Logo
CALIBRE Systems

Network Operations Planning Specialist

CALIBRE Systems, Springfield, Virginia, us, 22161


Job Description

CALIBRE Systems Inc., an employee-owned Management Consulting and Digital Transformation Company is seeking a Network Operations Planning Specialist (Intermediate) to support our Cybersecurity Division/ NGA Defender in the NCE-Springfield, VA. area. Plans, implements, and operates network services/systems, to include hardware and virtual environments. Analyzes data/information from one or multiple sources to conduct preparation of the environment, respond to requests for information, and submit intelligence collection and production requirements in support of planning and operations. Develops detailed plans for the conduct or support of the applicable range of cyber operations through collaboration with other planners, operators and/or analysts. Participates in targeting selection, validation, synchronization, and enables integration during the execution of cyber actions.

Responsibilities include, but are not limited to, the following:Provide input to the analysis, design, development, or acquisition of capabilities used for meeting objectives.Apply expertise in policy and processes to facilitate the development, negotiation, and internalAssess target vulnerabilities and/or operational capabilities to determine course of action.Assist and advise interagency partners in identifying and developing best practices for facilitating operational support to achievement of organization objectives.Provide input to the identification of cyber-related success criteria.Develop, review and implement all levels of planning guidance in support of cyber operations.Configure and optimize network hubs, routers, and switches (e.g., higher-level protocols, tunneling).Develop and implement network backup and recovery procedures.Diagnose network connectivity problem. Implement new system design procedures, test procedures, and quality standards.Install and maintain network infrastructure device operating system software (e.g., IOS, firmware).Install or replace network hubs, routers, and switches. Integrate new systems into existing network architecture.Monitor network capacity and performance.Perform file signature analysis.Perform real-time forensic analysis (e.g., using Helix in conjunction with LiveView).Answer requests for information.Provide expertise to course of action development.Provide subject matter expertise to the development of a common operational picture.Maintain a common intelligence picture.Provide subject matter expertise to the development of cyber operations specific indicators.Assist in the coordination, validation, and management of all-source collection requirements, plans, and/or activities.Assist in the identification of intelligence collection shortfalls. Brief threat and/or target current situations.Required Skills

Knowledge of computer networking concepts and protocols, and network security methodologies.Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy.Knowledge of cybersecurity and privacy principles.Knowledge of cyber threats and vulnerabilities. Knowledge of specific operational impacts of cybersecurity lapses.Knowledge of industry-standard and organizationally accepted analysis principles and methods.Knowledge of information technology (IT) architectural concepts and frameworks.Knowledge of Risk Management Framework (RMF) requirements.Skill in developing or recommending analytic approaches or solutions to problems and situations for which information is incomplete or for which no precedent exists.Skill in identifying cyber threats which may jeopardize organization and/or partner interests.Skill in using multiple analytic tools, databases, and techniques (e.g., Analyst's Notebook, A-Space, Anchory, M3, divergent/convergent thinking, link charts, matrices, etc.).Skill in using multiple search engines (e.g., Google, Yahoo, LexisNexis, DataStar) and tools in conducting open-source searches.Skill in utilizing feedback to improve processes, products, and services.Skill in utilizing virtual collaborative workspaces and/or tools (e.g., IWS, VTCs, chat rooms, SharePoint). Skill in analyzing network traffic capacity and performance characteristics.Skill in establishing a routing schema.Skill in implementing, maintaining, and improving established network security practices.Skill in installing, configuring, and troubleshooting LAN and WAN components such as routers, hubs, and switches.Skill in using network management tools to analyze network traffic patterns (e.g., simple network management protocol).Skill in administrative planning activities, to include preparation of functional and specific support plans, preparing and managing correspondence, and staffing procedures.Skill in applying analytical methods typically employed to support planning and to justify recommended strategies and courses of action.Skill in applying crisis planning procedures.Skill in developing and executing comprehensive cyber operations assessment programs for assessing and validating operational performance characteristics.Skill in documenting and communicating complex technical and programmatic information.Skill in evaluating information for reliability, validity, and relevance.Skill in preparing and presenting briefings.Must have the ability to communicate accurate informationRequired Experience

Bachelor degree or higher from an accredited college or university (Recommend an accredited Computer Science, Cyber Security, Information Technology, Software Engineering, Information Systems, or Computer Engineering degree; or a degree in a Mathematics or Engineering field.)Active

TS/SCI Clearance REQUIRED8140 Certification: CEH or Security + or CISSPSkill in identifying measures or indicators of system performance and the actions needed to improve or correct performance, relative to the goals of the system.Skill in conducting audits or reviews of technical systemsSkill to translate, track, and prioritize information needs and intelligence collection requirements across the extended enterprise.Ability to ensure security practices are followed throughout the acquisition process