12/10/2023 0 Comments Mos 25b job descriptionSupervises a team consisting of seven battalions and 3500+ Soldiers manages and troubleshoots Automated Information Systems (AIS), Tactical Secure networks and over 5,000 pieces of equipment valued at over $2,000,000 provides technical and Cyber Security assistance to user owned AIS maintains, operates, and integrates Information Assurance and Information Systems for the brigade HQ and staff responsible for the welfare, preparation, and development of two McAfee Enterprise Security Managers (ESM) and five Network Intrusion Detection Systems (NIDS). Responsible for the health, welfare, and training of 32 service members and their families. Supervises, manages, and troubleshoots Automated Information Systems (AIS), Tactical Secure networks, and specialized Cyber Security appliances ensuring high availability and secure data transmissions in support of the warfighter mission and over 5,000 pieces of equipment valued in excess of $2,000,000. Serves as the Brigade Combat Team (BCT) Senior Infrastructure Support Specialist and BDE S6 NCOIC for a Stryker Brigade Combat Team consisting of seven battalions and 4500+ Soldiers. Serves as the Senior Incident Responder within the G6 provides technical guidance to the Assistant Chief of Staff G6 on cybersecurity matters monitors and maintains division and brigade cyberspace defense assets for both the tactical and installation as a docking station (IaaDS) networks within the 1ID Area of Operations (AO) trains and develops seven division and brigade 25Ds (Network Cyber Defenders) supports Defensive Cyber Operations (DCO) that aid in assured mobility for the 1st Infantry Division across cyber terrain in the Department of Defense Information Network (DoDIN). Leads network defense operations, including monitoring, intrusion detection, incident response, and vulnerability assessments to identify and mitigate cyber threats provides guidance and mentorship to junior personnel, ensuring their proficiency in executing assigned tasks and contributing to the overall cybersecurity posture implements necessary changes to maintain network security coordinates with other units and agencies to minimize damage and prevent future incidents in the event of security breaches evaluates network vulnerabilities and recommends strategic mitigation strategies enhances cybersecurity awareness through comprehensive training programs and collaborates with other units and agencies to address evolving cyber threats while staying current on the latest cybersecurity trends.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |