About the Role
<div id="ContentSection11_pcContentSectionMainPanel" ><table border="0" cellspacing="0" cellpadding="0" id="ContentSection11_pcContentSectionConatinerTable"><tbody><tr><td valign="top"><div id="ContentSection11_pnlContainer"><div id="PNL_REQ_DESC"><table border="0" cellspacing="1" cellpadding="2"><tbody><tr><td colspan="4">Short Description: <br />Network Architect with 13+ years of design and implementation experience in Security and Cisco Networking solutions</td></tr><tr><td colspan="4">Complete Description: <br />Plan, design, implement, and secure networks to support enterprise and/or service provider environment. Responsibilities include product evaluation, architect solutions, produce engineering and design documents, and provide Tier3 support for the network infrastructure. Assessing the security posture of existing network environments, identifying risks, recommend remediation plans; and ensuring projects are deployed in compliance with certification and accreditation standards in accordance with NIST, DOD 8500, FISMA, JAFAN, DCID, ICD 503, PCI, HIPAA, and SOX</td></tr><tr><td colspan="4">Behavior Characteristics: <br />Thrives in a time- critical, results-oriented environment; speaks and writes effectively; can analyze and think critically; is detail-oriented; creatively solves problems; facilitates interagency cooperation; is aware of financial bottom line</td></tr><tr><td colspan="4"> </td></tr></tbody></table></div></div></td></tr></tbody></table></div><div id="ContentSection14_pcContentSectionMainPanel" ><table border="0" cellspacing="0" cellpadding="0" id="ContentSection14_pcContentSectionConatinerTable"><tbody><tr id="ContentSection14_HeadingSectionRow"><td id="ContentSection14_HeadingBackgroundCell" ><table border="0" cellspacing="0" cellpadding="0" id="ContentSection14_HeadingTable"><tbody><tr><td id="ContentSection14_HeadingTextCell" valign="middle"> Required / Desired Skills </td><td id="ContentSection14_SectionHeadingEndImageCell" valign="middle"></td><td id="ContentSection14_pcHeadingAdditionalContentOnLeft" > </td><td id="ContentSection14_CollapseButtonsCell" align="right" valign="middle"><div> </div></td></tr></tbody></table></td></tr><tr><td valign="top"><div id="ContentSection14_pnlContainer"><div id="PNL_REQ_SKILLS"><table border="0" cellspacing="1" cellpadding="2"><tbody><tr><td colspan="4" valign="top"><table border="0" cellspacing="0" cellpadding="2" width="525"><tbody><tr><td >Skill</td><td width="1"></td><td >Required / Desired</td><td width="1"></td><td >Amount of Experience</td><td width="1"></td><td >Expertise Rating</td></tr><tr><td >Planning and Design network security architecture</td><td width="1"></td><td >Required</td><td width="1"></td><td >14 Years</td><td width="1"></td><td >3 - Expert</td></tr><tr><td >Develop Security requirements</td><td width="1"></td><td >Required</td><td width="1"></td><td >5 Years</td><td width="1"></td><td >2 - Proficient</td></tr><tr><td >Develop Engineering/Architectural documents</td><td width="1"></td><td >Required</td><td width="1"></td><td >5 Years</td><td width="1"></td><td >2 - Proficient</td></tr><tr><td >Hands-on exp. w/ Cisco firewalls, IDS, and related security technology</td><td width="1"></td><td >Required</td><td width="1"></td><td >5 Years</td><td width="1"></td><td >2 - Proficient</td></tr><tr><td >Experience in designing and securing data center networks</td><td width="1"></td><td >Required</td><td width="1"></td><td >14 Years</td><td width="1"></td><td >3 - Expert</td></tr><tr><td >Hands-on exp w/ building Site2Site & Remote Access VPNs</td><td width="1"></td><td >Required</td><td width="1"></td><td >14 Years</td><td width="1"></td><td >3 - Expert</td></tr><tr><td >Hands-on exp w/ building UAC/NAC solutions</td><td width="1"></td><td >Required</td><td width="1"></td><td >5 Years</td><td width="1"></td><td >2 - Proficient</td></tr><tr><td >Demonstrated understanding of SAN security</td><td width="1"></td><td >Highly desired</td><td width="1"></td><td >3 Years</td><td width="1"></td><td >1 - Basic</td></tr><tr><td >Able to configure wireless authentication technologies (i.e. ACS, LDAP)</td><td width="1"></td><td >Required</td><td width="1"></td><td >5 Years</td><td width="1"></td><td >2 - Proficient</td></tr><tr><td >Experience in performing security audits and developing remediation plans</td><td width="1"></td><td >Highly desired</td><td width="1"></td><td >3 Years</td><td width="1"></td><td >1 - Basic</td></tr><tr><td >Exp. with Net Mgmt tools and protocols (Solarwinds, NetMri, Syslog, SNMP)</td><td width="1"></td><td >Required</td><td width="1"></td><td >3 Years</td><td width="1"></td><td >1 - Basic</td></tr><tr><td >Understanding of ESX / VMWare and Securing a Virtual infrastructure</td><td width="1"></td><td >Highly desired</td><td width="1"></td><td >3 Years</td><td width="1"></td><td >1 - Basic</td></tr><tr><td >Experience implementing and troubleshooting BGP networks</td><td width="1"></td><td >Required</td><td width="1"></td><td >14 Years</td><td width="1"></td><td >3 - Expert</td></tr><tr><td >Experience implementing and troubleshooting OSPF networks</td><td width="1"></td><td >Required</td><td width="1"></td><td >14 Years</td><td width="1"></td><td >3 - Expert</td></tr><tr><td >Experience implementing and documenting standards or best practices</td><td width="1"></td><td >Required</td><td width="1"></td><td >14 Years</td><td width="1"></td><td >3 - Expert</td></tr><tr><td >Experience with mitigating denial of service attacks</td><td width="1"></td><td >Highly desired</td><td width="1"></td><td >3 Years</td><td width="1"></td><td >1 - Basic</td></tr><tr><td >Able to conduct network analysis and troubleshoot at customer sites</td><td width="1"></td><td >Required</td><td width="1"></td><td >5 Years</td><td width="1"></td><td >2 - Proficient</td></tr><tr><td >Exp gathering customer requirements, whiteboarding, presenting solutions</td><td width="1"></td><td >Desired</td><td width="1"></td><td >6 Months</td><td width="1"></td><td >1 - Basic</td></tr><tr><td >Exp. producing BOM and preparing project Statements of Work (SOWs)</td><td width="1"></td><td >Desired</td><td width="1"></td><td >6 Months</td><td width="1"></td><td >1 - Basic</td></tr><tr><td >Understanding of IPv6</td><td width="1"></td><td >Desired</td><td width="1"></td><td >2 Years</td><td width="1"></td><td >1 - Basic</td></tr><tr><td >Knowledge FIPS, HIPAA security guidelines</td><td width="1"></td><td >Highly desired</td><td width="1"></td><td >2 Years</td><td width="1"></td><td >1 - Basic</td></tr><tr><td >Knowledge of encryption standards</td><td width="1"></td><td >Highly desired</td><td width="1"></td><td >2 Years</td><td width="1"></td><td >1 - Basic</td></tr><tr><td >Possesses professional network diagramming skills</td><td width="1"></td><td >Required</td><td width="1"></td><td >14 Years</td><td width="1"></td><td >3 - Expert</td></tr><tr><td >Technical undrstnding to present complex tech concepts to non-tech audience</td><td width="1"></td><td >Required</td><td width="1"></td><td >14 Years</td><td width="1"></td><td >3 - Expert</td></tr><tr><td >One of the following Professional Certifications (CCSP, CISSP)</td><td width="1"></td><td >Required</td><td width="1"></td><td >2 Years</td><td width="1"></td><td >2 - Proficient</td></tr><tr><td >Possesses one of the following Expert Certifications (CCIE, JNCIE, or CWNE)</td><td width="1"></td><td >Required</td><td width="1"></td><td >2 Years</td><td width="1"></td><td >3 - Expert</td></tr><tr><td >Possesses an active secret security clearance</td><td width="1"></td><td >Required</td><td width="1"></td><td >2 Years</td><td width="1"></td><td >2 - Proficient</td></tr><tr><td colspan="5"> <br /><table border="0" cellspacing="0" cellpadding="0" id="ContentSection16_pcContentSectionConatinerTable"><tbody><tr id="ContentSection16_HeadingSectionRow"><td id="ContentSection16_HeadingBackgroundCell" ><table border="0" cellspacing="0" cellpadding="0" id="ContentSection16_HeadingTable"><tbody><tr><td id="ContentSection16_HeadingTextCell" valign="middle">Questions For Requirement </td><td id="ContentSection16_SectionHeadingEndImageCell" valign="middle"></td><td id="ContentSection16_pcHeadingAdditionalContentOnLeft" > </td><td id="ContentSection16_CollapseButtonsCell" align="right" valign="middle"><div> </div></td></tr></tbody></table></td></tr><tr><td valign="top"><div id="ContentSection16_pnlContainer"><div id="PNL_REQ_QSTNS"><table border="0" cellspacing="1" cellpadding="2"><tbody><tr><td colspan="4">Question 1: <br />Bachelor of Science in Computer Science or Electrical Engineering or related fields is desired. Please acknowledge</td></tr><tr><td colspan="4">Question 2: <br />Please provide Certification numbers and Expiration Dates for the required Certifications</td></tr><tr><td colspan="4">Question 3: <br />Must be able to lift at least 40lbs. (The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.) Please acknowledge</td></tr><tr><td colspan="4">Question 4: <br />May be required to work after hours and/or on holidays. Please acknowledge</td></tr><tr><td colspan="4">Question 5: <br />Candidate must have their own laptop to perform daily functions (i.e. email, Office suite, Visio diagrams, security and network management applications and tools) Please acknowledge</td></tr><tr><td colspan="4">Question 6: <br />Must have a valid state issued Drivers License and be able to drive in Washington, DC. Please acknowledge</td></tr><tr><td colspan="4">Question 7: <br />Must carry smart phones at all times. Please acknowledge</td></tr><tr><td colspan="4">Question 8: <br />Please provide proof of security clearance and the name of the organization holding the clearance. <br /></td></tr><tr><td colspan="4">Question 9: <br />Please acknowledge that this position is funded through the end of the fiscal year. The position will be extended based on funding and performance.</td></tr><tr><td colspan="4"> </td></tr></tbody></table></div></div></td></tr></tbody></table><br /></td></tr></tbody></table></td></tr><tr><td colspan="4"> </td></tr></tbody></table></div></div></td></tr></tbody></table></div>