Logistics Information Systems Administrator/Information Systems Security Officer (ISSO) Information Technology (IT) - Washington, DC at Geebo

Logistics Information Systems Administrator/Information Systems Security Officer (ISSO)

Overview Logistics Information Systems Administrator (LISA)/Information Systems Security Officer (ISSO) collaborates with a multi-faceted team building unique solutions responsible for providing dedicated automation support to the various logistics automation systems and fully supports the Client's Logistics Information System (LIS).
The incumbent will execute and demonstrate knowledge in all aspects of the Defense Property Accountability Systems (DPAS) systems administration, systems engineering, and ISSO support that encompasses troubleshooting hardware, software, and networking issues, as well as ensuring that all computing operations run with optimal performance and security.
As a LIS Administrator/ISSO, additional responsibilities include not limited to providing administration and engineering life cycle, scope and work estimation, software development, systems engineering, research, design, documentation, implementation, testing, evaluation, and integration.
LIS Administrator also serves as the Information Systems Security Officer (ISSO) for information assurance activities for Client's DPAS and other logistics information systems as required.
Responsibilities Manage Windows, Linux, or Mac systems Upgrade, install, and configure application software and computer hardware Troubleshoot and provide technical support to the Client Create and manage DPAS and other Client LIS permissions and user accounts Perform regular security tests and security monitoring Maintain DPAS and other client LIS networks including network file systems Configure and maintain the networked computer system, including hardware, system software, and applications.
Ensure data is stored securely and backed up regularly.
Diagnose and resolve hardware, software, networking, and system issues when they arise.
Replace and upgrade defective or outdated components when necessary.
Monitor system performance to ensure everything runs smoothly and securely.
Research and recommend new approaches to improve the networked computer system.
Provide technical support when requested.
Document processes which employees need to follow in order to successfully work within our computing system.
Participate in the full software systems development lifecycle.
Develop software systems, including the design, develop, troubleshoot, and debug software programs for software enhancements and new software-intensive systems and products.
Use software tools and scripting languages to design, develop and maintain on-premises and cloud infrastructure and platforms.
Serve not only as LIS Administrator but also serves as the ISSO for DPAS and other Client LIS Ensure that management, operational, and technical controls for securing either National Security Systems, SBU, or CUI level Information Systems are in place and are followed Ensure appropriate steps are taken to implement information security requirements for IT systems throughout their life cycle, from the requirements definition phase through disposal.
Respond to Information Security Vulnerability Management (ISVM) notifications and ensure all systems under their purview are in compliance with the Client IT policies by the date prescribed Conduct Security Authorization (SA) activities in accordance with NIST 800-37 standards.
Manage single or multiple systems depending on the size and complexity.
Report IT Security events/incidents in the time prescribed per Client IT Policy depending on the severity of the incident Identify software and hardware dependencies and capacities Design and develop including conduct automated testing and automated deployment of software modules Champion and implement advanced software development practices; Design, develop and document modular, readable, and maintainable solutions to hard problems Determine and communicate system requirements and capabilities in furtherance of the customer's mission Interact with other developers, architects, and technical team leads to rapidly learn a complex operational system, its subsystems, and components to positively contribute to development; Recommend and lead changes to development and systems integration that will increase efficiency and development effectiveness.
Research and integrate new technologies into the Client's development and production systems.
May Serve as technical lead for small projects and mentor other software engineers and developers.
Develop software in a Windows environment with very limited development in Linux utilizing Client authorized software such as Virtual machine, Cygwin, Cooperative Linux, Ubuntu via Wubi including Client authorized ported and compiled programs Execute Security Authorization activities to support the accreditation of the system (s) and related continuous monitoring.
Assist with external/internal audits for designated systems.
Assist in developing unified guidelines and procedures for conducting authorizations and/or system-level evaluations of federal information systems and networks including the Client's critical infrastructure Ensure DPAS has all security controls in place and functioning properly in accordance with NIST 800-53A publication.
Report incidents within the timeframe prescribed by the Client's policy for incident response.
Qualifications Education:
Degree in Computer Science or Computer Engineering, or related field; if no degree, 12
years of experience in Software Engineering/Enveloping, Systems Administration, and Information System Security Officer.
Certifications:
Windows Server Administration Fundamentals Google IT Support Professional Certificate Red Hat System Administrator Certification Getting the Red Hat System Administrator Certification CompTIA Server
or A Certification and Accreditation Professional (CAP), CISSP, or similar widely recognized IT Security certification is required.
Microsoft MCSE certification or similar.
Must have Valid U.
S.
Driver's and be able to obtain an International Driver's License Must have a valid US Passport Clearance:
Must have an current, adjudicated, and active TS-SCI w/Poly
Experience:
Eight plus (8+)years' experience working as a systems administrator and ISSO Previous or current experience as SASMO, Unit Supply Clerk, Unit Supply Sergeant, Battalion S4, Quartermaster Warrant Officer or equivalent (Preferred) Strong information security experience (personnel security experience does not qualify; must be INFOSEC related) Enterprise Network devices (i.
e.
routers, switches, firewalls).
Experience shall be clearly outlined in resume.
Demonstrated experience with Operating platforms (i.
e.
, UNIX, Solaris, and Microsoft).
US Army SAMSO for DPAS, GCSS-Army, PBUSE, and/or SPBS-R (Preferred) SQL and database operations.
Administering server-side technology and networked computing systems.
NIST 800 publications standards Experience with Linux(CentOS) WMware, Apache (middleware) and performing Linus systems administration Knowledge of Java, Angular, Perl, JavaScript, PHP, Bash, relational and non-relational databases Programming experience in C, C++, and C# Windows system administration Firewalls and with network connectivity Mobile App experience Using Mobile Scanning Devices (MSD) (Desired) Vulnerability scanning and assessments Creating all necessary Security Authorization documentation (Required) Knowledge of developing in a Windows operating environment Some experience with Agile development Proven experience in solving challenging technical problems.
Experience using Jira (Desired) Knowledge of Agile development using SAFe (Desired) Firmware programming experience (Desired) Knowledge of developing in a Linux environment (Desired) Experience using Team Foundation Server (TFS) and Target process (Desired) Candidate must be able to work in a fast moving environment, adapt to changes in schedules, be courteous and professional when interacting with colleagues and customers, demonstrate a solid ability to solve problems, plan and prioritize personal tasking, effectively communicate verbally and in writing, and be able to work successfully in a team environment.
Knowledge:
NIST 800 publications standards (Required) Demonstrated knowledge of software life-cycle management and ability to develop robust, production-ready software using Java, Angular, Perl, JavaScript, PHP, Bash, relational and non-relational databases (e.
g.
MySQL), object-oriented design, or other technologies and techniques.
Defense Property Accountability System (Required) Skills:
Critical thinking and problem solving skills.
Proficient in developing and presenting, both verbally and in writing, highly technical information and presentations to non-technical audiences at all levels of the organization.
Extensive understanding of both Type-1 and Type-2 encryption, including virtual private networks (VPNs) from both an engineering and implementation perspectives.
Abilities:
Solve problems using your in-depth understanding of information systems and computing solutions.
Develop and present, both verbally and in writing, highly technical information and presentations to non-technical audiences at all levels of the organization.
Work outside of normal hours including weekends, and if mission requires holidays to resolve emergency issues promptly.
We are committed to an inclusive and diverse workplace that values and supports the contributions of each individual.
This commitment along with our common Vision and Values of Integrity, Respect, and Responsibility, allows us to leverage differences, encourage innovation and expand our success in the global marketplace.
Vectrus is an Equal Opportunity /Affirmative Action Employer.
All qualified applicants will receive consideration for employment without regard to race, color, religion, age, sex, national origin, protected veteran status or status as an individual with a disability.
EOE/Minority/Female/Disabled/Veteran.
Recommended Skills Administration Agile Methodology Angular4 Apache Http Server Assessments Auditing Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.