IA/IT Specialist

Company Name:
The Tatitlek Corporation
Tracking Code
Job Description
Job specifications are intended to present a descriptive list of the range of duties performed by employees. Specifications are _not__ intended to reflect all duties performed within the job._

## Summary:
## This is a temporary assignment. The IA/IT Specialist will be primarily responsible for building virtual servers in accordance with customer specifications. In addition, the IA/IT Specialist will provide day to day IA and general IT support for the SETA contract as needed.
Essential Duties and Responsibilities:
Essential functions are intended to present a descriptive list of the range of duties performed by employees. This list of essential functions is not intended to reflect every duty that may be performed within the job.
Performs systems planning, management, analysis, integration, installation and training tasks that include all aspects of preparing and implementing a highly complex and integrated array of hardware, software (applications and operating systems), networks and procedures.
Monitors system performance and ensures corrective actions are accomplished.
Specifies hardware and software support to ensure effective administration and management of automation requirements.
Provides maintenance and systems management support for application software, processing platforms, executive software and data base management systems.
Provides technical support in the review, analysis, coordination and implementation of Army, DOD, and other government Information Assurance (IA) and Information Security (INFOSEC) policies, directives, regulations and instructions relating to the operation, certification and accreditation of PM IW(s) information systems and networks.
Provides system certification and accreditation support to the PM IW for LANs, WANs, stand-alone capabilities, point-to-point systems, and any other AIS certification requirements under either DCID/JAFAN 6/3 or the DOD Intelligence Information Systems (DODIIS) Security Certification and Accreditation Guide.
Upload and download of various secure files to 7 point-to-point locations.
Attend meetings (staff call, IMO meetings, etc.).
Help desk IT actions for DOIM accounts - troubleshooting systems access.
Determine and recommend courses of action to resolve problems which arise out of the IA program operations.
Prepare Weekly Activity Report.
Unlocking accounts, installation of updates and software, maintenance of computers, viewing vendor's sites for updates, market research for IA equipment and supplies.
Manage, enforce and audit all account passwords and permissions.
Coordinate with all off-site locations on software issues and updates; ensure adequate network connectivity, backups of network servers, setup and monitor all secure VTC sessions.
Monitor replacement and disposition of program office computer equipment.
Attend mandatory annual training directed by government client documents, take mandatory DAU courses when directed by the client.
Non - Essential Duties:
Assists in the implementation of new system hardware/software and develops operating procedures.
Assist government client with update and installation of COMSEC material and equipment.
Perform require escort duty when directed.
Other duties as assigned.
Qualifications - Experience, Education and Licensure:
Requires past experience with building virtual servers. Demonstrated knowledge of system security certification and accreditation policies, directives, regulations and instructions for Government AIS networks.
Hands on experience with the installation, configuration, troubleshooting and operations of network devices such as hubs, routers, network monitors, firewalls and data/network encryptors.
Demonstrated knowledge of, and experience in: DCID 6/3; JAFAN 6/3; certification/accreditation documentation and review/approval processing; vulnerability testing and assessments; Army Information Systems policies.
CompTIA Security + GSEC, SCNP or SSCP certification.
Extensive background and experience in:
compliance with Army and DoD Information Systems and Information Assurance policies
creating, documenting, executing information assurance policies, plans, instructions, standard operating procedures, and continuity of operations plans
configuration and security hardening of Microsoft Windows and Linux based systems; risk analysis; disaster recover; system log analysis
Former military
Knowledge, Skills, and Abilities:
Must be able to work independently to accomplish required virtual server builds.
Knowledge of customer service, the ability to listen carefully and the ability to quickly determine problem solutions or escalation path.
Ability to arrange things or actions in a certain order or pattern according to a specific rule or set of rules (e.g., patterns of numbers, letters, words, pictures, mathematical operations).
Ability to apply general rules to specific problems to produce answers that make sense
Ability to read and understand information and ideas presented in writing.
Ability to combine pieces of information to form general rules or conclusions (includes finding a relationship among seemingly unrelated events).
Ability to communicate information and ideas in writing and while speaking so others will understand.
Ability to tell when something is wrong or is likely to go wrong. It does not involve solving the problem, only recognizing there is a problem.
Skill in organizing resources and establishing priorities.
Ability to provide technical training to end users.
Ability to learn and support new systems and applications.
## Physical Requirements:
## _The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions._
While performing the duties of this job, the employee is regularly required to stand; walk; sit; use hands to finger, handle, or feel objects, tools or controls; reach with hands and arms; talk or hear. The employee must occasionally lift and/or move up to 25 pounds. Specific vision abilities required by the job include close vision, distance vision, depth perception, and the ability to adjust focus.
Work Environment:
Work environment characteristics described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.

While performing the duties of this job, the employee is usually in an office setting with exposure to computer screens and requires extensive use of a computer, keyboard, mouse and multi-line telephone system. The employee will be exposed to weather conditions prevalent at the time when on field assignments. The noise level in the work environment is usually moderate.
## Supervisory Responsibilities:
Additional Qualifying Factors:
As a condition of employment, must pass a pre-employment drug screening, as well as have acceptable reference and background check results. May be subject to a government security investigation and must meet eligibility requirements for access to classified information. Only US citizens are eligible for a security clearance. For this position, Tatitlek will consider only applicants with security clearances or applicants who are eligible for security clearances.
The Tatitlek Corporation is an Equal Opportunity Employer
All qualified applicants will receive consideration for employment without regard to race, color, religion, sex national origin, or protected veteran status and will not be discriminated against on color, religion, sex, national origin, or protected veterans status and will not be discriminated against on the basis of disability or any other status protected by law
Job Location
Hanover, Maryland, United States
Position Type

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.