Presently we are looking for candidates for the following positions:
JOB TITLE: IT/Cyber Security/TSCM Specialist
JOB SUMMARY: A skilled cyber security expert with a broad variety of expertise in different specialties to apply their technical expertise to execute a wide range of tactics to counter cybercrime, including risk mitigation, risk and vulnerability assessments, awareness and training, network and systems audits and assessments, intrusion testing and detection, incident response, and access control. The scope of the activities performed is very broad and will be performed working in a federal facility as a contractor staff member.
ESSENTIAL DUTIES AND RESPONSIBILITIES:• Recommends and implements updates and corrective actions to strengthen security plans, controls, and other defenses against unauthorized access or modification, disruption, loss, or damage to information and systems.• Uses network security tools and controls to conduct technical assessments of classified and unclassified network systems.• Researches and identify threats, architectural designs, and other vulnerabilities that may alter or hinder security; performs penetration testing and incidence response exercises; and recommends corrective actions and improvements based on assessment results.• Audits and verifies security of computers used for unclassified information.• Develops, implements, and updates procedures and plans for unclassified computer security program for network and stand-alone systems; implements System Security Plans; conducts random and annual information technology audits of unclassified and classified desktop systems to determine compliance with appropriate standards, procedures, and controls; and writes audit reports.• Analyzes systems and updates documentation for certification, accreditation, and de-accreditation of classified systems.• Applies antivirus software updates to the classified network at least monthly or as required.• Updates monthly antivirus software for each classified system; performs vulnerability scans and patch implementation; and verifies approval of hardware and software installed on classified systems.• Monitors multi-user and network computers for unauthorized use or access, disclosure of classified or protected data, or other security violations.• Executes incident responses as directed; analyzes and prepares reports on incidents; documents lessons learned and incorporates them into security plan reviews and materials used for awareness and training programs; follows up to ensure that security violations are reported and resolved before restoring network access to users.• Recommends innovative approaches to improve employee compliance and acceptance of cyber security requirements, including targeted training, regular training, awareness, and education for employees who have access to systems; delivers awareness and training programs; assists in planning, set up, preparation of handouts and other materials, and management of the Cyber Security Awareness Day program.• Maintains, submits, and tracks access requests, Code of Conduct acknowledgements, and requests for access to site applications in Lotus Notes; receives, submits, and tracks requests for Use of Hardware and Software, SECURIDs, and access to the site domain; creates and cancels user accounts.• Maintains current knowledge of technology, best practices, threats, and other information needed to assure the protection of information and systems.• Maintains electronic security systems that provide confidentiality, integrity, and availability and meet applicable DOE/NNSA requirements and commercial standards, including periodic assessments of risk, including the magnitude of harm that could result from the unauthorized access, use, disclosure, disruption, modification, or destruction of information and information systems that support the operations and assets of the NNSA/NFO.• Creates policies and procedures that are based on risk assessments, cost-effectively reduce cyber security risks to an acceptable level, and ensure that cyber security is addressed throughout the life cycle of each information system.• Conducts security awareness training to inform contractor personnel of the cyber security risks associated with their activities and their responsibilities in complying with NNSA/NFO policies and procedures designed to reduce these risks.• Conducts periodic testing and evaluation of the effectiveness of cyber security policies, procedures, practices, and security controls to be performed with a frequency depending on risk, but no less than annually.• Creates a process for planning, implementing, evaluating, and documenting remedial actions to address any deficiencies in the cyber security policies, procedures, and practices of the contractor.• Create and employ procedures for detecting, reporting, and responding to security incidents and events.• Create and employ plans and procedures to ensure continuity of operations for information systems that support the operations and assets of the NNSA/NFO.• Ensures that appropriately “Q” cleared, trained, and knowledgeable officials are assigned cyber security responsibilities and obtains formal NNSA/NFO authorization for operating information systems prior to installation and operation.• After receiving TSCM training (requires 1 week of travel), Serves as a Technical Surveillance Countermeasures Officer (TSCMO) in accordance with applicable DOE/NNSA requirements• Coordinates audio and technical countermeasures requirements, surveys, and corrective actions for all facilities with the NNSA/NFO Technical Surveillance Countermeasures Operations Manager (TSCMOM)• Provides guidance to engineering, facilities, and programmatic personnel regarding acoustic and technical security requirements for new facilities or areas that are being upgraded to security areas, including limited areas, Vault Type Rooms, Protected Areas, Material Access Areas, Special Access Program facilities, and Sensitive Compartmented Information Facilities as defined by applicable DOE/NNSA requirements
EDUCATION REQUIREMENTS:• Bachelor’s degree in Management of Information Systems, Information Assurance, Cyber Security, Computer Science, or similar field.
QUALIFICATIONS:• Must be able to pass an OPM/DOE background check and eligible for a "Q" Clearance (an Active or recently Active TS or TS/SCI Clearance would be helpful to expedite this process).• Be proficient with Information Assurance Software Tools, Scanning Software, Risk Assessments Software Application, Microsoft Office Suite, especially Word, PowerPoint, Outlook, and Excel.• Have some experience with newsletter or other document design.
OPTIONAL BUT DESIRABLE:• Some understanding of concepts related to technical surveillance countermeasures a plus.• Experience with RSA SecureID infrastructure, Nessus/ACAS a plus.• Previous experience working in a work environment with safeguards related to classified programs a plus.
Other Requirements: Working hours are generally 8 work hours per day during normal business hours but could occasionally require work outside of those hours to support operational requirements.The employee must adhere to all safety and security requirements of the work location.
Please fill one out and submit it to: firstname.lastname@example.org.
In addition, we are accepting resumes at large for positions that will be opening in the areas of records management, records classification/declassification, administrative support, customer service, software development, and network administration.
Here is a link our employment application: MCH Corporation Employment Application. Please fill one out and submit it to: email@example.com
E-Verify:If you are selected for a position, the documentation that you present for purposes of completing the Department of Homeland Security (DHS) Form I-9 will be verified through the DHS "E-Verify" system. Federal Law requires MCH to use the E-Verify system to verify the employment eligibility of all new hires, and obligates the new hire to take affirmative steps to resolve any discrepancies identified by the system as a condition of continued employment. MCH Corporation is an E-Verify Participant.
Our company employs people in a number of states in the continental United State (CONUS) from New Hampshire and North Carolina to Tennessee and New Mexico. We are open to considering opportunities anywhere in the United States and select OCONUS locations.
We are experienced at meeting government requirements related to security, health & safety, and operating a drug free workplace.
In addition, we have experience at procuring products and subcontract services with government funds as well as managing government property either provided to us by customers or purchased on their behalf.
We look forward to hearing from you. Weather you are looking for employment or looking for a capable company that can provide cost effective solutions for your organization. You can reach us at:
995 Hwy 11 S (Purple Heart Trail)
P.O. Box 720
Sweetwater, TN 37874
Phone: (888) 534-1729
Fax: (888) 534-1730
More Contact Information