Employment

At Metova, our employees are our most valuable asset. Metova is for professional people who want to exceed. Metova is designed around team members who want to make a difference in shaping the company’s future and who can expect fair rewards for doing superior work. Taking care of people is our number one initiative to ensure success.

Metova is commited to creating a diverse environment and is proud to be an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, gender, sexual orientation, national origin, age, or veteran status.”

– John Adams, CEO

Current Metova Job Opportunities

Security Analyst Engineer

Metova is looking for talented and highly motivated, Security Analyst Engineer to join our team in support of the Battle Lab Collaborative Simulation Environment (BLCSE).At Metova, our employees are our most valuable assets. Taking care of our employees is our number one initiative to ensure not only Metova’s success, but also the success of our employees. We want to see our employees exceed! We are designed around team members who want to make a difference in shaping the Company’s future and who can expect great rewards for doing superior work.

Learn More

Responsibilities

  • This position is responsible for providing Computer Network Defense (CS) supportto the Battle Lab Collaborative Simulation Environment (BLCSE) within the Cyber Enterprise Systems Center (CESC) to ensure products, systems, and services comply with all appropriate Information Assurance policies/procedures, network defense requirements and best practices as prescribed by the Office of the Directory of National Intelligence (ODNI), Defense Intelligence Agency (DIA), Department of Defense (DoD), Defense Information Systems Agency (DISA), Army Cyber Command (ARCYBER), the CSSP TIER-II, and local authorities.
  • Provide the Battle Lab Collaborative the operation and system administration of the Host Based Security Systems supporting TRADOC’s Modeling & Simulation community and Future Forces Concept experimentation.

Required Skills and Qualifications

Skills & Experience

  • Must have at least two (2) years’ experience with CS disciplines within the DoD and/or other agencies within the United States Government. Must be familiar with the requirements outlined in the most current Evaluator Scoring Metric (ESM).
  • Demonstrated experience with DoD Directive 8500.01E, Chairman Joint Chief of Staff (CJCS) Instruction 6510.01, DoD Instruction O-8530.2,
  • Knowledge of the DoD, IC, and national level system security initiatives and Local Area Network (LAN) / Wide Area Network (WAN) technologies.
  • Be knowledgeable of and have experience supporting DoD systems accreditation, certification, and authorization processes (e.g. DIACAP, RMF).
  • Be skilled at and have experience: assessing & mitigating risk in information systems; performing compliance auditing of information systems; developing and maintaining DoD information systems accreditation documentation.
  • Must be familiar with the requirements outlined in the most current Evaluator Scoring Metric (ESM).
  • Must have at least two (2) years’ experience with CS disciplines within the DoD and/or other agencies within the United States Government.
  • Specific experience with McAfee ePolicy Orchestrator (ePO) Server and hands on experience deploying and troubleshooting HBSS products (e.g. HIPS, VSE, and DLP).
  • Knowledge and experience in working with the McAfee Host Intrusion Prevention System, McAfee Data Loss Prevention Endpoint, and McAfee product policy tuning.
  • Solid understanding of Microsoft operating systems and networking.

Required Qualifications

  • 4+ years of concentrated related IA/CS discipline experience.
  • Must be a United States Citizen
  • Up to 10% travel

Security Clearance

TS/SCI

Education and Certifications

Education

Bachelor’s Degree Information Technology/Computer Science or relevant preferred

Certifications

  • Candidate must have baseline certification requirement to include either GCIA (preferred) or CEH or GCIH or SCYBER or CFR or CSA+ or GICSP certification.
  • Within 6 months of assignment to position the candidate must have CISA** or GSNA or cyber/information/network security advanced degrees approved by the IAM/COR and HBSS 201 and 501 training.

Cyber Security Manager

Metova is looking for talented and highly motivated Cyber Security Manager to join our team! The Cyber Security Manager is responsible for all areas of IT cyber security and assisting the ARNG NCR DOIM in managing the risk of operating a network including the Command Cyber Readiness Inspection (CCRI) and Certification and Accreditation (C&A) support and tracking.

At Metova, our employees are our most valuable assets. Taking care of our employees is our number one initiative to ensure not only Metova’s success, but also the success of our employees. We want to see our employees exceed! We are designed around team members who want to make a difference in shaping the Company’s future and who can expect great rewards for doing superior work.

Learn More

Roles and Responsibilities

The IMC Team DOIM Cyber Security Manager is responsible for ensuring the following aspects of Cyber Security: physical, personnel, facility, information systems, through policies and controls IAW AR25-2, AR 380-5, CJCSI 6510.01F, and DoD 5220.22M, DODD 8140.01, DODI 8500.01, DODI 8530.01, DODI 8510.01, and DOD 8570.01-M. The Cyber Security Manager will manage information security risks and report findings to the Government.

 

  • The Cyber Security Manager will develop and maintain an OPSEC Standing Operating Procedure (SOP)/Plan. This SOP/Plan shall include the Government’s critical information, why it needs to be protected, where it is located, who is responsible for it, and how to protect it. In addition, the contractor shall identify an individual who will be an OPSEC Coordinator.  The Cyber Security Manager will become OPSEC Level II certified in accordance with AR 530-1.
  • The Cyber Security Manager will maintain ARNG NCR DOIM IT infrastructure in a manner compliant with Federal Information Security Management Act (FISMA), DoD Risk Management Framework (RMF) and National Institute of Standards and Technology (NIST) guidance.
  • The Cyber Security Manager will provide Security Management Support to many of the other areas of ARNG NCR DOIM Managed Services as well as IT Service Management tasks ensuring that security considerations are accounted for or Security Management is a sub-process to other tasks.
  • Ensure that ARNG NCR DOIM LAN and its management systems are in compliance with all Information Assurance Vulnerability Alerts (IAVAs).
  • Conduct weekly security scans of all ARNG NCR DOIM networked equipment using the ARNG NCR DOIM Assured Compliance Assessment Solution (ACAS), and remediate vulnerabilities according to SLA.
  • Review Host Based Security Solution (HBSS) and Tanium reports for end point security compliance. Remediate identified vulnerabilities as required.
  • Track Information Assurance Vulnerability Management (IAVM) compliance.
  • Create and submit appropriate security related reports, such as intrusion, virus infection incidents, FISMA and others as requested by the Government.
  • Create POA&M for identified vulnerabilities.
  • Continuously update progress on POA&Ms.
  • Report ARNG NCR DOIM security compliance to higher level authorities and/or reporting structures.

 

The Cyber Security Manager will also support other DOIM Management and Policy activities including:

 

  • Maintain the Information Security Plan.
  • Support and validate access requests for ARNG NCR DOIM network access and Managed services through Service Operations.
  • Provide consultation on Cybersecurity perspectives for proposed changes, initiatives, and projects.
  • Monitor and review development in the technology and regulations governing the industry, DoD, and Federal Government security operations.
  • Provide oversight of Cyber Security for the ARNG NCR DOIM.
  • Maintain and draft memorandums for record, system interconnection agreement, and/or equivalent to document any and all system connections to ARNG NCR DOIM networks.
  • Validate ARNG NCR DOIM managed assets are in compliance with Army Gold Master configuration, NSA Configuration Guidance and NIST Configuration Guidance through coordination with Asset Management.

 

The Cyber Security Manager will support C&A activities including:

 

  • Ensure the ARNG NCR DOIM complies with the Tenant Security Plan (TSP) for the ARNG portion of DODIN-A NIPR and SIPR in support of the ARNG Authority to Connect (ATC) and Authority to Operate (ATO). The contractor shall ensure ARNG NCR DOIM compliance with all applicable security controls as defined by NIST SP 800-53.
  • Test the security technical controls for the ARNG NCR DOIM LAN.
  • Support the ARNG’s Enterprise C&A, prior to external audit, the contractor shall conduct an internal review and execute all checks and tests as required in DoDI 8510.01 Risk Management Framework in the areas the Enterprises needs in association with DOIM assets that touch or work with DODIN-A.
  • Develop a Security Test and Evaluation (ST&E) Test Plan (Section F, Deliverable 33) that addresses all the requirements identified in NIST SP 800-53 and the appropriate DoD, Army, and ARNG information system security testing requirements. Prepare, at a minimum, two ST&E Test Plans and support the resulting testing activities during the life of the contract.

 

The Cyber Security Manager will support the CCRI process including:

 

  • Ensure ARNG NCR DOIM compliance with all applicable CCRI requirements (e.g. Technical, CND Directives, Contributing Factors, and etc.).
  • Provide support to the CCRI assessment team during scheduled and unscheduled inspections.
  • Report ARNG NCR DOIM CCRI status, findings, and results.
  • Create Plans of Action & Milestones (POA&M) and track CCRI findings through POA&Ms and report status during MPSRs.
  • Support ARNG NCR DOIM preparation for CCRI inspections.
  • Continuously update progress on POA&Ms. Support post-CCRI finding remediation. Assist with the planning, execution, and documentation of CCRI finding remediation activities

 

The Cyber Security Manager position reports to the IMC Project Manager and oversees the Cyber Security Team made up of other Metova employees and subcontractor employees.

Required Skills and Qualifications

  • Experience managing and using the Cyber tools used at the ARNG NCR DOIM
  • Travel up to 10%

Education, Experience and Certifications

Education:

  • Bachelor’s Degree or higher in Computer Science, Information Systems, Information Technology, Cyber Security, Statistics, Business Administration, Systems Engineering, Computation Science, Computer Engineering, Electrical Engineering, Data Analytics, Information Technology, Information Security and Assurance, Mathematics, Software Engineering, Systems Engineering, or Telecommunications.

 

Certifications & Experience:

  • An IAM Level III Certification
    • CASP – CompTIA Advanced Security Practitioner
    • CISA – Certified Information Systems Auditor
    • GSE – GIAC Security Expert
    • SCNA – Security Certified Network Architect
    • CISSP – Certified Information Systems Security Professional
    • GCIH – GIAC Certified Incident Handler

    PLUS

    ITIL 2007/2011 Foundations Certification.

 

Security Clearance:

  • Active Top Secret Security Clearance

Systems Engineer III

Metova is looking for talented and highly motivated individuals to join our team at Scott AFB, IL as a Systems Engineer! At Metova, our employees are our most valuable assets. Taking care of our employees is our number one initiative to ensure not only Metova’s success, but also the success of our employees. We want to see our employees exceed! We are designed around team members who want to make a difference in shaping the Company’s future and who can expect great rewards for doing superior work.

The Systems Engineer III performs as a member of a network and systems engineering team charged with the design, integration, production, testing, and installation of network simulators.  Develop high-fidelity simulated environment that mirrors/replicates the primary CVA/H Weapon System and emulates any Mission Partner networks. Provide support to develop and enhance virtual training environments. Environments will be utilized to teach doctrine and TTPS during simulated defensive cyberoperations. This effort will require the use of training architectures and networks to maintain Information Assurance compliance and promote interoperability.

Learn More

Roles and Responsibilities

Conducting research, analysis, design, development, prototyping, system integration and testing needed to deliver IT-based training simulations that replicate operational mission partner networks. Developing high-fidelity simulated environment that mirrors/replicates the primary CVA/H Weapon System and emulates any Mission Partner network. Convert existing simulated Mission Partner networks created for Cyber Protection Teams to the new simulation and training environment and add the Deployable Interceptor Platform to environments.

Required Skills and Qualifications

Engineering

  • Well-rounded engineer capable of configuring operating systems and networking appliances
  • Complete understanding of application protocols (ping, dns, ssh, smtp, ntp, https, etc)
  • Ability to quickly diagnose network connectivity issues in a virtual or physical environment
  • Ability to train customers how to use the simulator

 

Documentation

  • Process – Generates comprehensible documentation for reference by other engineers, developers, etc. that complies with company standards.
  • External – Produces design documentation and build guides for entities outside the company (customers) that are professional.

 

Testing

  • Performs operational test and evaluation for completed mission partner network development
  • Performs testing of simulated mission partner network with training scenarios

 

Analysis and Design

  • Generates and documents simulator designs which comply with requirements specifications.
  • Accurately determines effort and time that will be required to resolve tasks and design requirements.

 

General

  • Completes tasks in a timely fashion with little or no supervision.
  • Adheres to all defined guidelines and procedures in performance of duties.
  • Presents clear, comprehensive recommendations for decision-making.
  • Organizes, plans, and executes tasks and projects.
  • Innovates and applies skills and knowledge in problem-solving situations.
  • Works individually or with a group to successfully achieve objectives and goals.
  • Adapts to assignment changes on short notice.
  • Provides instruction to others and participates meaningfully in discussions/meetings.
  • Clearly and concisely writes cyber range documents and reports.

 

Travel: Up to 10%

Education, Experience and Certifications

Education:

  • Bachelor’s Degree in Information Technology/Computer Science preferred.  Related field experience preferred.

 

Experience:

  • Networking: Routing, Switching, DNS, Active Directory, VLANs, SANs
  • Virtualization: VM Ware ESXi, Kernel Virtual Manager (KVM)
  • Operating Systems: MS 2003, 2008, 2012, 2016; Windows XP/Vista/7/10; Debian/Red Hat Linux
  • Applications:  Exchange 2007/2010/2012, IIS, SQL Server, Solarwinds Kiwi Syslog
  • Security Appliances/VMs:  PaloAlto, McAfee Network Security IPS, Cisco ASA, E-Policy Orchestrator (Gov HBSS), MetaSploit, Splunk, Sourcefire FirePOWER
  • Office Applications:  MS Office – Word, Excel, PowerPoint; Visio
  • Network vulnerabilities, network attack vectors, attack signatures, and technical mitigation

 

Certifications:

  • None required

 

Security Clearance:

  • Active Secret Security Clearance

SharePoint Server Farm Administrator

Metova is looking for talented and highly motivated SharePoint Farm Admin to join our team in support of the NCR/DOIM. At Metova, our employees are our most valuable assets. Taking care of our employees is our number one initiative to ensure not only Metova’s success, but also the success of our employees. We want to see our employees exceed! We are designed around team members who want to make a difference in shaping the Company’s future and who can expect great rewards for doing superior work.

The SharePoint Server Farm Administrator that will provide day to day support of Microsoft Office SharePoint Sites in 2013 and 2016 environments at customer site. The individual needs to be familiar with the web application, Microsoft SharePoint, and related web technologies. They must be able to provide support and solutions to third-parties and end users. They will also be required to oversee and manage specific aspects of SharePoint.

Learn More

Responsibilities

Responsibilities

  • Responsible for the creation of new site collections, default permissions, etc.
  • Documenting SharePoint configuration and architecture
  • Reviewing and monitoring usage reports
  • Providing Microsoft Project support to project leads
  • Providing SharePoint Support and Training to end users

Skills & Experience

  • Prior experience administering, developing and maintaining SharePoint 2013/2016 portal sites
  • Experience investigating and resolving SharePoint performance issues, such as front-end web server performance, indexing performance, and working with the Structured Query Language (SQL).
  • Knowledge of troubleshooting techniques for SharePoint configuration and web part issues.
  • Experience with Microsoft SQL Server
  • Knowledge and experience working with and establishing workflows within the SharePoint environment
  • Experience with site layout structure and content
  • Experience maintaining sites and sub-sites
  • Familiarity with central administration functions within SharePoint
  • Must possess knowledge of business workflows and have an in depth understanding of the capabilities of SharePoint, Windows SharePoint Services and SharePoint Designer / Visual Studio
  • Minimum 4 years of SharePoint Server Farm Administration
  • Experience working in a large, enterprise-level environment with the ability to support multiple SP farms
  • Experience using PowerShell, ASP.NET, JavaScript, Visual Studio, Microsoft Team System, Cascading Style Sheets, HMTL and other Microsoft-based technologies is preferred.

Required Qualifications

  • Must be a United States Citize
  • Up to 10% travel
  • Active Secret Security Clearance

Education and Certifications

Education

A Bachelor’s Degree is desired, nut not necessary

Certifications

A minimum of DOD 8570 IAM Level II Information Assurance Certification required

Systems Architect – Intermediate

Full-time position located at Fort Belvoir, Virginia.

Metova is seeking a qualified and highly motivated individual to serve as a Systems Architect in support of the Army National Guard.

Learn More

Roles and Responsibilities

Major responsibilities include (not all inclusive)

The position will be responsible for providing technical oversight and performance management ensuring RCAS system architecture and implementation meet DoD/Army SE principles and guidelines. The Systems Architect Lead should possess a strong blend of DoD/Army system architecture, technical implementation, and testing experience to support the RCAS Program Management Office (PMO). The candidate will support the RCAS PMO in all technical aspects with a focus on technical oversight, system testing/verification, and quality assurance. The Systems Architect Lead will support infrastructure planning, design, implementation, and deployment including target architecture within an agile software development environment for a variety of RCAS programmatic mission objectives.

Primary Job Duties and Responsibilities Include:

The Systems Architect Lead will have a background providing leadership and technical execution within an agile software development environment. The Systems Architect Lead will provide technical assistance and support working closely with the Governments Chief Technology Officer (CTO) on a myriad of tasks and activities. The Systems Architect Lead is expected to develop a deep understanding of the business and user needs and design solutions that exceed expectations. We are looking for someone that deeply understands current DoD/Army system architecture, technical implementation, and testing within an agile software development environment.

The ideal candidate must be self-motivated with a proven track record in systems architecture with demonstrated experience as a systems architect. Candidate must be organized and analytical, adept at working in a team environment, and able to handle multiple priorities.

  • Provide technical expertise in ensuring system designs and implementation meet DoD/Army SE principles and guidelines.
  • Design, analyze, and document architectural and engineering requirements, and ensures that the enterprise solution meets customer requirements.
  • Identifies architectural and technology risks with the potential to impact RCAS system requirements; develops goals and plans to mitigate risks.
  • Analyze, document, recommend, present, and review improvements from a technical architecture perspective.
  • Defines IT architecture issues and allocates requirements. Identifies hardware and software architectural needs and solutions.
  • Conduct assessments of the RCAS program determining the need and direction of its existing System Architecture.
  • Design and effectively implement strategies and solutions ensuring technology standards and best practices are maintained across the organization.
  • Collaborate with the Prime integrator and support RCAS infrastructure planning, design, implementation, and deployment.
  • Review Prime Integrator’s Technical Plans and Artifacts Such As Systems Engineering Plan, Test and Evaluation Management Plan, DoDAF Artifacts, Systems Design Document, System Architecture Diagrams, Etc.
  • Author software engineering/technical documentation
  • Provide expert technical insight and analysis on system design and architecture.
  • Apply appropriate DoD statutes, rules, and processes for system design and architecture.
  • Propose technical and procedural system design and architecture solutions.
  • Recommend updates, modifications, and process improvements to existing enterprise architecture.
  • Provide technical solutions to automate processes or functions to improve business operations.
  • Provide technical support for establishing, maintaining or improving the quality of RCAS system design and architecture products, services and/or processes.
  • Provide technical/project briefings as required and presentation support for senior leadership.
  • Deliver both oral and written communication to the highest levels of senior leadership.
  • Evaluate existing enterprise architecture solutions and recommend changes.
  • Identify performance gaps (operational, training, etc.); develop and implement repeatable, sustainable processes to increase operational efficiencies.
  • Develop and provide oversight in the preparation of technical management reports and progress reviews; management and reporting.

Job Requirements and Skills:

The successful candidate will have:

  • Demonstrated experience with DoD/Army SE principles and guidelines.
  • 6+ years of system architecture design.
  • 6+ years of Army/DoD experience.
  • Possess a broad understanding of modern Agile development technologies to be able to provide end-to-end solution recommendations.
  • Ability to set strategic architectural direction.
  • Ability to identify architecture components for reuse.
  • Must have a clear understanding of architecture standards.
  • Substantial knowledge of ITIL processes and experience evolving to Agile development lifecycles.
  • Experience with system architectures for major automation information systems similar in size, scope, and complexity of RCAS.
  • Experience operating within Army IT/C4I acquisition and/or Army Guard/Reserve communities.
  • Strong ability to articulate complex architectures to non-technical audiences.
  • Strong stakeholder relationship management skills.
  • Knowledge in web-based systems architecture, service-based architecture, and enterprise application architecture.
  • Experience building conceptual, logical, and physical data models.
  • Experience with database design; ability to articulate best practices, advantages and constraints of designs.
  • Experience with Microsoft SharePoint as a knowledge management and reporting tool
  • Understanding of COTS software licensing models.
  • Self-starter who is responsive and accountable to the responsibilities they are given, the team they lead, and the clients they support.
  • Organization skills with the ability to manage and deliver on multiple priorities simultaneously.
  • Ability to communicate complex technical concepts to all levels of an organization to aid in decision making and understanding through written, verbal, and presentation mediums.
  • Must be able to work with clients to thoroughly understand problems while identifying, formalizing, and driving solutions.
  • Familiarity and experience with references, standards, and guidelines pertaining to system architectures.
  • Ability to understand business requirements and converting them into solution architecture designs.
  • Working knowledge of the Program Executive Office and Resource Sponsors, organizations, processes, programs, and policies.
  • Capable of using MS Office tools to prepare documents, spreadsheets, and presentations.
  • Strong consulting and client management skills.
  • Project management, analytical, and critical thinking skills.
  • Ability to multi-task across assignments and engagements as needed.
  • Desire to work in a collaborative environment, and to solicit and provide constructive feedback.
  • Ability to think strategically, and actively participate in discussions with client, management and staff.
  • Ability to work autonomously and build relationships.
  • Must hold a DoD Secret level security clearance.

Physical Demands

  • Normal demands associated with an office environment.
  • Ability to work on a computer for long periods of time.
  • Ability to communicate with individuals by telephone, email and face to face.
  • Some travel may be required.

Education and Certifications

Qualified candidates will have:

  • Bachelor’s degree in Computer Science, Software Engineering, MIS or equivalent preferred.
  • Minimum of 5 years of experience working with the DoD.
  • Minimum of 6 years of experience architecting application or data centric solutions.
  • Excellent communication skills (writing, speaking, and listening).
  • Federal Government and/or consulting experience; Army Guard/Reserve experience preferred
  • CSM/SAFe/ITIL/PMP preferred
  • Complex IT automated information systems and distributed learning technology experience

Cyber Defense Network Support Technician

Full time Positions at Scott AFB and Lackland AFB.

Metova is seeking qualified and highly motivated individuals for Cyber Defense Network Support Technician positions at Scott AFB (1 position) and Lackland AFB (1 position).

Learn More

Role and Responsibilities

The following specifications are required to successfully deliver the required service and support company objectives. The individual is encouraged to exceed these minimum responsibilities to demonstrate its technical, operational, and administrative expertise in support of company’s organizational and departmental objectives.

Objectives are as follows to support the Cyberspace Vulnerability Assessment/Hunter (CVA/H) Weapon System (WS) Maintenance Support Services (MSS) contract :

  • The qualified Network Support Technicians will serve as Cyber Defense Network Support Technicians and will provide hardware and software maintenance support for the Cyberspace Vulnerability Assessment/Hunter (CVA/H) and the Information Operations – Fly-away Kits (IOP FAKs) for the Air Force’s Cyber Protection Teams (CPTs).
  • Additionally, the Network Support Technicians will also perform hardware and software administrator duties, and provide maintenance support to CPTs and IOP FAKs located at multiple stateside locations.
  • The Network Support Technicians will respond to first-line customer requests such as user account issues, configuration issues, regular/scheduled maintenance and other touch maintenance functions.
  • The Network Support Technicians will use software and hardware tools to identify and diagnose problems affecting network and mission systems performance.
  • The environments typically include a mixture of platforms to include Windows and LINUX based operating systems.

Preferred Skills

  • Cybersecurity:  Experience in vulnerability management and scanning, host based security systems, intrusion detection/protection systems, DNS, wireless technologies, and boundary protection solutions.
  • Network Infrastructure:  Experience in network infrastructure including routers, switches, network management solutions, network access solutions, firewalls, virtualization solutions, and virtual private network solutions.
  • Systems Sustainment:  Experience in Microsoft and/or Unix-like operating systems, host based security systems, DNS, DHCP, group policy, vulnerability management, patch management, antivirus, antivirus solutions, and virtualization solutions.

Education and Certifications

  • (Mandatory): TOP SECRET security clearance is required, applicants must already have a fully adjudicated active clearance.
  • (Mandatory): 3+ years’ experience in cybersecurity, network infrastructure or systems architecture
  • (Mandatory): DoD 8570 IAT L2 or L3
  • (Mandatory): Applicants must have three of the following certifications – MS Windows 2012, MCP for SQL Admin, CCDA, VCAP5-Data Center, Blade Server experience, Cloudshield CS-2000 and CS-4000 certification, SAN and NAS experience, RHCE, and LINUX Professional Certification (LPIC-2)

Information Assurance/Cyber Security Engineer II

Full-time Position at Fort Belvoir, Virginia.

Metova is seeking a qualified and highly motivated individual to serve as an Information Assurance/Cyber Security Engineer Level II in support of the Army CIO-G6 Cyber Directorate.

Learn More

Role and Responsibilities

The following specifications are required to successfully deliver the required service and support Company objectives. This individual is encouraged to exceed these minimum responsibilities to demonstrate its technical, operational, and administrative expertise in support of the Company’s organizational and departmental objectives.

Objectives are as follows:

  • Provides technical expertise for Policy, Guidance and Tactics, Techniques, and Procedures (TTP) development
  • Provide technical support in the area of programmatic analyses, studies, briefings, IA training and certification implementation support.
  • Provide technical reviews, as well as analysis of National, Department of Defense (DoD), Joint Staff, and other federal agencies Cybersecurity/IA policies as they relate to Army level policy.
  • Providing technical support to the Government in transitioning to and complying with the DoD and national level policies.
  • Assessing Cybersecurity/IA needs and reporting, which encompasses, managing and organizing data sufficiently to report proposed actionable changes.
  • Providing technical support to the Government in the incorporation of policy into appropriate regulations and pamphlets; in drafting, reviewing, revising and delivering Cybersecurity/IA policy documents to the Cybersecurity Directorate, and in responding to DA Staff, Army Command (AC), ASCC, DRU, PEO, and field units’ oral and written queries regarding Cybersecurity/IA policy.
  • Develop proposed policies and Tactics, Techniques, and Procedures (TTP) in support of the Army’s Defense-in-Depth strategy and the Department of Defense Global Information Grid (GIG) Vision.

 

Responsibilities:

  • Obtaining and analyzing information, assessing its relevance to policy or standards, and identify and relate technical and procedural recommendations.
  • To be knowledgeable of the entire spectrum of Cybersecurity tools and processes to include: intrusion detection, intrusion prevention, eradication tools and procedures; cross-domain solutions and multiple level security solutions; wireless personal electronic devices.
  • Gather and collect information assurance data such as intrusions and incidents
  • Write memorandums for Army implementation of privileged user responsibilities, monitor staffing of document across all Army Commands, review comments submitted and provide government lead with recommendations on accepting or rejecting changes/comments
  • Prepare briefings for Army cybersecurity program managers to implementation studies for manpower and staffing levels within their command.
  • Review historical data on systemic information assurance violations to determine the course of actions to minimize recurrence of the violations and provide information paper for leadership on findings.

 

Physical Demands:

  • Normal demands associated with an office environment.
  • Ability to work on a computer for long periods of time.
  • Ability to communicate with individuals by telephone, email, and face to face.
  • Some travel may be required.

Requirements

  • Maintain a current and final SECRET clearance.
  • Minimum five (5) years of experience as an Information Assurance Engineer
  • Bachelor’s Degree or higher from an accredited college or university in IT, Computer Science, Cybersecurity, Computer Engineering, or related discipline.
  • Master’s Degree may be substituted for one (1) year of relevant experience.
  • A minimum of DOD 8570 IAM Level II Information Assurance Certification required (CompTIA Sec+ or equivalent).

Database Security Analyst

Full time Position at Scott Air Force Base.

Metova is seeking a qualified and highly motivated individual for a Database Security Analyst position at Scott Air Force Base, IL.

Learn More

Role and Responsibilities

The following specifications are required to successfully deliver the required service and support company objectives. The individual is encouraged to exceed these minimum responsibilities to demonstrate its technical, operational, and administrative expertise in support of company’s organizational and departmental objectives.

Participates in the design, creation, and maintenance of computerized databases. Responsible for the quality control and auditing of databases to ensure accurate and appropriate use of data. Works with management to develop database strategies to support organization requirements. Consults with and advises users on access to various databases. Works directly with users to resolve data conflicts and inappropriate data usage. Directs the maintenance and use of the corporate data dictionary.

The Database Analyst is responsible to the Site Lead for providing expertise on Oracle and SQL-based systems.  This person must be able to assess, provide recommendations for mitigation and remediation, align security policies within the environment with government directives, identify and implement security controls and gather findings for artifacts for the DoD RMF process for several tenant programs under the cognizance of our customer.  The applicant also must be knowledgeable about DoD DIACAP and RMF processes for gathering artifacts.

Preferred Skills

Certification and Accreditation:  Risk Management Framework

Operating Systems and Applications: Oracle, SQL

Documentation

  • Process – Generates comprehensible documentation for reference by other analysts and team members, etc. that complies with government standards.
  • Testing – Generates test plans and test cases for RMF and system testing
  • External – Assists in generating ATOs for deployable systems

Testing

  • Performs RMF testing of system components as necessary.
  • Accomplishes validation testing on systems when assigned.

Analysis and Mitigation

  • Provide risk assessment of identified vulnerabilities and provide impact statements
  • Assess identified vulnerabilities and provide recommendations for mitigation and remediation

General

  • Complete tasks in a timely fashion.
  • Adhere to all defined guidelines and procedures in performance of duties.
  • Present clear, comprehensive recommendations for decision-making.
  • Organize, plan, and execute tasks and projects.
  • Innovate and apply skills and knowledge in problem solving situations.
  • Work individually or with a group to successfully achieve objectives and goals.
  • Adapt to assignment changes on short notice.
  • Provide instruction to others and participate meaningfully in discussions/meetings.
  • Clearly and concisely write RMF artifacts, documents, and reports.

Education and Certifications

Required: Bachelor’s degree + 2 years’ experience (Or 6 years’ experience with 4 years specialized experience.

Required: Certified Data Management Professional (CDMP) or an equivalent certification with database fundamentals.

Desired: Experience with Fortify and WebInspect.Education: Bachelor’s degree and two (2) years related experience, or six (6) years applicable experience, which should include four (4) years specialized experience.

Certifications:  OCP or equivalent certification; CDMP or equivalent; CompTIA Security+ or equivalent DoD 8570 IAT 2

Desired Experience:

Hands On Experience with Sun Java web/app servers, Oracle Database and Oracle app servers.

Hands On Experience with SQL

Hands On Experience in validating DISA STIGS and IAVAs

Security Clearance:  SECRET Security clearance required

Solaris/Unix and Database Systems (GSA – Senior Systems Engineer)

Full time Position at Scott AFB.

Metova is seeking a qualified and highly motivated individual for a Senior Systems Engineer position at Scott AFB.

Learn More

Role and Responsibilities

GSA Schedule 70 IT Description:

Under general supervision, performs duties such as site surveys, architecture design, system evaluation, system analysis, and infrastructure assessment. Performs duties on tasks that require expertise in system/processor architecture, wired for management baseline, desktop management interface, SNMP, client/server architecture, operating systems, software applications, network protocols, routers, switches, remote access servers, and firewalls.

 

GSA Schedule 70 IT Education/Experience:

Bachelor’s Degree and 2 years related experience, or 4 years applicable experience which should include 2 years specialized experience.

Education and Certifications

  • (Required): SECRET security clearance is required, applicants must already have a fully adjudicated active clearance.
  • (Required): 8570 IAT 2
  • (Required): Oracle Certified Professional (OCP) or an equivalent certification with Unix-based systems.
  • (Required): Certified Data Management Professional (CDMP) or an equivalent certification with database fundamentals.
  • (Required): BS Degree + 2 Years Experience (Or 4 Years Experience)
  • (Preferred): Experience with Solaris 10/11 with virtualization. Sun Java web/app servers, Oracle Database and Oracle app servers.
  • (Preferred): Experience with DISA STIGS and IAVAs

Microsoft / Systems Security Analyst

1 Full time position at Scott Air Force Base, Illinois.

Metova is seeking qualified and a highly motivated individual for a Microsoft/Systems Security Analyst position at Scott Air Force Base.

Learn More

Role and Responsibilities

The following specifications are required to successfully deliver the required service and support company objectives. The individual is encouraged to exceed these minimum responsibilities to demonstrate its technical, operational, and administrative expertise in support of company’s organizational and departmental objectives.

 

Under general direction, responsible for activities related to system administration. Assigns personnel to various projects, directs their activities, and evaluates their work. Ensures long-term requirements of systems operations and administration are included in the overall information systems planning of the organization. Responsible for the installation, maintenance, configuration, and integrity of computer software. Implements operating system enhancements that will improve the reliability and performance of the system.

Preferred Skills

Must have experience in the following areas:

Desired: Experience with VMWare

Desired: Experience with DISA STIGS and IAVAs

Desired: Experience with Microsoft SQL database, Microsoft Internet Information Services (MS IIS)

Education and Certifications

Education/Experience: Bachelor’s Degree and 2 years related experience, or 4 years applicable experience which should include 2 years specialized experience.

  1. Required: SECRET Clearance
  2. Required: 8570 IAT 2
  3. Required: Microsoft Certified Solutions Associate (MCSA) or an equivalent certification

Live Experimentation – Cyber Systems Analyst

Full time Position at the Cyber Battle Lab, Fort Gordon, GA.

Metova Federal, LLC is seeking a qualified and highly motivated individual for a Live Experimentation – Cyber Systems Analyst position at Fort Gordon, Georgia.

Learn More

Role and Responsibilities

The following specifications are required to successfully deliver the required service and support company objectives. The individual is encouraged to exceed these minimum responsibilities to demonstrate its technical, operational, and administrative expertise in support of company’s organizational and departmental objectives.

 

The Live Experimentation – Cyber Systems Analyst will work closely with TRADOC Capability Manager CYber (TCM-CYBER) to inform the development and validation of requirements within the Joint Capabilities Integration Development System (JCIDS).   Qualified candidates must have the ability to think tactically, and strategically to evaluate future capabilities as well as provide solutions to current problems, based upon operational Cyber Warfare Experience.  Position responsibilities and expected duties will include, but will not be limited to:

  • Solicit industry/academia for cyber capability solutions based on guidance from PdM DCO.
  • Coordinate and conduct evaluations/assessments of technologies.
  • Analyst will explore current Army CW posture, determine needs, assess risks, vulnerabilities, and recommend countermeasures.
  • Analysts will employ a thorough understanding of the tenets of Cyber Network Operations (CNO), and know how to optimally use all CNO resources for “effects-based” cyber warfare.
  • Analysts will evaluate CNO capabilities that will deliver tactical, operational, and strategic advantages.
  • Coordinate with appropriate stakeholders (i.e. Cyber Protection Brigade (CPB), TCM Cyber) for related assessments/evaluations.
  • Analyst will inform development and validation of requirements through experimentation independently or in coordination with TCM-Cyber and CPB.
  • Augment the existing PdM DCO team when necessary.
  • Produce written reports/evaluations/assessments as necessary.
  • Research emerging technologies that address gaps/shortfalls in cyber operations.
  • Participate in routine meetings as an extension of the PdM DCO team.
  • Develop experimentation/test plans.
  • Provide dedicated exercise support to represent PdM initiatives in experimentation events such as Cyber Quest, Cyber Blitz, NIE, etc.
  • Support capability development events conducted by the Forge as necessary.
  • Provide quarterly (minimum) updates to PdM DCO for work performed and ongoing/future projects.
  • Daily interaction with extended PdM DCO team at CPB.
  • Must be knowledgeable and anticipate working with Commercial Networks as well as Military Tactical and Enterprise networks.
  • Analyst shall plan, lead, and/or coordinate meetings as needed to ensure completion of all project objectives.

Clearance, Education, Experience and Certification Requirements

  • BS Degree in Computer Science or Computer Engineering from an accredited institution.  Coursework shall include computer programming (e.g., Fundamentals of Programming, Computer Forensics) and coding (e.g., C, C++, Python, Java).   Equivalent job experience will be considered.
  • 5 – 10 years prior military experience and/or significant civilian occupational experience in Cyber Warfare including, but not exclusively, computer programming, software design, cyber security (defensive or offensive), and cyber forensics.
  • Possess strong oral communication and writing skills.
  • SECRET clearance (TS preferred).
  • Intermediate/Advanced understanding of Defensive Cyber Operations (required).
  • Intermediate/Advanced understanding of CPT/CPB operations (preferred).
  • Basic understanding of the Risk Management Framework (RMF) documentation process.
  • Advanced understanding and hands on experience with virtualization technologies (required).
  • Advanced understanding of computer Hardware (Servers, Workstations, and Laptops) (required).
  • Experience or working knowledge on evaluating and or assessing cyber technologies to include establishing and applying logical steps toward determining their operational benefit.
  • Certifications that would be beneficial in this role include:  CISSP, Global Industrial Cyber Security Professional (GICSP), GIAC Enterprise Defender (GCED), GIAC Information Security Professional (GISP).

Cyber Training Solutions Director

Full time Position located at  Pensacola, Florida.

Learn More

Major Responsibilities include (not all inclusive)

Under general direction, responsible for activities related to curriculum development, instruction, and exercise planning. Ensures long-term requirements of Metova CyberCENTS training programs are included in the overall planning of the organization. Responsible for the setup, teardown, operation of Metova’s CENTS product line, curriculum development, instruction, and exercise planning as customer requirements dictate.

The Cyber Training Solutions Director is responsible to the VP of Cyber Training Solutions for providing expertise on cybersecurity instruction, managing training schedules and assisting in customer relations and business development.  Additionally, manage curriculum development, and exercise planning using the ADDIE process of ISD.  Curriculum will be developed using the MIL-PRF-29612 PERFORMANCE SPECIFICATION: TRAINING DATA PRODUCTS (26-SEP-1996) [SUPERSEDING MIL-STD-1379D] standard (includes NAVEDTRA 130 series; TRADOC Training Development Management, Processes, and Regulation 350-70 Products; AFH 36-2235 Information for Designers of Instructional Systems/ AF Manual 36-2234 Instructional System Development, and DoDISS Department of Defense Index of Specifications and Standards).  Exercises will be planned using the DoD Joint Event Life Cycle planning and execution phases.  This person must be able to utilize several network devices and operating systems to include Linux, Windows, Cisco IOS, Vyatta, pfSense, NMAP, AngryIP, etc.

Education and Experience requirements

Maintain an interim and final TOP SECRET/SCI security clearance.

Education: Masters Degree and four (4) years applicable experience, which should include two (2) years specialized instructor/curriculum development experience.

Certifications:  Instructor certification under the auspices of a Government Instructor Training Program (for example, Navy Basic Instructor Training) or experience teaching at the college level; Advanced certifications in Cybersecurity certification.

Experience:

Prior Instructor experience required.

Prior Curriculum Development experience a plus.

Experience as an IT/Cybersecurity trainer a plus.

Cyber Operations Specialist

Full time position located at Scott Air Force Base, Illinois.

 

Metova is seeking a qualified and highly motivated individual to serve as a Cyber Operations Specialist.

Learn More

Role and Responsibilities

The following specifications are required to successfully deliver the required service and support company objectives. The individual is encouraged to exceed these minimum responsibilities to demonstrate its technical, operational, and administrative expertise in support of company’s organizational and departmental objectives.

 

Qualified personnel will serve in dual capacities as Air Force Cyber Protection Team (CPT) Operators and Subject Matter Experts (SMEs) as part of the Air Force’s CPT organizations at Scott AFB, IL. CPT Operators and SMEs will serve as Cybersecurity, Network Infrastructure and Systems Architecture experts in conducting global cyberspace operations to deter, disrupt, and defeat adversary cyberspace operations in order to defend U.S., DoD, and Air Force critical infrastructure and key resources.

In the Operator role, qualified personnel will serve on CPT Squads in providing expertise in collecting, analyzing, and assessing network and systems cybersecurity posture and providing DoD and AF leadership with risk mitigation strategies and defense plans to protect and defend vital missions. As SMEs, qualified personnel will serve as technical experts in managing CPT training and testing environments, developing and maintaining CPT tools and techniques, conducting standardized training, and providing critical analyses and best practice support for evolving CPT mission needs. Qualified personnel will have experience and expertise in security best practices, vulnerability analysis, network defense tactics and techniques, and network and application performance resolution.

Skill Requirements:

Networking: DNS, Active Directory, Firewalls, Routers, Access Control Lists, NAT, Switches/VPNs

Cybersecurity: Nessus/ACAS, HBSS, Metasploit, Wireshark, NMAP, Security Onion, SNORT

Operating Systems: Windows, Unix/Linux, Red Hat, Kali, VMWare

 Analysis and Mitigation

  • Provide risk assessment of identified vulnerabilities and provide impact statements
  • Assess identified vulnerabilities and provide recommendations for mitigation and remediation

General

  • Complete tasks in a timely fashion.
  • Adhere to all defined guidelines and procedures in performance of duties.
  • Present clear, comprehensive recommendations for decision-making.
  • Organize, plan, and execute tasks and projects.
  • Innovate and apply skills and knowledge in problem solving situations.
  • Work individually or with a group to successfully achieve objectives and goals.
  • Adapt to assignment changes on short notice.
  • Provide instruction to others and participate meaningfully in discussions/meetings.

Education and Certifications

  • Requirements:

– DoD Top Secret Security clearance

– DoD 8570 IAT Level II Qualified

– 5 years experience in cybersecurity, network infrastructure or systems architecture

– CONUS Travel: 25%

Certifications:

PREFERRED SKILLS (Select from one of the 3 groups):

Cybersecurity

o Experience in vulnerability management and scanning, host based security systems, intrusion detection/protection systems, DNS, wireless technologies, and boundary protection solutions

o At least one of the following certifications: CCNP, MCSE:SI, RHCE, GWAPT, GWEB

Network Infrastructure

o Experience in network infrastructure including routers, switches, network management solutions, network  access solutions, firewalls, virtualization solutions, and virtual private network solutions

o At least one of the following certifications: CCNP, GPEN

Systems Architecture

o Experience in Microsoft and/or Unix-like operating systems, host based security systems, DNS, DHCP, group policy, vulnerability management, patch management, antivirus, antivirus solutions, and virtualization solutions

o At least one of the following certifications: MCSE:SI, MCSE:DP, MCSE:BI

Cyber Range Engineer

1 Position at Scott AFB, IL

3 Positions at Lackland AFB, TX

 

Metova is seeking a qualified and highly motivated individual to serve as a Cyber Range Engineer

Learn More

Role and Responsibilities

Performs as a member of a cyber range engineering team on-site at Joint Base San Antonio – Lackland AFB and Scott AFB charged with the integration, system management and configuration, operation, testing, and scheduling of the Air Force Defense Cyber Training Simulators.  Will maintain and update simulator designs, integrate hardware and software, determine baseline configurations for training classes and cyber exercises, and assist with maintaining the system’s Authority to Operate. Develop training scenarios to meet the training qualification requirements for Initial Qualification Training and Mission Qualification Training.  Configures and tests existing/legacy images of virtualized enclaves for integration into the system. Maintains and updates local design documents and configurations.  Works with the Air Force Program Office and Technical Engineers on the evolution of the system’s design and capabilities based on Air Force cyber training needs and the cyber weapon system baseline.  Trains the Operational Units on how to use and configure the system.Skill Requirements:

Networking: Routing, switching, DNS, Active Directory, VPNs, VLANs, SANs

Virtualization: KVM, VM Ware

Operating Systems: MS Server, Linux, Windows

Infrastructure:  Cisco, Juniper, Vyatta

Applications:  Exchange, E-Policy Orchestrator, Snort, Whats-Up-Gold, SQL Server, Symantec Mail Relay

Security Appliances:  Sidewinder-McAfee Enterprise Firewall, Cisco ASA and SSM, BlueCoat Proxy, McAfee Instrushield, Palo-Alto Firewall

Documentation:

  • Process – Generates comprehensible documentation for reference by other engineers, developers, etc. that complies with company standards.
  • Testing – Generates test plans and test cases for integration and system testing
  • External – Produces design documentation and build guides for entities outside the company (customers) that are professional.

Testing:

  • Performs integration testing of simulator components as necessary.
  • Accomplishes integration and/or validation testing on simulators when assigned.
  • Performs operational test and evaluation for finished cyber ranges at company and customer sites

Analysis and Design:

  • Generates and documents simulator designs which comply with requirements specifications.
  • Accurately determines effort and time that will be required to resolve tasks and design requirements.

General:

  • Completes tasks in a timely fashion.
  • Adheres to all defined guidelines and procedures in performance of duties.
  • Presents clear, comprehensive recommendations for decision-making.
  • Organizes, plans, and executes tasks and projects.
  • Innovates and applies skills and knowledge in problem-solving situations.
  • Works individually or with a group to successfully achieve objectives and goals.
  • Adapts to assignment changes on short notice.
  • Provides instruction to others and participates meaningfully in discussions/meetings.
  • Clearly and concisely writes cyber range documents and reports.

Travel:  Up to 10%

Education and Certifications

Education:

  • Bachelors Degree Information Technology/Computer Science related field with 4 years of experience or Associates Degree in Information Technology/Computer Science related field with 7 years of experience (MANDATORY)

Certifications:

  • Security+ or another approved DoD 8570.01-M IAT II Certification (MANDATORY)
  • One or more of the following technical certification(s): Cisco Certified Network Associate (CCNA); Cisco Certified Network Professional (CCNP); Cisco Certified Security Professional (CCSP); Microsoft Certified Systems Engineer (MCSE); Certified Ethical Hacker (CEH) (MANDATORY)
  • Experience: (in four of the following areas)– Networking: Routing, Switching, DNS, Active Directory, VPNs, VLANs, SANs, PKI– Virtualization: VM Ware ESXi, Kernel Virtual Manager (KVM)– Operating Systems: MS 2003, 2008, 2012; Windows XP/Vista/7/10; Debian/Red Hat Linux– Applications:  Exchange 2007/2010/2012, IIS, SQL Server, Solarwinds Kiwi Syslog; NetIQ Sentinel Log Manager— Security Appliances/VMs:  McAfee Network Security IPS, Cisco ASA, E-Policy Orchestrator (Gov HBSS), Nessus (Gov’t ACAS), MetaSploit, Splunk, Sourcefire FirePOWER— Office Applications:  MS Office – Word, Excel, PowerPoint; Visio

    — Network vulnerabilities, network attack vectors, attack signatures, and technical mitigation

    — Security Test & Evaluation/Continuous Monitoring for DIACAP/Risk Management Framework

  • Knowledge of Air Force cyber mission force operations and the Air Force cyber weapons (DESIRED)is a plus.
  • Able to lift 50 lbs (MANDATORY)
  • MUST HAVE TS/SCI

Cybersecurity Services Technician – Intermediate

Full time position located at Scott Air Force Base, Illinois.

Metova is seeking a qualified and highly motivated individual to serve as a Cybersecurity Services Technician in support of the Specialized Engineering for Cyber Optimization, Defense & Evaluation (SE-CODE) effort.

Learn More

Role and Responsibilities

The following specifications are required to successfully deliver the required service and support company objectives. The individual is encouraged to exceed these minimum responsibilities to demonstrate its technical, operational, and administrative expertise in support of company’s organizational and departmental objectives.

 

Qualified personnel will serve in dual capacities as Air Force Cyber Protection Team (CPT) Operators and Subject Matter Experts (SMEs) as part of the Air Force’s CPT organizations at Scott AFB, IL. CPT Operators and SMEs will serve as Cybersecurity, Network Infrastructure and Systems Architecture experts in conducting global cyberspace operations to deter, disrupt, and defeat adversary cyberspace operations in order to defend U.S., DoD, and Air Force critical infrastructure and key resources.

In the Operator role, qualified personnel will serve on CPT Squads in providing expertise in collecting, analyzing, and assessing network and systems cybersecurity posture and providing DoD and AF leadership with risk mitigation strategies and defense plans to protect and defend vital missions. As SMEs, qualified personnel will serve as technical experts in managing CPT training and testing environments, developing and maintaining CPT tools and techniques, conducting standardized training, and providing critical analyses and best practice support for evolving CPT mission needs. Qualified personnel will have experience and expertise in security best practices, vulnerability analysis, network defense tactics and techniques, and network and application performance resolution.

Skill Requirements:

Networking: DNS, Active Directory, Firewalls, Routers, Access Control Lists, NAT, Switches/VPNs

Cybersecurity: Nessus/ACAS, HBSS, Metasploit, Wireshark, NMAP, Security Onion, SNORT

Operating Systems: Windows, Unix/Linux, Red Hat, Kali, VMWare

Analysis and Mitigation

  • Provide risk assessment of identified vulnerabilities and provide impact statements
  • Assess identified vulnerabilities and provide recommendations for mitigation and remediation

General

  • Complete tasks in a timely fashion.
  • Adhere to all defined guidelines and procedures in performance of duties.
  • Present clear, comprehensive recommendations for decision-making.
  • Organize, plan, and execute tasks and projects.
  • Innovate and apply skills and knowledge in problem solving situations.
  • Work individually or with a group to successfully achieve objectives and goals.
  • Adapt to assignment changes on short notice.
  • Provide instruction to others and participate meaningfully in discussions/meetings.

Education and Certifications

Requirements:

– DoD Top Secret Security clearance

– DoD 8570 IAT Level II Qualified

– Associates Degree in a computer science or equivalent program OR 3 years experience in cybersecurity, network infrastructure or systems architecture

– CONUS Travel: 25%

Certifications:

REQUIRED SKILLS (Select from one of the 3 groups):

Cybersecurity

o Experience in vulnerability management and scanning, host based security systems, intrusion detection/protection systems, DNS, wireless technologies, and boundary protection solutions

o At least one of the following certifications: CCNP, MCSE:SI, RHCE, GWAPT, GWEB

Network Infrastructure

o Experience in network infrastructure including routers, switches, network management solutions, network access solutions, firewalls, virtualization solutions, and virtual private network solutions

o At least one of the following certifications: CCNP, GPEN

Systems Architecture

o Experience in Microsoft and/or Unix-like operating systems, host based security systems, DNS, DHCP, group policy, vulnerability management, patch management, antivirus, antivirus solutions, and virtualization solutions

o At least one of the following certifications: MCSE:SI, MCSE:DP, MCSE:BI

IT Support Technician – Intermediate

Full-time position located at 111 S. George Mason Dr., Arlington, Virginia

Metova is seeking a qualified and highly motivated individual to serve as IT Certified Professional in support of the Army National Guard CIO-G6.

Learn More

Role and Responsibilities

Position Summary:

The IT Support Technician- Intermediate will serve as the primary support technician and representative for the National Capital Region, Directorate of Information Management (NCR DOIM). The candidate will provide personal professional assistance for the 3500+ users within the campus. This includes National Guard standard hardware/software installs and configuration, diagnosing of desktop/laptop hardware/software problems, printer troubleshooting. Professional interaction with the customers by phone, remote control of desktop, and desk-side visits. Requests may involve working with other resources and vendors to deliver effective support services. This individual will be the first level of assistance for the NCR DOIM and maintain professionalism at all times.

Major responsibilities include (not all inclusive):

  • The technician will image workstations and laptops with the National Guard standard desktop image.
  • The technician will complete user moves and new user set-up; perform software installs, life cycle equipment replacement, and data moves.
  • The technician will troubleshoot software/hardware problems.
  • Provide PC and laptop support, problem analysis, and hardware/software installation and configuration.
  • Provide phone, remote, and desk-side technical support to users
  • Configuration of systems, communications devices, and peripheral equipment.
  • Conduct desk-side training for site personnel in proper use of hardware and software.
  • Resolve tickets in a timely manner to meet SLA’s.
  • Evaluate, prioritize, and solve tickets and escalate all tickets to the appropriate Tier Support:
    • Assigning ticket severity
    • Updating service work notes
    • Prioritizing work to resolve complex support client issues
    • Establishing a high level of personal credibility and building strong relationships
    • Maintaining ownership of service tickets throughout the life span of the support request
    • Collaborating with other staff and vendor support resources to resolve requests
    • Providing updates, status, and completion information to management
    • Follow-up with users/customers to ensure resolution of issues to the satisfaction of the user/customer. Closing tickets only when the resolution to the issue has been reached, to the satisfaction of the user/customer.
  • Participate in workshops, seminars, or other events as required.
  • Other duties as assigned by the Government, contract or supervisors in coordination with the SLA’s.
  • The Government standard software includes but is not limited to:
    • Windows 7, Windows 10
    • Office 2013
    • Internet Explorer/Mozilla Firefox
    • Citrix
    • Various Air and Army National Guard software.
    • Outlook
    • Adobe Acrobat (XI Pro)
    • Adobe Flash Player
    • Adobe Shockwave
    • DCS

Physical Demands:

  • Normal demands associated with an office environment.
  • Ability to work on a computer for long periods of time.
  • Ability to communicate with individuals by telephone, email and face to face.
  • Some travel may be required.

Requirements

  • Maintain a current and final SECRET clearance.
  • 5+ years of experience or equivalent with similar role and complexity
  • A+ certification as a minimum, Security+/Network+ desired
  • Active Directory experience
  • Imaging with Microsoft SCCM
  • VMWare (Virtual Desktop Infrastructure) administration experience
  • Hardware and Software troubleshooting for computers and printers
  • Excellent customer service skills, and experience working in a customer service environment
  • Excellent writing and verbal communication skills
  • Possess customer service, communication, problem-solving, analytical, troubleshooting, team work interpersonal, organizational, prioritization and multitasking skills
  • Ability to work in a fast-paced environment
  • Ability to communicate with others in an efficient and professional manner
  • Maintain professional appearance as an example of the organization

Preferred Education and Experience

  • B.S. Degree in computer science or similar field, or 5+ years equivalent job experience
  • Ticketing systems; IssueTrak
  • Hardware configuration/repair of various makes/models of computers and printers
  • Familiarity with working in a military environment
  • Understanding of OPSEC requirements
  • Some knowledge of Quality Management and Configuration Management principles

Certification Requirements:

A minimum of DOD 8570 IAT Level I Information Assurance Certification required (CompTIA A+ or equivalent).

Cyberspace Data Scientist

Full-time position located in Augusta, Georgia.

This position will be incorporated into the Metova CyberCENTS team.

Metova is seeking a qualified and highly motivated individual to serve as Cyberspace Data Scientist in support of the Cyber Center Of Excellence’s TRADOC Capability Manager Cyber (TCM Cyber).

Learn More

Role and Responsibilities

Major responsibilities include (not all inclusive):

  • The individual needs to have a situational understanding of Cyberspace operations. They must be able to provide support and solutions to third-parties and end users. They will also be required to oversee and manage specific aspects of Cyberspace solutions development such as:
  • Understand the data architecture development, cloud based computing and visualization are necessary in order to provide technical guidance on future solutions development.
  • Knowledge of Army Force modernization, capability development process and or requirements determination process.
  • Information technology, data management, analytics, and visualization
  • knowledge in leading small teams
  • Excellent oral and written communication skills will be necessary to convey information, explain issues, and provide support to individuals and/or groups requiring assistance with capability development process.

Physical Demands:

  • Normal demands associated with an office environment.
  • Ability to work on a computer for long periods of time.
  • Ability to communicate with individuals by telephone, email and face to face.
  • Some travel may be required.

Requirements

  • TOP SECRET clearance and upon award be immediately eligible for nomination to receive
  • Special Compartmented Information (SCI) access.
  • ten (10) years’ experience in information technology, data management, analytics and visualization, knowledge in leading small teams and experience/knowledge of force modernization, capability development process, or requirements determination process.
  • Master’s or doctorate degree from an accredited university in data science, informatics and computing or other relevant information science degree.
  • A certification in Certified Information Systems Security Professional (CISSP) is required.
  • A minimum of DOD 8570 IAT Level III Certification required (CISSP or equivalent).

IA Network/RMF/Support Officer

Full time position at Fort Gordon, Georgia.

Learn More

Roles and Responsibilities

  • Implement procedures for vulnerability mitigation, thereby minimizing system threats such as hackers, malicious code attacks;
  • Verify operating procedures and accreditation for subject device and/or network;
  • Execute device, network, & system vulnerability assessments using procedures and tools as approved by the government IAM;
  • Evaluate threats and vulnerabilities to ascertain whether additional safeguards are needed;
  • Develop, analyze, assess for impact, test, and recommend changes to address, mitigate, or eliminate vulnerabilities; execute CCB approved changes;
  • Execute device and/or network security testing to ensure compliance with DoD and U.S. Army standards (e.g. IAVM processes and procedures);
  • Update system documentation to reflect changes and the new status / configuration of the system;
  • Ensure the development of system certification documentation by reviewing and endorsing such documentation and recommending action by the government IAM and the Director, Modeling, Simulations and Experimentation Division;
  • Maintain appropriate system accreditation documentation, including records in standard Army IT/IA tracking tools (e.g. APMS, C&A TdB, etc.);
  • Evaluate certification documentation and provide written recommendations for accreditation to the IAM;
  • Ensure records of all security-related vulnerabilities and incidents are maintained and report serious or unresolved violations to the IAM;
  • Assess changes in the systems, networks, its environment and operational needs that could impact the security posture and/or accreditation of the systems;
  • Document and research incident resolutions and communication with all appropriate parties as directed by the government IAM;
  • Research security related regulations, publications and directions to stay abreast so potential threats to the M&S and ED computers may be effectively mitigated;
  • Recommend, develop, and coordinate staffing of interconnection agreements with external systems.

Requirements

  • Certification in Windows Server – or –  Experience in DoD Information Assurance Certification and Accreditation Process (DIACAP) moving to Risk Management Framework (RMF)  (required)
  • Willing to achieve Windows Server Cert in 6-8 months or develop an Advanced understanding in Risk Management Framework experience (Aptitude to achieve)
  • Understanding and hands on experience with:  common applications used in experimentation M&S, how to build, manage computer images; the cloning process, and manage computer hardware (Servers, Workstations, Laptops).
  • Basic understanding and hands on experience with:  Windows OS, VTC Suites (LINUX experience a plus)
  • Basic understanding and hands on experience with:  Switches and Routers
  • Basic CAT V/VI wiring fundamentals (security classifications cable colors, how to run cat VI, making and testing cables, patch panels, flag tagging
  • Possess a Secret (at hire) with the potential to be upgraded to a TS in the next two years.

Submit your cover letter, resume, and requested position