Information Assurance Technician II*

Job ID
# of Openings


***** Please note this position is pending contract award. *****

Job Title: Information Assurance Technician II *

Job Location: Qatar

Security Clearance: Active, in-scope US Government issued Secret clearance

Due to the nature of the work and contract requirements, US Citizenship required.

Job Responsibilities:

Trace Systems is seeking an experienced Information Assurance Technician II to support our on-site team based in Qatar. The candidate shall provide cyber-security management support to the Air Force Cyber Security Program Management. The ideal candidate will coordinate all actions required by the Government cyber security-related CTOs including, but not limited to, vulnerability scanning and patch compliance. The Government Cyber Security oversees all vulnerability scans.

Cyber security tasks shall include:

  • Scanning: Annotate remediation and mitigation actions on the vulnerability scan reports and return responses to Government Cyber Security to meet CTO compliance standards.
  • Patching: Monitor and verify patch compliance using the approved technical solution (i.e., SCCM, Assured Compliance Assessment Solution Information Assurance Vulnerability Alert (IAVA) compliance dashboards to track patching progress IAW patch compliance requirements. Subtasks shall include:
  • Coordinate appropriate actions to ensure site systems are receiving patches and identify any patch installation issues.
  • Coordinate with local administrators to troubleshoot and elevate patching issues to NOSC engineers in a timely manner in order to meet patch compliance timelines. If automated patches are unavailable, such as with PMO systems, the candidate shall coordinate with PMO offices for manual patching of these systems to meet compliance levels.
  • Develop a POA&M when CTO compliance cannot be met by the compliance date.
  • Review System Logs: Review all system logs on a daily basis for indications of unauthorized activity. Suspicious or abnormal log information shall be noted, escalated, and safeguarded.
  • Report and Contain Viruses, Malicious, and Negligent Activities: Report virus outbreaks or suspected malicious activity directives and instructions. The contractor shall take appropriate action to contain a virus outbreak or suspected malicious activity immediately; this includes updating virus signatures and possibly isolation of the infected system(s). A Remedy trouble ticket shall be opened for all virus outbreaks or suspected malicious activity.
  • Report all Negligent Discharges of Classified Information (NDCI) or Cross Do- main Violations (CDV) directives and instructions. The contractor shall take appropriate actions to contain and safeguard classified information from being further compromised. All NDCIs/CDVs and their respective reporting shall be classified to the same level as the information contained.
  • Attend and participate in required NOSC Systems and Cyber Security meetings or teleconferences.
  • Security Information and Event Management (SIEM): Monitor internal and wireless (if site is equipped with wireless) SIEM systems and escalate any possible alerts to the Government Cyber Security for investigation. The candidate shall attempt to identify the source and severity of activity and work with the Government Cyber Security to contain, eradicate, or block the malicious activity. The contractor shall review all intrusion and SIEM system alerts, logs, and reports for false positives.
  • The candidate shall identify all activity detected by working with site systems and networks to document the activity that is causing the alerts. The contractor shall then work with site and the Government Cyber Security leadership to acquire approval to filter out these alerts.
  • Air Wireless Detection: Monitor over-the-air wireless detection systems if site is so equipped for indications of malicious activity against wireless systems. The contractor shall attempt to identify the source of activity and consult with the Government Cyber Security and site leadership on courses of action.
  • Wireless Audits: Conduct wireless audits (war drives) to detect any unauthorized wireless devices connected to the site network. The contractor shall consult with site leadership and Government Cyber Security to identify the device and assist in any investigations as directed by leadership.
  • Network Compliance: Review all site Access Control Lists and validate that permitted activity is relevant to current systems/network architecture and approved through Government Cyber Security leadership.
  • Audit all backup procedures to validate critical systems can be reconstituted after failure. Review all network account access request forms for accuracy prior to account creation. The contractor shall be responsible for maintaining certifications as listed in the labor category. 

Minimum Qualifications:

  • Intermediate level of experience in design, maintenance, and operation of small to medium networks managing mail servers, printer servers, WWW servers, and/or firewalls.
  • Must have experience in reviewing and recommending software applications as well as identifying hardware salient characteristics and any add on devices. Experience in systems management, monitoring and sustainment; hardware repair for servers, PCs, peripheral equipment; software installation, maintenance and sustainment.
  • Must have intermediate level of experience working with the following:
    • Tactical and strategic security issues of systems and networks, and associated requirements specific to deployed architecture
    • Network security, network and systems intrusion detections, advanced devices, firewalls, and software specific to the Department of Defense
    • Server operations including installation, configuration, optimization, and analyzing logs on Windows operating systems (including Server 2008/2012 and modern desktop versions)
    • Cisco IOS, CAT OS, configuration of Cisco routers and switches
    • Server operations including installation, configuration, optimization, and analyzing logs on Unix operating systems (including Linux and Solaris)
    • Mastery of the functions of DoD 8570-defined IAT Level I position
    • Active, in-scope US Government issued Secret clearance


  • High School Diploma

Certification Requirements:

Must meet the certification requirement of DoD 8570.01-M. The candidate is expected to have, but is not limited to, one or more IT certifications from each group:

Group 1: Information Technology Certification Requirements

  • Microsoft Certified Solutions Expert (MCSE) – Microsoft Exchange/Windows Server or equivalent
  • Cisco Certified Network Associate
  • Cisco Certified Network Professional (CCNP)
  • CompTIA Linux +
  • Linux Professional Institute Certification (LPIC)
  • Red Hat Certified Engineer (RHCE)

Group 2: IA Technology Certification Requirements

  • GIAC Certified Perimeter Protection Analyst (GPPA)
  • CompTIA Cyber Security Analyst (CSA +)
  • GIAC Certified Intrusion Analyst (GCIA)
  • GIAC Certified Windows Security Administrator (GCWN)
  • GIAC Certified UNIX Security Administrator (GCUX)
  • GIAC Systems and Network Auditor (GSNA)
  • GIAC Global Industrial Cyber Security Professional (GICSP)
  • Global Information Assurance Certification (GIAC) Security Essentials Certification (GSEC)
  • CompTIA Security +
  • Security Certified Network Professional (SCNP)
  • Systems Security, Certified Practitioner (SSCP)
  • GIAC Security Expert (GSE)
  • Security Certified Network Architect (SCNA)
  • Certification and Accreditation Professional (CAP)
  • GIAC Information Security Fundamentals (GISF)
  • GIAC Security Leadership Certification (GSLC)
  • Certified Information Security Manager (CISM)

Group 3: IAT Level III Requirements

  • Certified Information Security Auditor (CISA)
  • GIAC Certified Incident Handler (GCIH)
  • Certified Information System Security Professional (CISSP) or Associate
  • CompTIA Advanced Security Practitioner (CASP CE)
  • Cisco Certified Network Professional (CCNP) – Security
  • GIAC Certified Enterprise Defender (GCED)

Trace Systems

Trace Systems, headquartered in Vienna, Virginia, was founded to support and defend our nation's security interests at home and abroad–– whenever and wherever. We provide cybersecurity, intelligence, communications, networking and information technology services, systems, and solutions to the United States Department of Defense, Intelligence Community and Department of Homeland Security.


To Apply: We invite you to put your talents to work by joining a growing team of dynamic professionals here at Trace Systems! Be part of a culture at our leading edge company where you can achieve great things while fostering a satisfying and rewarding career progression. Please apply directly through the website at:      #jointracesystems


Trace Systems is an Equal Opportunity and Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex (including pregnancy), sexual orientation, gender identity, national origin, age (40 or older), genetic information, disability or veteran status. 


Sorry the Share function is not working properly at this moment. Please refresh the page and try again later.
Share on your newsfeed

Connect With Us!

Not ready to apply? Connect with us for general consideration.