IT Systems Engineer - UAM This position requires an active TS/Sensitive Compartmental Information (SCI) clearance. The IT Systems Engineer serves as User Activity Monitoring (UAM) analyst responsible for identifying anomalous user actions on networks while documenting findings and recommendations for leadership review and approval to assist with modernization efforts for Army systems. Compensation & Benefits: Pay commensurate with experience. Pay- $110,000- $125,000 Full-time benefits include Medical, Dental, Vision, 401K, and other possible benefits as provided. Benefits are subject to change with or without notice. IT Systems Engineer - UAM Responsibilities Include:
- Assist in modernizing UAM collection by reviewing existing capabilities and recommending modifications, enhancements and new techniques, along with processes, procedures, or technology changes to improve effectiveness.
- Serve as an Army UAM analyst responsible for identifying anomalous user actions on Army networks.
- Reviews and analyzes received network alerts to determine validity as potential insider threats and security incidents. Employs UAM, analysis, and correlation tools in the conduct of event analysis.
- Coordinates with other entities to receive data from a number of networks to support analysis efforts.
- Collaborates with the Insider Threat Hub, cyber defense, and information assurance (IA) staff members to leverage their expertise in the execution of mission requirements
- Creates recurring status reports and maintains a tracking mechanism for actions taken.
- Review and resolve received UAM audit events and alerts, present the Government findings with resolution recommendations, and document analysis results.
- Write, review and edit Incident Assessment Reports (IARs) and submit them to the Government for review and acceptance.
- Use the Army's UAM case management system to establish a new case, track progress, update status, modify existing open cases, and close out active cases. Review and edit case information and data in the Army's case management system to ensure all required analysis findings are properly documented.
- Assist Army units in resolving IAR findings.
- Assist external agencies in reviewing and clarifying collected system user activity audit data.
- Validate collected system event data against device log data or reports from other network-deployed tools when possible and include this research in the case management tool and IARs.
- Performs other job-related duties as assigned
IT Systems Engineer - UAM Experience, Education, Skills, Abilities requested:
- Must have good analytical skills, attention to detail, self-motivation, and highly effective organizational, writing, and verbal skills
- Must be able to adapt to a changing environment
- Must be proficient in all MS Office suite, including Word, Excel, and PowerPoint
- Prefer a minimum of a BA/BS in technology-related field; ten years' experience as an IT Systems Architect or Engineer can be substituted for the degree.
- Six years' experience in Project Engineering, Systems Engineering, or Software Engineering is required; 10 years' experience is preferred.
- Top Secret Clearance with SCI is required
- Must pass the pre-employment qualifications of Cherokee Federal
Company Information: Cherokee Nation Defense Solutions (CNDS) is a part of Cherokee Federal, a division of tribally owned federal contracting companies owned by Cherokee Nation Businesses. As a trusted partner for more than 60 federal clients, Cherokee Federal LLCs are focused on building a brighter future, solving complex challenges, and serving the government's mission with compassion and heart. To learn more about CNDS, visit cherokee-federal.com. #CherokeeFederal #LI- SH1 Cherokee Federal is a military-friendly employer. Veterans and active military transitioning to civilian status are encouraged to apply. Similar searchable job titles:
Cybersecurity Analyst - UAM IT Security Engineer Insider Threat Analyst Network Security Engineer Information Assurance Analyst
Keywords:
TS/SCI Clearance User Activity Monitoring (UAM) Insider Threat Detection Network Security Analysis Army Systems Modernization
Legal Disclaimer: All qualified applicants will receive consideration for employment without regard to protected veteran status, disability or any other status protected under applicable federal, state or local law. Many of our job openings require access to government buildings or military installations. Candidates must pass pre-employment qualifications of Cherokee Federal.
|