Enterprise Information Services, Inc.

  • System Administrator

    Job Location KR | KR-27
    # of Openings
    Targeted Job Start Date
  • Overview

    This project will provide defensive cyberspace operations (DCO) support to Defensive Cyberspace Operations Division (DCOD), US Army Regional Cyber Center-Korea. The DCOD environment includes any hardware, software, application, tool, system, or network used by the Government, whether developed, leased, or commercially purchased.


    Work shall include current and new systems at various lifecycle stages, and any future applications/systems not currently identified. DCO services are required to defend against unauthorized activity on all Army assets residing on the NIPRNet and SIPRNet. This includes activities from external hackers who may attempt to gain unauthorized access, insider threats attempts for unauthorized access, and policy violations that may impact network security and operations. The Contractor shall be required to continue performance during peacetime, crisis, hostilities, and war operations.


    • Ability to recognize a cyber security incident, taking appropriate action to report the incident and preserve evidence, mitigating any adverse impact.
    • Develop and implement access control lists on routers, firewalls, and other network devices.
    • Provide end user IA support for all CE applications, operating systems, peripherals, and applications.
    • Support, monitor, test, and troubleshoot hardware and software IA problems pertaining to their CE.
    • Manage accounts, network rights, and access to NE systems and equipment.
    • Implement applicable patches including IA vulnerability alerts (IAVA), IA vulnerability bulletins (IAVB), and technical advisories (TA) for the CE operating system(s).
    • Configure, optimize, and test network servers, hubs, routers, and switches to ensure they comply with security policy, procedures, and technical requirements.
    • Install, test, maintain, and upgrade CE operating systems software and hardware to comply with IA requirements.
    • Demonstrate proficiency in applying security requirements to an operating system for the NE or CE used in their current position.
    • Install, test, maintain, and upgrade network operating systems software and hardware to comply with IA requirements.
    • Install and maintain perimeter defense systems including intrusion detection systems, firewalls, grid sensors, etc.
    • Ensure that hardware, software, data, and facility resources are archived, sanitized, or disposed of in a manner consistent with system security plans and requirements.
    • Monitor and evaluate the effectiveness of enclave IA security procedures and safeguards.
    • Support the design and execution of security exercises.
    • Conduct tests of network devices and IA safeguards in accordance with established test plans and procedures to ensure compliance with security policies, procedures, and requirements.


    Clearance and Certifications

    • Active DoD TS/SCI clearance
    • DoD IAT Level III; one of the following certifications -- CASP CE, CCNP Security, CISA, CISSP (or Associate), GCED, or GCIH
    • Operating System Certification.
    • Any of the following:

    Additional Qualifications                                  

    • Bachelor’s degree and 4 years’ experience in System Administration and Information Assurance technology;  may substitute five additional years of experience for a Bachelor’s Degree.
    • ITIL Foundations certification (within three months of contract start date or hiring date)
    • All DCO analysts shall have specialized experience in Information Technology (IT) defense infrastructure (Sensors, Vulnerability Scanners, Firewalls, etc.) and a working knowledge of wireless technology and Army operating systems (OS) (i.e. Windows, Apple, and UNIX).
    • Experience working independently to solve problems quickly and completely.
    • Experience leading the work of others.

    EIS is an Equal Opportunity Employer/M/F/V/Disabled.


    Sorry the Share function is not working properly at this moment. Please refresh the page and try again later.
    Share on your newsfeed