0; margin: 0;"><span style="font-size:11pt"><span style="tab-stops:list .5in"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:11.5pt"><span style="line-height:107%"><span style="font-family:"Helvetica",sans-serif">Familiarity with best Business practice for networks and administration of United States Department of Defense commercial off-the-shelf software applications.</span></span></span></span></span></span></span></li> <li style="padding: 0; margin: 0;"><span style="font-size:11pt"><span style="tab-stops:list .5in"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:11.5pt"><span style="line-height:107%"><span style="font-family:"Helvetica",sans-serif">Experience with Microsoft and Linux Server Operating Systems.</span></span></span></span></span></span></span></li> </ul> <br /> <span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><b><span style="font-size:11.5pt"><span style="line-height:107%"><span style="font-family:"Helvetica",sans-serif">Preferred Qualifications: </span></span></span></b></span></span></span> <ul> <li style="padding: 0; margin: 0;"><span style="font-size:11pt"><span style="tab-stops:list .5in"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:11.5pt"><span style="line-height:107%"><span style="font-family:"Helvetica",sans-serif">Proven experience supporting Information Assurance Certification and Accreditation (C&A) and associated IA processes, procedures, and activities with capability and expertise to implement DoDD 8530.1, DoDD 8500.2, DoDI 8510.1, DoDI 8510.01 and other applicable NIST and CNSS IA directives, instructions, guidelines.</span></span></span></span></span></span></span></li> <li style="padding: 0; margin: 0;"><span style="font-size:11pt"><span style="tab-stops:list .5in"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:11.5pt"><span style="line-height:107%"><span style="font-family:"Helvetica",sans-serif">HBSS specific training and certification (i.e. DISA HBSS 201 AND 301).</span></span></span></span></span></span></span></li> <li style="padding: 0; margin: 0;"><span style="font-size:11pt"><span style="tab-stops:list .5in"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:11.5pt"><span style="line-height:107%"><span style="font-family:"Helvetica",sans-serif">Currently has Certified Information Systems Security Professional (CISSP).</span></span></span></span></span></span></span></li> <li style="padding: 0; margin: 0;"><span style="font-size:11pt"><span style="tab-stops:list .5in"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:11.5pt"><span style="line-height:107%"><span style="font-family:"Helvetica",sans-serif">Currently certified Microsoft Windows Server 2019 or 2021.</span></span></span></span></span></span></span></li> <li style="padding: 0; margin: 0;"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:11.5pt"><span style="line-height:107%"><span style="font-family:"Helvetica",sans-serif">Experience with file sharing</span></span></span></span></span></span></li> </ul> <br /> <span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:11.5pt"><span style="line-height:107%"><span style="font-family:"Helvetica",sans-serif">Candidate </span></span></span><span style="font-family:"Helvetica",sans-serif">must be a U.S. Citizen and </span><span style="font-size:11.5pt"><span style="line-height:107%"><span style="font-family:"Helvetica",sans-serif">have a current <b>Secret</b> clearance with ability to obtain TS/SCI. This position is located in Huntsville, AL</span></span></span></span></span></span><br />   Nlogic Huntsville AL

Nl-22-059 Junior FBI IT Specialist

Nlogic