• Information Assurance Technical Support-OCONUS-BAHRAIN

    Job Locations US
    Job ID 2018-1367
  • Overview

    Remote field communications and networking depend on reliable technology that performs in even the most extreme environments. DataPath specializes in designing, manufacturing and supporting both custom and commercial-off-the-shelf field communications and information technology products. All of our solutions are backed by industry leading management tools, customer care and field support. At DataPath we are passionate about developing easy-to-use top quality products that help our clients achieve their mission objectives.  


    This role shall manage risks related to the use, processing, storage, and transmission of information or data and the systems and processes used for those purposes. Information assurance includes protection of the integrity, availability, authenticity, non-repudiation and confidentiality of user data.


    •      Shall manage accounts, network rights, and access to Network Environmental (NE) systems and equipment.
    •      Shall install, configure and troubleshoot Information Assurance solutions in a deployed environment to include: MacAfee ePolicy  Orchestrator (EPO) Server, Blue Coat SG Proxy, Microsoft WSUS, eEye Retina Scanner.
    •    Shall install, test, maintain, and upgrade network operating systems software and hardware to comply with Information Assurance (IA) requirements.
    •     Shall implement applicable patches including Information Assurance & Vulnerability Assessment (IAVAs), Information Assurance & Vulnerability Bulletin (IAVBs), and Technical Assessment (TAs) for their NE.
    •      Shall provide end user support for all IA related applications for the NE.
    •      Shall perform IA related customer support functions including installation, configuration, troubleshooting, customer support, and/or training, in response to customer requirements for the NE.
    •      Shall analyze patterns of non-compliance and take appropriate administrative or programmatic actions to minimize security risks and insider threats.
    •      Shall write and maintain scripts for the NE.
    •     Shall examine potential security violations to determine if the NE policy has been breached, assess the impact, and preserve evidence.
    •      Shall support, monitor, test, and troubleshoot hardware and software IA problems pertaining to the NE.
    •      Shall analyze system performance for potential security problems.
    •      Shall assess the performance of IA security controls within the NE.
    •      Shall identify IA vulnerabilities resulting from a departure from the implementation plan or that were not apparent during testing.
    •     Shall configure, optimize, and test network servers, hubs, routers, and switches to ensure they comply with security policy,  procedures, and technical requirements.
    •      Shall recommend and schedule IA related repairs in the NE.
    •      Shall evaluate potential IA security risks and take appropriate corrective and recovery action.
    •      Shall ensure that hardware, software, data, and facility resources are archived, sanitized, or disposed of in a manner consistent  with system security plans and requirements.
    •      Shall diagnose and resolve IA problems in response to reported incidents.
    •      Shall research, evaluate, and provide feedback on problematic IA trends and patterns in customer support requirements.
    •      Shall ensure IA Workforce Technical (IAT) Level I personnel are properly trained
    •      Shall perform system audits to assess security related factors within the NE.
    •      Shall develop and implement access control lists on routers, firewalls, and other network devices.
    •     Shall install perimeter defense systems including intrusion detection systems, firewalls, grid sensors, etc., and enhance rule  sets to block sources of malicious traffic.
    •      Shall apply security requirements to an operating system for the NE or CE used in their current position.
    •      Shall adhere to Information System (IS) security laws and regulations to support functional operations for the NE.
    •      Shall implement response actions in reaction to security incidents.
    •      Shall support the design and execution of exercise scenarios.
    •      Shall support Security Test and Evaluations (Part of Certification and Accreditation Process).
    •      Shall work with other privileged users to jointly solve IA problems.
    •      Perform other duties as assigned.


    •      Must have Active Secret Clearance
    •      Must have a passport
    •      Bachelors degree, in lieu 5 years’ experience in a related field
    •      Must be Security + certified.
    •      Must be Network+ certified.
    •      Global Information Assurance Certification (GIAC) GIAC Security Essentials Certification (GSEC). 
    •      Software Configuration Management Plan (SCMP) experience.
    •      Shall have additional CISCO and or Microsoft related certifications.
    •     Shall have experience performing IA related customer support functions including installation, configuration, troubleshooting, customer support, and/or training, in response to customer requirements for the NE systems, firewalls, grid sensors, etc., and enhance rule sets to block sources of malicious traffic.
    •      Shall have a minimum of two (2) years’ experience in a military contingency.
    •      Shall have knowledge of the Information System (IS) security laws and regulations to support functional operations for the NE.


    EEOC Statement

    EOE AA/M/F/Vet/Disability


    DataPath is an Equal Opportunity Employer. We comply with the laws set forth in the Equal Employment Opportunity in The Law poster.


    DataPath is committed to Equal Employment Opportunity and providing reasonable accommodations to applicants with physical and/or mental disabilities. If you are interested in applying for employment and need special assistance or an accommodation to use our website to apply for a position, please contact us at HRTA@Datapath.com We evaluate requests for reasonable accommodation on a case-by-case basis.


    Sorry the Share function is not working properly at this moment. Please refresh the page and try again later.
    Share on your newsfeed