NCI: As an Enterprise IP-VTC Unified Capabilities Senior Systems Engineer, provide non-personal Army Enterprise Internet Protocol Video TeleConference (IP-VTC) services supporting the United States Army Network Enterprise Technology Command (NETCOM). Provide IT support to NETCOM and NETCOM supported organizations for Department of Defense (DoD) Information Network (DoDIN) hardware, software, data, applications, tools, and systems used/provided by the Army. Provide direct support to the NETCOM and its worldwide customers with business operations, Network Operations (NetOps), Operations and Maintenance (O&M) support, Cybersecurity, Knowledge Management (KM), Army Enterprise Service Ownership/Development and Capability Management, plus Content Management requirements for Army Enterprise IP-VTC capabilities and services. Provide support in accordance with (IAW) industry and Army/DoD best practices as delineated in frameworks/guidelines such as the Information Technology Infrastructure Library (ITIL), Army Enterprise Service Management Framework (AESMF), DoD Enterprise Service Management Framework (DESMF), and Defense Information Systems Agency (DISA) Security Technical Implementation Guides (STIGs). Support is required in the NETCOM managed Department of Defense Information Network - Army (DoDIN- Army) Nonsecure Internet Protocol Router Network (NIPRNET) and Secure Internet Protocol Router Network (SIPRNET) environments. In assuming this position, you will be a critical contributor to meeting NCI's mission: To deliver innovative, cost-effective solutions and services that enable our customers to rapidly adapt to dynamic environments.
Highlights of Responsibilities:
- Provide support for Unified Capabilities (UC). The Army defines UC as the integration of Voice, Video, and Data services delivered ubiquitously across a secure and highly available infrastructure, independent of the technology, to provide increased mission effectiveness to the Warfighter and business communities. UC includes Internet Protocol – Video Telecommunications (IP-VTC), Voice over Internet Protocol (VOIP), and Instant Messaging and Collaborative Services. These are described in the following four functional areas
- Assist with cybersecurity functional support for assessments, authorizations, and documentation of enterprise fielded systems managed by NETCOM HQ
- Assist the NETCOM CM in development of enterprise services/capabilities, including Army Portfolio Management System (APMS) system registration and maintenance, concepts of operations (CONOPS), functional requirements documents (FRD), Enterprise Technical Procedures (ETP), and Standard Operating Procedures (SOP), Change Configuration Release and Management (CCRM) Deployment Plan, doctrine, policies, processes, standards, and other supporting documentation. Support NETCOM CM in developing and supporting key solutions for service/capability implementation, fielding, and operations, including concepts, architecture, requirements, and integration (between operational, and strategic levels of operations) analysis for related solutions throughout the Army Enterprise; provide technical guidance for enterprise systems that affect the mission-essential operations of the DoDIN-Army; and coordinates with other Army Commands, installations, key personnel, and industry partners to develop and implement a plan to transition, migrate, and onboard organizations and their users. Provide information, analysis, and recommendations on the required force structure requirements (organization, training, and personnel), and changing roles and responsibilities associated with NetOps, migration, onboarding, and provisioning of tiered O&M support; and then implements those programs.
- Tier II/III (handles the most difficult problems and are experts in their field often conducts research and develops solutions for new or unknown issues) support for the NETCOM Headquarters and Regional Cyber Center (RCC) internal VTC equipment.
- VTC scheduling, call monitoring, endpoint testing, and troubleshooting support to NETCOM customers utilizing IP-VTC services.
- Configure VTC call manager suites of equipment on NIPRNet and SIPRNet to communicate with call managers at the deployed unit locations and with call managers in all military theaters of operations.
- Coordinate with installation RCCs and Network Enterprise Centers (NECs) to ensure network connectivity is available and alert NEC system administrators about outages.
- Troubleshoot and monitor appliances for failures and alarms. Install, configure, and maintain a lab environment in support of Information Assurance Vulnerability Alert (IAVA) testing/patches and system/database upgrades.
- Provide technical guidance and support to end-users, sites, including posts, camps, and stations, on problems relating to the endpoints, bridges, VTC appliances, and Global Video Services (GVS).
- Provide timely situational awareness of critical events, their impact, reasons for outages, projected time to resolve, and final resolutions.
- Enterprise IM and collaborative services systems that do not currently exist at the Army Enterprise level. Support an eventual Enterprise IM and Collaboration Tool systems to be determined at a later date. These systems may also be integrated with the existing Enterprise Voice over Internet Protocol (VoIP) and VTC Enterprise solutions for seamless call and communication routing, i.e. Jabber, Avaya, GenBand, Skype for Business, and Office 365.
- Support NETCOM with its Risk Management Framework (RMF) processes. Supporting:
- Enterprise Mission Assurance Support Service (eMASS)
- Implementation Security Controls as identified via information system security categorization in accordance with NIST SP 800-53 and CNSSI 1253.
- Ensure the VTC equipment and applications are STIG and IAVA compliant.
- Extensive experience with DoD security hardening, collection and assessment tools (STIGs, ACAS SCAP, Nessus, etc.) and experience with security architectures, firewalls and network access.
- Extensive experience in cybersecurity documentation and system authorization artifacts (System Security Plan, lifecycle documentation, continuous monitoring plan, Security Assessment Plan, Security Assessment Report, Risk Assessment, etc.).
- Extensive knowledge of and review the Risk Management Framework (RMF) and Certificate of Networthiness (CoN) submission.