IT Systems Engineer III - Federal Information Technology (IT) - Colorado Springs, CO at Geebo

IT Systems Engineer III - Federal

CenturyLink (NYSE:
CTL) is a global communications, hosting, cloud and IT services company enabling millions of customers to transform their businesses and their lives through innovative technology solutions.
CenturyLink offers network and data systems management, Big Data analytics and IT consulting, and operates more than 55 data centers in North America, Europe and Asia.
The company provides broadband, voice, video, data and managed services over a robust 250,000-route-mile U.
S.
fiber network and a 300,000-route-mile international transport network.

Responsibilities & Job Duties

  • Engineer III position is responsible to the operations manager for advanced network security tasks/processes in a complex, secure and challenging environment in support of a nationwide fiber optic transport network and two geographically separated network operations centers.
  • Make use of trouble ticketing system to and document outages.
  • Implement software patches and security updates as required.
  • Use software and hardware tools to identify and diagnose network status and performance.
  • Conduct analysis/audits of log files and network activity to identify, report, and remediate the effects of unauthorized user activity.
  • Installs, documents, and manages security software/system tools, configurations, and tests/verifies processes to ensure standard and secure implementation and use of systems, tools, and processes.
  • Provides recommendations and engineering solutions for new security systems and procedures as well as modifications to current configurations.
  • Reacts quickly and competently to identify, track, document, escalate, and resolve immediate network vulnerabilities/threats.
  • Customizes security system software based on research and customer needs as appropriate.
  • Coordinates and facilitates communications with engineering and security departments and commercial vendors to identify, investigate and resolve security vulnerability matters.
  • Communicates status of security system, processes, ongoing malicious activity, and possible vulnerabilities with management and customers.
  • Develops and implements detailed standard operations procedures dealing with Network Operations Centers.
  • Provides project status to management.
  • Creates monthly customer operations IPR outage slides
  • Provides after-hours support on an on-call basis, as required.
  • Create and maintain network policies and procedures, to include training documentation.
  • Assess risk factors and remediate system vulnerabilities as required.
  • Experience with IBM Blade Centers/Servers, Tipping Point IDS/IPS, McAfee Firewall and Host Based Security System, and Ciena optical equipment highly desired.
  • Deploys, maintains, and troubleshoots firewalls, Intrusion Detection/Prevention devices, vulnerability assessment tools, event and log analysis, security change tracking and other network security systems and devices.
  • Maintain and monitor anti-virus server and clients.
  • Acts as technical lead on new security system initiatives or countermeasures.
  • Responds to the escalation of trouble reports by isolation of problem and mobilization of resources capable of affecting a resolution in a manner which least disrupts customer service within acceptable security risks.
  • Troubleshoots and analyzes security software/system tools to ensure compatibility and integration with hardware systems.
  • Provides after-hours support on an on-call basis, as required.
  • Perform other duties as assigned.
  • Estimated 15% of time is travel; however, the amount of travel is dependent on the current mission requirement and operations environment.
  • Previous military experience preferred

Job Requirements

  • DoD 8570 IAT Level II certification or above required.
    IAT Level III certification preferred.
  • Bachelors degree in an Information Technology field and three years experience or seven years applicable work experience desired.
  • Experience with accreditation of DoD information systems and knowledge of NIST Special Publication 800-37, Guide for Applying the Risk Management Framework to Federal Information Systems, developed by the Joint Task Force Transformation Initiative Working Group, transforms the traditional Certification and Accreditation (C&A) process into the six-step Risk Management Framework (RMF).
  • Experience with Assured Compliance Assessment Solution (ACAS) highly desired
  • Top Secret clearance mandatory and current SCI mandatory.

#CFJFED

#LI-POST1

Alternate Location:
US-Colorado-Colorado Springs

Requisition # :
129317

This job may require successful completion of an online assessment.
A brief description of the assessments can be viewed on our website at

EEOStatement

No Discrimination.
We are committed to providing equal employment opportunities to all persons regardless of race, color, ancestry, citizenship, national origin, religion, veteran status, disability, genetic characteristic or information, age, gender, sexual orientation, marital status, family status, pregnancy, or other legally protected status (collectively, protected statuses).
We do not tolerate unlawful discrimination in any employment decisions, including recruiting, hiring, compensation, promotion, benefits, discipline, termination, job assignments or training.
Any offer of employment is contingent upon the results of a pre-employment drug test and background check.

Disclaimer

The above job definition information has been designed to indicate the general nature and level of work performed by employees within this classification.
It is not designed to contain or be interpreted as a comprehensive inventory of all duties, responsibilities, and qualifications required of employees assigned to this job.
Job duties and responsibilities are subject to change based on changing business needs and conditions.

.
Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.