| Provides SME in the area of IA to support DISA/FSO, the COCOMs Combatant Commands, and all branches of the U.S. Military. DoD 8570.1-M compliant for IAT and IAM Level III. Supervised managed 50 contractor personnel to include travel, training, counsel, guidance technical support for all aspects on the IA contract. Responsible for management of the entire project and the assigned staff, ensuring appropriately skilled trained personnel are properly assigned. Developed contingency planning for system and network outages. Conduct risk assessment for systems worked solutions to fix or mitigate risk. Coordinate IAVM alerts with the teams for applications to IA tools. Provide VMS guidance to technicians for compliance reporting. Provide management for technical, engineering, IA professional supportability to provide guidance and direction in the task areas identified in the statement of work. Author required documentation such as DIACAP - System Identification Profile for Certification and Accreditation of security tools. Oversee the configuration deployment of IA Security Tools on DISA other related networks. Work to ensure all DoD IA Tools support the confidentiality, integrity, and availability of systems, networks, data through the planning, analysis, development, implementation, maintenance, enhancement of security policies procedures. Ensure system baselines are tested, implemented, maintained thoroughly documented. Identify, interpret implement security standards for FSO supported IA tools deployed DoD-wide. Assist in the resolution of configuration concerns and problems related to evaluation and placement of Information Assurance Security tools. Assist in the testing and implementation of new security software and tools. Actively participate with multiple COCOM's, DISA organizations, and DoD agencies on development of network drawings and researching technical issues to support multiple projects. Work to ensure all DoD IA Tools support the confidentiality, integrity, and availability of systems, networks, and data through the planning, analysis, development, implementation, maintenance, enhancement of security policies and procedures. Installation, deployment, troubleshooting, securing STIG compliance and maintenance of McAfee ePo, AV, PA, Anti Spyware, DCM, eEye Retina/REM, McAfee Hercules, Securify SecurVantage, ISS RealSecure Intrusion Detection Software, ISS Real-Secure Network Senor and Work-Group Manager systems, ISS Internet Scanner, JIDS, Sourcefire, CA PestPatrol, Harris STAT scanner |