Subject Matter Expert, Cyber Intelligence - Point Mugu, CA (1954)

As a leading international services company for more than 65 years, IAP provides a broad spectrum of services and solutions to U.S. and international government agencies, and organizations. A world-class leader in providing seasoned program management, IAP leverages and integrates its capabilities ? IT & Communications, Aviation & Engineering Solutions, Power Solutions, Infrastructure & Logistics - to provide safe, innovative, and reliable solutions to meet customers' diverse and complex challenges. With 2,500 team members, IAP operates in more than 110 locations in 27 countries worldwide and maintains offices in the Washington D.C. area, Florida, Maryland, Oklahoma, the United Kingdom, and the Middle East. Learn more at www.iapws.com.
NAWCWD Electronic Warfare Laboratories Support Services: The Naval Air Warfare Center Weapons Division (NAWCWD), Systems Engineering Department, and Electronic Warfare Integrated Laboratories Division (EWIL) Division requires engineering services in support of Cyber Warfare (CW), Information Operations (IO), Information Warfare (IW), Electronic Warfare (EW), and Foreign Military Sales (FMS) requirements. Primary performance will take place in various NAWCWD CW, IO, IW, and EW laboratories, ranges, facilities and Sensitive Compartmented Information Facilities (SCIF). Testing and support maintenance locations will be defined at the time of test conduction and will include: China Lake, CA; Yuma, AZ; Crane, IN; Aberdeen, MD; Idaho Falls, ID, and OCONUS to include Partner Countries, NATO, Tactical areas of interest and all other CONUS appropriate locations. Contract award and start is expected for 29 July 2017.
Primary Work Location: Point Mugu, CA
This is a proposal position (contingent upon contract award).
Essential Job Functions:
Works under general guidelines established by supervisor; receives overall instructions on specific assignment objectives, features, possible solutions, etc
Assistance is furnished on unusual problems and work is reviewed for consistency and completeness.
Applicable functional areas include systems engineering, network engineering, acquisition management, business process reengineering, specialty engineering (e.g., communications, systems safety, quality assurance, test and evaluation, human factors, reliability and maintainability, systems security etc.), organizational planning, financial management, acquisition logistics, configuration and data information systems, and support or program management.
Performs routine assignments on a broad range of tasks associated with the implementation of standard techniques, procedures and/or criteria as they apply to the technical or administrative discipline relating to the task.
Using prescribed methods and information supplied, develops draft inputs to program documentation as it relates to any of the support functions.
Reviews final draft documents for conformity to requirements and completeness.
Organizes and maintains management files.
Tracks preparation and delivery status of required deliverables.
Attends meetings, design reviews, working groups and briefings.
Reports issues and problems.
Recommends solutions.
May direct the activities of other personnel.
Performs other related duties as assigned.
Required Education and Experience:
Must have an Associate's degree.
Five (5) years of experience, within the last 10 years, with Signal Intelligence including Cyber Intelligence.
Experience and knowledge with collecting live network data using various collection methods software and equipment and includes Mesh Test procedure.
Must be trained in advanced Global System for Mobile (GSM) and Cyber Defense Management Authority (CDMA) theory and certified in Wireless Cyber Intelligence from a US National Source.
Security Clearance:
Must have a SECRET clearance. TS preferred.

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.