CenturyLink IT Systems Engineer III - Federal in Colorado Springs, Colorado

CenturyLink (NYSE: CTL) at http://www.centurylink.com is a global communications and IT services company focused on connecting its customers to the power of the digital world. CenturyLink offers network and data systems management, big data analytics, managed security services, hosting, cloud, and IT consulting services. The company provides broadband, voice, video, advanced data and managed network services over a robust 265,000-route-mile U.S. fiber network and a 360,000-route-mile international transport network. Visit CenturyLink at http://www.centurylink.com/ for more information.

Job Summary

Engineer III position is responsible to the operations manager for advanced network security tasks/processes in a complex, secure and challenging environment in support of a nationwide fiber optic transport network and two geographically separated network operations centers. Work location is Colorado Springs.

Job Description

  • Make use of trouble ticketing system to and document outages.

  • Implement software patches and security updates as required.

  • Use software and hardware tools to identify and diagnose network status and performance.

  • Conduct analysis/audits of log files and network activity to identify, report, and remediate the effects of unauthorized user activity.

  • Installs, documents, and manages security software/system tools, configurations, and tests/verifies processes to ensure standard and secure implementation and use of systems, tools, and processes.

  • Provides recommendations and engineering solutions for new security systems and procedures as well as modifications to current configurations.

  • Reacts quickly and competently to identify, track, document, escalate, and resolve immediate network vulnerabilities/threats.

  • Customizes security system software based on research and customer needs as appropriate.

  • Coordinates and facilitates communications with engineering and security departments and commercial vendors to identify, investigate and resolve security vulnerability matters.

  • Communicates status of security system, processes, ongoing malicious activity, and possible vulnerabilities with management and customers.

  • Develops and implements detailed standard operations procedures dealing with Network Operations Centers.

  • Provides project status to management.

  • Provides after-hours support on an on-call basis, as required.

  • Assess risk factors and remediate system vulnerabilities as required.

  • Deploys, maintains, and troubleshoots firewalls, Intrusion Detection/Prevention devices, vulnerability assessment tools, event and log analysis, security change tracking and other network security systems and devices.

  • Maintain and monitor anti-virus server and clients.

  • Acts as technical lead on new security system initiatives or countermeasures.

  • Responds to the escalation of trouble reports by isolation of problem and mobilization of resources capable of affecting a resolution in a manner which least disrupts customer service within acceptable security risks.

  • Troubleshoots and analyzes security software/system tools to ensure compatibility and integration with hardware systems.

  • Provides after-hours support on an on-call basis, as required.

  • Perform other duties as assigned.

  • Estimated 15% of time is travel; however, the amount of travel is dependent on the current mission requirement and operations environment.#CFJFED

#LI-POST1

Qualifications

  • DoD 8570 IAT Level II certification or above required. IAT Level III certification preferred.

  • Experience with accreditation of DoD information systems and knowledge of NIST at http://en.wikipedia.org/wiki/NationalInstituteofStandardsandTechnology Special Publication 800-37, "Guide for Applying the Risk Management Framework to Federal Information Systems," developed by the Joint Task Force Transformation Initiative Working Group, transforms the traditional Certification and Accreditation at http://en.wikipedia.org/wiki/Certificationand_Accreditation (C&A) process into the six-step Risk Management Framework (RMF).

  • Top Secret clearance mandatory and current SCI mandatory.

Education

Bachelors or Equivalent in Information Systems or Information Systems

Alternate Location: US-Colorado-Colorado Springs

Requisition # : 143509

This job may require successful completion of an online assessment. A brief description of the assessments can be viewed on our website at http://find.centurylink.jobs/testguides/

EEO Statement

We are committed to providing equal employment opportunities to all persons regardless of race, color, ancestry, citizenship, national origin, religion, veteran status, disability, genetic characteristic or information, age, gender, sexual orientation, gender identity, marital status, family status, pregnancy, or other legally protected status (collectively, “protected statuses”). We do not tolerate unlawful discrimination in any employment decisions, including recruiting, hiring, compensation, promotion, benefits, discipline, termination, job assignments or training.

Disclaimer

The above job definition information has been designed to indicate the general nature and level of work performed by employees within this classification. It is not designed to contain or be interpreted as a comprehensive inventory of all duties, responsibilities, and qualifications required of employees assigned to this job. Job duties and responsibilities are subject to change based on changing business needs and conditions.