HBSS Branch Chief

Company Name:
STG, Inc.
Join STG, Inc. and watch your career soar as the Host Based Security System (HBSS) Branch Chief for the 2nd Regional Cyber Center - Western Hemisphere located in Fort Huachuca, Arizona. This position will support the 2RCC-WH which is an exciting and fast paced organization focused on securing the Army Networks within CONUS.
Provide strategic leadership and guidance to the HBSS Teams supporting the 2RCC-WH. Coordinate with technical staff and senior leaders to develop strategies and solutions for complex issues related to compliance, deployment, and providing O&M; support to the Army's HBSS implementation on multiple classified and unclassified networks. Oversee all aspects of the HBSS mission and provide direct support to the HBSS/CND Service Manager.
Primary Duties:
Ensure proper operation and maintenance of HBSS systems to achieve compliance with applicable OPORD/FRAGO and STIG requirements, while ensuring adequate protection for Army assets against malicious activity.
Coordinate with external organizations including 7th Signal Command (Theater), Network Enterprise Technology Command (NETCOM), U.S. Army Cyber Command (USARCYBER) and Defense Information Systems Agency (DISA).
Ensure the operational security and protection of more than 430,000 Army assets throughout the CONUS Theater. Recommend changes and/or improvements to security postures based on emerging threats.
Leverage industry trends to achieve Army and/or 2RCC-WH goals. Perform work without appreciable direction. Set realistic objectives and motivates others to achieve them. Gathers organizational support for implementing change.
Effectively manage personnel, assigned tasks, and special projects in order to meet mission objectives.
Regularly interact with senior management, senior Government, or executives on matters concerning operational security, module deployment, and implementation of HBSS security policies. Requires the ability to change the thinking of, or gain acceptance from, others in sensitive situations without damage to the relationship. Conducts beneficial briefings for customer management. Demonstrates strong interpersonal skills
Monitor, research, triage, and provide quality assurance for HBSS incidents and service requests. Monitor established SLTs and taking appropriate action as necessary to ensure proper handling and mitigate potential breaches.
Assist with on-site training and developing written procedures (TTP, SOP, etc...).
Support and/or lead special projects as required.
Ability to secure and maintain a SECRET level security clearance.
BS/BA in Computer Science or directly related field (_e.g_., Electrical Engineering, Systems Engineering, etc) and 8 years equivalent experience
To include 2 or more years technical experience supporting system and/or network operations & maintenance.
Must complete vendor specific training and certification within 30 days from date of start (e.g. Arcsight, HBSS, etc.)
Security+ required
CEH required within 60 days of hire
Certified McAfee Security Specialist -ePO certification or Microsoft Server certification required within 180 days
Possess exceptional communication and interpersonal skills and the ability to express a positive attitude toward others.
Logically think through and diagnose issues with Security Management tools, sensors, and supporting infrastructure.
Understand computer networks, data flow and security controls.
Ability to manage computers remotely and use enterprise software packages.
Ability to establish priorities, work independently, and complete objectives.
Ability to resolve problems independently and as a member of a team.
Certified Information Systems Security Professional (CISSP)
5-8 years Technical/Managerial experience in progressively more complex environments or operations
Date: 2014-07-23
Country: US
State: AZ
City: Fort Huachuca

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.