Travel Required: Less than 10%
1) General Summary:
Monitors and responds to hardware and software problems utilizing a variety of hardware and software testing tools and techniques. Installs and configures network hardware and software. Provides network troubleshooting and support. Provides technical support and training to end-users. Administers network security. Backs up file server data/disks. Provides minor to moderately complex server maintenance. Maintains current knowledge of relevant technology as assigned. Participates in special projects as required.
Requires knowledge of the principles methods and techniques used in network troubleshooting and support. Knowledge of routers, switches, patch panels, concentrators, associated terminals, and related network hardware and software. Knowledge of desktop operating systems and applications. Professional Certification in one or more specific technologies may be required to meet DoD Approved RMF Baseline Certifications.
The Network tech shall possess the general knowledge and diagnostic abilities to solve network technical problems associated with maintaining a large training complex network and adapting the same to various situations. Possesses strong written and verbal communication skills and able to work both independently and in a team environment.
Must be well-versed in general system administration principles including operating system configuration for Windows Vista, Windows 7, Windows 2003 Server, Windows 2008 Server with emphasis on Army Gold Master versions of those operating systems, and Linux systems.
Must be experienced with analyzing network security architectures and network design diagrams that provide port, protocol, and service details. Experience with DoD and US Army IAVM tracking and reporting, and with implementing Cybersecurity Best Practices and formulating remediation guidance for supported platforms is also required.
Must have a basic understanding of Army staff procedures regarding TOC/OP operations and individual C2 data threads and how they are managed to ultimately form the Common Operating Picture.
2) Principle Duties and Responsibilities: (application of General Summary attributes)
a) Leadership - Not a normally a supervisory position. May be tasked to temporarily supervise certain functions as needed.
b) Network Admin Tasks
i) Establishes and maintains training and exercise networks for both local area and wide area networks (LAN and WAN).
ii) Analyze local and wide area network systems, including planning, designing, evaluating, selecting, and upgrading operating systems and protocol suites and configuring communication media such as Cisco integrated services routers, Cisco model 6500 and 4500 series network backbone switches, Cisco model 5500 series security appliances, Cisco model 3500 and 3700 series level-2 and level-3 switches, and other devices.
iii) Coordinate network operations for maximum flexibility and responsiveness to ensure that all technical and operational requirements are met for networking systems hardware and software designated for use in Mission Command training exercises and events.
iv) Supports data and communications links to live, virtual, and constructive training environments consistent with government furnished equipment. This includes networks, communications, C2, and simulations architectures. Communications network support may also require links to joint, coalition and homeland security agencies from within the MTC.
v) Operates the MTC local and wide area networks. The network(s) shall be operational 99% of the time during exercises. The operational percentage excludes scheduled downtimes, system and software upgrades, and network problems caused by outside elements.
vi) Monitor and respond to technical support requests and requirements related to the installation, configuration, and maintenance of network systems.
vii) Establishes and maintains Ethernet networking and configuration of associated hardware devices and the various protocols employed in networked data communications at various levels of the protocol stack.
viii) Establish and maintain Ethernet networking and configuration of associated hardware devices and the various protocols employed in networked data communications at various levels of the protocol stack.
ix) Employ configuration guidance based on Defense Information Systems Agency (DISA) Security Technical Implementation Guides (STIG). An in-depth knowledge of Cisco integrated operating systems and experience with network management systems such as Solarwinds network management suite or Ipswitch What's Up Gold is essential to performing this task.
c) Network Management (Non-Exercise Support)
i) Setup and maintain the physical network security for the site enclave. Maintain knowledge of the Risk Management Framework (RMF) Assess and Authorize (A&A) process. Perform and/or evaluate vulnerability scans on production and integration systems utilizing approved network scanning tools and appropriate government provided software such as Retina, DISA Gold Disk, and UNIX and Oracle SRR scripts. Experience performing security test and evaluation, directing remediation efforts, building residual risk reports and tracking POA&M as well as experience performing privacy impact assessments and knowledge of best practices protecting sensitive Information is essential to performing this task.
ii) Performs routine maintenance of all network systems, software and licenses insuring that systems have been installed with the most current supported revision of the system software.
iii) Maintains current knowledge of relevant computer hardware/software applications and participates in special projects as required. Possesses the ability to put all of essential pieces together to form a coherent mental picture of the combined JLCCTC-MRF/ERF, instrumentation, and tactical MCS network and be able to determine where to focus efforts to solve problems or conceive of new solutions.
iv) Establish internal procedures for review of system logs, event files, and critical systems file management in order to assess system network systems and network support systems integrity.
v) Perform backup and storage of critical files and logs on monthly basis. Employ network intrusion detection systems such as Snort as well as intrusion prevention systems and anti-virus deployment systems such as Host Based Security Systems (HBSS) utilizing McAfee ePolicy Orchestrator.
d) Network Management (Exercise Support)
i) Work directly with internal and external customers to develop and report present network activity and status.
ii) Has at least a minimal knowledge of Army staff procedures, TOC/OP operations and individual MCS data threads and how they are managed to ultimately form the Common Operating Picture.
iii) Work with MTC staff and supported units to provide the network capabilities required to pass tactical data from the simulation interfaces to tactical systems in support of exercises.
iv) Work with remote locations to enable wide area network connectivity to MTC assets.
v) Resolve interoperability problems to obtain operations across all platforms utilizing various data exchange and file transfer methods.
vi) Configure systems to meet user requirements. Perform various tests to analyze network performance and document results. Provide technical support and troubleshooting to users. Maintain current knowledge of relevant computer hardware/software applications.
f) Security Requirements:
i) Complies with MTC security requirements. Performs physical security, classified information security, and information assurance security tasks in order to safeguard classified information/equipment and high value government purchased and owned equipment and software.
ii) Ensures that data security, including data retrieval, transmission, and storage is conducted IAW applicable government standards to ensure that data transmission and storage are secure and free from unauthorized access IAW AR 380-5 and AR 25-2.
iii) Under the guidance of the Information Assurance Manager (IAM) shall ensure RMF accredited database and network security measures remain in place to protect information and systems from unauthorized access IAW AR 25-2 and all RMF regulations.
1-3 Years, “and/or” related AA in a Computer Science or related technical discipline, or the equivalent combination of education, technical certifications or training, or work experience.
a) Security Clearance: Secret
b) Experience Requirements: 1-3 Years, “and/or” related AA in a Computer Science or related technical discipline, or the equivalent combination of education, technical certifications or training, or work experience.
c) DoD Certification and Training Requirements: As a condition of initial and continuing employment, obtains and maintains required certifications.
i) Baseline Certification: Security + CE
ii) Computing Environment Certification: CCNA
iii) Mandatory Training / Local Training Plan: Complies with all DoD, Army, and company training requirements IAW Government policy, DoD 8570.01-M IA Workforce Improvement Program, Army Regulation, and company and site policy.
' We are GDIT. The people supporting some of the most complex government, defense, and intelligence projects across the country. We deliver. Bringing the expertise needed to understand and advance critical missions. We transform. Shifting the ways clients invest in, integrate, and innovate technology solutions. We ensure today is safe and tomorrow is smarter. We are there. On the ground, beside our clients, in the lab, and everywhere in between. Offering the technology transformations, strategy, and mission services needed to get the job done.
GDIT is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status, or any other protected class.
Installations (Computer Systems)