Employment

At Metova, our employees are our most valuable asset. Metova is for professional people who want to exceed. Metova is designed around team members who want to make a difference in shaping the company’s future and who can expect fair rewards for doing superior work. Taking care of people is our number one initiative to ensure success.

Metova is commited to creating a diverse environment and is proud to be an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, gender, sexual orientation, national origin, age, or veteran status.”

– John Adams, CEO

Current Metova Job Opportunities

Technical Instructor

Full time position located in Pensacola, FL.

Must have an ACTIVE TS/SCI POLY

Metova is actively seeking technical instructors to deliver Computer Network Operations (CNO) training. Specifically, we have a need for talented personnel in the following areas:

Learn More

Responsibilities and Requirements

Responsibilities:

Areas of instruction include:

      • Programming/Scripting (from fundamentals to advanced concepts WRT Python; Perl; C/C++; Windows command-line & UNIX/Linux shell; etc)
      • Computer Science (hardware/system internals; logic/discrete structures/mathematics; etc)
      • CND & CNE
      • Operating Systems (Windows & UNIX/Linux OS fundamentals to advanced concepts/usage)
      • Wireless Technologies (802.1x)
      • Networking & Network Security
      • Protocol Analysis
      • Target Research/SIGINT Analysis

      Qualifications

      Some of the many tools and key concepts that apply are: network enumeration tools and techniques, packet capturing and analysis, Kali Linux, EnCase, and Wireshark

Desktop Support Technician II

Must have ACTIVE SECRET Clearance

Arlington, VA

Metova is seeking a qualified and highly motivated individual to serve as IT Certified Professional in support of the Army National Guard CIO-G6.

The Desktop Support Technician II will serve as the primary support technician and representative for the National Capital Region, Directorate of Information Management (NCR DOIM). The candidate will provide personal professional assistance for the 3500+ users within the campus. This includes National Guard standard hardware/software installs and configuration, diagnosing of desktop/laptop hardware/software problems, printer troubleshooting. Professional interaction with the customers by phone, remote control of desktop, and desk-side visits. Requests may involve working with other resources and vendors to deliver effective support services. This individual will be the first level of assistance for the NCR DOIM and maintain professionalism at all times.

 

Learn More

Responsibilities and Requirements

Major responsibilities include (not all inclusive):

  • The technician will image workstations and laptops with the National Guard standard desktop image.
  • The technician will complete user moves and new user set-up; perform software installs, life cycle equipment replacement, and data moves.
  • The technician will troubleshoot software/hardware problems.
  • Provide PC and laptop support, problem analysis, and hardware/software installation and configuration.
  • Provide phone, remote, and desk-side technical support to users
  • Configuration of systems, communications devices, and peripheral equipment.
  • Conduct desk-side training for site personnel in proper use of hardware and software.
  • Resolve tickets in a timely manner to meet SLA’s.
  • Evaluate, prioritize, and solve tickets and escalate all tickets to the appropriate Tier Support:
    • Assigning ticket severity
    • Updating service work notes
    • Prioritizing work to resolve complex support client issues
    • Establishing a high level of personal credibility and building strong relationships
    • Maintaining ownership of service tickets throughout the life span of the support request
    • Collaborating with other staff and vendor support resources to resolve requests
    • Providing updates, status, and completion information to management
    • Follow-up with users/customers to ensure resolution of issues to the satisfaction of the user/customer. Closing tickets only when the resolution to the issue has been reached, to the satisfaction of the user/customer.
  • Participate in workshops, seminars, or other events as required.
  • Other duties as assigned by the Government, contract or supervisors in coordination with the SLA’s.
  • The Government standard software includes but is not limited to:
    • Windows 7, Windows 10
    • Office 2013
    • Internet Explorer/Mozilla Firefox
    • Citrix
    • Outlook

Qualified candidates will have:

  • Maintain a current and final SECRET clearance.
  • 5+ years of experience or equivalent with similar role and complexity
  • A+ certification as a minimum, Security+/Network+ desired
  • Active Directory experience
  • Imaging with Microsoft SCCM
  • VMWare (Virtual Desktop Infrastructure) administration experience
  • Hardware and Software troubleshooting for computers and printers
  • Excellent customer service skills, and experience working in a customer service environment
  • Excellent writing and verbal communication skills
  • Possess customer service, communication, problem-solving, analytical, troubleshooting, team work interpersonal, organizational, prioritization and multitasking skills
  • Ability to work in a fast-paced environment
  • Ability to communicate with others in an efficient and professional manner
  • Maintain professional appearance as an example of the organization

Preferred Education and Experience

  • B.S. Degree in computer science or similar field, or 5+ years equivalent job experience
  • Ticketing systems; IssueTrak
  • Hardware configuration/repair of various makes/models of computers and printers
  • Familiarity with working in a military environment
  • Understanding of OPSEC requirements
  • Some knowledge of Quality Management and Configuration Management principles

 

Certifications:

REQUIRED SKILLS

A minimum of DOD 8570 IAT Level I Information Assurance Certification required (CompTIA A+ or equivalent).

Information Assurance/Cyber Security Engineer II

MUST have ACTIVE TOP SECRET clearance

Fort Belvoir, VA

Metova is seeking a qualified and highly motivated individual to serve as an Information Assurance/Cyber Security Engineer Level II in support of the Army CIO-G6 Cyber Directorate.

The following specifications are required to successfully deliver the required service and support Company objectives. This individual is encouraged to exceed these minimum responsibilities to demonstrate its technical, operational, and administrative expertise in support of the Company’s organizational and departmental objectives.

Objectives are as follows:

  • Provides technical expertise for Policy, Guidance and Tactics, Techniques, and Procedures (TTP) development
  • Provide technical support in the area of programmatic analyses, studies, briefings, IA training and certification implementation support.
  • Provide technical reviews, as well as analysis of National, Department of Defense (DoD), Joint Staff, and other federal agencies Cybersecurity/IA policies as they relate to Army level policy.
  • Providing technical support to the Government in transitioning to and complying with the DoD and national level policies.
  • Assessing Cybersecurity/IA needs and reporting, which encompasses, managing and organizing data sufficiently to report proposed actionable changes.
  • Providing technical support to the Government in the incorporation of policy into appropriate regulations and pamphlets; in drafting, reviewing, revising and delivering Cybersecurity/IA policy documents to the Cybersecurity Directorate, and in responding to DA Staff, Army Command (AC), ASCC, DRU, PEO, and field units’ oral and written queries regarding Cybersecurity/IA policy.
  • Develop proposed policies and Tactics, Techniques, and Procedures (TTP) in support of the Army’s Defense-in-Depth strategy and the Department of Defense Global Information Grid (GIG) Vision.

Learn More

Responsibilities and Requirements

Responsibilities:

  • Responsibilities:
    • Obtaining and analyzing information, assessing its relevance to policy or standards, and identify and relate technical and procedural recommendations.
    • To be knowledgeable of the entire spectrum of Cybersecurity tools and processes to include: intrusion detection, intrusion prevention, eradication tools and procedures; cross-domain solutions and multiple level security solutions; wireless personal electronic devices.
    • Gather and collect information assurance data such as intrusions and incidents
    • Write memorandums for Army implementation of privileged user responsibilities, monitor staffing of document across all Army Commands, review comments submitted and provide government lead with recommendations on accepting or rejecting changes/comments
    • Prepare briefings for Army cybersecurity program managers to implementation studies for manpower and staffing levels within their command.
    • Review historical data on systemic information assurance violations to determine course of actions to minimize recurrence of the violations and provide information paper for leadership on findings.

    Physical Demands:

    Normal demands associated with an office environment.

    • Ability to work on a computer for long periods of time.
    • Ability to communicate with individuals by telephone, email and face to face.
    • Some travel may be required.

Qualified candidates will have:

  • Maintain a current and final SECRET clearance.
  • Minimum five (5) years of experience as an Information Assurance Engineer
  • A minimum of DOD 8570 IAM Level II Information Assurance Certification required (CompTIA Sec+ or equivalent).
  • MUST have cross domain solutions experience

Certifications:

REQUIRED SKILLS

A minimum of DOD 8570 IAM Level II Information Assurance Certification required (CompTIA Sec+ or equivalent).

 

Education:

  • Bachelor’s Degree or higher from an accredited college or university in IT, Computer Science, Cybersecurity, Computer Engineering, or related discipline.
  • Master’s Degree may be substituted for one (1) year of relevant experience.

Senior Software Engineer

Fort Gordon – Augusta, GA

About the Team:

The Modeling and Simulations Branch within the Army Cyber Battle Lab operates in support of Army and Joint Forces experimentation in the field of networking, electronic warfare, and cyberspace operations. It is a small team which works within a larger community of other geographically separated Battle Labs in order to build large scale scenarios which consider many different aspects of warfare in order to inform and save money for the Army acquisitions process.

Learn More

Responsibilities and Requirements

*****MUST HAVE AN ACTIVE SECRET SECURITY CLEARANCE***********

The Cyber Battle Lab is looking for a Senior Software Engineer capable of applying innovative solutions towards solving complex problems in support of experimentation. Daily activities include design, development, and operation of data-driven solutions for the purpose of simulating networks, electronic warfare, and cyberspace concepts. This position is required to integrate and automate existing solutions to streamline operations. Candidates must be able to work on a small team where each member is responsible for the design, development, testing, and validation of their assigned area of responsibility within the team.

Minimum Requirements on day one:

DoD “Secret” security clearance

Bachelor’s Degree or higher (Computer Science preferred)

CompTIA Security+ Certification

5+ years professional software engineering experience

Experience using two or more of the following languages:

o Java (SE or EE)o C++
o C# .NET
o SQL

o Python
o Ruby
o JavaScript(preferablyusingaframeworksuchasAngular,Node,orVue)

Experience with some or all of the following technologies:o Virtualization (ESXi, Hyper-V)
o Orchestration(Ansible,Puppet,Chef,etc)
o Source Control (git, Subversion)

o Databases (MS SQL Server, MySQL, LINQ)

o Networking and Routing

Ability to work with both Windows and Linux operating systems

Bonus Knowledge/Experience:

One Semi-Automated Forces (OneSAF)

High-Level Architecture (HLA) or Distributed Interactive Simulation (DIS)

Microsoft Access with Visual Basic Advanced (VBA) (legacy systems)

Web UI/UX Design

Ability to architect, diagram, and communicate new systems or processes

Atlassian JIRA and Confluence

Protobuf

Education

Must possess a minimum Bachelor’s Degree

Must have a minimum of 5 years experience

Splunk Engineer/Site Lead

Scott AFB, IL – Active Secret Security Clearance Required

Metova is looking for a talented and highly motivated individual to join our team at Scott AFB, IL as a Site Lead working as a Splunk Engineer! At Metova, our employees are our most valuable assets. Taking care of our employees is our number one initiative to ensure not only Metova’s success, but also the success of our employees. We want to see our employees exceed! We are designed around team members who want to make a difference in shaping the Company’s future and who can expect great rewards for doing superior work.

Learn More

Required Skills and Qualifications

The Splunk Engineer/Site Lead is responsible to the PM and Contracting Officer Representative for the delivery of all program deliverables, RMF Assessment and Authorization of 17 environments, daily management of task personnel, and delivery of Splunk Enterprise Design, Development, Implementation, Testing and Administration services. This person must be able to assess, provide recommendations for mitigation and remediation, align security policies within the environment with government directives, identify and implement security controls and gather findings for artifacts for the DoD RMF process for several tenant programs under the cognizance of our customer.  The applicant also must be knowledgeable about DoD DIACAP and RMF processes for gathering artifacts.

 

  • Security best practices
  • Responsible for all activities relating to information assurance procedures and systems.
  • Develops information systems assurance programs and control guidelines.
  • Consults with and advises subordinates on administrative policies and procedures and resolving technical problems, priorities, and methods.
  • Consults with and advises other sections regarding internal controls and security procedures. Prepares activity and progress reports relating to the information systems audit function.
  • Participates in all phases of software operating systems and software application programs engineering, including design, analysis, and modeling at a highly technical level; Performs software operating systems and application engineering, including full life cycle application systems design and development; assesses system architecture and hardware limitations; defines and selects new concepts and approaches for the design, development, and implementation of software engineering applications; defines complex design specifications and parameters; resolves complex hardware/software compatibility and interface design considerations; performs requirements acquisition and definition and data analysis;
  • Directs research on emerging technologies to determine impacts on application execution.
  • Performs systems modeling
  • Writes, modifies, and maintains technical documentation and specifications such as user manuals, system documentation, and training materials; performs integration testing and support of various computer operating and/or network systems; troubleshoots and provides customer support for software operating systems and application issues; analyzes and documents client needs and requirements.
  • May perform the following: database analysis, design, implementation, and

Testing.

 

 

 

 

 

 

Skills

Mandatory Experience:

  • Hands On Experience with Splunk Enterprise Services.

Desired Experience:

  • Hands On Experience with Solaris 10/11 with virtualization. Sun Java web/app servers, Oracle Database and Oracle app servers.
  • Hands On Experience with Windows 2002 Server and above
  • Hands On Experience with Red Hat Enterprise 5.0 and above
  • Hands On Experience in validating DISA STIGS and IAVAs

Travel – Up to 10%

Education, Experience and Certifications

Education

Bachelor’s degree and six (6) years related experience, or eight (8) years applicable experience, which should include four (4) years specialized experience.

Certifications

CompTIA Security+ or equivalent DoD 8570 IAT II

Security Clearance

Active Secret Security Clearance

Unix/Solaris Security Analyst

Scott AFB, IL – Active Secret Security Clearance Required

Metova is looking for talented and highly motivated individuals to join our team at Scott AFB, IL as a Unix Solaris Security Analyst! At Metova, our employees are our most valuable assets. Taking care of our employees is our number one initiative to ensure not only Metova’s success, but also the success of our employees. We want to see our employees exceed! We are designed around team members who want to make a difference in shaping the Company’s future and who can expect great rewards for doing superior work.

The Unix/Solaris Security Analyst performs duties such as site surveys, architecture design, system evaluation, system analysis, and infrastructure assessment. Performs duties on tasks that require expertise in system/processor architecture, wired for management baseline, desktop management interface, SNMP, client/server architecture, operating systems, software applications, network protocols, routers, switches, remote access servers, and firewalls.

Learn More

Roles and Responsibilities

The Unix/Linux Analyst is responsible to the Site Lead for providing expertise on Unix and Linux-based systems.  This person must be able to assess, provide recommendations for mitigation and remediation, align security policies within the environment with government directives, identify and implement security controls and gather findings for artifacts for the DoD RMF process for several tenant programs under the cognizance of our customer.  The applicant also must be knowledgeable about DoD DIACAP and RMF processes for gathering artifacts.

Required Skills and Qualifications

Documentation

  • Process – Generates comprehensible documentation for reference by other analysts and team members, etc. that complies with government standards.
  • Testing – Generates test plans and test cases for RMF and system testing
  • External – Assists in generating ATOs for deployable systems

 

Testing

  • Performs RMF testing of system components as necessary.
  • Accomplishes validation testing on systems when assigned.

 

 

Analysis and Mitigation

  • Provide risk assessment of identified vulnerabilities and provide impact statements
  • Assess identified vulnerabilities and provide recommendations for mitigation and remediation

 

General

  • Complete tasks in a timely fashion.
  • Adhere to all defined guidelines and procedures in performance of duties.
  • Present clear, comprehensive recommendations for decision-making.
  • Organize, plan, and execute tasks and projects.
  • Innovate and apply skills and knowledge in problem solving situations.
  • Work individually or with a group to successfully achieve objectives and goals.
  • Adapt to assignment changes on short notice.
  • Provide instruction to others and participate meaningfully in discussions/meetings.
  • Clearly and concisely write RMF artifacts, documents, and reports.

 

Travel:  Up to 10%

Education, Experience and Certifications

Education: Bachelor’s degree and two (2) years related experience, or four (4) years applicable experience, which should include two (2) years specialized experience.

Certifications:  Solaris 10/11 or equivalent Unix/Linux certification; CompTIA Security+ or equivalent DoD 8570 IAT 2

Desired Experience:

Hands On Experience with Solaris 10/11 with virtualization. Sun Java web/app servers, Oracle Database and Oracle app servers.

Hands On Experience with Red Hat Enterprise 5.0 and above

Hands On Experience in validating DISA STIGS and IAVAs

Security Clearance

Active Secret Security Clearance

Network/Systems Engineer IV

Metova is looking for talented and highly motivated individuals to join our team as a Systems Engineer! At Metova, our employees are our most valuable assets. Taking care of our employees is our number one initiative to ensure not only Metova’s success, but also the success of our employees. We want to see our employees exceed! We are designed around team members who want to make a difference in shaping the Company’s future and who can expect great rewards for doing superior work.

The Systems Engineer III performs as a member of a network and systems engineering team charged with the design, integration, production, testing, and installation of network simulators.  Develop high-fidelity simulated environment that mirrors/replicates the primary CVA/H Weapon System and emulates any Mission Partner networks. Provide support to develop and enhance virtual training environments. Environments will be utilized to teach doctrine and TTPS during simulated defensive cyberoperations. This effort will require the use of training architectures and networks to maintain Information Assurance compliance and promote interoperability.

Learn More

Roles and Responsibilities

Conducting research, analysis, design, development, prototyping, system integration and testing needed to deliver IT-based training simulations that replicate operational mission partner networks. Developing high-fidelity simulated environment that mirrors/replicates the primary CVA/H Weapon System and emulates any Mission Partner network. Convert existing simulated Mission Partner networks created for Cyber Protection Teams to the new simulation and training environment and add the Deployable Interceptor Platform to environments.

Required Skills and Qualifications

Engineering

  • Well-rounded engineer capable of configuring operating systems and networking appliances
  • Complete understanding of application protocols (ping, dns, ssh, smtp, ntp, https, etc)
  • Ability to quickly diagnose network connectivity issues in a virtual or physical environment
  • Ability to train customers how to use the simulator

 

Documentation

  • Process – Generates comprehensible documentation for reference by other engineers, developers, etc. that complies with company standards.
  • External – Produces design documentation and build guides for entities outside the company (customers) that are professional.

 

Testing

  • Performs operational test and evaluation for completed mission partner network development
  • Performs testing of simulated mission partner network with training scenarios

 

Analysis and Design

  • Generates and documents simulator designs which comply with requirements specifications.
  • Accurately determines effort and time that will be required to resolve tasks and design requirements.

 

General

  • Completes tasks in a timely fashion with little or no supervision.
  • Adheres to all defined guidelines and procedures in performance of duties.
  • Presents clear, comprehensive recommendations for decision-making.
  • Organizes, plans, and executes tasks and projects.
  • Innovates and applies skills and knowledge in problem-solving situations.
  • Works individually or with a group to successfully achieve objectives and goals.
  • Adapts to assignment changes on short notice.
  • Provides instruction to others and participates meaningfully in discussions/meetings.
  • Clearly and concisely writes cyber range documents and reports.

 

Travel: Up to 10%

Education, Experience and Certifications

Education:

  • Bachelor’s Degree in Information Technology/Computer Science preferred.  Related field experience preferred.

 

Experience:

  • Networking: Routing, Switching, DNS, Active Directory, VLANs, SANs
  • Virtualization: VM Ware ESXi, Kernel Virtual Manager (KVM)
  • Operating Systems: MS 2003, 2008, 2012, 2016; Windows XP/Vista/7/10; Debian/Red Hat Linux
  • Applications:  Exchange 2007/2010/2012, IIS, SQL Server, Solarwinds Kiwi Syslog
  • Security Appliances/VMs:  PaloAlto, McAfee Network Security IPS, Cisco ASA, E-Policy Orchestrator (Gov HBSS), MetaSploit, Splunk, Sourcefire FirePOWER
  • Office Applications:  MS Office – Word, Excel, PowerPoint; Visio
  • Network vulnerabilities, network attack vectors, attack signatures, and technical mitigation

 

Certifications:

  • None required

 

Security Clearance:

  • Active Secret Security Clearance

Information Assurance/Cyber Security Engineer II

Must have an ACTIVE SECRET security clearance.

Metova is seeking a qualified and highly motivated individual to serve as an Information Assurance/Cyber Security Engineer Level II in support of the Army CIO-G6 Cyber Directorate.

Learn More

Role and Responsibilities

The following specifications are required to successfully deliver the required service and support Company objectives. This individual is encouraged to exceed these minimum responsibilities to demonstrate its technical, operational, and administrative expertise in support of the Company’s organizational and departmental objectives.

Objectives are as follows:

  • Provides technical expertise for Policy, Guidance and Tactics, Techniques, and Procedures (TTP) development
  • Provide technical support in the area of programmatic analyses, studies, briefings, IA training and certification implementation support.
  • Provide technical reviews, as well as analysis of National, Department of Defense (DoD), Joint Staff, and other federal agencies Cybersecurity/IA policies as they relate to Army level policy.
  • Providing technical support to the Government in transitioning to and complying with the DoD and national level policies.
  • Assessing Cybersecurity/IA needs and reporting, which encompasses, managing and organizing data sufficiently to report proposed actionable changes.
  • Providing technical support to the Government in the incorporation of policy into appropriate regulations and pamphlets; in drafting, reviewing, revising and delivering Cybersecurity/IA policy documents to the Cybersecurity Directorate, and in responding to DA Staff, Army Command (AC), ASCC, DRU, PEO, and field units’ oral and written queries regarding Cybersecurity/IA policy.
  • Develop proposed policies and Tactics, Techniques, and Procedures (TTP) in support of the Army’s Defense-in-Depth strategy and the Department of Defense Global Information Grid (GIG) Vision.

 

Responsibilities:

  • Obtaining and analyzing information, assessing its relevance to policy or standards, and identify and relate technical and procedural recommendations.
  • To be knowledgeable of the entire spectrum of Cybersecurity tools and processes to include: intrusion detection, intrusion prevention, eradication tools and procedures; cross-domain solutions and multiple level security solutions; wireless personal electronic devices.
  • Gather and collect information assurance data such as intrusions and incidents
  • Write memorandums for Army implementation of privileged user responsibilities, monitor staffing of document across all Army Commands, review comments submitted and provide government lead with recommendations on accepting or rejecting changes/comments
  • Prepare briefings for Army cybersecurity program managers to implementation studies for manpower and staffing levels within their command.
  • Review historical data on systemic information assurance violations to determine the course of actions to minimize recurrence of the violations and provide information paper for leadership on findings.

 

Physical Demands:

  • Normal demands associated with an office environment.
  • Ability to work on a computer for long periods of time.
  • Ability to communicate with individuals by telephone, email, and face to face.
  • Some travel may be required.

Requirements

  • Maintain a current and final SECRET clearance.
  • Minimum five (5) years of experience as an Information Assurance Engineer
  • Bachelor’s Degree or higher from an accredited college or university in IT, Computer Science, Cybersecurity, Computer Engineering, or related discipline.
  • Master’s Degree may be substituted for one (1) year of relevant experience.
  • A minimum of DOD 8570 IAM Level II Information Assurance Certification required (CompTIA Sec+ or equivalent).

Live Experimentation – Cyber Systems Analyst

Full time Position at the Cyber Battle Lab, Fort Gordon, GA.

Metova Federal, LLC is seeking a qualified and highly motivated individual for a Live Experimentation – Cyber Systems Analyst position at Fort Gordon, Georgia.

Learn More

Role and Responsibilities

The following specifications are required to successfully deliver the required service and support company objectives. The individual is encouraged to exceed these minimum responsibilities to demonstrate its technical, operational, and administrative expertise in support of company’s organizational and departmental objectives.

 

The Live Experimentation – Cyber Systems Analyst will work closely with TRADOC Capability Manager CYber (TCM-CYBER) to inform the development and validation of requirements within the Joint Capabilities Integration Development System (JCIDS).   Qualified candidates must have the ability to think tactically, and strategically to evaluate future capabilities as well as provide solutions to current problems, based upon operational Cyber Warfare Experience.  Position responsibilities and expected duties will include, but will not be limited to:

  • Solicit industry/academia for cyber capability solutions based on guidance from PdM DCO.
  • Coordinate and conduct evaluations/assessments of technologies.
  • Analyst will explore current Army CW posture, determine needs, assess risks, vulnerabilities, and recommend countermeasures.
  • Analysts will employ a thorough understanding of the tenets of Cyber Network Operations (CNO), and know how to optimally use all CNO resources for “effects-based” cyber warfare.
  • Analysts will evaluate CNO capabilities that will deliver tactical, operational, and strategic advantages.
  • Coordinate with appropriate stakeholders (i.e. Cyber Protection Brigade (CPB), TCM Cyber) for related assessments/evaluations.
  • Analyst will inform development and validation of requirements through experimentation independently or in coordination with TCM-Cyber and CPB.
  • Augment the existing PdM DCO team when necessary.
  • Produce written reports/evaluations/assessments as necessary.
  • Research emerging technologies that address gaps/shortfalls in cyber operations.
  • Participate in routine meetings as an extension of the PdM DCO team.
  • Develop experimentation/test plans.
  • Provide dedicated exercise support to represent PdM initiatives in experimentation events such as Cyber Quest, Cyber Blitz, NIE, etc.
  • Support capability development events conducted by the Forge as necessary.
  • Provide quarterly (minimum) updates to PdM DCO for work performed and ongoing/future projects.
  • Daily interaction with extended PdM DCO team at CPB.
  • Must be knowledgeable and anticipate working with Commercial Networks as well as Military Tactical and Enterprise networks.
  • Analyst shall plan, lead, and/or coordinate meetings as needed to ensure completion of all project objectives.

Clearance, Education, Experience and Certification Requirements

  • BS Degree in Computer Science or Computer Engineering from an accredited institution.  Coursework shall include computer programming (e.g., Fundamentals of Programming, Computer Forensics) and coding (e.g., C, C++, Python, Java).   Equivalent job experience will be considered.
  • 5 – 10 years prior military experience and/or significant civilian occupational experience in Cyber Warfare including, but not exclusively, computer programming, software design, cyber security (defensive or offensive), and cyber forensics.
  • Possess strong oral communication and writing skills.
  • SECRET clearance (TS preferred).
  • Intermediate/Advanced understanding of Defensive Cyber Operations (required).
  • Intermediate/Advanced understanding of CPT/CPB operations (preferred).
  • Basic understanding of the Risk Management Framework (RMF) documentation process.
  • Advanced understanding and hands on experience with virtualization technologies (required).
  • Advanced understanding of computer Hardware (Servers, Workstations, and Laptops) (required).
  • Experience or working knowledge on evaluating and or assessing cyber technologies to include establishing and applying logical steps toward determining their operational benefit.
  • Certifications that would be beneficial in this role include:  CISSP, Global Industrial Cyber Security Professional (GICSP), GIAC Enterprise Defender (GCED), GIAC Information Security Professional (GISP).

Cyber Operations Specialist

Metova is seeking qualified and highly motivated individuals to serve as a Cyber Operations Specialist at Scott, AFB.

This position requires an ACTIVE SECRET security clearance

Learn More

Role and Responsibilities

Qualified personnel will serve in dual capacities as Air Force Cyber Protection Team (CPT) Operators and Subject Matter Experts (SMEs) as part of the Air Force’s CPT organizations at Scott AFB, IL. CPT Operators and SMEs will serve as Cybersecurity, Network Infrastructure and Systems Architecture experts in conducting global cyberspace operations to deter, disrupt, and defeat adversary cyberspace operations in order to defend U.S., DoD, and Air Force critical infrastructure and key resources.

In the Operator role, qualified personnel will serve on CPT Squads in providing expertise in collecting, analyzing, and assessing network and systems cybersecurity posture and providing DoD and AF leadership with risk mitigation strategies and defense plans to protect and defend vital missions. As SMEs, qualified personnel will serve as technical experts in managing CPT training and testing environments, developing and maintaining CPT tools and techniques, conducting standardized training, and providing critical analyses and best practice support for evolving CPT mission needs. Qualified personnel will have experience and expertise in security best practices, vulnerability analysis, network defense tactics and techniques, and network and application performance resolution.

Skill Requirements:

Networking: DNS, Active Directory, Firewalls, Routers, Access Control Lists, NAT, Switches/VPNs

Cybersecurity: Nessus/ACAS, HBSS, Metasploit, Wireshark, NMAP, Security Onion, SNORT

Operating Systems: Windows, Unix/Linux, Red Hat, Kali, VMWare

 Analysis and Mitigation

  • Provide risk assessment of identified vulnerabilities and provide impact statements
  • Assess identified vulnerabilities and provide recommendations for mitigation and remediation

General

  • Complete tasks in a timely fashion.
  • Adhere to all defined guidelines and procedures in performance of duties.
  • Present clear, comprehensive recommendations for decision-making.
  • Organize, plan, and execute tasks and projects.
  • Innovate and apply skills and knowledge in problem solving situations.
  • Work individually or with a group to successfully achieve objectives and goals.
  • Adapt to assignment changes on short notice.
  • Provide instruction to others and participate meaningfully in discussions/meetings.

Education and Certifications

  • Requirements:

 

– 5 years experience in cybersecurity, network infrastructure or systems architecture

 

Certifications:

PREFERRED SKILLS (Select from one of the 3 groups):

Cybersecurity

o Experience in vulnerability management and scanning, host based security systems, intrusion detection/protection systems, DNS, wireless technologies, and boundary protection solutions

o At least one of the following certifications: CCNP, MCSE:SI, RHCE, GWAPT, GWEB

Network Infrastructure

o Experience in network infrastructure including routers, switches, network management solutions, network  access solutions, firewalls, virtualization solutions, and virtual private network solutions

o At least one of the following certifications: CCNP, GPEN

Systems Architecture

o Experience in Microsoft and/or Unix-like operating systems, host based security systems, DNS, DHCP, group policy, vulnerability management, patch management, antivirus, antivirus solutions, and virtualization solutions

o At least one of the following certifications: MCSE:SI, MCSE:DP, MCSE:BI

Cyber Range Engineer III

This position is 80% travel.

Metova is seeking a qualified and highly motivated individual to serve as a Cyber Range Engineer III

Learn More

Role and Responsibilities

Performs as a member of a cyber range engineering team at various on-site locations, charged with the integration, system management and configuration, operation, testing, and scheduling of Cyber Training Simulators.  Will maintain and update simulator designs, integrate hardware and software, determine baseline configurations for training classes and cyber exercises, and assist with maintaining the system’s Authority to Operate. Develop training scenarios to meet the training qualification requirements for Initial Qualification Training and Mission Qualification Training.  Configures and tests existing/legacy images of virtualized enclaves for integration into the system. Maintains and updates local design documents and configurations.  Works with the Air Force Program Office and Technical Engineers on the evolution of the system’s design and capabilities based on Air Force cyber training needs and the cyber weapon system baseline.  Trains the Operational Units on how to use and configure the system.Skill Requirements:

Networking: Routing, switching, DNS, Active Directory, VPNs, VLANs, SANs

Virtualization: KVM, VM Ware

Operating Systems: MS Server, Linux, Windows

Infrastructure:  Cisco, Juniper, Vyatta

Applications:  Exchange, E-Policy Orchestrator, Snort, Whats-Up-Gold, SQL Server, Symantec Mail Relay

Security Appliances:  Sidewinder-McAfee Enterprise Firewall, Cisco ASA and SSM, BlueCoat Proxy, McAfee Instrushield, Palo-Alto Firewall

Documentation:

  • Process – Generates comprehensible documentation for reference by other engineers, developers, etc. that complies with company standards.
  • Testing – Generates test plans and test cases for integration and system testing
  • External – Produces design documentation and build guides for entities outside the company (customers) that are professional.

Testing:

  • Performs integration testing of simulator components as necessary.
  • Accomplishes integration and/or validation testing on simulators when assigned.
  • Performs operational test and evaluation for finished cyber ranges at company and customer sites

Analysis and Design:

  • Generates and documents simulator designs which comply with requirements specifications.
  • Accurately determines effort and time that will be required to resolve tasks and design requirements.

General:

  • Completes tasks in a timely fashion.
  • Adheres to all defined guidelines and procedures in performance of duties.
  • Presents clear, comprehensive recommendations for decision-making.
  • Organizes, plans, and executes tasks and projects.
  • Innovates and applies skills and knowledge in problem-solving situations.
  • Works individually or with a group to successfully achieve objectives and goals.
  • Adapts to assignment changes on short notice.
  • Provides instruction to others and participates meaningfully in discussions/meetings.
  • Clearly and concisely writes cyber range documents and reports.

Travel:  Up to 80%

Education and Certifications

Education:

  • Bachelors Degree Information Technology/Computer Science related field with 4 years of experience or Associates Degree in Information Technology/Computer Science related field with 7 years of experience (MANDATORY)

Certifications:

  • Security+ or another approved DoD 8570.01-M IAT II Certification (MANDATORY)
  • One or more of the following technical certification(s): Cisco Certified Network Associate (CCNA); Cisco Certified Network Professional (CCNP); Cisco Certified Security Professional (CCSP); Microsoft Certified Systems Engineer (MCSE); Certified Ethical Hacker (CEH) (MANDATORY)
  • Experience: (in four of the following areas)– Networking: Routing, Switching, DNS, Active Directory, VPNs, VLANs, SANs, PKI– Virtualization: VM Ware ESXi, Kernel Virtual Manager (KVM)– Operating Systems: MS 2003, 2008, 2012; Windows XP/Vista/7/10; Debian/Red Hat Linux– Applications:  Exchange 2007/2010/2012, IIS, SQL Server, Solarwinds Kiwi Syslog; NetIQ Sentinel Log Manager— Security Appliances/VMs:  McAfee Network Security IPS, Cisco ASA, E-Policy Orchestrator (Gov HBSS), Nessus (Gov’t ACAS), MetaSploit, Splunk, Sourcefire FirePOWER— Office Applications:  MS Office – Word, Excel, PowerPoint; Visio— Network vulnerabilities, network attack vectors, attack signatures, and technical mitigation— Security Test & Evaluation/Continuous Monitoring for DIACAP/Risk Management Framework
  • Knowledge of Air Force cyber mission force operations and the Air Force cyber weapons (DESIRED)is a plus.
  • Able to lift 50 lbs (MANDATORY)
  • MUST HAVE TS/SCI

Cyber Range Engineer

2 Positions at Lackland AFB, TX

Must have an ACTIVE TS/SCI security Clearance

Metova is seeking a qualified and highly motivated individual to serve as a Cyber Range Engineer

Learn More

Role and Responsibilities

Performs as a member of a cyber range engineering team on-site at Joint Base San Antonio – Lackland AFB and Scott AFB charged with the integration, system management and configuration, operation, testing, and scheduling of the Air Force Defense Cyber Training Simulators.  Will maintain and update simulator designs, integrate hardware and software, determine baseline configurations for training classes and cyber exercises, and assist with maintaining the system’s Authority to Operate. Develop training scenarios to meet the training qualification requirements for Initial Qualification Training and Mission Qualification Training.  Configures and tests existing/legacy images of virtualized enclaves for integration into the system. Maintains and updates local design documents and configurations.  Works with the Air Force Program Office and Technical Engineers on the evolution of the system’s design and capabilities based on Air Force cyber training needs and the cyber weapon system baseline.  Trains the Operational Units on how to use and configure the system.Skill Requirements:

Networking: Routing, switching, DNS, Active Directory, VPNs, VLANs, SANs

Virtualization: KVM, VM Ware

Operating Systems: MS Server, Linux, Windows

Infrastructure:  Cisco, Juniper, Vyatta

Applications:  Exchange, E-Policy Orchestrator, Snort, Whats-Up-Gold, SQL Server, Symantec Mail Relay

Security Appliances:  Sidewinder-McAfee Enterprise Firewall, Cisco ASA and SSM, BlueCoat Proxy, McAfee Instrushield, Palo-Alto Firewall

Documentation:

  • Process – Generates comprehensible documentation for reference by other engineers, developers, etc. that complies with company standards.
  • Testing – Generates test plans and test cases for integration and system testing
  • External – Produces design documentation and build guides for entities outside the company (customers) that are professional.

Testing:

  • Performs integration testing of simulator components as necessary.
  • Accomplishes integration and/or validation testing on simulators when assigned.
  • Performs operational test and evaluation for finished cyber ranges at company and customer sites

Analysis and Design:

  • Generates and documents simulator designs which comply with requirements specifications.
  • Accurately determines effort and time that will be required to resolve tasks and design requirements.

General:

  • Completes tasks in a timely fashion.
  • Adheres to all defined guidelines and procedures in performance of duties.
  • Presents clear, comprehensive recommendations for decision-making.
  • Organizes, plans, and executes tasks and projects.
  • Innovates and applies skills and knowledge in problem-solving situations.
  • Works individually or with a group to successfully achieve objectives and goals.
  • Adapts to assignment changes on short notice.
  • Provides instruction to others and participates meaningfully in discussions/meetings.
  • Clearly and concisely writes cyber range documents and reports.

Travel:  Up to 10%

Education and Certifications

Education:

  • Bachelors Degree Information Technology/Computer Science related field with 4 years of experience or Associates Degree in Information Technology/Computer Science related field with 7 years of experience (MANDATORY)

Certifications:

  • Security+ or another approved DoD 8570.01-M IAT II Certification (MANDATORY)
  • One or more of the following technical certification(s): Cisco Certified Network Associate (CCNA); Cisco Certified Network Professional (CCNP); Cisco Certified Security Professional (CCSP); Microsoft Certified Systems Engineer (MCSE); Certified Ethical Hacker (CEH) (MANDATORY)
  • Experience: (in four of the following areas)– Networking: Routing, Switching, DNS, Active Directory, VPNs, VLANs, SANs, PKI– Virtualization: VM Ware ESXi, Kernel Virtual Manager (KVM)– Operating Systems: MS 2003, 2008, 2012; Windows XP/Vista/7/10; Debian/Red Hat Linux– Applications:  Exchange 2007/2010/2012, IIS, SQL Server, Solarwinds Kiwi Syslog; NetIQ Sentinel Log Manager— Security Appliances/VMs:  McAfee Network Security IPS, Cisco ASA, E-Policy Orchestrator (Gov HBSS), Nessus (Gov’t ACAS), MetaSploit, Splunk, Sourcefire FirePOWER— Office Applications:  MS Office – Word, Excel, PowerPoint; Visio— Network vulnerabilities, network attack vectors, attack signatures, and technical mitigation— Security Test & Evaluation/Continuous Monitoring for DIACAP/Risk Management Framework
  • Knowledge of Air Force cyber mission force operations and the Air Force cyber weapons (DESIRED)is a plus.
  • Able to lift 50 lbs (MANDATORY)
  • MUST HAVE TS/SCI

Network Engineer II

Must have an Secret security Clearance

Metova is seeking a qualified and highly motivated individual to serve as a Network Engineer II

Learn More

Role and Responsibilities

Performs as a member of a network and systems engineering team charged with the design, integration, production, testing, and installation of network simulators and associated support systems (cyber weapon systems, secure network nodes, video distribution systems).  Provides support to develop and enhance virtual training environments and interconnection and maintenance to associated support systems. Environments will be utilized to teach doctrine and TTPS during simulated defensive cyberoperations. This effort will require the use of training architectures and networks to maintain Information Assurance compliance and promote interoperability.

Conducting system integration, installation, and testing needed to deliver the Digital Distributed Video Collaboration System (DDVCS). Primary Metova representative to customers using the DDVCS.  Requires 24-hour on-call support based on customer exercise and training schedules. Stay current with DDVCS technology and manufacturer’s product update. Visits customer sites to do all initial installs, troubleshoot maintenance issues and restore system operations, and update systems software/hardware.  Supports the development, testing, installation, and maintenance of the CENTS® product like as required.

Education and Certifications

Education: Awarded or pursuing Bachelor’s Degree Information Technology/Computer Science preferred.  Networking and IT field experience is mandatory.

Certifications:  None required

Experience: 3 years experience in the following disciplines:

— Networking

— Operating Systems: (Windows 10 is must)

— Applications and Systems: Vidyo Teleconferences and Infocus Collaboration Tool

— Security Appliances/VMs:  Security boundaries and secure configurations

— Office Applications:  MS Office 2016

Engineering

  • Well-rounded engineer capable of configuring operating systems and video appliances
  • Understanding of application protocols (ping, dns, ssh, smtp, ntp, https, etc)
  • Ability to quickly diagnose network connectivity issues and video collaboration issue
  • Ability to train customers how to use the video collaboration system

 

Documentation

  • Process – Generates comprehensible documentation for reference by other engineers, developers, etc. that complies with company standards.
  • External – Produces design documentation and build guides for entities outside the company (customers) that are professional.

 

Testing

  • Performs operational test and evaluation at customer sites
  • Performs testing video system at customer site integrated with simulators

 

Analysis and Design

  • Generates and documents interconnection of video collaboration system with the simulator which comply with requirements specifications.
  • Accurately determines effort and time that will be required to resolve trouble tickets/tasks.

 

General

  • Completes tasks in a timely fashion with little or no supervision.
  • Adheres to all defined guidelines and procedures in performance of duties.
  • Presents clear, comprehensive recommendations for decision-making.
  • Organizes, plans, and executes tasks and projects.
  • Innovates and applies skills and knowledge in problem solving situations.
  • Works individually or with a group to successfully achieve objectives and goals.
  • Adapts to assignment changes on short notice.
  • Provides instruction to others and participates meaningfully in discussions/meetings.
  • Clearly and concisely writes cyber range documents and reports.

 

Travel:  Up to 65%

Submit your cover letter, resume, and requested position