Yesterday
Secret
Unspecified
Unspecified
China Lake, CA (On-Site/Office)
Position Description
The incumbent will assist in developing, providing technical solutions, and implementing the tools and processes necessary to support the Navy, Joint Community, and mission specific IT Systems Software analysis configuration development and deployment within the NMCI services of the Technical Support Branch (DC332000) of the IT Service Delivery Division (DC33000) within the DITAC Department (DC30000).
With guidance from leadership, the specialist will perform technical support work within Information Technology security constraints and for technical thrusts. Specific duties will include network analyses, decomposing, deriving, managing, documenting, developing requirements for IT systems and software components.
Incumbent duties include providing NMCI Administration and equipment management in support of NAWCWD NMCI customers and labs in the following areas:
• Support NMCI ordering and build out processes in NMCI Enterprise Tool (NET) to obtain and implement new NMCI equipment, software, and services for customers.
• Support NMCI equipment deliveries and technical refresh efforts for unclassified and classified computer equipment.
• Maintain computer, software, services, and peripheral inventory information in NET.
• Process move-add-change requests in NET and maintain existing NMCI equipment and services.
• Support validation of NMCI invoices and provide reports to management.
• Provide file share and email administration support.
• Develop business process documentation to define the processes used to administer NMCJ Administration responsibilities.
Incumbent serves as deputy team Lead and provides customer assistance and technical support for NMCI computers, software,
services, scanners, external hard drives, and other peripherals; supports escalation of NMCI Issues.
Incumbent additional system administrative duties narrative under guidance from team leadership:
· Incumbent will ensure that IA and IA-enabled software, hardware, and firmware comply with appropriate security configuration guidelines. DODI 8500.2, February 6, 2003.
· Access only that data, control information, software, hardware, and firmware for which they are authorized access and have a need-to-know, and assume only those roles and privileges for which they are authorized.
· Maintain, troubleshoot, and reconfigure information system assets in accordance with department and agency policies and procedures and within the scope of granted privileged access systems.
· Immediately report all IA-related events and potential threats and vulnerabilities involving a DoD information system to the appropriate ISSM.
· Ensure that system media and output are properly marked, controlled, stored, transported, and destroyed based on classification or sensitivity and need-to-know.
· Protect terminals or workstations from unauthorized access. DODI 8500.2, February 6, 2003.
· Inform the ISSM when access to a particular DoD information system is no longer required (e.g., completion of project, transfer, retirement, resignation).
· Observe policies and procedures governing the secure operation and authorized use of a DoD information system.
· Use the DoD information system only for authorized purposes.
· Not unilaterally bypass, strain, or test IA mechanisms. If IA mechanisms must be bypassed, users shall coordinate the procedure with the IAM and receive written approval from the ISSM.
· Not introduce or use unauthorized software, firmware, or hardware on the DoD information system.
· Not relocate or change DoD information system equipment or the network connectivity of equipment without proper IA authorization.
· Immediately report all IA-related events and potential threats and vulnerabilities involving a DoD information system to the appropriate IAM.
Experience Required
0-3 Years
Minimum Salary
62926
Maximum Salary
118635
The incumbent will assist in developing, providing technical solutions, and implementing the tools and processes necessary to support the Navy, Joint Community, and mission specific IT Systems Software analysis configuration development and deployment within the NMCI services of the Technical Support Branch (DC332000) of the IT Service Delivery Division (DC33000) within the DITAC Department (DC30000).
With guidance from leadership, the specialist will perform technical support work within Information Technology security constraints and for technical thrusts. Specific duties will include network analyses, decomposing, deriving, managing, documenting, developing requirements for IT systems and software components.
Incumbent duties include providing NMCI Administration and equipment management in support of NAWCWD NMCI customers and labs in the following areas:
• Support NMCI ordering and build out processes in NMCI Enterprise Tool (NET) to obtain and implement new NMCI equipment, software, and services for customers.
• Support NMCI equipment deliveries and technical refresh efforts for unclassified and classified computer equipment.
• Maintain computer, software, services, and peripheral inventory information in NET.
• Process move-add-change requests in NET and maintain existing NMCI equipment and services.
• Support validation of NMCI invoices and provide reports to management.
• Provide file share and email administration support.
• Develop business process documentation to define the processes used to administer NMCJ Administration responsibilities.
Incumbent serves as deputy team Lead and provides customer assistance and technical support for NMCI computers, software,
services, scanners, external hard drives, and other peripherals; supports escalation of NMCI Issues.
Incumbent additional system administrative duties narrative under guidance from team leadership:
· Incumbent will ensure that IA and IA-enabled software, hardware, and firmware comply with appropriate security configuration guidelines. DODI 8500.2, February 6, 2003.
· Access only that data, control information, software, hardware, and firmware for which they are authorized access and have a need-to-know, and assume only those roles and privileges for which they are authorized.
· Maintain, troubleshoot, and reconfigure information system assets in accordance with department and agency policies and procedures and within the scope of granted privileged access systems.
· Immediately report all IA-related events and potential threats and vulnerabilities involving a DoD information system to the appropriate ISSM.
· Ensure that system media and output are properly marked, controlled, stored, transported, and destroyed based on classification or sensitivity and need-to-know.
· Protect terminals or workstations from unauthorized access. DODI 8500.2, February 6, 2003.
· Inform the ISSM when access to a particular DoD information system is no longer required (e.g., completion of project, transfer, retirement, resignation).
· Observe policies and procedures governing the secure operation and authorized use of a DoD information system.
· Use the DoD information system only for authorized purposes.
· Not unilaterally bypass, strain, or test IA mechanisms. If IA mechanisms must be bypassed, users shall coordinate the procedure with the IAM and receive written approval from the ISSM.
· Not introduce or use unauthorized software, firmware, or hardware on the DoD information system.
· Not relocate or change DoD information system equipment or the network connectivity of equipment without proper IA authorization.
· Immediately report all IA-related events and potential threats and vulnerabilities involving a DoD information system to the appropriate IAM.
Experience Required
0-3 Years
Minimum Salary
62926
Maximum Salary
118635
group id: 90707755S