Cybersecurity Defense System Support

Location: Dayton, Ohio, United States


This position is no longer open.

Requisition Number: 4159

Position Title:

External Description: Cybersecurity Defense System Support
Dayton, OH, USA • Wright-Patterson AFB, OH, USA Req #4159

Monday, September 27, 2021


All Native Group is seeking an SC Cybersecurity Defense System Support to provide system support to the United States Space Force in Dayton, Ohio.All Native Group is in an active bidding process for this position. Employment is contingent upon All Native Group being awarded the contract.

Essential Functions

• Support, as the subject matter expert, the engineering, integration, operations, troubleshooting, maintenance, and upgrades of existing and new network and endpoint-based cybersecurity capabilities, including Endpoint Security Solutions (ESS, aka HBSS) and the Assured Compliance Assessment Solution (ACAS) for five enterprise-level networks to include associated cloud resources.

• Research and recommend technical solutions to address network and system vulnerabilities and security compliance deficiencies.

• Provide SME/Security Engineering support for new and emerging technologies.


• Operate and provide advanced technical support for ACAS and ESS/HBSS across a complex environment of NASIC enterprise IT resources to include five enterprise LANs (3 production, 2 development)

• Provide level II and level III technical support for cybersecurity systems and interact with other support personnel as needed to troubleshoot and resolve issues

• Integrate/deploy cybersecurity systems across multiple Enterprise operating system versions as required by the IC, DoD and USAF for Windows, Solaris, RHEL, and CentOS, following DISA/vendor provided installation/configuration guidance and NASIC configuration management processes

• Document installations, removals, and change requests using the NASIC CCR process; gather technical information in support of the CCR process to include microcode software updates, license software changes, and updates to antivirus applications; submit a CCR documenting the change and ensure approval is granted prior to completing modifications

• Perform functionality testing before application installation and regression testing post-install and generate before-after reporting

• Create, maintain, and properly document cybersecurity system configurations, architectural diagrams, and ad hoc scripting

• Ensure platforms hosting cybersecurity systems maintain currency with required operating system patches

• Monitor the health of cybersecurity systems, review audit logs for security and functional issues, provide daily status reports, report problems as needed, and work with other team members to take appropriate corrective actions to maintain system stability and uptime

• Monitor the status of cybersecurity system endpoint deployment and ensure full coverage or approved/documented exceptions across the entire enterprise; ensure updates to modules and detection signatures are tested and fully applied

• Provide recommendations that improve security system performance and maintenance, minimizing man-hours required to support and manage security system infrastructure

• Serve as a senior member of the team responsible for the planning and development of a robust and scalable management infrastructure for enterprise cybersecurity capabilities

• Research and evaluate current and new cybersecurity product advancements and provide recommendations for planned testing; develop implementation schedules for deployment into

• production environments; develop and assist with the implementation of clear transition plans between old and new capabilities • Create dashboards for user sets (e.g. administrators, ISSOs, leadership) to convey relevant information from cybersecurity systems and provide training on the use of those dashboards

• Provide expert advice on the security and integration of emerging technologies within the NASIC environment

• Recommend and implement solutions and mitigations to comply with higher-level compliance directives including but not limited to Information Assurance Vulnerability Alerts (IAVA), Intelligence Community Vulnerability Alerts (ICVA), and Command Cyber Operational Readiness Inspection (CCORI) criteria

• Provide monthly functional area reports summarizing work accomplished, work planned in next month and important issues occurring during the month. Report shall include system and POA&M status (if applicable) and trend data.

Supervisory Responsibility

None required for this position

Work Environment

This job operates in a professional office environment. This role routinely uses standard office equipment such as computers, phones, photocopiers, filing cabinets and fax machines.

Physical Demands

The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of this job.

• Must be able to remain in a stationary position 75% of the time.

• Occasionally moves about inside the office to access file cabinets, office machinery, etc.

• Constantly operates a computer and other office productivity machinery, such as a calculator, copy machine, and computer printer.

• Expresses or exchanges ideas by means of the spoken word. Those activities in which they must convey detailed or important spoken instructions to other workers accurately, loudly or quickly.

• Frequently moves standard office equipment up to 25 pounds.

• Must be able to work indoor conditions 90% of the time.

While performing the duties of this job, the employee is regularly required to talk or hear. The employee frequently is required to stand; walk; use hands to finger, handle or feel; and reach with hands and arms.

Position Type/Expected Hours of Work

This is a full-time position. Typical days and hours of work are Monday through Friday, 8:00 a.m. to 5:00 p.m. Evening and weekend hours required, as required by business need.


Travel is primarily local during the business day, although some out of the area travel and overnight may be expected.


• 5+ years in IT and 2+ years in IT security for an enterprise-level organization


• Bachelor's Degree with diploma from an accredited educational institution; Graduate Diploma from a technical or vocational school or have acquired equivalent military training with certifications.

Additional Eligibility Qualifications

• Baseline Certifications for IAT II are: CCNA Security, or CySA+, or GICSP, or GSEC, or Security+ CE, or CND, or SSCP.

• Have vendor specific training/certifications: ACAS, HBSS Admin 201 or equivalent & HBSS Advanced Admin 301 or equivalent.

• Formal education, training, and experience performing privileged-user functions on Windows, Linux, and Unix systems to include knowledge of administrative commands and scripting capabilities.

• Advanced to expert-level knowledge and understanding of enterprise security best practices, application design, security engineering and integration in a complex, networked environment consisting of a variety of operating systems.

Security Clearance

Must possess or be able to obtain/maintain a TS/SCI security clearance

AAP/EEO Statement

All Native Group is an equal opportunity employer. All applicants are considered without regard to age, sex, race, national origin, religion, marital status or physical disability. However, preference may be extended to persons of Indian descent in accordance with applicable laws.

Other Duties

Please note this job description is not designed to cover or contain a comprehensive listing of activities, duties or responsibilities that are required of the employee for this job. Duties, responsibilities and activities may change at any time with or without notice.


Other details

  • Job Family IT / Cyber Security / Network Systems
  • Pay Type Salary

City: Dayton

State: Ohio

Community / Marketing Title: Cybersecurity Defense System Support

Company Profile:

Location_formattedLocationLong: Dayton, Ohio US

CountryEEOText_Description: US EEO Verbiage

Copyright 2020 © All Native Group