3 days old

Senior Cybersecurity Operations Manager

Columbia, SC 29201
Business Group Highlights


The Defense group supports the Department of Defense (DoD) mission to keep our homeland and its citizens safe. We provide solutions to improve the Nation's defense by providing software, systems engineering, IT, training and logistics and fleet management solutions.


The Senior Cybersecurity Operations Manager shall:

a. Provide management oversight for cybersecurity operations & intelligence functions
b. Analyze cyber intelligence reports to determine correlation and applicability to network operations on USAFCENT networks.
c. Analyze network intrusion detection reports and vulnerability assessments to evaluate security posture as it pertains to current operations and information security levels.
d. Recommends security posture changes based on security analysis and changes in threat indicators.
e. Develop reports and trend analysis of internal and external security activity, and incidents.
f. Provide on-shift training for both contractors and government personnel to include analysis interpretation and threat/event correlation.
g. Contractor analyze Suspicious Event Reports (SER) to determine the impact and effect on USAFCENTs networks and systems, and provide details on possible actions and alternatives to resolve problems, issues, attacks, and intrusions.
h. Cyber Intelligence Coordination. Coordinate with intelligence activities to gain situational awareness of cyber and security threats. Coordination will include physical and virtual meetings, using voice and video technologies. Develop a weekly Cyber Activity Report focused on USAFCENTs networks; the report will include intelligence that directly and indirectly affects USAFCENTs networks and operations from both red and blue team perspectives.
i. Intrusion Detection. Examine logs and information gained from network sniffers or protocol analyzers to determine if possible outside or unauthorized access has occurred. Track and record possible intrusion or security breach from routine daily analysis to successful anomaly/intrusion identification, which includes writing detailed analysis for possible legal use. Function as government subject matter security expert for any legal actions associated with security breaches.
j. Use vulnerability assessment reports to analyze networks and operation systems to determine security weaknesses and shortfalls. Research and provide detailed fix actions for all identified vulnerabilities.
k. Maintain a standard set of published network architectural diagrams; establish and coordinate periodic reviews and publishing to keep information accurate for use by Network Engineers and Helpdesk Technicians. Ensure Enterprise and Site network architecture drawings and diagrams are up to date and accurate. Establish and maintain a web page to provide deployed sites up/download access for site-specific drawings and diagrams.
l. Develop logic flow charts for Enterprise processes utilized by the NOSC and deployed sites. Provide standardized written procedures and/or checklists for associated with common tasks and procedures.
m. Document, create, maintain, and track network accreditation packages throughout their life cycle for local and deployed networks. Visit each site annually or sooner if required to maintain site network accreditation. Work with the Web Design Engineer and Programmer to provide access to the accreditation documentation using standard NOSC web page design practices.
n. Ensure cybersecurity policies are up to date with all USCYBERCOM, Air Force and other government direction.
o. Collaborate with government stakeholders, teammates and other contractors to meet all mission requirements efficiently and effectively.
p. Provide expert technical analysis and direction to optimize mission performance while minimizing program risks.
q. Help ensure program compliance with all government laws, policies and regulations and directives.
r. Institute and maintain industry best-practice standards, processes, and methodologies.


Requires 12 to 15 years with BS/BA or 10 to 13 years with MS/MA or 7 to 9 years with Ph.D.

Required experience and qualifications: - BS degree in Electrical Engineering, Computer Science, Information Technology or other related engineering or technology degree AND 5+ years of experience providing cybersecurity for networks and applications; OR 7 or more years relevant experience AND Unix and Firewall experience

- Active TS/SCI clearance.

Hold all of the following active certifications:
- Network + CE
- Unix/Linux
- Firewall
- ITIL Foundation
- CISSP OR CCNP-Security

- Desired experience and qualifications; it is desired that the candidate meet one or more of the following experience requirements - MS degree in Electrical Engineering, Computer Science, Information Technology or other related engineering or technology degree. - CCNP or CCIE certification. - CEH certification. - Experience with network architectures and vulnerabilities including both satellite and terrestrial TCP/IP networks.

About Perspecta

What matters to our nation, is what matters to us. At Perspecta, everything we do, from conducting innovative research to cultivating strong relationships, supports one imperative: ensuring that your work succeeds. Our company was formed to bring a broad array of capabilities to all parts of the public sectorfrom investigative services and IT strategy to systems work and next-generation engineering.

Our promise is simple: never stop solving our nations most complex challenges. And with a workforce of approximately 14,000, more than 48 percent of which is cleared, we have been trusted to do just that, as a partner of choice across the entire sector.

Perspecta is anAA/EEOEmployer - Minorities/Women/Veterans/Disabled and other protected categories.

As a government contractor, Perspecta abides by the following provision

Pay Transparency Nondiscrimination Provision

The contractor will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. However, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of the other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by the employer, or (c) consistent with the contractors legal duty to furnish information. 41 CFR 60-1.35(c).



  • Information Technology
Posted: 2020-08-09 Expires: 2020-09-08

With offerings in mission services, digital transformation and enterprise operations, our team of 14,000 engineers, analysts, investigators and architects work tirelessly to create innovative solutions. We have the expertise and experience not only to devise solutions, but to execute on them successfully.

Featured Jobs

Sponsored by:
ADP Logo

Career News

Before you go...

Our free job seeker tools include alerts for new jobs, saving your favorites, optimized job matching, and more! Just enter your email below.

Share this job:

Senior Cybersecurity Operations Manager

Columbia, SC 29201

Join us to start saving your Favorite Jobs!

Sign In Create Account
Powered ByCareerCast