Electronic Knee Board (EKB) Publications Support (A3TV) Customer Service & Call Center - Hampton, VA at Geebo

Electronic Knee Board (EKB) Publications Support (A3TV)

Overview:
Headquarters, Air Combat Command (ACC), Directorate of Operations (A3), Flight Operations Division (A3T) at Langley Air Force Base, VA is responsible for the combat readiness and training of the Combat Air Forces (CAF).
ACC/A3T provides the operational expertise required to meet current and future needs of the CAF by developing, coordinating, and publishing command guidance for all aspects of CAF fighter aircrew training.
Job
Summary:
Advise the Government on all aspects of the CAF EKB program including current and planned technologies and methodologies.
Requirement:
Active Top Secret clearance with SCI/SAP/SAR eligibility is requiredEducation and
Experience:
Bachelor's degree in Information Systems, Computer Science, or related technical field 3 years of experience utilizing mobile devices with a focus on iOS and working mobile IT topologies, to include a keen understanding of wireless routers/modems, commercial ISP and cellular services, and how to establish those services 3 years of systems administration experience establishing group security policies and resolving a multitude of IT issues either by hands-on troubleshooting or through the CIPS/Remedy/IAO Express trouble ticketing processesEssential Duties:
Ensure EKB software, hardware, and firmware comply with appropriate security configuration guidelines.
Assist in implementing and enforcing all AF Cybersecurity policies, procedures, and countermeasures and managing applicable resources within the EKB program.
Follow proper configuration management procedures prior to EKB.
Coordinate changes or modifications with the system-level ISSM, SCA, and/or Cybersecurity officials.
Initiate protective or corrective measures, in coordination with Cybersecurity managers, when a security incident or vulnerability is discovered.
Report security incidents or vulnerabilities to the system-level ISSM and Cybersecurity officials according to AFI 17-130.
Recommend SAP/SCI/CPA security measures for vaults, simulators, cockpits, and mission crew decks.
Initiate exceptions, deviations, or waivers to Cybersecurity requirements for Government consideration.
Coordinate as needed for EKB IT support, sustainment, and modernization plans and mobile device management, upgrades, technical refresh, communications, and Security direction.
Assist in ensuring appropriate standardization of T.
O.
and FLIP integration and ensure currency compliance.
Help develop future EKB capability requirements with USAFWS/WEPTAC.
Interface with vendors to achieve optimal service and equipment.
Provide full spectrum of project management on short-term projects to include research, selection recommendations, scheduling, implementation inventory tracking, and sustainment.
Assist in the development of strategies for the ACC EKB enterprise to include budget formulation for future funding requirements, network management, scaling of infrastructure to provide robust bandwidth, and evaluating future technology products to support the enterprise.
Conduct studies and analyses of WAN-related issues.
Provide guidance and assistance related to WAN installation, integration, maintenance, and migration.
Support the other Operational Mobile Device programs as needed.
Knowledge, Skill and Abilities:
IAT Level II certification IAW DoD 8570 Expertise in configuration, management, and security of Samsung devices using Android operating systems and Knox security Understanding of Mobile Device Management (MDM) regarding the administration of mobile devices (i.
e.
smartphones, tablets, laptops, and desktop computers) Experience with commercial mobile technology and enterprise mobile management services (i.
e.
mobile device management, mobile content management, and/or mobile application management) including knowledge of some/all of the following:
MobileIron, BlackBerry Unified Endpoint Management (UEM), IBM MaaS 360, VMware AirWatch, Citrix XenMobile, DoD Mobile Unclassified Capability (DMUC) and/or the DoD Mobile Classified Capability (DMCC) 3 years of experience in Desktop Support or Mobile Device Support 1 year of experience with equipment and software management, to include equipment custodian duties 3 years of experience with Cyber Systems Management Experience providing a high level of customer-relationship management with hands-on support and trainingTo apply, please go to https:
//vectorcsp.
applicantpro.
com/.
For assistance, please contact our Human Resources Department by telephone at (252) 337-5120 or by email at.
This position is contingent upon contract award.
Vector CSP, LLC is an equal opportunity employer and does not discriminate against any employee or applicant for employment because of race, color, religion, national origin, age, disability, or any other reasons prohibited under Federal, State, or local laws.
EOE AA/M/F/D/V.
VectorCSP is a federal contracting small business based out of North Carolina.
We help our nation's military and government leaders realize the Cost, Schedule, and Performance goals of their organizations through our expert integrated logistics, engineering, training, and strategic program management support.
We offer Medical, Vision, LTD, STD, Life Insurance, Dental, 401K, PTO, and Tuition Reimbursement to those who qualify.
Like us on Facebook, https:
//www.
facebook.
com/VectorCSP/ & follow us on LinkedIn, https:
//www.
linkedin.
com/company/vectorcsp/ />Job Posted by ApplicantPro Recommended Skills Administration Business Relationship Management Citrix Systems Communication Configuration Management Content Management Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.