NSS is Hiring an ACAS Systems Operator Near Montgomery, AL
Montgomery, AL 36043 US (Primary) Job Description
Operates the baseline configuration, operation, and best practices for the vulnerability management solution (VMS) deployed across multiple unclassified and classified network locations supporting the implementation for Tenable products within Assured Compliance Assessment Solution (ACAS) including .SC (SecurityCenter™), Nessus®, and potentially Passive Vulnerability Scanner™
Work in concert with other Tenable operators and IA personnel responsible for operating and maintaining the ACAS program in multiple enclaves
Candidate will coordinate system activities such as deploying, configuring, monitoring, tuning, upgrading, and troubleshooting Tenable components spanning local, remote and complex environments
Must have experience setting up and executing Tenable Nessus scans, review scan data, assess reports and trends through SC interface; determine whether a completed scan provide valid results, and ensure reports/dashboards meet customer needs and expectations
Record configurations, conduct assessments and submit suggestions to scan schedule(s), scanners scan zones, repository management, chart Credentials >Assets >Scans >Reports >Dashboards
Ability to install and patch operating systems, applications, and document Department Information Systems Agency (DISA) Security Technical Implementation Guidelines (STIGs) applicable to each Non-classified or Secret Internet Protocol (IP) Router Network (NIPRNet, SIPRNet) environment for all ACAS implementations
Responsible for acquiring, configuring and ensuring external deliverables: DISA/Continuous Monitoring and Risk Scoring (CMRS), importing vulnerability and security audit plug-ins, DoD Patch Repository Defense Asset Distribution System (DADS), build/maintain vulnerability and audit repositories
Assist mapping scan zones, scanners, subnets to include leveraging enterprise network application tools such as ForeScout, SolarWinds Orion, McAfee Endpoint Security Solutions (ESS) and/or Microsoft Endpoint Configuration Manager (MECM)
Continuously assesses current ACAS implementations for scans, assets, analysis and permissions
Assist with validation and sustainment of documentation such as Security Plans, Network Address Declaration (NAD), security groups/roles/permissions and/or zones/credentials/scans
Document steps required to design/engineer ACAS systems for each network to include IP address, Fully Qualified Domain Name (FQDN), DNS entries, Role Based Access Controls (RBAC), service accounts, certifications, licenses and physical/virtual location of each component
Implement/create report dashboard designs, automated custom email report notifications, report repositories for each environment that are specific to the following audiences: Leadership & Executives; Cybersecurity Staff; System Administrators; Application Maintainers
Ensures networks receive periodic updates from AFCYBER-released software patches, updates, and upgrades via Time Compliance Technical Orders (TCTO), Time Compliance Network Orders (TCNO), Maintenance Tasking Order (MTO) and Notices to Airman (NOTAMs)
Responsible to assist/troubleshoot schedule scans are covering 100% of intended targets ensuring timely and accurate scanning and reporting per PMO, IA and DoD policies and orders.
Maintains the Nessus scanners connectivity with the associated Tenable.sc (formerly SecurityCenter)
Provide cyber security staff scanning capability and system administration continuity
Maintain effective communications with other external and internal teams essential to ACAS operations
Create/maintain/implement custom security policies in line with DISA ACAS best practice guidance
Assist AF Cyber personnel with the DISA Information Assurance Vulnerability Management (IAVM) programs, cybersecurity toolsets, and Operation Order (OPORD)/Fragmentary Order (FRAGO) support
Perform systems analysis, design review, integration of complex system applications
Ensures external networks receive cybersecurity inventory reporting for compliance data via ACAS to DISA CMRS and DoD Enterprise Logging Ingest and Cyber Situational Awareness Refinery (ELICSAR) Big Data Platform (BDP)
Participate in all phases of the Vulnerability Management (VM) life cycle with emphasis on the scan, patch, rescan and reporting phases
Assist in the installation/maintenance of configuration files, custom security policies, plug-ins, signatures, certificates, DISA STIGs and checklist configuration audits and other such files necessary to add vulnerability discovery capabilities into the ACAS system
Candidate will report to the 26th NOS Information Assurance (IA) team leadership
Qualifications
Candidate should have 1 to 4 years of years of hands-on experience in:
ACAS and/or Tenable.sc (SecurityCenter) or Tenable Nessus products
Familiarity using ACAS or Tenable .SC/Nessus best practices
Linux-based (RHEL) or Windows operating systems support with experience in mid-to-large enterprise data center environment; familiarity with network patch/update management
Experience with virtualized environments (VMware vSphere, ESXi)
Any scripting experience: Bash, Perl, PowerShell, Python, Nessus Attack Scripting Language (NASL)
Disaster Recovery - knowledge in risk reduction, hot/warm site DR architecture
Knowledge of data communications, local-area networking (LAN), wide-area networking (WAN), VoIP, routers, switches, and firewalls
Advanced networking concepts, VLAN, trunking and port channel
Thorough understanding of Internet Protocol (IP) routing, switching, and OSI model
Technical degree, Associates or, Bachelor’s degree in Computer Science/Information Systems, Science/Engineering/Math or 2-4 years’ relevant experience in Information Technology preferably within system or application administration is acceptable
Required Certification: CompTIA Security ce (continuing education) or (ISC)² CISSP
Required Certification (or ability to acquire within 60 days): DISA ACAS Operator and Supervisor Course
Prefer one or more of the following OS based technical certifications:
CompTIA Linux or Red Hat Certified System Administrator (RHCSA) or Linux Foundation Certified System Administrator (LFCS)
Microsoft based certification (current): Microsoft 365 Certified: Fundamentals; Microsoft Certified: Security, Compliance, and Identity Fundamentals; Microsoft 365 Certified: Security Administrator Associate; Microsoft Certified: Azure Security Engineer Associate; Microsoft Certified: Identity and Access Administrator Associate; Microsoft 365 Certified: Teamwork Administrator Associate
Microsoft based certification (retired, will be considered): Microsoft Technology Associate (MTA) or Microsoft Certified Solutions Associate (MCSA) or Microsoft Certified Technology Specialist (MCTS) or Microsoft Certified Solutions Expert (MCSE)
Preferred technical certifications:
ITIL certification a plus
Splunk Core Certified User or Splunk Core Certified Power User
Active DoD Secret required or ability to complete investigation process for interim with potential to upgrade to Top Secret clearance preferred
Clearance Level Secret Certifications CompTIA Security ce or (ISC)² CISSP