It Support Specialist - Ccis
Listed on 2026-01-12
-
IT/Tech
IT Support, Cybersecurity
IT SUPPORT SPECIALIST - CCIS at Nex Threat
Job Title: IT SUPPORT SPECIALIST
Location: Reston, VA, telework acceptable after program start
Time Type: Full-time
Clearance Requirement: Secret / IT-I – Critical Sensitive (Tier 5/SSBI)/ High Risk
Employee Type: W2 or 1099
Citizenship: US Citizen, no Dual Citizenship
Job DescriptionThe IT Support Specialist at Nex Threat is responsible for planning, delivering, and refining customer support services, including installation, troubleshooting, user assistance, and training. This role involves diagnosing and resolving incidents reported by customers, analyzing work processes, researching trends in issues, and developing training materials. The specialist will install, troubleshoot, and maintain hardware and software, execute backup and recovery operations, and consult with users to identify needs and requirements.
Additionally, the position includes feasibility studies, trade‑off analyses, preparing business cases, and ensuring rigorous application of information security and cybersecurity policies, principles, and practices across all activities.
- Deliver high-quality customer support services, including installation, configuration, troubleshooting, user assistance, and training;
- Diagnose and resolve customer-reported incidents with timely escalation where appropriate; perform root‑cause analysis and prevent recurrence;
- Plan and analyze work processes; research trends and patterns of problems to inform continuous improvement;
- Develop, maintain, and deliver training materials and conduct computing/information system training sessions for end users and internal staff;
- Create, maintain, and utilize problem tracking databases to manage incidents, requests, and known issues;
- Install, troubleshoot, and maintain hardware and software across client environments; perform routine maintenance and updates;
- Execute backup and recovery operations; test restore procedures to verify data integrity and availability;
- Consult with users to identify needs, requirements, and potential solutions; translate requirements into actionable technical tasks;
- Conduct feasibility studies and trade‑off analyses to inform solution choices and project scoping;
- Prepare business cases, cost estimates, and return‑on‑investment analyses for proposed IT initiatives;
- Ensure rigorous application of information security and cybersecurity policies, standards, and practices; collaborate with security teams to address vulnerabilities and incidents;
- Maintain accurate documentation of configurations, procedures, and support processes; contribute to knowledge bases and runbooks;
- Participate in on‑call rotations or after‑hours support as needed to maintain service levels;
- Stay current with industry trends, technologies, and best practices to support Nex Threat’s mission and customer needs.
Six (6) years of progressive experience in the field of Information Processing, three (3) of which are specialized in Information Processing and involve a range of hardware/software solutions, two (2) of which are concentrated, hands‑on experience in installing, diagnosing problems, and training customers in the use of software and hardware.
Certification RequirementsIA Level: IAT II
8570.01‑M Baseline Certification:
- Google Associate Cloud Engineer;
- Google Professional Cloud Architect.
Plus One of the following:
- AWS Certified Cloud Practitioner;
- AWS Certified Security – Specialty;
- AWS Certified Solutions Architect – Associate;
- AWS Certified Solutions Architect – Professional;
- AWS Certified Sys Ops Administrator;
- Microsoft Certified:
Azure Administrator Associate; - Microsoft Certified:
Azure Solutions Architect Expert; - Microsoft Certified Azure Security Engineer Associate;
- Oracle Cloud Infrastructure Cloud Operations;
- Red Hat Certified Engineer;
- Red Hat Certified System Administrator.
- Three (3) years hands‑on experience supporting the Department of Defense (DoD) IT hosting solutions;
- Experience administering Windows and Linux operating systems in large enterprise environments;
- Proficiency and understanding of network fundamentals, VPNs, firewalls, and remote access solutions;
- Strong analytical and problem‑solving skills; proficiency in problem‑solving and troubleshooting complex issues, with the ability to analyze problems, identify root causes, communicate to management and implement effective solutions in a timely manner.
We may use artificial intelligence (AI) tools to support parts of the hiring process, such as reviewing applications, analyzing resumes, or assessing responses. These tools assist our recruitment team but do not replace human judgment. Final hiring decisions are ultimately made by humans. If you would like more information about how your data is processed, please contact us.
Seniority levelNot Applicable
Employment typeFull‑time
Job functionInformation Technology
IndustriesComputer and Network Security
#J-18808-Ljbffr(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).