Employment

At Metova, our employees are our most valuable asset. Metova is for professional people who want to exceed. Metova is designed around team members who want to make a difference in shaping the company’s future and who can expect fair rewards for doing superior work. Taking care of people is our number one initiative to ensure success.

Metova is commited to creating a diverse environment and is proud to be an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, gender, sexual orientation, national origin, age, or veteran status.”

– John Adams, CEO

Current Metova Job Opportunities

Cyber Defense Network Support Technician

Full time Positions at Scott AFB and Lackland AFB.

Metova is seeking qualified and highly motivated individuals for Cyber Defense Network Support Technician positions at Scott AFB (1 position) and Lackland AFB (1 position).

Learn More

Role and Responsibilities

The following specifications are required to successfully deliver the required service and support company objectives. The individual is encouraged to exceed these minimum responsibilities to demonstrate its technical, operational, and administrative expertise in support of company’s organizational and departmental objectives.

Objectives are as follows to support the Cyberspace Vulnerability Assessment/Hunter (CVA/H) Weapon System (WS) Maintenance Support Services (MSS) contract :

  • The qualified Network Support Technicians will serve as Cyber Defense Network Support Technicians and will provide hardware and software maintenance support for the Cyberspace Vulnerability Assessment/Hunter (CVA/H) and the Information Operations – Fly-away Kits (IOP FAKs) for the Air Force’s Cyber Protection Teams (CPTs).
  • Additionally, the Network Support Technicians will also perform hardware and software administrator duties, and provide maintenance support to CPTs and IOP FAKs located at multiple stateside locations.
  • The Network Support Technicians will respond to first-line customer requests such as user account issues, configuration issues, regular/scheduled maintenance and other touch maintenance functions.
  • The Network Support Technicians will use software and hardware tools to identify and diagnose problems affecting network and mission systems performance.
  • The environments typically include a mixture of platforms to include Windows and LINUX based operating systems.

Preferred Skills

  • Cybersecurity:  Experience in vulnerability management and scanning, host based security systems, intrusion detection/protection systems, DNS, wireless technologies, and boundary protection solutions.
  • Network Infrastructure:  Experience in network infrastructure including routers, switches, network management solutions, network access solutions, firewalls, virtualization solutions, and virtual private network solutions.
  • Systems Sustainment:  Experience in Microsoft and/or Unix-like operating systems, host based security systems, DNS, DHCP, group policy, vulnerability management, patch management, antivirus, antivirus solutions, and virtualization solutions.

Education and Certifications

  • (Mandatory): TOP SECRET security clearance is required, applicants must already have a fully adjudicated active clearance.
  • (Mandatory): 3+ years’ experience in cybersecurity, network infrastructure or systems architecture
  • (Mandatory): DoD 8570 IAT L2 or L3
  • (Mandatory): Applicants must have three of the following certifications – MS Windows 2012, MCP for SQL Admin, CCDA, VCAP5-Data Center, Blade Server experience, Cloudshield CS-2000 and CS-4000 certification, SAN and NAS experience, RHCE, and LINUX Professional Certification (LPIC-2)

Information Assurance/Cyber Security Engineer II

Full-time Position at Fort Belvoir, Virginia.

Metova is seeking a qualified and highly motivated individual to serve as an Information Assurance/Cyber Security Engineer Level II in support of the Army CIO-G6 Cyber Directorate.

Learn More

Role and Responsibilities

The following specifications are required to successfully deliver the required service and support Company objectives. This individual is encouraged to exceed these minimum responsibilities to demonstrate its technical, operational, and administrative expertise in support of the Company’s organizational and departmental objectives.

Objectives are as follows:

  • Provides technical expertise for Policy, Guidance and Tactics, Techniques, and Procedures (TTP) development
  • Provide technical support in the area of programmatic analyses, studies, briefings, IA training and certification implementation support.
  • Provide technical reviews, as well as analysis of National, Department of Defense (DoD), Joint Staff, and other federal agencies Cybersecurity/IA policies as they relate to Army level policy.
  • Providing technical support to the Government in transitioning to and complying with the DoD and national level policies.
  • Assessing Cybersecurity/IA needs and reporting, which encompasses, managing and organizing data sufficiently to report proposed actionable changes.
  • Providing technical support to the Government in the incorporation of policy into appropriate regulations and pamphlets; in drafting, reviewing, revising and delivering Cybersecurity/IA policy documents to the Cybersecurity Directorate, and in responding to DA Staff, Army Command (AC), ASCC, DRU, PEO, and field units’ oral and written queries regarding Cybersecurity/IA policy.
  • Develop proposed policies and Tactics, Techniques, and Procedures (TTP) in support of the Army’s Defense-in-Depth strategy and the Department of Defense Global Information Grid (GIG) Vision.

 

Responsibilities:

  • Obtaining and analyzing information, assessing its relevance to policy or standards, and identify and relate technical and procedural recommendations.
  • To be knowledgeable of the entire spectrum of Cybersecurity tools and processes to include: intrusion detection, intrusion prevention, eradication tools and procedures; cross-domain solutions and multiple level security solutions; wireless personal electronic devices.
  • Gather and collect information assurance data such as intrusions and incidents
  • Write memorandums for Army implementation of privileged user responsibilities, monitor staffing of document across all Army Commands, review comments submitted and provide government lead with recommendations on accepting or rejecting changes/comments
  • Prepare briefings for Army cybersecurity program managers to implementation studies for manpower and staffing levels within their command.
  • Review historical data on systemic information assurance violations to determine the course of actions to minimize recurrence of the violations and provide information paper for leadership on findings.

 

Physical Demands:

  • Normal demands associated with an office environment.
  • Ability to work on a computer for long periods of time.
  • Ability to communicate with individuals by telephone, email, and face to face.
  • Some travel may be required.

Requirements

  • Maintain a current and final SECRET clearance.
  • Minimum five (5) years of experience as an Information Assurance Engineer
  • Bachelor’s Degree or higher from an accredited college or university in IT, Computer Science, Cybersecurity, Computer Engineering, or related discipline.
  • Master’s Degree may be substituted for one (1) year of relevant experience.
  • A minimum of DOD 8570 IAM Level II Information Assurance Certification required (CompTIA Sec+ or equivalent).

Database Security Analyst

Full time Position at Scott Air Force Base.

Metova is seeking a qualified and highly motivated individual for a Database Security Analyst position at Scott Air Force Base, IL.

Learn More

Role and Responsibilities

The following specifications are required to successfully deliver the required service and support company objectives. The individual is encouraged to exceed these minimum responsibilities to demonstrate its technical, operational, and administrative expertise in support of company’s organizational and departmental objectives.

Participates in the design, creation, and maintenance of computerized databases. Responsible for the quality control and auditing of databases to ensure accurate and appropriate use of data. Works with management to develop database strategies to support organization requirements. Consults with and advises users on access to various databases. Works directly with users to resolve data conflicts and inappropriate data usage. Directs the maintenance and use of the corporate data dictionary.

The Database Analyst is responsible to the Site Lead for providing expertise on Oracle and SQL-based systems.  This person must be able to assess, provide recommendations for mitigation and remediation, align security policies within the environment with government directives, identify and implement security controls and gather findings for artifacts for the DoD RMF process for several tenant programs under the cognizance of our customer.  The applicant also must be knowledgeable about DoD DIACAP and RMF processes for gathering artifacts.

Preferred Skills

Certification and Accreditation:  Risk Management Framework

Operating Systems and Applications: Oracle, SQL

Documentation

  • Process – Generates comprehensible documentation for reference by other analysts and team members, etc. that complies with government standards.
  • Testing – Generates test plans and test cases for RMF and system testing
  • External – Assists in generating ATOs for deployable systems

Testing

  • Performs RMF testing of system components as necessary.
  • Accomplishes validation testing on systems when assigned.

Analysis and Mitigation

  • Provide risk assessment of identified vulnerabilities and provide impact statements
  • Assess identified vulnerabilities and provide recommendations for mitigation and remediation

General

  • Complete tasks in a timely fashion.
  • Adhere to all defined guidelines and procedures in performance of duties.
  • Present clear, comprehensive recommendations for decision-making.
  • Organize, plan, and execute tasks and projects.
  • Innovate and apply skills and knowledge in problem solving situations.
  • Work individually or with a group to successfully achieve objectives and goals.
  • Adapt to assignment changes on short notice.
  • Provide instruction to others and participate meaningfully in discussions/meetings.
  • Clearly and concisely write RMF artifacts, documents, and reports.

Education and Certifications

Required: Bachelor’s degree + 2 years’ experience (Or 6 years’ experience with 4 years specialized experience.

Required: Certified Data Management Professional (CDMP) or an equivalent certification with database fundamentals.

Desired: Experience with Fortify and WebInspect.Education: Bachelor’s degree and two (2) years related experience, or six (6) years applicable experience, which should include four (4) years specialized experience.

Certifications:  OCP or equivalent certification; CDMP or equivalent; CompTIA Security+ or equivalent DoD 8570 IAT 2

Desired Experience:

Hands On Experience with Sun Java web/app servers, Oracle Database and Oracle app servers.

Hands On Experience with SQL

Hands On Experience in validating DISA STIGS and IAVAs

Security Clearance:  SECRET Security clearance required

Solaris/Unix and Database Systems (GSA – Senior Systems Engineer)

Full time Position at Scott AFB.

Metova is seeking a qualified and highly motivated individual for a Senior Systems Engineer position at Scott AFB.

Learn More

Role and Responsibilities

GSA Schedule 70 IT Description:

Under general supervision, performs duties such as site surveys, architecture design, system evaluation, system analysis, and infrastructure assessment. Performs duties on tasks that require expertise in system/processor architecture, wired for management baseline, desktop management interface, SNMP, client/server architecture, operating systems, software applications, network protocols, routers, switches, remote access servers, and firewalls.

 

GSA Schedule 70 IT Education/Experience:

Bachelor’s Degree and 2 years related experience, or 4 years applicable experience which should include 2 years specialized experience.

Education and Certifications

  • (Required): SECRET security clearance is required, applicants must already have a fully adjudicated active clearance.
  • (Required): 8570 IAT 2
  • (Required): Oracle Certified Professional (OCP) or an equivalent certification with Unix-based systems.
  • (Required): Certified Data Management Professional (CDMP) or an equivalent certification with database fundamentals.
  • (Required): BS Degree + 2 Years Experience (Or 4 Years Experience)
  • (Preferred): Experience with Solaris 10/11 with virtualization. Sun Java web/app servers, Oracle Database and Oracle app servers.
  • (Preferred): Experience with DISA STIGS and IAVAs

Microsoft / Systems Security Analyst

1 Full time position at Scott Air Force Base, Illinois.

Metova is seeking qualified and a highly motivated individual for a Microsoft/Systems Security Analyst position at Scott Air Force Base.

Learn More

Role and Responsibilities

The following specifications are required to successfully deliver the required service and support company objectives. The individual is encouraged to exceed these minimum responsibilities to demonstrate its technical, operational, and administrative expertise in support of company’s organizational and departmental objectives.

 

Under general direction, responsible for activities related to system administration. Assigns personnel to various projects, directs their activities, and evaluates their work. Ensures long-term requirements of systems operations and administration are included in the overall information systems planning of the organization. Responsible for the installation, maintenance, configuration, and integrity of computer software. Implements operating system enhancements that will improve the reliability and performance of the system.

Preferred Skills

Must have experience in the following areas:

Desired: Experience with VMWare

Desired: Experience with DISA STIGS and IAVAs

Desired: Experience with Microsoft SQL database, Microsoft Internet Information Services (MS IIS)

Education and Certifications

Education/Experience: Bachelor’s Degree and 2 years related experience, or 4 years applicable experience which should include 2 years specialized experience.

  1. Required: SECRET Clearance
  2. Required: 8570 IAT 2
  3. Required: Microsoft Certified Solutions Associate (MCSA) or an equivalent certification

Network / Data Engineer

Full time Position at the Cyber Battle Lab, Fort Gordon, GA.

Metova is seeking a qualified and highly motivated individual for a Network/Data Engineer position at Fort Gordon, Georgia.

Learn More

Role and Responsibilities

The following specifications are required to successfully deliver the required service and support company objectives. The individual is encouraged to exceed these minimum responsibilities to demonstrate its technical, operational, and administrative expertise in support of company’s organizational and departmental objectives.

The Network / Data Engineer will be required to install, configure, operate and maintain routing and switching equipment associated with the BLCSE WAN service delivery point providing 90% network availability during normal duty hours and annual TRADOC approved experimentation events.  The install, configure operate and maintain (ICOM) includes the Generic Routing Encapsulation (GRE)  tunnels, multicast implementations, Multiprotocol Label Switching (MLS), Quality of Service implementations and necessary IP address definition and routing to support the BLCSE.  The contractor shall support network based collaborations through the Multipoint Control Unit (MCU)/ IPVC and Call Manager software.  The Network / Data Engineer will be responsible for maintaining and updating the Voice over Internet Protocol (VoIP) phone database and the Call Manager software, Intrusion Prevention/Protection Systems, Firewalls, penetration tools, and Network Monitoring and Operations Tools.  Additionally, the Network / Data Engineer will be required to schedule, monitor, and troubleshoot the secure video teleconferences (VTC) on the BLCSE distributed network providing 90% network availability during normal duty hours and annual TRADOC approved experimentation events..  The network engineer must be able to design, develop and implement extended network enclaves based upon rapidly changing experimentation requirements to support the BLCSE Community of Practice.  The Network / Data Engineer will verify that all network monitoring systems have been updated after any changes on the network have been made.  The Network / Data Engineer will be required to install, configure, operate and maintain the automated information systems required for 90% availability of the NOSC Network.  The Network / Data Engineer will ensure that all information and operating systems, collaborative services, and supporting applications are updated as needed with the latest government approved versions, and recommended information assurance patches and anti-virus releases.  All systems will be tested no less than 48 hours prior to and after any updates are applied to information and operating systems, collaborative services, and supporting applications to verify that the information system and the network it is connected to are operational.

Education and Certifications

  • On day one, must provide verification of DoD 8570.01 / DoD 8140 IAT level II baseline certification requirements (CCNA Security (preferred) or GSEC or Security+CE or SSCP). All required certifications must be maintained and updated as needed.
  • On day one, must have certification in CCNP R&S, (full CCNP preferred). Required certifications must be maintained and updated as needed.
  • Within six months of task order start date, at least one CME in the BLCSE must provide verification of Cisco Certified Network Professional Collaboration; all other Network / Data Engineers in the BLCSE shall provide verification of either (1) CCNP R&S certification; or (2) certificate of completion in CCNP TSHOOT 2015 Video Boot Camp from Udemy. All required certifications must be maintained and updated as needed.
  • A minimum of five (5) years’ experience or equivalent in network operational environment consisting of multiple Cisco devices, including Routers, Switches, and Firewalls.
  • Must possess expert knowledge and skills with inline encryption devices (e.g., TACLANEs).
  • Must possess expert knowledge and skills on VoIP and secure VTC services.
  • Must be competent in the use of network monitoring systems and troubleshooting techniques.
  • Must possess expert knowledge on Network Management Systems and Software Cisco Call Manager, Syslog, Solarwinds, GEMx, SNMPc, and Cisco Security Manager at a minimum.
  • Must possess expert knowledge on Network Management Systems and Software Cisco Call Manager, Syslog, Solarwinds, GEMx, SNMPc, and Cisco Security Manager at a minimum.
  • Must be able to obtain/maintain a Top Secret security clearance with SCI eligibility.

Cyber Security Analyst – Level 2

Full time Position located at  Fort Belvoir, Virginia.

Metova is seeking a qualified and highly motivated individual to serve as a Cyber Security Analyst/Information Assurance Engineer-Level II in support of the Army CIO-G6 Task 1.

Learn More

Major Responsibilities include (not all inclusive)

Under indirect supervision, performs analysis of systems, programs, and/or planning activities. Duties include the development of policies, procedures, and other technical documentation and the analysis of IA / Cyber related programs and initiatives. Duties may also include the design, development, and coordination of relationships and solutions to resolve problems within the specialty area. The position requires substantial knowledge of advanced theory and current practices in cybersecurity utilizing analytical skills.

Responsibilities include but are not limited to:

  • Providing technical support in the area of programmatic analyses, studies, briefings, IA training and certification implementation support, and technical reviews, as well as analysis of National, Department of Defense (DoD), Joint Staff, and other federal agencies Cybersecurity/IA policies as they relate to Army level policy. Specifically:
  • Providing technical support to the Government in transitioning to and complying with the DoD and national level policies.
  • Assessing Cybersecurity/IA needs and reporting (managing and organizing data sufficiently to report proposed actionable changes)
  • Providing technical support to the Government in the incorporation of policy into appropriate regulations and pamphlets; in drafting, reviewing, revising, and delivering Cybersecurity/IA policy documents to the Cybersecurity Directorate, and in responding to DA Staff, Army Command (AC), ASCC, DRU, PEO, and field units’ oral and written queries regarding Cybersecurity/IA policy.
  • Developing proposed policies and Tactics, Techniques, and Procedures (TTP) in support of the Army’s Defense-in-Depth strategy and the Department of Defense Global Information Grid (GIG) Vision. The Defense-in-Depth strategy must provide a seamless interface between the institutional and operational networks. The support includes:
  • Obtaining and analyzing information, assessing its relevance to policy or standards, and identify and relate technical and procedural recommendations.
  • Knowledge required of the entire spectrum of Cybersecurity tools and processes to include: intrusion detection, intrusion prevention, eradication tools and procedures; cross-domain solutions and multiple level security solutions; wireless personal electronic devices.
  • Gathering and collecting information assurance data such as intrusions and incidents across the Army and the Department of Defense, and the National Security Agency as required to formulate and implement Army Cybersecurity/IA policy.

Physical Demands:

  • Normal demands associated with an office environment.
  • Ability to work on a computer for long periods of time.
  • Ability to communicate with individuals by telephone, email and face to face.
  • Some travel may be required.

Qualified candidates will have

Maintain a current and final SECRET clearance.

  • Deep understanding of both DIACAP and RMF
  • Cloud Experience
  • Policy experience in the DoD arena, preferably Army
  • Knowledgeable of applicable policies and regulations governing IA
  • Minimum five (5) years of experience in Information Assurance or CyberSecurity
  • Bachelor’s Degree preferred or higher from an accredited college or university in IT, Computer Science, Cybersecurity, Computer Engineering, or related discipline.
  • Master’s Degree may be substituted for one (1) year of relevant experience.
  • A minimum of DOD 8570 IAM Level II Information Assurance Certification required (CompTIA Sec+ or equivalent).

Cyber Operations Specialist

Full time position located at Scott Air Force Base, Illinois.

 

Metova is seeking a qualified and highly motivated individual to serve as a Cyber Operations Specialist.

Learn More

Role and Responsibilities

The following specifications are required to successfully deliver the required service and support company objectives. The individual is encouraged to exceed these minimum responsibilities to demonstrate its technical, operational, and administrative expertise in support of company’s organizational and departmental objectives.

 

Qualified personnel will serve in dual capacities as Air Force Cyber Protection Team (CPT) Operators and Subject Matter Experts (SMEs) as part of the Air Force’s CPT organizations at Scott AFB, IL. CPT Operators and SMEs will serve as Cybersecurity, Network Infrastructure and Systems Architecture experts in conducting global cyberspace operations to deter, disrupt, and defeat adversary cyberspace operations in order to defend U.S., DoD, and Air Force critical infrastructure and key resources.

In the Operator role, qualified personnel will serve on CPT Squads in providing expertise in collecting, analyzing, and assessing network and systems cybersecurity posture and providing DoD and AF leadership with risk mitigation strategies and defense plans to protect and defend vital missions. As SMEs, qualified personnel will serve as technical experts in managing CPT training and testing environments, developing and maintaining CPT tools and techniques, conducting standardized training, and providing critical analyses and best practice support for evolving CPT mission needs. Qualified personnel will have experience and expertise in security best practices, vulnerability analysis, network defense tactics and techniques, and network and application performance resolution.

Skill Requirements:

Networking: DNS, Active Directory, Firewalls, Routers, Access Control Lists, NAT, Switches/VPNs

Cybersecurity: Nessus/ACAS, HBSS, Metasploit, Wireshark, NMAP, Security Onion, SNORT

Operating Systems: Windows, Unix/Linux, Red Hat, Kali, VMWare

 Analysis and Mitigation

  • Provide risk assessment of identified vulnerabilities and provide impact statements
  • Assess identified vulnerabilities and provide recommendations for mitigation and remediation

General

  • Complete tasks in a timely fashion.
  • Adhere to all defined guidelines and procedures in performance of duties.
  • Present clear, comprehensive recommendations for decision-making.
  • Organize, plan, and execute tasks and projects.
  • Innovate and apply skills and knowledge in problem solving situations.
  • Work individually or with a group to successfully achieve objectives and goals.
  • Adapt to assignment changes on short notice.
  • Provide instruction to others and participate meaningfully in discussions/meetings.

Education and Certifications

  • Requirements:

– DoD Top Secret Security clearance

– DoD 8570 IAT Level II Qualified

– 5 years experience in cybersecurity, network infrastructure or systems architecture

– CONUS Travel: 25%

Certifications:

PREFERRED SKILLS (Select from one of the 3 groups):

Cybersecurity

o Experience in vulnerability management and scanning, host based security systems, intrusion detection/protection systems, DNS, wireless technologies, and boundary protection solutions

o At least one of the following certifications: CCNP, MCSE:SI, RHCE, GWAPT, GWEB

Network Infrastructure

o Experience in network infrastructure including routers, switches, network management solutions, network  access solutions, firewalls, virtualization solutions, and virtual private network solutions

o At least one of the following certifications: CCNP, GPEN

Systems Architecture

o Experience in Microsoft and/or Unix-like operating systems, host based security systems, DNS, DHCP, group policy, vulnerability management, patch management, antivirus, antivirus solutions, and virtualization solutions

o At least one of the following certifications: MCSE:SI, MCSE:DP, MCSE:BI

Cybersecurity Services Technician – Intermediate

Full time position located at Scott Air Force Base, Illinois.

Metova is seeking a qualified and highly motivated individual to serve as a Cybersecurity Services Technician in support of the Specialized Engineering for Cyber Optimization, Defense & Evaluation (SE-CODE) effort.

Learn More

Role and Responsibilities

The following specifications are required to successfully deliver the required service and support company objectives. The individual is encouraged to exceed these minimum responsibilities to demonstrate its technical, operational, and administrative expertise in support of company’s organizational and departmental objectives.

 

Qualified personnel will serve in dual capacities as Air Force Cyber Protection Team (CPT) Operators and Subject Matter Experts (SMEs) as part of the Air Force’s CPT organizations at Scott AFB, IL. CPT Operators and SMEs will serve as Cybersecurity, Network Infrastructure and Systems Architecture experts in conducting global cyberspace operations to deter, disrupt, and defeat adversary cyberspace operations in order to defend U.S., DoD, and Air Force critical infrastructure and key resources.

In the Operator role, qualified personnel will serve on CPT Squads in providing expertise in collecting, analyzing, and assessing network and systems cybersecurity posture and providing DoD and AF leadership with risk mitigation strategies and defense plans to protect and defend vital missions. As SMEs, qualified personnel will serve as technical experts in managing CPT training and testing environments, developing and maintaining CPT tools and techniques, conducting standardized training, and providing critical analyses and best practice support for evolving CPT mission needs. Qualified personnel will have experience and expertise in security best practices, vulnerability analysis, network defense tactics and techniques, and network and application performance resolution.

Skill Requirements:

Networking: DNS, Active Directory, Firewalls, Routers, Access Control Lists, NAT, Switches/VPNs

Cybersecurity: Nessus/ACAS, HBSS, Metasploit, Wireshark, NMAP, Security Onion, SNORT

Operating Systems: Windows, Unix/Linux, Red Hat, Kali, VMWare

Analysis and Mitigation

  • Provide risk assessment of identified vulnerabilities and provide impact statements
  • Assess identified vulnerabilities and provide recommendations for mitigation and remediation

General

  • Complete tasks in a timely fashion.
  • Adhere to all defined guidelines and procedures in performance of duties.
  • Present clear, comprehensive recommendations for decision-making.
  • Organize, plan, and execute tasks and projects.
  • Innovate and apply skills and knowledge in problem solving situations.
  • Work individually or with a group to successfully achieve objectives and goals.
  • Adapt to assignment changes on short notice.
  • Provide instruction to others and participate meaningfully in discussions/meetings.

Education and Certifications

Requirements:

– DoD Top Secret Security clearance

– DoD 8570 IAT Level II Qualified

– Associates Degree in a computer science or equivalent program OR 3 years experience in cybersecurity, network infrastructure or systems architecture

– CONUS Travel: 25%

Certifications:

REQUIRED SKILLS (Select from one of the 3 groups):

Cybersecurity

o Experience in vulnerability management and scanning, host based security systems, intrusion detection/protection systems, DNS, wireless technologies, and boundary protection solutions

o At least one of the following certifications: CCNP, MCSE:SI, RHCE, GWAPT, GWEB

Network Infrastructure

o Experience in network infrastructure including routers, switches, network management solutions, network access solutions, firewalls, virtualization solutions, and virtual private network solutions

o At least one of the following certifications: CCNP, GPEN

Systems Architecture

o Experience in Microsoft and/or Unix-like operating systems, host based security systems, DNS, DHCP, group policy, vulnerability management, patch management, antivirus, antivirus solutions, and virtualization solutions

o At least one of the following certifications: MCSE:SI, MCSE:DP, MCSE:BI

Cyber Security Analyst II

Full-time position located at Fort Belvoir, Virginia

Position Title: Cyber Security Analyst – Level II – Task 5 FISMA

Metova is seeking a qualified and highly motivated individual to serve as a Cyber Security Analyst Level II in support of the Army CIO-G6 Cyber Directorate.

Learn More

Role and Responsibilities

Major responsibilities include (not all inclusive):

Under indirect supervision, performs analysis of systems, programs, and/or planning activities. Duties include the development of policies, procedures, and other technical documentation and the analysis of Cyber related programs and initiatives. Duties may also include the design, development, and coordination of relationships and solutions to resolve problems within the specialty area. The position requires substantial knowledge of advanced theory and current practices in cybersecurity utilizing analytical skills.

Responsibilities include but are not limited to:

Task 5:

Federal Information Security Management Act (FISMA):

  • provide support with the collection, and monitoring, of Army activities and preparing the Army Federal Information Security Management Act (FISMA) report for approval and transmission to DoD. The support will include:
  • Representing the Army at FISMA core team; army portfolio management solution and DoD level FISMA working groups, and provide feedback to the government technical lead.
  • Developing and maintaining statistics and metrics on a weekly and quarterly basis in support of the Army annual FISMA submission for Department of the Army.
  • Reviewing and analyzing annual OMB FISMA guidance and support to reporting for audits by agencies within and outside Army (i.e., GAO, AAA, DoD IG).

Example tasks:

  • Prepare memoranda for Army commands that identify their FISMA score, staff the memo for signature through the government chain and ensure memos are sent out. (frequency: monthly) Follow up with commands contacted on reporting updates to the compliance statistics telephonically and via email (frequency: daily)
  • Prepare briefings for Army Senior leadership on FISMA compliance for Army commands. (frequency: quarterly).

Physical Demands:

  • Normal demands associated with an office environment.
  • Ability to work on a computer for long periods of time.
  • Ability to communicate with individuals by telephone, email and face to face.
  • Some travel may be required.

Requirements

  • Maintain a current and final SECRET clearance.
  • Policy experience in the DoD arena, preferably Army
  • Knowledgeable of applicable policies and regulations governing The Federal Information Security Management Act (FISMA)
  • Minimum five (5) years of experience
  • Bachelor’s Degree preferred or higher from an accredited college or university in IT, Computer Science, Cybersecurity, Computer Engineering, or related discipline.
  • Master’s Degree may be substituted for one (1) year of relevant experience.
  • A minimum of DOD 8570 IAM Level II Information Assurance Certification required (CompTIA Sec+ or equivalent).
  • A minimum of DOD 8570 IAM Level II Information Assurance Certification required (CompTIA Sec+ or equivalent).

Cyberspace Data Scientist

Full-time position located in Augusta, Georgia.

This position will be incorporated into the Metova CyberCENTS team.

Metova is seeking a qualified and highly motivated individual to serve as Cyberspace Data Scientist in support of the Cyber Center Of Excellence’s TRADOC Capability Manager Cyber (TCM Cyber).

Learn More

Role and Responsibilities

Major responsibilities include (not all inclusive):

  • The individual needs to have a situational understanding of Cyberspace operations. They must be able to provide support and solutions to third-parties and end users. They will also be required to oversee and manage specific aspects of Cyberspace solutions development such as:
  • Understand the data architecture development, cloud based computing and visualization are necessary in order to provide technical guidance on future solutions development.
  • Knowledge of Army Force modernization, capability development process and or requirements determination process.
  • Information technology, data management, analytics, and visualization
  • knowledge in leading small teams
  • Excellent oral and written communication skills will be necessary to convey information, explain issues, and provide support to individuals and/or groups requiring assistance with capability development process.

Physical Demands:

  • Normal demands associated with an office environment.
  • Ability to work on a computer for long periods of time.
  • Ability to communicate with individuals by telephone, email and face to face.
  • Some travel may be required.

Requirements

  • TOP SECRET clearance and upon award be immediately eligible for nomination to receive
  • Special Compartmented Information (SCI) access.
  • ten (10) years’ experience in information technology, data management, analytics and visualization, knowledge in leading small teams and experience/knowledge of force modernization, capability development process, or requirements determination process.
  • Master’s or doctorate degree from an accredited university in data science, informatics and computing or other relevant information science degree.
  • A certification in Certified Information Systems Security Professional (CISSP) is required.
  • A minimum of DOD 8570 IAT Level III Certification required (CISSP or equivalent).

IA Network/RMF/Support Officer

This position located is at Fort Gordon, Georgia.

Learn More

Requirements

  • Certification in Windows Server – or –  Experience in DoD Information Assurance Certification and Accreditation Process (DIACAP) moving to Risk Management Framework (RMF)  (required)
  • Willing to achieve Windows Server Cert in 6-8 months or develop an Advanced understanding in Risk Management Framework experience (Aptitude to achieve)
  • Understanding and hands on experience with:  common applications used in experimentation M&S, how to build, manage computer images; the cloning process, and manage computer hardware (Servers, Workstations, Laptops).
  • Basic understanding and hands on experience with:  Windows OS, VTC Suites (LINUX experience a plus)
  • Basic understanding and hands on experience with:  Switches and Routers
  • Basic CAT V/VI wiring fundamentals (security classifications cable colors, how to run cat VI, making and testing cables, patch panels, flag tagging
  • Possess a Secret (at hire) with the potential to be upgraded to a TS in the next two years.

Submit your cover letter, resume, and requested position