UIC Alaska

Information Systems Security Specialist

Program/Project Management
Location : Location
USD $85,000.00/Yr.
USD $120,000.00/Yr.
Clearance Level Must Be Able to Obtain
Minimum Clearance Required
Travel Requirement
Less than 10%


Bowhead seeks to network with an Information Systems Security Specialist to support an upcoming effort in Corona, CA. 


• Conduct, identify and counter DoD network Cyber Security threats and vulnerability scans.
• Applying cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).
• Troubleshooting and diagnosing cyber defense infrastructure anomalies and working through resolution.
• DoD network risk analysis tools to identify vulnerabilities (e.g., ACAS, HBSS, ESS).
• System, network, and OS hardening techniques (e.g., remove unnecessary services, password policies, network segmentation, enable logging, least privilege, etc.).
• Diagnose context of an organization's threat environment to risk management posture.
• Privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).
• Virtual Private Network (VPN) devices and encryption to secure network communications.
• Network malware. (e.g., NIPS, anti-malware, restrict/prevent external devices, spam filters).


• Bachelor’s degree in Computer Science, Information Technology, or related field.
• A minimum of seven (7) years of professional experience.

• Minimum IAT II Baseline Certification
• Network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth & concept of zero trust).
• Intrusion Detection System (IDS)/Intrusion Prevention System (IPS) tools and applications.
• TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services.
• Unix/Linux, IOS, Android, and Windows operating systems.
• Transmission records (e.g., Bluetooth, Radio Frequency Identification (RFID), Infrared Networking (IR), Wireless Fidelity (Wi-Fi). paging, cellular, satellite dishes, Voice over Internet Protocol (VoIP)), and jamming techniques that enable transmission of undesirable information, or prevent installed systems from operating correctly.
• Network access, identity, and access management (e.g., public key infrastructure, Oauth, OpenID, SAML, SPML).
• Security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code).

SECURITY CLEARANCE REQUIREMENTS: Must currently hold or be able to obtain a Secret Security Clearance. US Citizenship is a requirement for Secret clearance at this location.

Physical Demands:

• Must be able to lift up to 25 pounds

• Must be able to stand and walk for prolonged amounts of time

• Must be able to twist, bend and squat periodically 




Sorry the Share function is not working properly at this moment. Please refresh the page and try again later.
Share on your newsfeed