Systems Administrator 3 TALO093 | | | 02/01/2023 | Systems Administrator 3:
Position Description:
Maintains smooth operation of multi-user computer systems, including coordination with network engineers. Monitors and manages system resources, including CPU usage, disk usage, and response times to maintain operating efficiency. Performs systems security administration functions, including creating user profiles and accounts. Provides Tier 3 problem identification, diagnosis and resolution of problems. Configure operating systems. Other duties may include setting up administrator accounts, maintaining system documentation, tuning system performance, installing system wide software, applications/operating systems hardening, and allocating mass storage space. Interacts with users and evaluates vendor products. Makes recommendations to purchase hardware and software, coordinates installation and provides backup recovery. Develops and monitors policies and standards for allocation related to the use of computing resources.
Required Qualifications:
Requires applicable Bachelor's degree with 5 or more years of relevant experience. Additional experience may be considered in lieu of degree.
A minimum 2 year of experience with systems administration, including Linux or CentOS
Must be a US Citizen;
Ability to work in a team environment
Ability to anticipate problems & take decisive action
Experience maintaining applications built on a PostgreSQL or Oracle database.
Experience writing scripts to monitor system services, resources, data mine logs, etc.
Writing SQL and PL/SQL to generate system data reports, modify data as necessary, etc.
Experience with Keytool and OpenSSL
Familiarity w/troubleshooting Java & Oracle applications
XML Proficiency
DoD 8570 Compliant holding current IAT level II baseline certification (Security+ CE, GICSP, SSCP, etc.)
Experience maintaining systems in cloud environments
Experience working with Firewalls and AWS Security Groups
Desired Qualifications:
Security Clearance:
| |
DevOps Systems Engineer TALO092 | | | 02/01/2023 | DevOps Systems Engineer (All LCATs considered):
Candidate will develop CI/CD build and deploy pipelines; integrate tools into the pipeline and manage debugging integration issues. In addition, candidate will help integrate with various tools for the DevOps process.
Job Duties include:
Development of CI/CD Build and Deployment Pipelines: Write/modify Jenkins-based groovy scripts. Write/update CloudFormation scripts. Troubleshoot pipeline issues across Jenkins and AWS Environments (Linux EC2, RDS, CloudFormation, Elasticsearch, etc…). Document key features for developer use. Help write and maintain scripts for process improvements (ex: stage/unstage builds, branch tag automation, automating variance corrections across networks).
Integrate tools into the pipeline: Work with the development teams to bring in new microservices into the pipeline. Helping troubleshoot as necessary. Work through steps to automate installations of COTS products into the architecture.
Debugging integration issues: Help identify issues in the deployment (i.e. potentially intermittent connectivity issues from an API Server to the Database). Monitor (and help develop scripts to monitor) the AWS services to ensure everything is functioning as necessary.
DevOps Tool Integration: Help integrate with various tools for the DevOps process (SonarQube, Fortify, Jenkins, Robot Framework/Selenium, Artifactory, etc…)
Required:
A Bachelor’s degree and 9+ years of relevant experience OR a Master’s degree with 7 years of relevant experience OR a PhD with 4 years of relevant experience; an additional 4 years of experience may be considered in lieu of the degree requirement.
Experience with Linux Environments.
Experience with scripting languages, such as Bash and Python.
Strong problem solving, analytical, and technical troubleshooting skills.
Experience with Git for Source Control.
Understanding and willingness to work in a DevSecOps oriented environment with an Infrastructure as Code mindset.
Active CompTIA Security+ CE Certification (or equivalent DoD IAT Level 2 cert).
Position is 100% onsite. NO EXCEPTIONS.
TS/ SCI CI Poly
Desired:
Experience with CloudFormation, Elasticsearch.
Basic understanding of an Object-Oriented Programming Language, preferably Java or Python.
Experience integrating Jenkins and Docker for automated CI/CD pipelines.
Basic understanding of Kubernetes or OpenShift Container Platform
| |
Functional Specialist/Advisor Training Level 1 111-001 | | | 01/28/2023 | Functional Specialist/Advisor Training Level 1:
Overall Assignment Description:
Certification Exam Administrator – Serve as a member of a team managing the delivery of high-stakes exams to candidates seeking to earn professional credentials. Apply excellent attention to detail and customer service skills in a high operational tempo environment using standard operating procedures.
Duties include:
Assessment Delivery – Develop, document, and administer processes to deliver certification exams, manage relevant exam data, and communicate with test-takers and proctors.
Ensure testing is delivered in an approved, proctored environment, using standardized procedures and in compliance with applicable laws, and external accreditation standards
Work location/Schedule:
Primarily onsite, Springfield VA.
Monday-Friday, 40 hours/week average, generally flexible to accommodate those with preference for earlier or later schedules between 6am and 5pm.
Telework: currently supported 10-25% of time, subject to change at any time
Travel:
Security Clearance:
| |
Cloud Solutions Architect-Engineer Senior Level NEE123 | | | 02/02/2023 | Cloud Solutions Architect/Engineer (Senior-Level):
Overall Assignment Description:
The Cloud Solutions Architect/Engineer will work across Cloud Ops, Security, Development, Auditing teams at NGA to design resilient, flexible, and scalable cloud solutions to support GEOINT Enterprise operations.
Formulate, document, and communicate methodologies for building and operating highly available, scalable services.
Provide assistance in reducing and resolving production incidents (e.g. Site Reliability
Look for opportunities to improve all operations processes.
Evaluate, build and modify automation for deploying and operating production services. •
Create, assess, update and maintain documentation pertaining to Product Lines.
Develop and design elastic, resilient and self-healing Cloud native applications and
Crafting excellent documentation for respective projects and carrying ownership for the code and the instructional tutorials of how to use it.
Work with team members to design, architect and implement solutions across geographic
Skills and Experience:
Five or more years of experience with cloud-based services or technologies.
Understanding of object-oriented software with languages like Java, C++, Python or Ruby ideally in SOA applications.
Understanding of networking and core Internet protocols (e.g. TCP/IP, DNS, SMTP, HTTP, and distributed networks).
Understanding of industry standards for designing and implementing IaaS/PaaS/SaaS in Cloud environments.
Experience with modern container orchestration systems, such as: Kubernetes, Mesos,
Desired:
Master’s degree in Computer Science, Information Technology, Engineering, EngineeringManagement, Management Information Systems, or related STEM degree program.
Certified AWS Solutions Architect
Two or more years of demonstrated experience in Site Reliability Engineering functions.
Experience with Linux/UNIX systems and the best practices for deploying applications to those stacks.
Experience designing, implementing, and operating in a DevSecOps.
Experience using APIs and RESTful services.
Experience with infrastructure configuration and automations processes and tools: Terraform,Puppet, Ansible, Chef, Fabric.
Experience with security in the cloud, such as: Intrusion, penetration, and vulnerabilityscanning.
Experience with monitoring solutions, such as: ELK, Splunk, SUMO, Nagios, Prometheus.
Experience with build automation and continuous integration/delivery ecosystemcapabilities, such as: Git, Gerrit, Maven/Gradle, Jenkins, Docker, Nexus.
Education and Experience:
12+ to 18 years' experience
Bachelor's degree or higher in Computer Science, Information Technology, Engineering,
Engineering Management, Management Information Systems, or related STEM degree
program, or related equivalent additional experience.
Security Clearance:
| |
Information Systems Security Officer (ISSO) III 118-075 | | | 01/17/2023 | Information Systems Security Officer (ISSO) III:
The ISSO is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO. The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is assigned responsibility for the day-to-day security operations of a system. This also will include physical and environmental protection, personnel security, incident handling, and security training and awareness. It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configuration management across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
Performance shall include:
Assist the ISSM in meeting their duties and responsibilities
Prepare, review, and update authorization packages
Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media
Notify ISSM when changes occur that might affect the authorization determination of the information system(s)
Conduct periodic reviews of information systems to ensure compliance with the security authorization package
Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change
Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly
Ensure all IS security-related documentation is current and accessible to properly authorized individuals
Ensure audit records are collected, reviewed, and documented (to include any anomalies)
Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties
Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans
Identify cyber security vulnerabilities and assist with the implementation of the countermeasures for them
Prepare reports on the status of security safeguards applied to computer systems
Perform ISSO duties in support of in-house and external customers
Conduct continuous monitoring activities for authorization boundaries under your preview
Assist Department of Defense, National Agency and Contractor organizations with the development of assessment and authorization (A&A) efforts
Experience:
5 - 7 years related experience
Prior performance in roles such as System, Network Administrator or ISSO
Education:
Certifications:
Security Clearance:
Current Top Secret Clearance with SCI Eligibility
Eligibility for access to Special Access Program Information
Willingness to submit to a Counterintelligence polygraph
Other Requirements:
| |
Information Systems Security Officer (ISSO) III 118-074 | | | 01/17/2023 | Information Systems Security Officer (ISSO) III:
The ISSO is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO. The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is assigned responsibility for the day-to-day security operations of a system. This also will include physical and environmental protection, personnel security, incident handling, and security training and awareness. It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configuration management across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
Performance shall include:
Assist the ISSM in meeting their duties and responsibilities
Prepare, review, and update authorization packages
Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media
Notify ISSM when changes occur that might affect the authorization determination of the information system(s)
Conduct periodic reviews of information systems to ensure compliance with the security authorization package
Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change
Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly
Ensure all IS security-related documentation is current and accessible to properly authorized individuals
Ensure audit records are collected, reviewed, and documented (to include any anomalies)
Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties
Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans
Identify cyber security vulnerabilities and assist with the implementation of the countermeasures for them
Prepare reports on the status of security safeguards applied to computer systems
Perform ISSO duties in support of in-house and external customers
Conduct continuous monitoring activities for authorization boundaries under your preview
Assist Department of Defense, National Agency and Contractor organizations with the development of assessment and authorization (A&A) efforts
Experience:
5 - 7 years related experience
Prior performance in roles such as System, Network Administrator or ISSO
Education:
Certifications:
Security Clearance:
Current Top Secret Clearance with SCI Eligibility
Eligibility for access to Special Access Program Information
Willingness to submit to a Counterintelligence polygraph
Other Requirements:
| |
Information Systems Security Officer (ISSO) III 118-073 | | | 01/17/2023 | Information Systems Security Officer (ISSO) III:
The ISSO is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO. The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is assigned responsibility for the day-to-day security operations of a system. This also will include physical and environmental protection, personnel security, incident handling, and security training and awareness. It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configuration management across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
Performance shall include:
Assist the ISSM in meeting their duties and responsibilities
Prepare, review, and update authorization packages
Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media
Notify ISSM when changes occur that might affect the authorization determination of the information system(s)
Conduct periodic reviews of information systems to ensure compliance with the security authorization package
Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change
Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly
Ensure all IS security-related documentation is current and accessible to properly authorized individuals
Ensure audit records are collected, reviewed, and documented (to include any anomalies)
Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties
Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans
Identify cyber security vulnerabilities and assist with the implementation of the countermeasures for them
Prepare reports on the status of security safeguards applied to computer systems
Perform ISSO duties in support of in-house and external customers
Conduct continuous monitoring activities for authorization boundaries under your preview
Assist Department of Defense, National Agency and Contractor organizations with the development of assessment and authorization (A&A) efforts
Experience:
5 - 7 years related experience
Prior performance in roles such as System, Network Administrator or ISSO
Education:
Certifications:
Security Clearance:
Current Top Secret Clearance with SCI Eligibility
Eligibility for access to Special Access Program Information
Willingness to submit to a Counterintelligence polygraph
Other Requirements:
| |
Information Systems Security Officer (ISSO) II 118-072 | | | 01/17/2023 | Information Systems Security Officer (ISSO) II:
The ISSO is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO. The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is assigned responsibility for the day-to-day security operations of a system. This also will include physical and environmental protection, personnel security, incident handling, and security training and awareness. It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configuration management across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
Performance shall include:
Assist the ISSM in meeting their duties and responsibilities
Prepare, review, and update authorization packages
Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media
Notify ISSM when changes occur that might affect the authorization determination of the information system(s)
Conduct periodic reviews of information systems to ensure compliance with the security authorization package
Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change
Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly
Ensure all IS security-related documentation is current and accessible to properly authorized individuals
Ensure audit records are collected, reviewed, and documented (to include any anomalies)
Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties
Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans
Identify cyber security vulnerabilities and assist with the implementation of the countermeasures for them
Prepare reports on the status of security safeguards applied to computer systems
Perform ISSO duties in support of in-house and external customers
Conduct security impact analysis activities and provide to the ISSM on all configuration management changes to the authorization boundaries
Experience:
2 - 5 years related experience
Prior performance in roles such as System, Network Administrator or ISSO
Education:
Certifications:
Security Clearance:
Current Top Secret Clearance with SCI Eligibility
Eligibility for access to Special Access Program Information
Willingness to submit to a Counterintelligence polygraph
Other Requirements:
| |
Program Security Representative I 118-071 | | | 01/17/2023 | Program Security Representative I:
The Program Security Representative’s primary function is to provide multi-discipline security support for one or more of the customer’s Special Access Programs (SAPs). The position will provide “day-to-day” multi-discipline analysis for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
Performance shall include:
Ensure strict adherence to the provisions of the NISPOM, its Supplement, the DoD Overprint, DCID, ICD, and SAP policy
Assist in developing and executing approved policies and procedures for safeguarding Special Access Program (SAP), Sensitive Compartmented Information (SCI) and collateral data in support of US military operations
Provide day-to-day security support that includes continuous assessment of procedures to identify shortfalls and provide appropriate recommendations for revising and improving security policies, procedures, and systems
Identify vulnerabilities, threats, and risks to test, training, and operational activities
Assist in developing, implementing, and training the Operations Security program
Assist in providing contractor and subordinate facility assistance and oversight
Brief all levels of personnel, both in the government and senior civilian services, on a variety of security related topics
Conduct and document SAP facility compliance reviews, follow-on facility reviews, and facility close-outs
Monitor, report and track all corrective actions resulting from compliance reviews
Ensure timely notification of pertinent security matters to program technical and management staff
Conduct exploration of any loss, compromise, or suspected compromise of classified and/or sensitive information, including conducting preliminary inquiries and generating damage assessments resulting from the loss of classified information.
Coordinate with SAP security personnel to ensure lessons learned are incorporated into the curriculum for the SAP security education & awareness program
Experience:
5 - 7 years related experience
Security Fundamentals Professional Certification (SFPC) counts towards 3 years of experience
Special Program Security Certification (SPSC) counts towards 5 years of experience
Maximum equivalent experience for SPED Certifications is no more than 5 years
Education:
Security Clearance:
Current Top Secret Clearance with SCI Eligibility
Eligibility for access to Special Access Program Information
Willingness to submit to a Counterintelligence polygraph
| |
Network-System Administrator II 118-070 | Bolling AFB, Washington DC | | 01/17/2023 | Network-System Administrator II:
The primary function will be to organize, install, and support government organization’s computer systems, including local area networks (LANs), wide area networks (WANs), network segments, intranets, and other data communication systems. This will also include helping architect, design and analyze network models. It will require participation in decisions about buying future hardware or software to upgrade organization’s infrastructure. This position might be called upon to provide technical support to computer users to help solve users’ problems. This position will support activities within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
Performance shall include:
Ability to operate under minimal supervision
Execute day to day management and operations of systems and networks
Manage COTS & GOTS products to collect, display and remediate a variety of automated system security and system operations/performance functions and metrics
Follow Operations and Maintenance (O&M) checklists to maintain the service (daily, weekly, monthly, yearly O&M checklists); build Tactics, Techniques and Processes (TTPs) and Standard Operating Processes (SOPs) associated with service checklists
Operate monitoring tools/capabilities with the enterprise security information and event management (SIEM) and create/tailor complex event alarms/rules and summary reports
Assist in analyzing technical risk, upon request, of emerging cybersecurity tools and processes
Work as part of a security incident response team as needed
Working technical competency in one or more of the following supported platforms: Microsoft Windows Server, Red Hat Enterprise Linux servers, MS Hyper-V/VMWare/ESx/Xen Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems, forensic analysis/vulnerability assessment, Group Policy management and configuration, Scripting, BMC Footprints, WSUS, , Lumension, Bitlocker, SQL Server 2012, TomCat, IIS, Windows Server 2012r2/2016, Win 10, Red Hat 6.5, Microsoft Office
Toolkits, SEIMs, Logrhythm, ACAS/Nessus/SCAP, mandatory/role-based access control concepts (e. g. SE Linux extensions to RHEL, PitBull, AppArmor, and Sentris) , video teleconferencing/VOIP, Oracle/MS SQL database security, and Apache/IIS Web server security
Experience:
Education:
Certifications:
Security Clearance:
Current Top Secret Clearance with SCI Eligibility
Eligibility for access to Special Access Program Information
Willingness to submit to a Counterintelligence polygraph
Other Requirements:
Thorough knowledge of Microsoft Windows desktop and server operating systems, Microsoft Exchange Server, and as needed RHEL operating systems administration and associated hardware
Working knowledge of CISCO network and switching and virtualization technologies
Working knowledge of Local Area Network (LAN) and Wide Area Network (WAN) technologies and data backup technologies
Working knowledge communication security (COMSEC) policies and integration
Working knowledge of Risk Management Framework, Common Criteria, and System Security Policy as they relate to assessments and authorization
Working knowledge and current relevant experience with PL2 and PL3 network environments/systems
Experience providing technical support in a customer service role
Experience applying industry standards and best practices in an enterprise-level Windows system environment.
Experience solving technical problems quickly and identifying opportunities to automate repetitive processes.
Working knowledge of WSUS and/or YUM patch deployment methodologies
Must be familiar with DoD policy as it applies to implementing and executing system and network administration
Must be able to regularly lift up to 50 lbs
| |
Information Technology-Assurance Specialist III 118-069 | Bolling AFB, Washington DC | | 01/17/2023 | Information Technology-Assurance Specialist III:
The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
Performance shall include:
Establish complex operational software configuration controls and system interfaces for computer system(s) assigned
Maintain file servers, Firewalls, network access, Security Monitoring Systems and system documentation as required
Analyze and troubleshoot system anomalies to ensure optimum equipment performance
Prepare system for operational use and support operational tests
Review, prepare, and update authorization packages
Notify customer when changes occur that might affect authorization accreditation
Conduct cybersecurity portion of the self-inspection’s checklist
Review and provide technical and cyber security coordination on all Bodies of Evidence that make-up the authorization package
Identify any and all vulnerabilities and implement countermeasures
Ensure information systems and network appliances are operated, maintained, and disposed of in accordance with security policies and practices
Perform Video-Teleconferencing VTC System Administration, Scheduling, & Configuration
Provide External Information System(s) Client Support
Perform account creations, changes, & deletions on multiple authorization boundaries
Perform Help Desk & troubleshooting activities
Perform Hardware/Software System Configuration, upgrades and modifications
Perform system and network appliance patching activities
Provide Government-Issued Laptop Support
Assist in Media Control & Accountability activities
Perform COMSEC account/equipment management activities
Experience:
8-10 years related experience
Prior performance in roles such as System, Network Administrator or Information Technology/Assurance Specialists
Education:
Certifications:
Security Clearance:
| |
Network-System Administrator III 118-068 | | | 01/17/2023 | Network-System Administrator III:
The primary function will be to organize, install, and support government organization’s computer systems, including local area networks (LANs), wide area networks (WANs), network segments, intranets, and other data communication systems. This will also include helping architect, design and analyze network models. It will require participation in decisions about buying future hardware or software to upgrade organization’s infrastructure. This position might be called upon to provide technical support to computer users to help solve users’ problems. This position will support activities within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
Performance shall include:
Able to perform self-sustaining and work with little to no oversight
Lead IT ops team on day to day management and operations of Networks and implement capabilities vetted through Cybersecurity, ISSE and higher headquarters to maintain JSIG/RMF Authority to Operate and maintain Continuous Monitoring tools and processes
Manage COTS & GOTS products to collect, display and remediate a variety of automated system security and system operations/performance functions and metrics.
Assist during security assessments of servers/network devices/security appliances
Assist during security assessments with regard to accuracy and efficiency
Assist with Creation of operational Operations and Maintenance (O&M) checklists to maintain the service (daily, weekly, monthly, yearly O&M checklists); build Tactics, Techniques and Processes (TTPs) and Standard Operating Processes (SOPs) associated with service checklists
Manage and operate monitoring tools/capabilities with the enterprise security information and event management (SIEM) and create/tailor complex event alarms/rules and summary reports
Execute cybersecurity operations procedures for day to day network management, operations and maintenance
Monitor/analyze output of cybersecurity related tools for reportable security incidents and residual risk
Assist in analyzing technical risk, upon request, of emerging cybersecurity tools and processes
Work as part of a security incident response team as needed
Assist ISSM/ISSO/ISSE with the Integration/Development new techniques to improve Confidentiality, Integrity, and Availability for networks/systems operating at various classification levels
Advanced technical competency in one or more of the following supported platforms: Microsoft Windows Server, Active Directory Red Hat Enterprise Linux servers, MS Hyper-V/VMWare/ESx/Xen Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems, forensic analysis/vulnerability assessment, Group Policy management and configuration, Scripting, BMC Footprints, WSUS, , Lumension, Bitlocker, SQL Server 2012, TomCat, IIS, Windows Server 2012r2/2016, Win 10, Red Hat 6.5, Microsoft Office
Toolkits, SEIMs, Logrhythm, ACAS/Nessus/SCAP, mandatory/role-based access control concepts (e. g. SE Linux extensions to RHEL, PitBull, AppArmor, and Sentris) , video teleconferencing/VOIP, Oracle/MS SQL database security, and Apache/IIS Web server security
Experience:
Education:
Certifications:
Security Clearance:
Current Top Secret Clearance with SCI Eligibility
Eligibility for access to Special Access Program Information
Willingness to submit to a Counterintelligence polygraph
Other Requirements:
Thorough knowledge of Microsoft Windows desktop and server operating systems, Microsoft Exchange Server, and as needed RHEL operating systems administration and associated hardware
Experience in effective communication and collaborating in a high performance team environment.
Group Policy design and configuration
Working knowledge of CISCO network and switching and virtualization technologies
Working knowledge of virtualization as it applies to users environments, operating systems, and network appliances
Working knowledge of Local Area Network (LAN) and Wide Area Network (WAN) technologies and data backup technologies
Working knowledge communication security (COMSEC) policies and integration
Working knowledge of Risk Management Framework, Common Criteria, and System Security Policy as they relate to assessments and authorization
Working knowledge and current relevant experience with PL2, PL3, and PL4 network environments/systems
Working knowledge of WSUS and/or YUM patch deployment methodologies
Must be familiar with DoD policy as it applies to implementing and executing system and network administration
Working knowledge of Risk Management Framework and how to apply it to network/information system environments
Must be able to regularly lift up to 50 lbs
| |
Client-Server Database Manager – Senior 118-067 | | | 01/17/2023 | Client-Server Database Manager – Senior:
Projects long-range requirements for client/server database administration in conjunction with other managers in the information systems function as well as business function managers. Prepares activity and progress reports regarding the client/server database management section.
Performance shall include:
Audit database access and requests
Ensure proposed object definitions are clear, concise, technically correct, and that they represent singular concepts
Install and configure database environments and associated storage systems
Install and perform minor repairs to hardware, software, and peripheral equipment, following design or installation specifications
Oversee the daily performance of database systems
Perform backups/restores, and archive data
Perform optimization and tuning of data loads and extractions
Perform server and storage capacity management and planning for the most complex and critical systems
Provide technical support in the evaluation of prime object names, data elements, and other objects
Recommend appropriate procedure, query or package changes and optimizations to ensure and improve system performance and reliability
Study system requirements to determine proper server installation methods
Utilize system software to monitor the performance of system files; manages system data to maintain performance efficiencies
Experience:
Education:
Certifications:
Security Clearance:
Current Top Secret Clearance with SCI Eligibility
Eligibility for access to Special Access Program Information
Willingness to submit to a Counterintelligence polygraph
| |
Physical Security-Information Assurance Specialist 118-066 | | | 01/17/2023 | Physical Security-Information Assurance Specialist:
This position provides physical security (PS) and information assurance (IA) support for collateral, SCI and SAP systems in accordance with JSIG and other DoD and national guidance for facilities with internal networks and guest systems.
Performance may include:
Responsible to the Chief of Security for ensuring compliance with DCID and JSIG physical security and IA requirements and maintaining accreditation documentation
Conduct or manage physical and technical security (TEMPEST/TSCM) actions and procedures
Conduct preconstruction reviews and makes recommendations for compliance with guidance for construction, expansion and modifications of facilities
Assist the Information Assurance Manager with implementation of the information assurance program
Author, review and maintain Certification and Accreditation documentation
Assist with enforcement of personnel security controls for visitors and un-cleared personnel requiring entry to the facility
Enforce physical security controls of electronic devices and prohibited items; conduct entry/exit inspections
Identify IA and physical security vulnerabilities and ensure JAFAN 6/9 compliance
Conduct periodic IA & PS self-inspections and implement corrective actions
Review, track and conduct IA new user and refresher training
Implement local media control policies and procedures
Experience:
Education:
Certifications:
Security Clearance:
Current Top Secret Clearance with SCI Eligibility
Eligibility for access to Special Access Program Information
Willingness to submit to a Counterintelligence polygraph
| |
Physical Security-Information Assurance Specialist 118-065 | | | 01/17/2023 | Physical Security-Information Assurance Specialist:
This position provides physical security (PS) and information assurance (IA) support for collateral, SCI and SAP systems in accordance with JSIG and other DoD and national guidance for facilities with internal networks and guest systems.
Performance may include:
Responsible to the Chief of Security for ensuring compliance with DCID and JSIG physical security and IA requirements and maintaining accreditation documentation
Conduct or manage physical and technical security (TEMPEST/TSCM) actions and procedures
Conduct preconstruction reviews and makes recommendations for compliance with guidance for construction, expansion and modifications of facilities
Assist the Information Assurance Manager with implementation of the information assurance program
Author, review and maintain Certification and Accreditation documentation
Assist with enforcement of personnel security controls for visitors and un-cleared personnel requiring entry to the facility
Enforce physical security controls of electronic devices and prohibited items; conduct entry/exit inspections
Identify IA and physical security vulnerabilities and ensure JAFAN 6/9 compliance
Conduct periodic IA & PS self-inspections and implement corrective actions
Review, track and conduct IA new user and refresher training
Implement local media control policies and procedures
Experience:
Education:
Certifications:
Security Clearance:
Current Top Secret Clearance with SCI Eligibility
Eligibility for access to Special Access Program Information
Willingness to submit to a Counterintelligence polygraph
| |
Information Technology-Assurance Specialist I 118-064 | | | 01/17/2023 | Information Technology-Assurance Specialist I:
The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
Performance shall include:
Establish complex operational software configuration controls and system interfaces for computer system(s) assigned
Maintain file servers, Firewalls, network access, Security Monitoring Systems and system documentation as required
Analyze and troubleshoot system anomalies to ensure optimum equipment performance
Prepare system for operational use and support operational tests
Review, prepare, and update authorization packages
Notify customer when changes occur that might affect authorization accreditation
Conduct cybersecurity portion of the self-inspection’s checklist
Review and provide technical and cyber security coordination on all Bodies of Evidence that make-up the authorization package
Identify any and all vulnerabilities and implement countermeasures
Ensure information systems and network appliances are operated, maintained, and disposed of in accordance with security policies and practices
Perform Video-Teleconferencing VTC System Administration, Scheduling, & Configuration
Provide External Information System(s) Client Support
Perform account creations, changes, & deletions on multiple authorization boundaries
Perform Help Desk & troubleshooting activities
Perform Hardware/Software System Configuration, upgrades and modifications
Perform system and network appliance patching activities
Provide Government-Issued Laptop Support
Assist in Media Control & Accountability activities
Perform COMSEC account/equipment management activities
Experience:
Education:
Certifications:
Security Clearance:
Current Top Secret Clearance with SCI Eligibility
Eligibility for access to Special Access Program Information
Willingness to submit to a Counterintelligence polygraph
Other Requirements:
Thorough knowledge of Microsoft Windows 2012R2 Server, Microsoft Exchange Server 2010/2016, Microsoft Windows 7/10 operating systems (OS) administration and associated hardware
Working knowledge of Local Area Network (LAN) and Wide Area Network (WAN) technologies and data backup technologies to include communication security (COMSEC) integration
Working knowledge of Risk Management Framework, Common Criteria, and System Security Policy as they relate to Assessments and Authorizations
Working knowledge and current relevant experience with PL2 systems
Must be able to regularly lift up to 50 lbs
| |
Information Technology-Assurance Specialist I 118-063 | | | 01/17/2023 | Information Technology-Assurance Specialist I:
The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
Performance shall include:
Establish complex operational software configuration controls and system interfaces for computer system(s) assigned
Maintain file servers, Firewalls, network access, Security Monitoring Systems and system documentation as required
Analyze and troubleshoot system anomalies to ensure optimum equipment performance
Prepare system for operational use and support operational tests
Review, prepare, and update authorization packages
Notify customer when changes occur that might affect authorization accreditation
Conduct cybersecurity portion of the self-inspection’s checklist
Review and provide technical and cyber security coordination on all Bodies of Evidence that make-up the authorization package
Identify any and all vulnerabilities and implement countermeasures
Ensure information systems and network appliances are operated, maintained, and disposed of in accordance with security policies and practices
Perform Video-Teleconferencing VTC System Administration, Scheduling, & Configuration
Provide External Information System(s) Client Support
Perform account creations, changes, & deletions on multiple authorization boundaries
Perform Help Desk & troubleshooting activities
Perform Hardware/Software System Configuration, upgrades and modifications
Perform system and network appliance patching activities
Provide Government-Issued Laptop Support
Assist in Media Control & Accountability activities
Perform COMSEC account/equipment management activities
Experience:
Education:
Certifications:
Security Clearance:
Current Top Secret Clearance with SCI Eligibility
Eligibility for access to Special Access Program Information
Willingness to submit to a Counterintelligence polygraph
Other Requirements:
Thorough knowledge of Microsoft Windows 2012R2 Server, Microsoft Exchange Server 2010/2016, Microsoft Windows 7/10 operating systems (OS) administration and associated hardware
Working knowledge of Local Area Network (LAN) and Wide Area Network (WAN) technologies and data backup technologies to include communication security (COMSEC) integration
Working knowledge of Risk Management Framework, Common Criteria, and System Security Policy as they relate to Assessments and Authorizations
Working knowledge and current relevant experience with PL2 systems
Must be able to regularly lift up to 50 lbs
| |
Information Systems Security Manager (ISSM) II 118-062 | | | 01/17/2023 | Information Systems Security Manager (ISSM) II:
The ISSM’s primary function serves as a principal advisor on all matters, technical and otherwise, involving the security of information systems under their purview. Primary support will be working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense, and Military Compartment efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
Performance shall include:
Perform oversight of the development, implementation and evaluation of information system security program policy; special emphasis placed upon integration of existing SAP network infrastructures
Develop and oversee operational information systems security implementation policy and guidelines of network security, based upon the Risk Management Framework (RMF) with emphasize on Joint Special Access Program Implementation Guide (JSIG) authorization process
Advise customer on Risk Management Framework (RMF) assessment and authorization issues
Perform risk assessments and make recommendations to DoD agency customers
Advise government program managers on security testing methodologies and processes
Evaluate authorization documentation and provide written recommendations for authorization to government PM’s
Develop and maintain a formal Information Systems Security Program
Ensure that all IAOs, network administrators, and other cyber security personnel receive the necessary technical and security training to carry out their duties
Develop, review, endorse, and recommend action by the AO or DAO of system assessment documentation
Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media
Develop and execute security assessment plans that include verification that the features and assurances required for each protection level functioning
Maintain a and/or applicable repository for all system authorization documentation and modifications
Develop policies and procedures for responding to security incidents, to include investigating and reporting security violations and incidents
Ensure proper protection or corrective measures have been taken when an incident or vulnerability has been discovered within a system
Ensure that data ownership and responsibilities are established for each authorization boundary, to include accountability, access rights, and special handling requirements
Ensure development and implementation of an information security education, training, and awareness program, to include attending, monitoring, and presenting local cyber security training.
Evaluate threats and vulnerabilities to ascertain whether additional safeguards are needed
Assess changes in the system, its environment, and operational needs that could affect the authorization
Ensure that authorization is accomplished a valid Authorization determination has been given for all authorization boundaries under your purview
Review AIS assessment plans
Coordinate with PSO or cognizant security official on approval of external information systems (e.g., guest systems, interconnected system with another organization)
Conduct periodic assessments of the security posture of the authorization boundaries
Institute and implement a Configuration Control Board (CCB) charter
Ensure configuration management (CM) for security-relevant changes to software, hardware, and firmware and that they are properly documented
Ensure periodic testing is conducted to evaluate the security posture of IS by employing various intrusion/attack detection and monitoring tools (shared responsibility with ISSOs)
Ensure that system recovery and reconstitution processes developed and monitored to ensure that the authorization boundary can be recovered based on its availability level determination
Ensure all authorization documentation is current and accessible to properly authorized individuals
Ensure that system security requirements are addressed during all phases of the system life cycle
Participate in self-inspections
Periodically review system security to accommodate changes to policy or technology
Coordinate all technical security issues outside of area of expertise or responsibility with ISSE
Provide expert research and analysis in support of expanding programs and area of responsibility as it pertains to cyber security and information technology activities
Develop Assured File Transfers (AFT) on accordance with the JSIG
Provide leadership, mentoring, and quality assurance for Cyber Security and Information Technology team members
Experience:
Education:
Certifications:
Security Clearance:
Current Top Secret Clearance with SCI Eligibility
Eligibility for access to Special Access Program Information
Willingness to submit to a Counterintelligence polygraph
Other Requirements:
| |
Program Security Representative I 118-061 | Bolling AFB, Washington DC | | 01/17/2023 | Program Security Representative I:
The Program Security Representative’s primary function is to provide multi-discipline security support for one or more of the customer’s Special Access Programs (SAPs). The position will provide “day-to-day” multi-discipline analysis for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
Performance shall include:
Ensure strict adherence to the provisions of the NISPOM, its Supplement, the DoD Overprint, DCID, ICD, and SAP policy
Assist in developing and executing approved policies and procedures for safeguarding Special Access Program (SAP), Sensitive Compartmented Information (SCI) and collateral data in support of US military operations
Provide day-to-day security support that includes continuous assessment of procedures to identify shortfalls and provide appropriate recommendations for revising and improving security policies, procedures, and systems
Identify vulnerabilities, threats, and risks to test, training, and operational activities
Assist in developing, implementing, and training the Operations Security program
Assist in providing contractor and subordinate facility assistance and oversight
Brief all levels of personnel, both in the government and senior civilian services, on a variety of security related topics
Conduct and document SAP facility compliance reviews, follow-on facility reviews, and facility close-outs
Monitor, report and track all corrective actions resulting from compliance reviews
Ensure timely notification of pertinent security matters to program technical and management staff
Conduct exploration of any loss, compromise, or suspected compromise of classified and/or sensitive information, including conducting preliminary inquiries and generating damage assessments resulting from the loss of classified information.
Coordinate with SAP security personnel to ensure lessons learned are incorporated into the curriculum for the SAP security education & awareness program
Experience:
5 - 7 years related experience
Security Fundamentals Professional Certification (SFPC) counts towards 3 years of experience
Special Program Security Certification (SPSC) counts towards 5 years of experience
Maximum equivalent experience for SPED Certifications is no more than 5 years
Education:
Security Clearance:
Current Top Secret Clearance with SCI Eligibility
Eligibility for access to Special Access Program Information
Willingness to submit to a Counterintelligence polygraph
| |
Information Technology-Assurance Specialist II 118-060 | | | 01/17/2023 | Information Technology-Assurance Specialist II:
The IT/IA primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
Performance shall include:
Establish complex operational software configuration controls and system interfaces for computer system(s) assigned
Maintain file servers, Firewalls, network access, Security Monitoring Systems and system documentation as required
Analyze and troubleshoot system anomalies to ensure optimum equipment performance
Prepare system for operational use and support operational tests
Review, prepare, and update authorization packages
Notify customer when changes occur that might affect authorization accreditation
Conduct cybersecurity portion of the self-inspection’s checklist
Review and provide technical and cyber security coordination on all Bodies of Evidence that make-up the authorization package
Identify any and all vulnerabilities and implement countermeasures
Ensure information systems and network appliances are operated, maintained, and disposed of in accordance with security policies and practices
Perform Video-Teleconferencing VTC System Administration, Scheduling, & Configuration
Provide External Information System(s) Client Support
Perform account creations, changes, & deletions on multiple authorization boundaries
Perform Help Desk & troubleshooting activities
Perform Hardware/Software System Configuration, upgrades and modifications
Perform system and network appliance patching activities
Provide Government-Issued Laptop Support
Assist in Media Control & Accountability activities
Perform COMSEC account/equipment management activities
Experience:
5-7 years related experience
Prior performance in roles such as System, Network Administrator or Information Technology/Assurance Specialists
Education:
Certifications:
Security Clearance:
Current Top Secret Clearance with SCI Eligibility
Eligibility for access to Special Access Program Information
Willingness to submit to a Counterintelligence polygraph
Other Requirements:
Thorough knowledge of Microsoft Windows 2012R2 Server, Microsoft Exchange Server 2010/2016, Microsoft Windows 7/10 operating systems (OS) administration and associated hardware.
Working knowledge of Local Area Network (LAN) and Wide Area Network (WAN) technologies and data backup technologies to include communication security (COMSEC) integration
Working knowledge of Risk Management Framework, SCI Information Systems Security Standards, Common Criteria, and System Security Policy as they relate to Assessment and Authorizations
Working knowledge and current relevant experience with PL2 systems; experience with PL3 & PL4 cross domain solutions is desired
Must be able to regularly lift up to 50 lbs
| |
Network-System Administrator II 118-059 | | | 01/17/2023 | Network-System Administrator II:
The primary function will be to organize, install, and support government organization’s computer systems, including local area networks (LANs), wide area networks (WANs), network segments, intranets, and other data communication systems. This will also include helping architect, design and analyze network models. It will require participation in decisions about buying future hardware or software to upgrade organization’s infrastructure. This position might be called upon to provide technical support to computer users to help solve users’ problems. This position will support activities within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
Performance shall include:
Ability to operate under minimal supervision
Execute day to day management and operations of systems and networks
Manage COTS & GOTS products to collect, display and remediate a variety of automated system security and system operations/performance functions and metrics
Follow Operations and Maintenance (O&M) checklists to maintain the service (daily, weekly, monthly, yearly O&M checklists); build Tactics, Techniques and Processes (TTPs) and Standard Operating Processes (SOPs) associated with service checklists
Operate monitoring tools/capabilities with the enterprise security information and event management (SIEM) and create/tailor complex event alarms/rules and summary reports
Assist in analyzing technical risk, upon request, of emerging cybersecurity tools and processes
Work as part of a security incident response team as needed
Working technical competency in one or more of the following supported platforms: Microsoft Windows Server, Red Hat Enterprise Linux servers, MS Hyper-V/VMWare/ESx/Xen Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems, forensic analysis/vulnerability assessment, Group Policy management and configuration, Scripting, BMC Footprints, WSUS, , Lumension, Bitlocker, SQL Server 2012, TomCat, IIS, Windows Server 2012r2/2016, Win 10, Red Hat 6.5, Microsoft Office
Toolkits, SEIMs, Logrhythm, ACAS/Nessus/SCAP, mandatory/role-based access control concepts (e. g. SE Linux extensions to RHEL, PitBull, AppArmor, and Sentris) , video teleconferencing/VOIP, Oracle/MS SQL database security, and Apache/IIS Web server security
Experience:
Education:
Certifications:
Security Clearance:
Current Top Secret Clearance with SCI Eligibility
Eligibility for access to Special Access Program Information
Willingness to submit to a Counterintelligence polygraph
Other Requirements:
Thorough knowledge of Microsoft Windows desktop and server operating systems, Microsoft Exchange Server, and as needed RHEL operating systems administration and associated hardware
Working knowledge of CISCO network and switching and virtualization technologies
Working knowledge of Local Area Network (LAN) and Wide Area Network (WAN) technologies and data backup technologies
Working knowledge communication security (COMSEC) policies and integration
Working knowledge of Risk Management Framework, Common Criteria, and System Security Policy as they relate to assessments and authorization
Working knowledge and current relevant experience with PL2 and PL3 network environments/systems
Experience providing technical support in a customer service role
Experience applying industry standards and best practices in an enterprise-level Windows system environment.
Experience solving technical problems quickly and identifying opportunities to automate repetitive processes.
Working knowledge of WSUS and/or YUM patch deployment methodologies
Must be familiar with DoD policy as it applies to implementing and executing system and network administration
Must be able to regularly lift up to 50 lbs
| |
Activity Security Representative III 118-058 | | | 01/17/2023 | Activity Security Representative III:
The Activity Security Representative’s primary function is to provide multi-disciplined security support to a customer’s facility and organization. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
Performance shall include:
Classification reviews of inbound and outbound correspondence
Assist in the maintenance of a document accountability database and associated correspondence
Processing inbound and outbound classified mail and receipt records
Perform destruction of classified materials
Process magnetic media for accountability
Reproduction support for classified materials
Maintain various daily logs for a variety of administrative functions associated with document control
Assist in the processing of inbound data and outbound data transfer files
Transfer electronic data files to internal customers
Maintain an extensive customer database point of contact listing
Assist with researching, processing, filing, and maintaining inbound and outbound visit notices
Escort facility visitors and maintains associated logs
Assist in the preparation of facility access control badges
Conduct entry and exit inspections
Assist in the maintenance of facility access control entry systems, to include visitor control
Perform data entry to the Personnel Access Security System database and maintain all customer sponsored billets and quota information
Assist in maintaining personnel security files for all personnel of the supported element
Follow and enforce the customer’s Standard Operating Procedures
Provide support for the security awareness and education programs
Perform miscellaneous administrative support functions as directed by the contractor site lead and/or the Senior Security Representative
Review, track, and monitor security clearance processing activities with appropriate government personnel to achieve appropriate clearance actions
Participate in Air Force SAP security compliance inspections of government organizations and industry
Implement Top Secret Control for accountable material and associated correspondence
Prepare and/or process inbound and outbound classified mail, faxes, courier packages and receipts
Prepare, process, and/or review Program Access Request (PARs) for accuracy and access eligibility
Execute Special Access Program Nomination Process Questionnaires
Conduct Defense Central Index of Investigations (DCII), Joint Personnel Access System (JPAS), and SAPNP reviews of candidates being submitted for SAP access
Perform data entry and record checks in the Air Force Access Data System (AFADS) and maintains all customer sponsored personnel access information current
Perform indoctrinations
Provide leadership, mentoring, and quality assurance for Team Members
Experience:
5 - 7 years related experience
Security Fundamentals Professional Certification (SFPC) counts towards 3 years of experience
Special Program Security Certification (SPSC) counts towards 5 years of experience
Maximum equivalent experience for SPED Certifications is no more than 5 years
Education:
Certifications:
Security Clearance:
Current Top Secret Clearance with SCI Eligibility
Eligibility for access to Special Access Program Information
Willingness to submit to a Counterintelligence polygraph
| |
Program Security Representative I 118-057 | | | 01/17/2023 | Program Security Representative I:
The Program Security Representative’s primary function is to provide multi-discipline security support for one or more of the customer’s Special Access Programs (SAPs). The position will provide “day-to-day” multi-discipline analysis for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
Performance shall include:
Ensure strict adherence to the provisions of the NISPOM, its Supplement, the DoD Overprint, DCID, ICD, and SAP policy
Assist in developing and executing approved policies and procedures for safeguarding Special Access Program (SAP), Sensitive Compartmented Information (SCI) and collateral data in support of US military operations
Provide day-to-day security support that includes continuous assessment of procedures to identify shortfalls and provide appropriate recommendations for revising and improving security policies, procedures, and systems
Identify vulnerabilities, threats, and risks to test, training, and operational activities
Assist in developing, implementing, and training the Operations Security program
Assist in providing contractor and subordinate facility assistance and oversight
Brief all levels of personnel, both in the government and senior civilian services, on a variety of security related topics
Conduct and document SAP facility compliance reviews, follow-on facility reviews, and facility close-outs
Monitor, report and track all corrective actions resulting from compliance reviews
Ensure timely notification of pertinent security matters to program technical and management staff
Conduct exploration of any loss, compromise, or suspected compromise of classified and/or sensitive information, including conducting preliminary inquiries and generating damage assessments resulting from the loss of classified information.
Coordinate with SAP security personnel to ensure lessons learned are incorporated into the curriculum for the SAP security education & awareness program
Experience:
5 - 7 years related experience
Security Fundamentals Professional Certification (SFPC) counts towards 3 years of experience
Special Program Security Certification (SPSC) counts towards 5 years of experience
Maximum equivalent experience for SPED Certifications is no more than 5 years
Education:
Security Clearance:
Current Top Secret Clearance with SCI Eligibility
Eligibility for access to Special Access Program Information
Willingness to submit to a Counterintelligence polygraph
| |
Network-System Administrator III 118-056 | | | 01/17/2023 | Network-System Administrator III:
The primary function will be to organize, install, and support government organization’s computer systems, including local area networks (LANs), wide area networks (WANs), network segments, intranets, and other data communication systems. This will also include helping architect, design and analyze network models. It will require participation in decisions about buying future hardware or software to upgrade organization’s infrastructure. This position might be called upon to provide technical support to computer users to help solve users’ problems. This position will support activities within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
Performance shall include:
Able to perform self-sustaining and work with little to no oversight
Lead IT ops team on day to day management and operations of Networks and implement capabilities vetted through Cybersecurity, ISSE and higher headquarters to maintain JSIG/RMF Authority to Operate and maintain Continuous Monitoring tools and processes
Manage COTS & GOTS products to collect, display and remediate a variety of automated system security and system operations/performance functions and metrics.
Assist during security assessments of servers/network devices/security appliances
Assist during security assessments with regard to accuracy and efficiency
Assist with Creation of operational Operations and Maintenance (O&M) checklists to maintain the service (daily, weekly, monthly, yearly O&M checklists); build Tactics, Techniques and Processes (TTPs) and Standard Operating Processes (SOPs) associated with service checklists
Manage and operate monitoring tools/capabilities with the enterprise security information and event management (SIEM) and create/tailor complex event alarms/rules and summary reports
Execute cybersecurity operations procedures for day to day network management, operations and maintenance
Monitor/analyze output of cybersecurity related tools for reportable security incidents and residual risk
Assist in analyzing technical risk, upon request, of emerging cybersecurity tools and processes
Work as part of a security incident response team as needed
Assist ISSM/ISSO/ISSE with the Integration/Development new techniques to improve Confidentiality, Integrity, and Availability for networks/systems operating at various classification levels.
Advanced technical competency in one or more of the following supported platforms: Microsoft Windows Server, Active Directory Red Hat Enterprise Linux servers, MS Hyper-V/VMWare/ESx/Xen Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems, forensic analysis/vulnerability assessment, Group Policy management and configuration, Scripting, BMC Footprints, WSUS, , Lumension, Bitlocker, SQL Server 2012, TomCat, IIS, Windows Server 2012r2/2016, Win 10, Red Hat 6.5, Microsoft Office.
Toolkits, SEIMs, Logrhythm, ACAS/Nessus/SCAP, mandatory/role-based access control concepts (e. g. SE Linux extensions to RHEL, PitBull, AppArmor, and Sentris) , video teleconferencing/VOIP, Oracle/MS SQL database security, and Apache/IIS Web server security
Experience:
Education:
Certifications:
Security Clearance:
Current Top Secret Clearance with SCI Eligibility
Eligibility for access to Special Access Program Information
Willingness to submit to a Counterintelligence polygraph
Other Requirements:
Thorough knowledge of Microsoft Windows desktop and server operating systems, Microsoft Exchange Server, and as needed RHEL operating systems administration and associated hardware
Experience in effective communication and collaborating in a high performance team environment.
Group Policy design and configuration
Working knowledge of CISCO network and switching and virtualization technologies
Working knowledge of virtualization as it applies to users environments, operating systems, and network appliances
Working knowledge of Local Area Network (LAN) and Wide Area Network (WAN) technologies and data backup technologies
Working knowledge communication security (COMSEC) policies and integration
Working knowledge of Risk Management Framework, Common Criteria, and System Security Policy as they relate to assessments and authorization
Working knowledge and current relevant experience with PL2, PL3, and PL4 network environments/systems
Working knowledge of WSUS and/or YUM patch deployment methodologies
Must be familiar with DoD policy as it applies to implementing and executing system and network administration
Working knowledge of Risk Management Framework and how to apply it to network/information system environments
Must be able to regularly lift up to 50 lbs
| |
Information Systems Security Manager (ISSM) II 118-055 | | | 01/17/2023 | Information Systems Security Manager (ISSM) II:
The ISSM’s primary function serves as a principal advisor on all matters, technical and otherwise, involving the security of information systems under their purview. Primary support will be working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense, and Military Compartment efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
Performance shall include:
Perform oversight of the development, implementation and evaluation of information system security program policy; special emphasis placed upon integration of existing SAP network infrastructures
Develop and oversee operational information systems security implementation policy and guidelines of network security, based upon the Risk Management Framework (RMF) with emphasize on Joint Special Access Program Implementation Guide (JSIG) authorization process
Advise customer on Risk Management Framework (RMF) assessment and authorization issues
Perform risk assessments and make recommendations to DoD agency customers
Advise government program managers on security testing methodologies and processes
Evaluate authorization documentation and provide written recommendations for authorization to government PM’s
Develop and maintain a formal Information Systems Security Program
Ensure that all IAOs, network administrators, and other cyber security personnel receive the necessary technical and security training to carry out their duties
Develop, review, endorse, and recommend action by the AO or DAO of system assessment documentation
Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media
Develop and execute security assessment plans that include verification that the features and assurances required for each protection level functioning
Maintain a and/or applicable repository for all system authorization documentation and modifications
Develop policies and procedures for responding to security incidents, to include investigating and reporting security violations and incidents
Ensure proper protection or corrective measures have been taken when an incident or vulnerability has been discovered within a system
Ensure that data ownership and responsibilities are established for each authorization boundary, to include accountability, access rights, and special handling requirements
Ensure development and implementation of an information security education, training, and awareness program, to include attending, monitoring, and presenting local cyber security training.
Evaluate threats and vulnerabilities to ascertain whether additional safeguards are needed
Assess changes in the system, its environment, and operational needs that could affect the authorization
Ensure that authorization is accomplished a valid Authorization determination has been given for all authorization boundaries under your purview
Review AIS assessment plans
Coordinate with PSO or cognizant security official on approval of external information systems (e.g., guest systems, interconnected system with another organization)
Conduct periodic assessments of the security posture of the authorization boundaries
Institute and implement a Configuration Control Board (CCB) charter
Ensure configuration management (CM) for security-relevant changes to software, hardware, and firmware and that they are properly documented
Ensure periodic testing is conducted to evaluate the security posture of IS by employing various intrusion/attack detection and monitoring tools (shared responsibility with ISSOs)
Ensure that system recovery and reconstitution processes developed and monitored to ensure that the authorization boundary can be recovered based on its availability level determination
Ensure all authorization documentation is current and accessible to properly authorized individuals
Ensure that system security requirements are addressed during all phases of the system life cycle
Participate in self-inspections
Periodically review system security to accommodate changes to policy or technology
Coordinate all technical security issues outside of area of expertise or responsibility with ISSE
Provide expert research and analysis in support of expanding programs and area of responsibility as it pertains to cyber security and information technology activities
Develop Assured File Transfers (AFT) on accordance with the JSIG
Provide leadership, mentoring, and quality assurance for Cyber Security and Information Technology team members
Experience:
Education:
Certifications:
Security Clearance:
Current Top Secret Clearance with SCI Eligibility
Eligibility for access to Special Access Program Information
Willingness to submit to a Counterintelligence polygraph
Other Requirements:
| |
Network-System Administrator III 118-054 | | | 01/17/2023 | Network/System Administrator III:
The primary function will be to organize, install, and support government organization’s computer systems, including local area networks (LANs), wide area networks (WANs), network segments, intranets, and other data communication systems. This will also include helping architect, design and analyze network models. It will require participation in decisions about buying future hardware or software to upgrade organization’s infrastructure. This position might be called upon to provide technical support to computer users to help solve users’ problems. This position will support activities within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
Performance shall include:
Able to perform self-sustaining and work with little to no oversight
Lead IT ops team on day to day management and operations of Networks and implement capabilities vetted through Cybersecurity, ISSE and higher headquarters to maintain JSIG/RMF Authority to Operate and maintain Continuous Monitoring tools and processes
Manage COTS & GOTS products to collect, display and remediate a variety of automated system security and system operations/performance functions and metrics.
Assist during security assessments of servers/network devices/security appliances
Assist during security assessments with regard to accuracy and efficiency
Assist with Creation of operational Operations and Maintenance (O&M) checklists to maintain the service (daily, weekly, monthly, yearly O&M checklists); build Tactics, Techniques and Processes (TTPs) and Standard Operating Processes (SOPs) associated with service checklists
Manage and operate monitoring tools/capabilities with the enterprise security information and event management (SIEM) and create/tailor complex event alarms/rules and summary reports
Execute cybersecurity operations procedures for day to day network management, operations and maintenance
Monitor/analyze output of cybersecurity related tools for reportable security incidents and residual risk
Assist in analyzing technical risk, upon request, of emerging cybersecurity tools and processes
Work as part of a security incident response team as needed
Assist ISSM/ISSO/ISSE with the Integration/Development new techniques to improve Confidentiality, Integrity, and Availability for networks/systems operating at various classification levels.
Advanced technical competency in one or more of the following supported platforms: Microsoft Windows Server, Active Directory Red Hat Enterprise Linux servers, MS Hyper-V/VMWare/ESx/Xen Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems, forensic analysis/vulnerability assessment, Group Policy management and configuration, Scripting, BMC Footprints, WSUS, , Lumension, Bitlocker, SQL Server 2012, TomCat, IIS, Windows Server 2012r2/2016, Win 10, Red Hat 6.5, Microsoft Office.
Toolkits, SEIMs, Logrhythm, ACAS/Nessus/SCAP, mandatory/role-based access control concepts (e. g. SE Linux extensions to RHEL, PitBull, AppArmor, and Sentris) , video teleconferencing/VOIP, Oracle/MS SQL database security, and Apache/IIS Web server security
Experience:
Education:
Certifications:
Security Clearance:
Current Top Secret Clearance with SCI Eligibility
Eligibility for access to Special Access Program Information
Willingness to submit to a Counterintelligence polygraph
Other Requirements:
Thorough knowledge of Microsoft Windows desktop and server operating systems, Microsoft Exchange Server, and as needed RHEL operating systems administration and associated hardware
Experience in effective communication and collaborating in a high performance team environment.
Group Policy design and configuration
Working knowledge of CISCO network and switching and virtualization technologies
Working knowledge of virtualization as it applies to users environments, operating systems, and network appliances
Working knowledge of Local Area Network (LAN) and Wide Area Network (WAN) technologies and data backup technologies
Working knowledge communication security (COMSEC) policies and integration
Working knowledge of Risk Management Framework, Common Criteria, and System Security Policy as they relate to assessments and authorization
Working knowledge and current relevant experience with PL2, PL3, and PL4 network environments/systems
Working knowledge of WSUS and/or YUM patch deployment methodologies
Must be familiar with DoD policy as it applies to implementing and executing system and network administration
Working knowledge of Risk Management Framework and how to apply it to network/information system environments
Must be able to regularly lift up to 50 lbs
| |
Information Systems Security Officer (ISSO) III 118-053 | | | 01/17/2023 | Information Systems Security Officer (ISSO) III:
The ISSO is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO. The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is assigned responsibility for the day-to-day security operations of a system. This also will include physical and environmental protection, personnel security, incident handling, and security training and awareness. It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configuration management across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
Performance shall include:
Assist the ISSM in meeting their duties and responsibilities
Prepare, review, and update authorization packages
Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media
Notify ISSM when changes occur that might affect the authorization determination of the information system(s)
Conduct periodic reviews of information systems to ensure compliance with the security authorization package
Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change
Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly
Ensure all IS security-related documentation is current and accessible to properly authorized individuals
Ensure audit records are collected, reviewed, and documented (to include any anomalies)
Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties
Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans
Identify cyber security vulnerabilities and assist with the implementation of the countermeasures for them
Prepare reports on the status of security safeguards applied to computer systems
Perform ISSO duties in support of in-house and external customers
Conduct continuous monitoring activities for authorization boundaries under your preview
Assist Department of Defense, National Agency and Contractor organizations with the development of assessment and authorization (A&A) efforts
Experience:
5 - 7 years related experience
Prior performance in roles such as System, Network Administrator or ISSO
Education:
Certifications:
Security Clearance:
Current Top Secret Clearance with SCI Eligibility
Eligibility for access to Special Access Program Information
Willingness to submit to a Counterintelligence polygraph
Other Requirements:
| |
Information Systems Security Officer (ISSO) III 118-052 | | | 01/17/2023 | Information Systems Security Officer (ISSO) III:
The ISSO is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO. The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is assigned responsibility for the day-to-day security operations of a system. This also will include physical and environmental protection, personnel security, incident handling, and security training and awareness. It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configuration management across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
Performance shall include:
Assist the ISSM in meeting their duties and responsibilities
Prepare, review, and update authorization packages
Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media
Notify ISSM when changes occur that might affect the authorization determination of the information system(s)
Conduct periodic reviews of information systems to ensure compliance with the security authorization package
Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change
Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly
Ensure all IS security-related documentation is current and accessible to properly authorized individuals
Ensure audit records are collected, reviewed, and documented (to include any anomalies)
Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties
Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans
Identify cyber security vulnerabilities and assist with the implementation of the countermeasures for them
Prepare reports on the status of security safeguards applied to computer systems
Perform ISSO duties in support of in-house and external customers
Conduct continuous monitoring activities for authorization boundaries under your preview
Assist Department of Defense, National Agency and Contractor organizations with the development of assessment and authorization (A&A) efforts
Experience:
5 - 7 years related experience
Prior performance in roles such as System, Network Administrator or ISSO
Education:
Certifications:
Security Clearance:
Current Top Secret Clearance with SCI Eligibility
Eligibility for access to Special Access Program Information
Willingness to submit to a Counterintelligence polygraph
Other Requirements:
| |
Information Systems Security Manager (ISSM) I 118-051 | | | 01/17/2023 | Information Systems Security Manager (ISSM) I:
The ISSM’s primary function serves as a principal advisor on all matters, technical and otherwise, involving the security of information systems under their purview. Primary support will be working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense, and Military Compartment efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
Performance shall include:
Perform oversight of the development, implementation and evaluation of information system security program policy; special emphasis placed upon integration of existing SAP network infrastructures
Develop and oversee operational information systems security implementation policy and guidelines of network security, based upon the Risk Management Framework (RMF) with emphasize on Joint Special Access Program Implementation Guide (JSIG) authorization process
Advise customer on Risk Management Framework (RMF) assessment and authorization issues
Perform risk assessments and make recommendations to DoD agency customers
Advise government program managers on security testing methodologies and processes
Evaluate authorization documentation and provide written recommendations for authorization to government PMs
Develop and maintain a formal Information Systems Security Program
Ensure that all IAOs, network administrators, and other cyber security personnel receive the necessary technical and security training to carry out their duties
Develop, review, endorse, and recommend action by the AO or DAO of system assessment documentation
Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media
Develop and execute security assessment plans that include verification that the features and assurances required for each protection level functioning
Maintain a and/or applicable repository for all system authorization documentation and modifications
Institute and implement a Configuration Control Board (CCB) charter
Develop policies and procedures for responding to security incidents, to include investigating and reporting security violations and incidents
Ensure proper protection or corrective measures have been taken when an incident or vulnerability has been discovered within a system
Ensure that data ownership and responsibilities are established for each authorization boundary, to include accountability, access rights, and special handling requirements
Ensure development and implementation of an information security education, training, and awareness program, to include attending, monitoring, and presenting local cyber security training.
Evaluate threats and vulnerabilities to ascertain whether additional safeguards are needed
Assess changes in the system, its environment, and operational needs that could affect the authorization
Ensure that authorization is accomplished a valid Authorization determination has been given for all authorization boundaries under your purview
Review AIS assessment plans
Coordinate with PSO or cognizant security official on approval of external information systems (e.g., guest systems, interconnected system with another organization)
Conduct periodic assessments of the security posture of the authorization boundaries
Ensure configuration management (CM) for security-relevant changes to software, hardware, and firmware and that they are properly documented
Ensure periodic testing is conducted to evaluate the security posture of IS by employing various intrusion/attack detection and monitoring tools (shared responsibility with ISSOs)
Ensure that system recovery and reconstitution processes developed and monitored to ensure that the authorization boundary can be recovered based on its availability level determination
Ensure all authorization documentation is current and accessible to properly authorized individuals
Ensure that system security requirements are addressed during all phases of the system life cycle
Develop Assured File Transfers (AFT) on accordance with the JSIG
Participate in self-inspections
Conduct the duties of the Information System Security Officer (ISSO) if one is not present and/or available
Experience:
Education:
Certifications:
Security Clearance:
Current Top Secret Clearance with SCI Eligibility
Eligibility for access to Special Access Program Information
Willingness to submit to a Counterintelligence polygraph
Other Requirements:
Must having working knowledge of DoD, National and applicable service and agency security policy, manuals and standards.
Must be able to regularly lift up-to 50lbs
| |
Activity Security Representative III 118-050 | | | 01/17/2023 | Activity Security Representative III:
The Activity Security Representative’s primary function is to provide multi-disciplined security support to a customer’s facility and organization. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
Performance shall include:
Classification reviews of inbound and outbound correspondence
Assist in the maintenance of a document accountability database and associated correspondence
Processing inbound and outbound classified mail and receipt records
Perform destruction of classified materials
Process magnetic media for accountability
Reproduction support for classified materials
Maintain various daily logs for a variety of administrative functions associated with document control
Assist in the processing of inbound data and outbound data transfer files
Transfer electronic data files to internal customers
Maintain an extensive customer database point of contact listing
Assist with researching, processing, filing, and maintaining inbound and outbound visit notices
Escort facility visitors and maintains associated logs
Assist in the preparation of facility access control badges
Conduct entry and exit inspections
Assist in the maintenance of facility access control entry systems, to include visitor control
Perform data entry to the Personnel Access Security System database and maintain all customer sponsored billets and quota information
Assist in maintaining personnel security files for all personnel of the supported element
Follow and enforce the customer’s Standard Operating Procedures
Provide support for the security awareness and education programs
Perform miscellaneous administrative support functions as directed by the contractor site lead and/or the Senior Security Representative
Review, track, and monitor security clearance processing activities with appropriate government personnel to achieve appropriate clearance actions
Participate in Air Force SAP security compliance inspections of government organizations and industry
Implement Top Secret Control for accountable material and associated correspondence
Prepare and/or process inbound and outbound classified mail, faxes, courier packages and receipts
Prepare, process, and/or review Program Access Request (PARs) for accuracy and access eligibility
Execute Special Access Program Nomination Process Questionnaires
Conduct Defense Central Index of Investigations (DCII), Joint Personnel Access System (JPAS), and SAPNP reviews of candidates being submitted for SAP access
Perform data entry and record checks in the Air Force Access Data System (AFADS) and maintains all customer sponsored personnel access information current
Perform indoctrinations
Provide leadership, mentoring, and quality assurance for Team Members
Experience:
5 - 7 years related experience
Security Fundamentals Professional Certification (SFPC) counts towards 3 years of experience
Special Program Security Certification (SPSC) counts towards 5 years of experience
Maximum equivalent experience for SPED Certifications is no more than 5 years
Education:
Certifications:
Security Clearance:
Current Top Secret Clearance with SCI Eligibility
Eligibility for access to Special Access Program Information
Willingness to submit to a Counterintelligence polygraph
| |
Activity Security Representative III 118-049 | | | 01/17/2023 | Activity Security Representative III:
The Activity Security Representative’s primary function is to provide multi-disciplined security support to a customer’s facility and organization. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
Performance shall include:
Classification reviews of inbound and outbound correspondence
Assist in the maintenance of a document accountability database and associated correspondence
Processing inbound and outbound classified mail and receipt records
Perform destruction of classified materials
Process magnetic media for accountability
Reproduction support for classified materials
Maintain various daily logs for a variety of administrative functions associated with document control
Assist in the processing of inbound data and outbound data transfer files
Transfer electronic data files to internal customers
Maintain an extensive customer database point of contact listing
Assist with researching, processing, filing, and maintaining inbound and outbound visit notices
Escort facility visitors and maintains associated logs
Assist in the preparation of facility access control badges
Conduct entry and exit inspections
Assist in the maintenance of facility access control entry systems, to include visitor control
Perform data entry to the Personnel Access Security System database and maintain all customer sponsored billets and quota information
Assist in maintaining personnel security files for all personnel of the supported element
Follow and enforce the customer’s Standard Operating Procedures
Provide support for the security awareness and education programs
Perform miscellaneous administrative support functions as directed by the contractor site lead and/or the Senior Security Representative
Review, track, and monitor security clearance processing activities with appropriate government personnel to achieve appropriate clearance actions
Participate in Air Force SAP security compliance inspections of government organizations and industry
Implement Top Secret Control for accountable material and associated correspondence
Prepare and/or process inbound and outbound classified mail, faxes, courier packages and receipts
Prepare, process, and/or review Program Access Request (PARs) for accuracy and access eligibility
Execute Special Access Program Nomination Process Questionnaires
Conduct Defense Central Index of Investigations (DCII), Joint Personnel Access System (JPAS), and SAPNP reviews of candidates being submitted for SAP access
Perform data entry and record checks in the Air Force Access Data System (AFADS) and maintains all customer sponsored personnel access information current
Perform indoctrinations
Provide leadership, mentoring, and quality assurance for Team Members
Experience:
5 - 7 years related experience
Security Fundamentals Professional Certification (SFPC) counts towards 3 years of experience
Special Program Security Certification (SPSC) counts towards 5 years of experience
Maximum equivalent experience for SPED Certifications is no more than 5 years
Education:
Certifications:
Security Clearance:
Current Top Secret Clearance with SCI Eligibility
Eligibility for access to Special Access Program Information
Willingness to submit to a Counterintelligence polygraph
| |
Activity Security Representative III 118-048 | | | 01/17/2023 | Activity Security Representative III:
The Activity Security Representative’s primary function is to provide multi-disciplined security support to a customer’s facility and organization. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
Performance shall include:
Classification reviews of inbound and outbound correspondence
Assist in the maintenance of a document accountability database and associated correspondence
Processing inbound and outbound classified mail and receipt records
Perform destruction of classified materials
Process magnetic media for accountability
Reproduction support for classified materials
Maintain various daily logs for a variety of administrative functions associated with document control
Assist in the processing of inbound data and outbound data transfer files
Transfer electronic data files to internal customers
Maintain an extensive customer database point of contact listing
Assist with researching, processing, filing, and maintaining inbound and outbound visit notices
Escort facility visitors and maintains associated logs
Assist in the preparation of facility access control badges
Conduct entry and exit inspections
Assist in the maintenance of facility access control entry systems, to include visitor control
Perform data entry to the Personnel Access Security System database and maintain all customer sponsored billets and quota information
Assist in maintaining personnel security files for all personnel of the supported element
Follow and enforce the customer’s Standard Operating Procedures
Provide support for the security awareness and education programs
Perform miscellaneous administrative support functions as directed by the contractor site lead and/or the Senior Security Representative
Review, track, and monitor security clearance processing activities with appropriate government personnel to achieve appropriate clearance actions
Participate in Air Force SAP security compliance inspections of government organizations and industry
Implement Top Secret Control for accountable material and associated correspondence
Prepare and/or process inbound and outbound classified mail, faxes, courier packages and receipts
Prepare, process, and/or review Program Access Request (PARs) for accuracy and access eligibility
Execute Special Access Program Nomination Process Questionnaires
Conduct Defense Central Index of Investigations (DCII), Joint Personnel Access System (JPAS), and SAPNP reviews of candidates being submitted for SAP access
Perform data entry and record checks in the Air Force Access Data System (AFADS) and maintains all customer sponsored personnel access information current
Perform indoctrinations
Provide leadership, mentoring, and quality assurance for Team Members
Experience:
5 - 7 years related experience
Security Fundamentals Professional Certification (SFPC) counts towards 3 years of experience
Special Program Security Certification (SPSC) counts towards 5 years of experience
Maximum equivalent experience for SPED Certifications is no more than 5 years
Education:
Certifications:
Security Clearance:
Current Top Secret Clearance with SCI Eligibility
Eligibility for access to Special Access Program Information
Willingness to submit to a Counterintelligence polygraph
| |
Program Security Representative I 118-047 | | | 01/17/2023 | Program Security Representative I:
The Program Security Representative’s primary function is to provide multi-discipline security support for one or more of the customer’s Special Access Programs (SAPs). The position will provide “day-to-day” multi-discipline analysis for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
Performance shall include:
Ensure strict adherence to the provisions of the NISPOM, its Supplement, the DoD Overprint, DCID, ICD, and SAP policy
Assist in developing and executing approved policies and procedures for safeguarding Special Access Program (SAP), Sensitive Compartmented Information (SCI) and collateral data in support of US military operations
Provide day-to-day security support that includes continuous assessment of procedures to identify shortfalls and provide appropriate recommendations for revising and improving security policies, procedures, and systems
Identify vulnerabilities, threats, and risks to test, training, and operational activities
Assist in developing, implementing, and training the Operations Security program
Assist in providing contractor and subordinate facility assistance and oversight
Brief all levels of personnel, both in the government and senior civilian services, on a variety of security related topics
Conduct and document SAP facility compliance reviews, follow-on facility reviews, and facility close-outs
Monitor, report and track all corrective actions resulting from compliance reviews
Ensure timely notification of pertinent security matters to program technical and management staff
Conduct exploration of any loss, compromise, or suspected compromise of classified and/or sensitive information, including conducting preliminary inquiries and generating damage assessments resulting from the loss of classified information.
Coordinate with SAP security personnel to ensure lessons learned are incorporated into the curriculum for the SAP security education & awareness program
Experience:
5 - 7 years related experience
Security Fundamentals Professional Certification (SFPC) counts towards 3 years of experience
Special Program Security Certification (SPSC) counts towards 5 years of experience
Maximum equivalent experience for SPED Certifications is no more than 5 years
Education:
Security Clearance:
Current Top Secret Clearance with SCI Eligibility
Eligibility for access to Special Access Program Information
Willingness to submit to a Counterintelligence polygraph
| |
Information Systems Security Officer (ISSO) II 118-046 | | | 01/17/2023 | Information Systems Security Officer (ISSO) II:
The ISSO is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO. The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is assigned responsibility for the day-to-day security operations of a system. This also will include physical and environmental protection, personnel security, incident handling, and security training and awareness. It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configuration management across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
Performance shall include:
Assist the ISSM in meeting their duties and responsibilities
Prepare, review, and update authorization packages
Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media
Notify ISSM when changes occur that might affect the authorization determination of the information system(s)
Conduct periodic reviews of information systems to ensure compliance with the security authorization package
Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change
Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly
Ensure all IS security-related documentation is current and accessible to properly authorized individuals
Ensure audit records are collected, reviewed, and documented (to include any anomalies)
Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties
Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans
Identify cyber security vulnerabilities and assist with the implementation of the countermeasures for them
Prepare reports on the status of security safeguards applied to computer systems
Perform ISSO duties in support of in-house and external customers
Conduct security impact analysis activities and provide to the ISSM on all configuration management changes to the authorization boundaries
Experience:
2 - 5 years related experience
Prior performance in roles such as System, Network Administrator or ISSO
Education:
Certifications:
Security Clearance:
Current Top Secret Clearance with SCI Eligibility
Eligibility for access to Special Access Program Information
Willingness to submit to a Counterintelligence polygraph
Other Requirements:
| |
Activity Security Representative III 118-045 | | | 01/17/2023 | Activity Security Representative III:
The Activity Security Representative’s primary function is to provide multi-disciplined security support to a customer’s facility and organization. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
Performance shall include:
Classification reviews of inbound and outbound correspondence
Assist in the maintenance of a document accountability database and associated correspondence
Processing inbound and outbound classified mail and receipt records
Perform destruction of classified materials
Process magnetic media for accountability
Reproduction support for classified materials
Maintain various daily logs for a variety of administrative functions associated with document control
Assist in the processing of inbound data and outbound data transfer files
Transfer electronic data files to internal customers
Maintain an extensive customer database point of contact listing
Assist with researching, processing, filing, and maintaining inbound and outbound visit notices
Escort facility visitors and maintains associated logs
Assist in the preparation of facility access control badges
Conduct entry and exit inspections
Assist in the maintenance of facility access control entry systems, to include visitor control
Perform data entry to the Personnel Access Security System database and maintain all customer sponsored billets and quota information
Assist in maintaining personnel security files for all personnel of the supported element
Follow and enforce the customer’s Standard Operating Procedures
Provide support for the security awareness and education programs
Perform miscellaneous administrative support functions as directed by the contractor site lead and/or the Senior Security Representative
Review, track, and monitor security clearance processing activities with appropriate government personnel to achieve appropriate clearance actions
Participate in Air Force SAP security compliance inspections of government organizations and industry
Implement Top Secret Control for accountable material and associated correspondence
Prepare and/or process inbound and outbound classified mail, faxes, courier packages and receipts
Prepare, process, and/or review Program Access Request (PARs) for accuracy and access eligibility
Execute Special Access Program Nomination Process Questionnaires
Conduct Defense Central Index of Investigations (DCII), Joint Personnel Access System (JPAS), and SAPNP reviews of candidates being submitted for SAP access
Perform data entry and record checks in the Air Force Access Data System (AFADS) and maintains all customer sponsored personnel access information current
Perform indoctrinations
Provide leadership, mentoring, and quality assurance for Team Members
Experience:
5 - 7 years related experience
Security Fundamentals Professional Certification (SFPC) counts towards 3 years of experience
Special Program Security Certification (SPSC) counts towards 5 years of experience
Maximum equivalent experience for SPED Certifications is no more than 5 years
Education:
Certifications:
Security Clearance:
Current Top Secret Clearance with SCI Eligibility
Eligibility for access to Special Access Program Information
Willingness to submit to a Counterintelligence polygraph
| |
Activity Security Representative II 118-044 | | | 01/17/2023 | Activity Security Representative II:
The Activity Security Representative’s primary function is to provide multi-disciplined security support to a customer’s facility and organization. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
Performance shall include:
Classification reviews of inbound and outbound correspondence
Assist in the maintenance of a document accountability database and associated correspondence
Processing inbound and outbound classified mail and receipt records
Perform destruction of classified materials
Process magnetic media for accountability
Reproduction support for classified materials
Maintain various daily logs for a variety of administrative functions associated with document control
Assist in the processing of inbound data and outbound data transfer files
Transfer electronic data files to internal customers
Maintain an extensive customer database point of contact listing
Assist with researching, processing, filing, and maintaining inbound and outbound visit notices
Escort facility visitors and maintains associated logs
Assist in the preparation of facility access control badges
Conduct entry and exit inspections
Assist in the maintenance of facility access control entry systems, to include visitor control
Perform data entry to the Personnel Access Security System database and maintain all customer sponsored billets and quota information
Assist in maintaining personnel security files for all personnel of the supported element
Follow and enforce the customer’s Standard Operating Procedures
Provide support for the security awareness and education programs
Perform miscellaneous administrative support functions as directed by the contractor site lead and/or the Senior Security Representative
Review, track, and monitor security clearance processing activities with appropriate government personnel to achieve appropriate clearance actions
Participate in Air Force SAP security compliance inspections of government organizations and industry
Implement Top Secret Control for accountable material and associated correspondence
Prepare and/or process inbound and outbound classified mail, faxes, courier packages and receipts
Prepare, process, and/or review Program Access Request (PARs) for accuracy and access eligibility
Execute Special Access Program Nomination Process Questionnaires
Conduct Defense Central Index of Investigations (DCII), Joint Personnel Access System (JPAS), and SAPNP reviews of candidates being submitted for SAP access
Perform data entry and record checks in the Air Force Access Data System (AFADS) and maintains all customer sponsored personnel access information current
Perform indoctrinations
Experience:
3-5 years related experience
Security Fundamentals Professional Certification (SFPC) counts towards 3 years of experience
Special Program Security Certification (SPSC) counts towards 5 years of experience
Maximum equivalent experience for SPED Certifications is no more than 5 years
Education:
Certifications:
Security Clearance:
Current Top Secret Clearance with SCI Eligibility
Eligibility for access to Special Access Program Information
Willingness to submit to a Counterintelligence polygraph
Physical Requirements:
| |
Information Systems Security Officer (ISSO) II 118-043 | | | 01/17/2023 | Information Systems Security Officer (ISSO) II:
The ISSO is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO. The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is assigned responsibility for the day-to-day security operations of a system. This also will include physical and environmental protection, personnel security, incident handling, and security training and awareness. It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configuration management across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
Performance shall include:
Assist the ISSM in meeting their duties and responsibilities
Prepare, review, and update authorization packages
Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media
Notify ISSM when changes occur that might affect the authorization determination of the information system(s)
Conduct periodic reviews of information systems to ensure compliance with the security authorization package
Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change
Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly
Ensure all IS security-related documentation is current and accessible to properly authorized individuals
Ensure audit records are collected, reviewed, and documented (to include any anomalies)
Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties
Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans
Identify cyber security vulnerabilities and assist with the implementation of the countermeasures for them
Prepare reports on the status of security safeguards applied to computer systems
Perform ISSO duties in support of in-house and external customers
Conduct security impact analysis activities and provide to the ISSM on all configuration management changes to the authorization boundaries
Experience:
2 - 5 years related experience
Prior performance in roles such as System, Network Administrator or ISSO
Education:
Certifications:
Security Clearance:
Current Top Secret Clearance with SCI Eligibility
Eligibility for access to Special Access Program Information
Willingness to submit to a Counterintelligence polygraph
Other Requirements:
| |
Program Security Representative II 118-042 | | | 01/17/2023 | Program Security Representative II:
The Program Security Representative’s primary function is to provide multi-discipline security support for one or more of the customer’s Special Access Programs (SAPs). The position will provide “day-to-day” multi-discipline analysis for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
Performance shall include:
Ensure strict adherence to the provisions of the NISPOM, its Supplement, the DoD Overprint, DCID, ICD, and SAP policy
Assist in developing and executing approved policies and procedures for safeguarding Special Access Program (SAP), Sensitive Compartmented Information (SCI) and collateral data in support of US military operations
Provide day-to-day security support that includes continuous assessment of procedures to identify shortfalls and provide appropriate recommendations for revising and improving security policies, procedures, and systems
Identify vulnerabilities, threats, and risks to test, training, and operational activities
Assist in developing, implementing, and training the Operations Security program
Assist in providing contractor and subordinate facility assistance and oversight
Brief all levels of personnel, both in the government and senior civilian services, on a variety of security related topics
Conduct and document SAP facility compliance reviews, follow-on facility reviews, and facility close-outs
Monitor, report and track all corrective actions resulting from compliance reviews
Ensure timely notification of pertinent security matters to program technical and management staff
Conduct exploration of any loss, compromise, or suspected compromise of classified and/or sensitive information, including conducting preliminary inquiries and generating damage assessments resulting from the loss of classified information
Coordinate with SAP security personnel to ensure lessons learned are incorporated into the curriculum for the SAP security education & awareness program
Experience:
8 – 10 years related experience
Security Fundamentals Professional Certification (SFPC) counts towards 3 years of experience
Special Program Security Certification (SPSC) counts towards 5 years of experience
Maximum equivalent experience for SPED Certifications is no more than 5 years
Education:
Security Clearance:
Current Top Secret Clearance with SCI Eligibility
Eligibility for access to Special Access Program Information
Willingness to submit to a Counterintelligence polygraph
| |
Information Systems Security Officer (ISSO) II 118-041 | | | 01/17/2023 | Information Systems Security Officer (ISSO) II:
The ISSO is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO. The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is assigned responsibility for the day-to-day security operations of a system. This also will include physical and environmental protection, personnel security, incident handling, and security training and awareness. It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configuration management across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
Performance shall include:
Assist the ISSM in meeting their duties and responsibilities.
Prepare, review, and update authorization packages
Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media
Notify ISSM when changes occur that might affect the authorization determination of the information system(s)
Conduct periodic reviews of information systems to ensure compliance with the security authorization package
Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change
Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly
Ensure all IS security-related documentation is current and accessible to properly authorized individuals
Ensure audit records are collected, reviewed, and documented (to include any anomalies)
Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties
Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans
Identify cyber security vulnerabilities and assist with the implementation of the countermeasures for them
Prepare reports on the status of security safeguards applied to computer systems
Perform ISSO duties in support of in-house and external customers
Conduct security impact analysis activities and provide to the ISSM on all configuration management changes to the authorization boundaries
Experience:
2 - 5 years related experience
Prior performance in roles such as System, Network Administrator or ISSO
Education:
Certifications:
Security Clearance:
Current Top Secret Clearance with SCI Eligibility
Eligibility for access to Special Access Program Information
Willingness to submit to a Counterintelligence polygraph
Other Requirements:
| |
Information Systems Security Officer (ISSO) III 118-040 | | | 01/16/2023 | Information Systems Security Officer (ISSO) III:
The ISSO is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO. The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is assigned responsibility for the day-to-day security operations of a system. This also will include physical and environmental protection, personnel security, incident handling, and security training and awareness. It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configuration management across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
Performance shall include:
Assist the ISSM in meeting their duties and responsibilities
Prepare, review, and update authorization packages
Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media
Notify ISSM when changes occur that might affect the authorization determination of the information system(s)
Conduct periodic reviews of information systems to ensure compliance with the security authorization package
Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change
Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly
Ensure all IS security-related documentation is current and accessible to properly authorized individuals
Ensure audit records are collected, reviewed, and documented (to include any anomalies)
Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties
Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans
Identify cyber security vulnerabilities and assist with the implementation of the countermeasures for them
Prepare reports on the status of security safeguards applied to computer systems
Perform ISSO duties in support of in-house and external customers
Conduct continuous monitoring activities for authorization boundaries under your preview
Assist Department of Defense, National Agency and Contractor organizations with the development of assessment and authorization (A&A) efforts
Experience:
5 - 7 years related experience
Prior performance in roles such as System, Network Administrator or ISSO
Education:
Certifications:
Security Clearance:
Current Top Secret Clearance with SCI Eligibility
Eligibility for access to Special Access Program Information
Willingness to submit to a Counterintelligence polygraph
Other Requirements:
| |
Information Systems Security Officer (ISSO) III 118-039 | | | 01/16/2023 | Information Systems Security Officer (ISSO) III:
The ISSO is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO. The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is assigned responsibility for the day-to-day security operations of a system. This also will include physical and environmental protection, personnel security, incident handling, and security training and awareness. It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configuration management across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
Performance shall include:
Assist the ISSM in meeting their duties and responsibilities
Prepare, review, and update authorization packages
Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media
Notify ISSM when changes occur that might affect the authorization determination of the information system(s)
Conduct periodic reviews of information systems to ensure compliance with the security authorization package
Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change
Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly
Ensure all IS security-related documentation is current and accessible to properly authorized individuals
Ensure audit records are collected, reviewed, and documented (to include any anomalies)
Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties
Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans
Identify cyber security vulnerabilities and assist with the implementation of the countermeasures for them
Prepare reports on the status of security safeguards applied to computer systems
Perform ISSO duties in support of in-house and external customers
Conduct continuous monitoring activities for authorization boundaries under your preview
Assist Department of Defense, National Agency and Contractor organizations with the development of assessment and authorization (A&A) efforts
Experience:
5 - 7 years related experience
Prior performance in roles such as System, Network Administrator or ISSO
Education:
Certifications:
Security Clearance:
Current Top Secret Clearance with SCI Eligibility
Eligibility for access to Special Access Program Information
Willingness to submit to a Counterintelligence polygraph
Other Requirements:
| |
Information Systems Security Officer (ISSO) II 118-038 | | | 01/16/2023 | Information Systems Security Officer (ISSO) II:
The ISSO is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO. The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is assigned responsibility for the day-to-day security operations of a system. This also will include physical and environmental protection, personnel security, incident handling, and security training and awareness. It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configuration management across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
Performance shall include:
Assist the ISSM in meeting their duties and responsibilities
Prepare, review, and update authorization packages
Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media
Notify ISSM when changes occur that might affect the authorization determination of the information system(s)
Conduct periodic reviews of information systems to ensure compliance with the security authorization package
Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change
Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly
Ensure all IS security-related documentation is current and accessible to properly authorized individuals
Ensure audit records are collected, reviewed, and documented (to include any anomalies)
Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties
Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans
Identify cyber security vulnerabilities and assist with the implementation of the countermeasures for them
Prepare reports on the status of security safeguards applied to computer systems
Perform ISSO duties in support of in-house and external customers
Conduct security impact analysis activities and provide to the ISSM on all configuration management changes to the authorization boundaries
Experience:
2 - 5 years related experience
Prior performance in roles such as System, Network Administrator or ISSO
Education:
Certifications:
Security Clearance:
Current Top Secret Clearance with SCI Eligibility
Eligibility for access to Special Access Program Information
Willingness to submit to a Counterintelligence polygraph
Other Requirements:
| |
Network/System Administrator III 118-037 | | | 01/16/2023 | Network/System Administrator III:
The primary function will be to organize, install, and support government organization’s computer systems, including local area networks (LANs), wide area networks (WANs), network segments, intranets, and other data communication systems. This will also include helping architect, design and analyze network models. It will require participation in decisions about buying future hardware or software to upgrade organization’s infrastructure. This position might be called upon to provide technical support to computer users to help solve users’ problems. This position will support activities within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
Performance shall include:
Able to perform self-sustaining and work with little to no oversight
Lead IT ops team on day to day management and operations of Networks and implement capabilities vetted through Cybersecurity, ISSE and higher headquarters to maintain JSIG/RMF Authority to Operate and maintain Continuous Monitoring tools and processes
Manage COTS & GOTS products to collect, display and remediate a variety of automated system security and system operations/performance functions and metrics.
Assist during security assessments of servers/network devices/security appliances
Assist during security assessments with regard to accuracy and efficiency
Assist with Creation of operational Operations and Maintenance (O&M) checklists to maintain the service (daily, weekly, monthly, yearly O&M checklists); build Tactics, Techniques and Processes (TTPs) and Standard Operating Processes (SOPs) associated with service checklists
Manage and operate monitoring tools/capabilities with the enterprise security information and event management (SIEM) and create/tailor complex event alarms/rules and summary reports
Execute cybersecurity operations procedures for day to day network management, operations and maintenance
Monitor/analyze output of cybersecurity related tools for reportable security incidents and residual risk
Assist in analyzing technical risk, upon request, of emerging cybersecurity tools and processes
Work as part of a security incident response team as needed
Assist ISSM/ISSO/ISSE with the Integration/Development new techniques to improve Confidentiality, Integrity, and Availability for networks/systems operating at various classification levels.
Advanced technical competency in one or more of the following supported platforms: Microsoft Windows Server, Active Directory Red Hat Enterprise Linux servers, MS Hyper-V/VMWare/ESx/Xen Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems, forensic analysis/vulnerability assessment, Group Policy management and configuration, Scripting, BMC Footprints, WSUS, , Lumension, Bitlocker, SQL Server 2012, TomCat, IIS, Windows Server 2012r2/2016, Win 10, Red Hat 6.5, Microsoft Office.
Toolkits, SEIMs, Logrhythm, ACAS/Nessus/SCAP, mandatory/role-based access control concepts (e. g. SE Linux extensions to RHEL, PitBull, AppArmor, and Sentris) , video teleconferencing/VOIP, Oracle/MS SQL database security, and Apache/IIS Web server security
Experience:
Education:
Certifications:
Security Clearance:
Current Top Secret Clearance with SCI Eligibility
Eligibility for access to Special Access Program Information
Willingness to submit to a Counterintelligence polygraph
Other Requirements:
Thorough knowledge of Microsoft Windows desktop and server operating systems, Microsoft Exchange Server, and as needed RHEL operating systems administration and associated hardware.
Experience in effective communication and collaborating in a high performance team environment.
Group Policy design and configuration.
Working knowledge of CISCO network and switching and virtualization technologies.
Working knowledge of virtualization as it applies to users environments, operating systems, and network appliances.
Working knowledge of Local Area Network (LAN) and Wide Area Network (WAN) technologies and data backup technologies.
Working knowledge communication security (COMSEC) policies and integration.
Working knowledge of Risk Management Framework, Common Criteria, and System Security Policy as they relate to assessments and authorization.
Working knowledge and current relevant experience with PL2, PL3, and PL4 network environments/systems.
Working knowledge of WSUS and/or YUM patch deployment methodologies.
Must be familiar with DoD policy as it applies to implementing and executing system and network administration.
Working knowledge of Risk Management Framework and how to apply it to network/information system environments.
Must be able to regularly lift up to 50 lbs.
| |
Information Technology/Assurance Specialist II 118-036 | | | 01/16/2023 | Information Technology/Assurance Specialist II:
The IT/IA primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
Performance shall include:
Establish complex operational software configuration controls and system interfaces for computer system(s) assigned
Maintain file servers, Firewalls, network access, Security Monitoring Systems and system documentation as required
Analyze and troubleshoot system anomalies to ensure optimum equipment performance
Prepare system for operational use and support operational tests
Review, prepare, and update authorization packages
Notify customer when changes occur that might affect authorization accreditation
Conduct cybersecurity portion of the self-inspection’s checklist
Review and provide technical and cyber security coordination on all Bodies of Evidence that make-up the authorization package
Identify any and all vulnerabilities and implement countermeasures
Ensure information systems and network appliances are operated, maintained, and disposed of in accordance with security policies and practices
Perform Video-Teleconferencing VTC System Administration, Scheduling, & Configuration
Provide External Information System(s) Client Support
Perform account creations, changes, & deletions on multiple authorization boundaries
Perform Help Desk & troubleshooting activities
Perform Hardware/Software System Configuration, upgrades and modifications
Perform system and network appliance patching activities
Provide Government-Issued Laptop Support
Assist in Media Control & Accountability activities
Perform COMSEC account/equipment management activities
Experience:
5-7 years related experience
Prior performance in roles such as System, Network Administrator or Information Technology/Assurance Specialists
Education:
Certifications:
Security Clearance:
| |
Information Systems Security Officer (ISSO) III 118-035 | | | 01/16/2023 | Information Systems Security Officer (ISSO) III:
The ISSO is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO. The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is assigned responsibility for the day-to-day security operations of a system. This also will include physical and environmental protection, personnel security, incident handling, and security training and awareness. It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configuration management across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
Performance shall include:
Assist the ISSM in meeting their duties and responsibilities
Prepare, review, and update authorization packages
Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media
Notify ISSM when changes occur that might affect the authorization determination of the information system(s)
Conduct periodic reviews of information systems to ensure compliance with the security authorization package
Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change
Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly
Ensure all IS security-related documentation is current and accessible to properly authorized individuals
Ensure audit records are collected, reviewed, and documented (to include any anomalies)
Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties
Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans
Identify cyber security vulnerabilities and assist with the implementation of the countermeasures for them
Prepare reports on the status of security safeguards applied to computer systems
Perform ISSO duties in support of in-house and external customers
Conduct continuous monitoring activities for authorization boundaries under your preview
Assist Department of Defense, National Agency and Contractor organizations with the development of assessment and authorization (A&A) efforts
Experience:
5 - 7 years related experience
Prior performance in roles such as System, Network Administrator or ISSO
Education:
Certifications:
Security Clearance:
Current Top Secret Clearance with SCI Eligibility
Eligibility for access to Special Access Program Information
Willingness to submit to a Counterintelligence polygraph
Other Requirements:
| |
Activity Security Representative I 118-034 | | | 01/16/2023 | Activity Security Representative I:
The Activity Security Representative’s primary function is to provide multi-disciplined security support to a customer’s facility and organization. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
Performance shall include:
Classification reviews of inbound and outbound correspondence
Assist in the maintenance of a document accountability database and associated correspondence
Processing inbound and outbound classified mail and receipt records
Perform destruction of classified materials
Process magnetic media for accountability
Reproduction support for classified materials
Maintain various daily logs for a variety of administrative functions associated with document control
Assist in the processing of inbound data and outbound data transfer files
Transfer electronic data files to internal customers
Maintain an extensive customer database point of contact listing
Assist with researching, processing, filing, and maintaining inbound and outbound visit notices
Escort facility visitors and maintains associated logs
Assist in the preparation of facility access control badges
Conduct entry and exit inspections
Assist in the maintenance of facility access control entry systems, to include visitor control
Perform data entry to the Personnel Access Security System database and maintain all customer sponsored billets and quota information
Assist in maintaining personnel security files for all personnel of the supported element
Follow and enforce the customer’s Standard Operating Procedures
Provide support for the security awareness and education programs
Perform miscellaneous administrative support functions as directed by the contractor site lead and/or the Senior Security Representative
Experience:
1 – 2 years related experience
Security Fundamentals Professional Certification (SFPC) counts towards 3 years of experience
Special Program Security Certification (SPSC) counts towards 5 years of experience
Maximum equivalent experience for SPED Certifications is no more than 5 years
Education:
Security Clearance:
Current Top Secret Clearance with SCI Eligibility
Eligibility for access to Special Access Program Information
Willingness to submit to a Counterintelligence polygraph
| |
Activity Security Representative I 118-033 | | | 01/16/2023 | Activity Security Representative I:
The Activity Security Representative’s primary function is to provide multi-disciplined security support to a customer’s facility and organization. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
Performance shall include:
Classification reviews of inbound and outbound correspondence
Assist in the maintenance of a document accountability database and associated correspondence
Processing inbound and outbound classified mail and receipt records
Perform destruction of classified materials
Process magnetic media for accountability
Reproduction support for classified materials
Maintain various daily logs for a variety of administrative functions associated with document control
Assist in the processing of inbound data and outbound data transfer files
Transfer electronic data files to internal customers
Maintain an extensive customer database point of contact listing
Assist with researching, processing, filing, and maintaining inbound and outbound visit notices
Escort facility visitors and maintains associated logs
Assist in the preparation of facility access control badges
Conduct entry and exit inspections
Assist in the maintenance of facility access control entry systems, to include visitor control
Perform data entry to the Personnel Access Security System database and maintain all customer sponsored billets and quota information
Assist in maintaining personnel security files for all personnel of the supported element
Follow and enforce the customer’s Standard Operating Procedures
Provide support for the security awareness and education programs
Perform miscellaneous administrative support functions as directed by the contractor site lead and/or the Senior Security Representative
Experience:
1 – 2 years related experience
Security Fundamentals Professional Certification (SFPC) counts towards 3 years of experience
Special Program Security Certification (SPSC) counts towards 5 years of experience
Maximum equivalent experience for SPED Certifications is no more than 5 years
Education:
Security Clearance:
Current Top Secret Clearance with SCI Eligibility
Eligibility for access to Special Access Program Information
Willingness to submit to a Counterintelligence polygraph
| |
Security Control Assessor (SCA) II 118-032 | | | 01/16/2023 | Security Control Assessor (SCA) II:
The SCA is responsible for conducting a comprehensive assessment of the management, operational, and technical security controls employed within or inherited by an IS to determine the overall effectiveness of the controls (i.e., the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting the security requirements for the system). SCAs also provide an assessment of the severity of weaknesses or deficiencies discovered in the IS and its environment of operation and recommend corrective actions to address identified vulnerabilities. Responsibilities will cover Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities within the customer’s area of responsibility.
Performance shall include:
Perform oversight of the development, implementation and evaluation of IS security program policy; special emphasis placed upon integration of existing SAP network infrastructure
Perform assessment of ISs, based upon the Risk Management Framework (RMF) methodology in accordance with the Joint Special Access Program (SAP) Implementation Guide (JSIG)
Advise the Information System Owner (ISO), Information Data Owner (IDO), Program Security Officer (PSO), and the Delegated and/or Authorizing Official (DAO/AO) on any assessment and authorization issues
Evaluate Authorization packages and make recommendation to the AO and/or DAO for authorization
Evaluate IS threats and vulnerabilities to determine whether additional safeguards are required
Advise the Government concerning the impact levels for Confidentiality, Integrity, and Availability for the information on a system
Ensure security assessments are completed and results documented and prepare the Security Assessment Report (SAR) for the Authorization boundary
Initiate a Plan of Action and Milestones (POA&M) with identified weaknesses for each Authorization Boundaries assessed, based on findings and recommendations from the SAR
Evaluate security assessment documentation and provide written recommendations for security authorization to the Government
Discuss recommendation for authorization and submit the security authorization package to the AO/DAO
Assess proposed changes to Authorization boundaries operating environment and mission needs to determine the continuation to operate.
Review and concur with all sanitization and clearing procedures in accordance with Government guidance and/or policy
Assist the Government compliance inspections
Assist the Government with security incidents that relate to cybersecurity and ensure that the proper and corrective measures have been taken
Ensure organization are addressing and conducting all phases of the system development life cycle (SDLC)
Evaluate Hardware and Software to determine security impact that it might have on Authorization boundaries
Evaluate the effectiveness and implementation of Continuous Monitoring Plans
Represent the customer on inspection teams
Experience:
7 - 9 years related experience
Minimum of four (4) years’ experience in SAP, SCI or Collateral Information Systems (IS) Security and the implementation of regulations identified in the description of duties.
Prior performance in the role of ISSO and ISSM or SCA
Education:
Certifications:
Security Clearance:
Current Top Secret Clearance with SCI Eligibility
Eligibility for access to Special Access Program Information
Willingness to submit to a Counterintelligence polygraph
Other Requirements:
| |
Information Technology-Assurance Specialist II 118-031 | | | 01/16/2023 | Information Technology/Assurance Specialist II:
The IT/IA primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
Performance shall include:
Establish complex operational software configuration controls and system interfaces for computer system(s) assigned
Maintain file servers, Firewalls, network access, Security Monitoring Systems and system documentation as required
Analyze and troubleshoot system anomalies to ensure optimum equipment performance
Prepare system for operational use and support operational tests
Review, prepare, and update authorization packages
Notify customer when changes occur that might affect authorization accreditation
Conduct cybersecurity portion of the self-inspection’s checklist
Review and provide technical and cyber security coordination on all Bodies of Evidence that make-up the authorization package
Identify any and all vulnerabilities and implement countermeasures
Ensure information systems and network appliances are operated, maintained, and disposed of in accordance with security policies and practices
Perform Video-Teleconferencing VTC System Administration, Scheduling, & Configuration
Provide External Information System(s) Client Support
Perform account creations, changes, & deletions on multiple authorization boundaries
Perform Help Desk & troubleshooting activities
Perform Hardware/Software System Configuration, upgrades and modifications
Perform system and network appliance patching activities
Provide Government-Issued Laptop Support
Assist in Media Control & Accountability activities
Perform COMSEC account/equipment management activities
Experience:
5-7 years related experience
Prior performance in roles such as System, Network Administrator or Information Technology/Assurance Specialists
Education:
Certifications:
Security Clearance:
Current Top Secret Clearance with SCI Eligibility
Eligibility for access to Special Access Program Information
Willingness to submit to a Counterintelligence polygraph
Other Requirements:
Thorough knowledge of Microsoft Windows 2012R2 Server, Microsoft Exchange Server 2010/2016, Microsoft Windows 7/10 operating systems (OS) administration and associated hardware.
Working knowledge of Local Area Network (LAN) and Wide Area Network (WAN) technologies and data backup technologies to include communication security (COMSEC) integration.
Working knowledge of Risk Management Framework, SCI Information Systems Security Standards, Common Criteria, and System Security Policy as they relate to Assessment and Authorizations.
Working knowledge and current relevant experience with PL2 systems; experience with PL3 & PL4 cross domain solutions is desired.
Must be able to regularly lift up to 50 lbs
| |
Activity Security Representative II 118-030 | | | 01/16/2023 | Activity Security Representative II:
The Activity Security Representative’s primary function is to provide multi-disciplined security support to a customer’s facility and organization. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
Performance shall include:
Classification reviews of inbound and outbound correspondence
Assist in the maintenance of a document accountability database and associated correspondence
Processing inbound and outbound classified mail and receipt records
Perform destruction of classified materials
Process magnetic media for accountability
Reproduction support for classified materials
Maintain various daily logs for a variety of administrative functions associated with document control
Assist in the processing of inbound data and outbound data transfer files
Transfer electronic data files to internal customers
Maintain an extensive customer database point of contact listing
Assist with researching, processing, filing, and maintaining inbound and outbound visit notices
Escort facility visitors and maintains associated logs
Assist in the preparation of facility access control badges
Conduct entry and exit inspections
Assist in the maintenance of facility access control entry systems, to include visitor control
Perform data entry to the Personnel Access Security System database and maintain all customer sponsored billets and quota information
Assist in maintaining personnel security files for all personnel of the supported element
Follow and enforce the customer’s Standard Operating Procedures
Provide support for the security awareness and education programs
Perform miscellaneous administrative support functions as directed by the contractor site lead and/or the Senior Security Representative
Review, track, and monitor security clearance processing activities with appropriate government personnel to achieve appropriate clearance actions
Participate in Air Force SAP security compliance inspections of government organizations and industry
Implement Top Secret Control for accountable material and associated correspondence
Prepare and/or process inbound and outbound classified mail, faxes, courier packages and receipts
Prepare, process, and/or review Program Access Request (PARs) for accuracy and access eligibility
Execute Special Access Program Nomination Process Questionnaires
Conduct Defense Central Index of Investigations (DCII), Joint Personnel Access System (JPAS), and SAPNP reviews of candidates being submitted for SAP access
Perform data entry and record checks in the Air Force Access Data System (AFADS) and maintains all customer sponsored personnel access information current
Perform indoctrinations
Experience:
3-5 years related experience
Security Fundamentals Professional Certification (SFPC) counts towards 3 years of experience
Special Program Security Certification (SPSC) counts towards 5 years of experience
Maximum equivalent experience for SPED Certifications is no more than 5 years
Education:
Certifications:
Security Clearance:
Current Top Secret Clearance with SCI Eligibility
Eligibility for access to Special Access Program Information
Willingness to submit to a Counterintelligence polygraph
Physical Requirements:
| |
Activity Security Representative II 118-029 | | | 01/16/2023 | Activity Security Representative II:
The Activity Security Representative’s primary function is to provide multi-disciplined security support to a customer’s facility and organization. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
Performance shall include:
Classification reviews of inbound and outbound correspondence
Assist in the maintenance of a document accountability database and associated correspondence
Processing inbound and outbound classified mail and receipt records
Perform destruction of classified materials
Process magnetic media for accountability
Reproduction support for classified materials
Maintain various daily logs for a variety of administrative functions associated with document control
Assist in the processing of inbound data and outbound data transfer files
Transfer electronic data files to internal customers
Maintain an extensive customer database point of contact listing
Assist with researching, processing, filing, and maintaining inbound and outbound visit notices
Escort facility visitors and maintains associated logs
Assist in the preparation of facility access control badges
Conduct entry and exit inspections
Assist in the maintenance of facility access control entry systems, to include visitor control
Perform data entry to the Personnel Access Security System database and maintain all customer sponsored billets and quota information
Assist in maintaining personnel security files for all personnel of the supported element
Follow and enforce the customer’s Standard Operating Procedures
Provide support for the security awareness and education programs
Perform miscellaneous administrative support functions as directed by the contractor site lead and/or the Senior Security Representative
Review, track, and monitor security clearance processing activities with appropriate government personnel to achieve appropriate clearance actions
Participate in Air Force SAP security compliance inspections of government organizations and industry
Implement Top Secret Control for accountable material and associated correspondence
Prepare and/or process inbound and outbound classified mail, faxes, courier packages and receipts
Prepare, process, and/or review Program Access Request (PARs) for accuracy and access eligibility
Execute Special Access Program Nomination Process Questionnaires
Conduct Defense Central Index of Investigations (DCII), Joint Personnel Access System (JPAS), and SAPNP reviews of candidates being submitted for SAP access
Perform data entry and record checks in the Air Force Access Data System (AFADS) and maintains all customer sponsored personnel access information current
Perform indoctrinations
Experience:
3-5 years related experience
Security Fundamentals Professional Certification (SFPC) counts towards 3 years of experience
Special Program Security Certification (SPSC) counts towards 5 years of experience
Maximum equivalent experience for SPED Certifications is no more than 5 years
Education:
Certifications:
Security Clearance:
Current Top Secret Clearance with SCI Eligibility
Eligibility for access to Special Access Program Information
Willingness to submit to a Counterintelligence polygraph
Physical Requirements:
| |
Information Systems Security Manager (ISSM) II 118-028 | | | 01/16/2023 | Information Systems Security Manager (ISSM) II:
The ISSM’s primary function serves as a principal advisor on all matters, technical and otherwise, involving the security of information systems under their purview. Primary support will be working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense, and Military Compartment efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
Performance shall include:
Perform oversight of the development, implementation and evaluation of information system security program policy; special emphasis placed upon integration of existing SAP network infrastructures
Develop and oversee operational information systems security implementation policy and guidelines of network security, based upon the Risk Management Framework (RMF) with emphasize on Joint Special Access Program Implementation Guide (JSIG) authorization process
Advise customer on Risk Management Framework (RMF) assessment and authorization issues
Perform risk assessments and make recommendations to DoD agency customers
Advise government program managers on security testing methodologies and processes
Evaluate authorization documentation and provide written recommendations for authorization to government PM’s
Develop and maintain a formal Information Systems Security Program
Ensure that all IAOs, network administrators, and other cyber security personnel receive the necessary technical and security training to carry out their duties
Develop, review, endorse, and recommend action by the AO or DAO of system assessment documentation
Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media
Develop and execute security assessment plans that include verification that the features and assurances required for each protection level functioning
Maintain a and/or applicable repository for all system authorization documentation and modifications
Develop policies and procedures for responding to security incidents, to include investigating and reporting security violations and incidents
Ensure proper protection or corrective measures have been taken when an incident or vulnerability has been discovered within a system
Ensure that data ownership and responsibilities are established for each authorization boundary, to include accountability, access rights, and special handling requirements
Ensure development and implementation of an information security education, training, and awareness program, to include attending, monitoring, and presenting local cyber security training.
Evaluate threats and vulnerabilities to ascertain whether additional safeguards are needed
Assess changes in the system, its environment, and operational needs that could affect the authorization
Ensure that authorization is accomplished a valid Authorization determination has been given for all authorization boundaries under your purview
Review AIS assessment plans
Coordinate with PSO or cognizant security official on approval of external information systems (e.g., guest systems, interconnected system with another organization)
Conduct periodic assessments of the security posture of the authorization boundaries
Institute and implement a Configuration Control Board (CCB) charter
Ensure configuration management (CM) for security-relevant changes to software, hardware, and firmware and that they are properly documented
Ensure periodic testing is conducted to evaluate the security posture of IS by employing various intrusion/attack detection and monitoring tools (shared responsibility with ISSOs)
Ensure that system recovery and reconstitution processes developed and monitored to ensure that the authorization boundary can be recovered based on its availability level determination
Ensure all authorization documentation is current and accessible to properly authorized individuals
Ensure that system security requirements are addressed during all phases of the system life cycle
Participate in self-inspections
Periodically review system security to accommodate changes to policy or technology
Coordinate all technical security issues outside of area of expertise or responsibility with ISSE
Provide expert research and analysis in support of expanding programs and area of responsibility as it pertains to cyber security and information technology activities
Develop Assured File Transfers (AFT) on accordance with the JSIG
Provide leadership, mentoring, and quality assurance for Cyber Security and Information Technology team members
Experience:
Education:
Certifications:
Security Clearance:
Current Top Secret Clearance with SCI Eligibility
Eligibility for access to Special Access Program Information
Willingness to submit to a Counterintelligence polygraph
Other Requirements:
| |
Information Technology-Assurance Specialist II 118-027 | | | 01/16/2023 | Information Technology/Assurance Specialist II:
The IT/IA primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
Performance shall include:
Establish complex operational software configuration controls and system interfaces for computer system(s) assigned
Maintain file servers, Firewalls, network access, Security Monitoring Systems and system documentation as required
Analyze and troubleshoot system anomalies to ensure optimum equipment performance
Prepare system for operational use and support operational tests
Review, prepare, and update authorization packages
Notify customer when changes occur that might affect authorization accreditation
Conduct cybersecurity portion of the self-inspection’s checklist
Review and provide technical and cyber security coordination on all Bodies of Evidence that make-up the authorization package
Identify any and all vulnerabilities and implement countermeasures
Ensure information systems and network appliances are operated, maintained, and disposed of in accordance with security policies and practices
Perform Video-Teleconferencing VTC System Administration, Scheduling, & Configuration
Provide External Information System(s) Client Support
Perform account creations, changes, & deletions on multiple authorization boundaries
Perform Help Desk & troubleshooting activities
Perform Hardware/Software System Configuration, upgrades and modifications
Perform system and network appliance patching activities
Provide Government-Issued Laptop Support
Assist in Media Control & Accountability activities
Perform COMSEC account/equipment management activities
Experience:
5-7 years related experience.
Prior performance in roles such as System, Network Administrator or Information Technology/Assurance Specialists
Education:
Certifications:
Security Clearance:
Current Top Secret Clearance with SCI Eligibility.
Eligibility for access to Special Access Program Information.
Willingness to submit to a Counterintelligence polygraph.
Other Requirements:
Thorough knowledge of Microsoft Windows 2012R2 Server, Microsoft Exchange Server 2010/2016, Microsoft Windows 7/10 operating systems (OS) administration and associated hardware.
Working knowledge of Local Area Network (LAN) and Wide Area Network (WAN) technologies and data backup technologies to include communication security (COMSEC) integration.
Working knowledge of Risk Management Framework, SCI Information Systems Security Standards, Common Criteria, and System Security Policy as they relate to Assessment and Authorizations.
Working knowledge and current relevant experience with PL2 systems; experience with PL3 & PL4 cross domain solutions is desired.
Must be able to regularly lift up to 50 lbs.
| |
Activity Security Representative I 118-026 | | | 01/16/2023 | Activity Security Representative I:
The Activity Security Representative’s primary function is to provide multi-disciplined security support to a customer’s facility and organization. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
Performance shall include:
Classification reviews of inbound and outbound correspondence
Assist in the maintenance of a document accountability database and associated correspondence
Processing inbound and outbound classified mail and receipt records
Perform destruction of classified materials
Process magnetic media for accountability
Reproduction support for classified materials
Maintain various daily logs for a variety of administrative functions associated with document control
Assist in the processing of inbound data and outbound data transfer files
Transfer electronic data files to internal customers
Maintain an extensive customer database point of contact listing
Assist with researching, processing, filing, and maintaining inbound and outbound visit notices
Escort facility visitors and maintains associated logs
Assist in the preparation of facility access control badges
Conduct entry and exit inspections
Assist in the maintenance of facility access control entry systems, to include visitor control
Perform data entry to the Personnel Access Security System database and maintain all customer sponsored billets and quota information
Assist in maintaining personnel security files for all personnel of the supported element
Follow and enforce the customer’s Standard Operating Procedures
Provide support for the security awareness and education programs
Perform miscellaneous administrative support functions as directed by the contractor site lead and/or the Senior Security Representative
Experience:
1 – 2 years related experience
Security Fundamentals Professional Certification (SFPC) counts towards 3 years of experience
Special Program Security Certification (SPSC) counts towards 5 years of experience
Maximum equivalent experience for SPED Certifications is no more than 5 years
Education:
Security Clearance:
Current Top Secret Clearance with SCI Eligibility
Eligibility for access to Special Access Program Information
Willingness to submit to a Counterintelligence polygraph
| |
Information Assurance (IA) System Security Engineer I 118-025 | | | 01/16/2023 | Information Assurance (IA) System Security Engineer I:
The Information System Security Engineer (ISSE) is primarily responsible for conducting information system security engineering activities with a focus on lifecycle of current systems and future requirement scoping. The position will collect and process the captured information security requirements and ensures that the requirements are effectively integrated into information systems through purposeful security architecting, design, development, and configuration. The position is an integral part of the development team designing and developing organizational information systems or upgrading legacy systems. The ISSE employs best practices when implementing security requirements within an information system including software engineering methodologies, system/security engineering principles, secure design, secure architecture, and secure coding techniques. This position’s main function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
Performance shall include:
Perform oversight of the development, implementation and evaluation of information system security program policy; special emphasis placed upon integration of existing SAP network infrastructures.
Perform analysis of network security, based upon the Risk Management Framework (RMF) with emphasize on Joint Special Access Program Implementation Guide (JSIG) authorization process.
Provides expert support, research and analysis of exceptionally complex problems, and processes relating to them.
Serves as technical expert to the Cybersecurity Assessment Program providing technical direction, interpretation and alternatives to complex problems.
Thinks independently and demonstrates exceptional written and oral communications skills. Applies advanced technical principles, theories, and concepts.
Contributes to the development of new principles, concepts, and methodologies..
Works on unusually complex technical problems and provides highly innovative and ingenious solutions.
Recommends cybersecurity software tools and assists in the development of software tool requirements and selection criteria to include the development of product specific STIGs from applicable DISA SRGs.
Leads technical teams in implementation of predetermined long-range goals and objectives.
Support customer and SAP community IA working groups, participate in SSE IPT reviews.
Provides expert level consultation and technical services on all aspects of Information Security.
Review ISSE related designs and provides security compliance recommendations.
Develop and provide IA risk management recommendations to the customer.
Provide ISSE support for Mission and Training systems design and development .
Assist with development and maintenance of the Program Protection Plan.
Assist with site activation activities and design reviews.
Represent the customer in various ISSE related working groups, advisory groups, and advisory council meetings.
Strong background in Patch/Configuration management, DevOps, and tier 3 support.
Assist team to design, integrate, and implement JSIG/RMF Continuous Monitoring tools and processes.
Integrate COTS & GOTS products to collect, display and remediate a variety of automated system security and system operations/performance functions and metrics..
Perform security assessments of servers/network devices/security appliances.
Develop improvements to security assessments with regard to accuracy and efficiency.
Integrate ancillary monitoring tools/capabilities with the enterprise security information and event management (SIEM) and create/tailor complex event alarms/rules and summary reports.
Write and execute cybersecurity test procedures for validation of control compliance.
Monitor/analyze output of cybersecurity related tools for reportable security incidents and residual risk.
Analyze technical risk of emerging cybersecurity tools and processes.
Work as part of a security incident response team as needed.
Build operational Operations and Maintenance (O&M) checklists to maintain the service (daily, weekly, monthly, yearly O&M checklists); build Tactics, Techniques and Processes (TTPs) and Standard Operating Processes (SOPs) associated with service checklists.
Integrate/Develop new techniques to improve Confidentiality, Integrity, and Availability for networks/systems operating at various classification levels.
Advanced technical competency in one or more of the following supported platforms: Microsoft Windows Server, Active Directory, Red Hat Enterprise Linux servers, MS Hyper-V/VMWare/ESx/Xen Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems, forensic analysis/vulnerability assessment, Group Policy management and configuration, Scripting, BMC Footprints, WSUS, Lumension, Bitlocker, SQL Server 2012, TomCat, IIS, Windows Server 2012r2/2016, Win 10, Red Hat 6.5, Microsoft Office.
Toolkits, SEIMs, Logrhythm, ACAS/Nessus/SCAP, mandatory/role-based access control concepts (e. g. SE Linux extensions to RHEL, PitBull, AppArmor, and Sentris) , video teleconferencing/VOIP, Oracle/MS SQL database security, and Apache/IIS Web server security
Experience:
10 - 12 years related experience.
Prior performance in roles such as ISSO, ISSM, SCA or SAP IT Technical Director.
Education:
Certifications:
Security Clearance:
Current Top Secret Clearance with SCI Eligibility.
Eligibility for access to Special Access Program Information.
Willingness to submit to a Counterintelligence polygraph.
Other Requirements:
Must have expert knowledge of DoD, National and applicable service and agency security policy, manuals and standards. Must have the ability to work in a dynamic environment and effectively interact with numerous DOD, military/civilian personnel and industry partners.
| |
Network-System Administrator II 118-024 | | | 01/16/2023 | Network/System Administrator II:
The primary function will be to organize, install, and support government organization’s computer systems, including local area networks (LANs), wide area networks (WANs), network segments, intranets, and other data communication systems. This will also include helping architect, design and analyze network models. It will require participation in decisions about buying future hardware or software to upgrade organization’s infrastructure. This position might be called upon to provide technical support to computer users to help solve users’ problems. This position will support activities within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
Performance shall include:
Ability to operate under minimal supervision.
Execute day to day management and operations of systems and networks.
Manage COTS & GOTS products to collect, display and remediate a variety of automated system security and system operations/performance functions and metrics.
Follow Operations and Maintenance (O&M) checklists to maintain the service (daily, weekly, monthly, yearly O&M checklists); build Tactics, Techniques and Processes (TTPs) and Standard Operating Processes (SOPs) associated with service checklists.
Operate monitoring tools/capabilities with the enterprise security information and event management (SIEM) and create/tailor complex event alarms/rules and summary reports
Assist in analyzing technical risk, upon request, of emerging cybersecurity tools and processes
Work as part of a security incident response team as needed.
Working technical competency in one or more of the following supported platforms: Microsoft Windows Server, Red Hat Enterprise Linux servers, MS Hyper-V/VMWare/ESx/Xen Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems, forensic analysis/vulnerability assessment, Group Policy management and configuration, Scripting, BMC Footprints, WSUS, , Lumension, Bitlocker, SQL Server 2012, TomCat, IIS, Windows Server 2012r2/2016, Win 10, Red Hat 6.5, Microsoft Office.
Toolkits, SEIMs, Logrhythm, ACAS/Nessus/SCAP, mandatory/role-based access control concepts (e. g. SE Linux extensions to RHEL, PitBull, AppArmor, and Sentris) , video teleconferencing/VOIP, Oracle/MS SQL database security, and Apache/IIS Web server security
Experience:
Education:
Certifications:
Security Clearance:
Current Top Secret Clearance with SCI Eligibility
Eligibility for access to Special Access Program Information
Willingness to submit to a Counterintelligence polygraph
Other Requirements:
Thorough knowledge of Microsoft Windows desktop and server operating systems, Microsoft Exchange Server, and as needed RHEL operating systems administration and associated hardware
Working knowledge of CISCO network and switching and virtualization technologies.
Working knowledge of Local Area Network (LAN) and Wide Area Network (WAN) technologies and data backup technologies.
Working knowledge communication security (COMSEC) policies and integration.
Working knowledge of Risk Management Framework, Common Criteria, and System Security
Policy as they relate to assessments and authorization.
Working knowledge and current relevant experience with PL2 and PL3 network environments/systems.
Experience providing technical support in a customer service role
Experience applying industry standards and best practices in an enterprise-level Windows system environment.
Experience solving technical problems quickly and identifying opportunities to automate repetitive processes.
Working knowledge of WSUS and/or YUM patch deployment methodologies.
Must be familiar with DoD policy as it applies to implementing and executing system and network administration.
Must be able to regularly lift up to 50 lbs.
| |
Information Systems Security Manager (ISSM) I 118-023 | | | 01/16/2023 | Information Systems Security Manager (ISSM) I:
The ISSM’s primary function serves as a principal advisor on all matters, technical and otherwise, involving the security of information systems under their purview. Primary support will be working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense, and Military Compartment efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
Performance shall include:
Perform oversight of the development, implementation and evaluation of information system security program policy; special emphasis placed upon integration of existing SAP network infrastructures
Develop and oversee operational information systems security implementation policy and guidelines of network security, based upon the Risk Management Framework (RMF) with emphasize on Joint Special Access Program Implementation Guide (JSIG) authorization process
Advise customer on Risk Management Framework (RMF) assessment and authorization issues
Perform risk assessments and make recommendations to DoD agency customers
Advise government program managers on security testing methodologies and processes
Evaluate authorization documentation and provide written recommendations for authorization to government PMs
Develop and maintain a formal Information Systems Security Program
Ensure that all IAOs, network administrators, and other cyber security personnel receive the necessary technical and security training to carry out their duties
Develop, review, endorse, and recommend action by the AO or DAO of system assessment documentation
Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media
Develop and execute security assessment plans that include verification that the features and assurances required for each protection level functioning
Maintain a and/or applicable repository for all system authorization documentation and modifications
Institute and implement a Configuration Control Board (CCB) charter
Develop policies and procedures for responding to security incidents, to include investigating and reporting security violations and incidents
Ensure proper protection or corrective measures have been taken when an incident or vulnerability has been discovered within a system
Ensure that data ownership and responsibilities are established for each authorization boundary, to include accountability, access rights, and special handling requirements
Ensure development and implementation of an information security education, training, and awareness program, to include attending, monitoring, and presenting local cyber security training.
Evaluate threats and vulnerabilities to ascertain whether additional safeguards are needed
Assess changes in the system, its environment, and operational needs that could affect the authorization
Ensure that authorization is accomplished a valid Authorization determination has been given for all authorization boundaries under your purview
Review AIS assessment plans
Coordinate with PSO or cognizant security official on approval of external information systems (e.g., guest systems, interconnected system with another organization)
Conduct periodic assessments of the security posture of the authorization boundaries
Ensure configuration management (CM) for security-relevant changes to software, hardware, and firmware and that they are properly documented
Ensure periodic testing is conducted to evaluate the security posture of IS by employing various intrusion/attack detection and monitoring tools (shared responsibility with ISSOs)
Ensure that system recovery and reconstitution processes developed and monitored to ensure that the authorization boundary can be recovered based on its availability level determination
Ensure all authorization documentation is current and accessible to properly authorized individuals
Ensure that system security requirements are addressed during all phases of the system life cycle
Develop Assured File Transfers (AFT) on accordance with the JSIG
Participate in self-inspections
Conduct the duties of the Information System Security Officer (ISSO) if one is not present and/or available
Experience:
Education:
Certifications:
Security Clearance:
Current Top Secret Clearance with SCI Eligibility
Eligibility for access to Special Access Program Information
Willingness to submit to a Counterintelligence polygraph
Other Requirements:
Must having working knowledge of DoD, National and applicable service and agency security policy, manuals and standards.
Must be able to regularly lift up-to 50lbs
| |
Information Systems Security Officer (ISSO) II 118-022 | | | 01/16/2023 | Information Systems Security Officer (ISSO) II:
The ISSO is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO. The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is assigned responsibility for the day-to-day security operations of a system. This also will include physical and environmental protection, personnel security, incident handling, and security training and awareness. It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configuration management across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
Performance shall include:
Assist the ISSM in meeting their duties and responsibilities
Prepare, review, and update authorization packages
Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media
Notify ISSM when changes occur that might affect the authorization determination of the information system(s)
Conduct periodic reviews of information systems to ensure compliance with the security authorization package
Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change
Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly
Ensure all IS security-related documentation is current and accessible to properly authorized individuals
Ensure audit records are collected, reviewed, and documented (to include any anomalies)
Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties
Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans
Identify cyber security vulnerabilities and assist with the implementation of the countermeasures for them
Prepare reports on the status of security safeguards applied to computer systems
Perform ISSO duties in support of in-house and external customers
Conduct security impact analysis activities and provide to the ISSM on all configuration management changes to the authorization boundaries
Experience:
2 - 5 years related experience
Prior performance in roles such as System, Network Administrator or ISSO
Education:
Certifications:
Security Clearance:
Current Top Secret Clearance with SCI Eligibility
Eligibility for access to Special Access Program Information
Willingness to submit to a Counterintelligence polygraph
Other Requirements:
| |
Information System Security Officer I 118-021 | | | 01/16/2023 | Information System Security Officer I:
The ISSO is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO. The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is assigned responsibility for the day-to-day security operations of a system. This also will include physical and environmental protection, personnel security, incident handling, and security training and awareness. It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configuration management across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
Performance shall include:
Assist the ISSM in meeting their duties and responsibilities.
Prepare, review, and update authorization packages
Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media.
Notify ISSM when changes occur that might affect the authorization determination of the information system(s).
Conduct periodic reviews of information systems to ensure compliance with the security authorization package.
Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change.
Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly.
Ensure all IS security-related documentation is current and accessible to properly authorized individuals.
Ensure audit records are collected, reviewed, and documented (to include any anomalies).
Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties.
Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans.
Identify cyber security vulnerabilities and assist with the implementation of the countermeasures for them.
Prepare reports on the status of security safeguards applied to computer systems.
Perform ISSO duties in support of in-house and external customers.
Experience:
Education:
Certifications:
Security Clearance:
Current Top-Secret Clearance with SCI Eligibility.
Eligibility for access to Special Access Program Information.
Willingness to submit to a Counterintelligence polygraph.
| |
Program Security Representative I 118-020 | | | 01/16/2023 | Program Security Representative I:
The Program Security Representative’s primary function is to provide multi-discipline security support for one or more of the customer’s Special Access Programs (SAPs). The position will provide “day-to-day” multi-discipline analysis for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
Performance shall include:
Ensure strict adherence to the provisions of the NISPOM, its Supplement, the DoD Overprint, DCID, ICD, and SAP policy.
Assist in developing and executing approved policies and procedures for safeguarding Special Access Program (SAP), Sensitive Compartmented Information (SCI) and collateral data in support of US military operations.
Provide day-to-day security support that includes continuous assessment of procedures to identify shortfalls and provide appropriate recommendations for revising and improving security policies, procedures, and systems.
Identify vulnerabilities, threats, and risks to test, training, and operational activities .
Assist in developing, implementing, and training the Operations Security program.
Assist in providing contractor and subordinate facility assistance and oversight.
Brief all levels of personnel, both in the government and senior civilian services, on a variety of security related topics.
Conduct and document SAP facility compliance reviews, follow-on facility reviews, and facility close-outs.
Monitor, report and track all corrective actions resulting from compliance reviews.
Ensure timely notification of pertinent security matters to program technical and management staff.
Conduct exploration of any loss, compromise, or suspected compromise of classified and/or sensitive information, including conducting preliminary inquiries and generating damage assessments resulting from the loss of classified information.
Coordinate with SAP security personnel to ensure lessons learned are incorporated into the curriculum for the SAP security education & awareness program
Experience:
5 - 7 years related experience
Security Fundamentals Professional Certification (SFPC) counts towards 3 years of experience
Special Program Security Certification (SPSC) counts towards 5 years of experience
Maximum equivalent experience for SPED Certifications is no more than 5 years
Education:
Security Clearance:
Current Top Secret Clearance with SCI Eligibility
Eligibility for access to Special Access Program Information
Willingness to submit to a Counterintelligence polygraph
| |
Counterintelligence (CI) Analyst 118-019 | Bolling AFB, Washington DC | | 01/16/2023 | Counterintelligence (CI) Analyst:
Position will provide “day-to-day” multi-discipline analysis, CI Analyst responsibilities will cover Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
Performance shall include: (may be modified with concurrence of the Contracting Officer and contractor Program Manager):
Plan, organize, and evaluate Air Force (AF) security and viability/effectiveness of highly sensitive and often highly classified programs and plans supporting sensitive activities and special access programs (SAPs) within the AF and DoD
Provide prompt review and coordination of unique and highly classified proposals requiring a vast knowledge of AF, DoD, Federal and non-federal organizations, tactics, policies, and processes. This includes, but is not limited to, dealing with sensitive intelligence collection programs and other sensitive activities primarily supporting the AF, but also DoD in general
Research, analyze, review, and provide meaningful recommendation, including written products, when appropriate, to senior leadership regarding security, counterintelligence, and signature reduction issues.
Identify, assess, and provide recommendations for potential security vulnerabilities; review all pertinent security directives, regulations and instructions to ensure compliance; prepare future threat analysis assessments.
Provide prompt and responsive customer support and subject matter expertise as required to ensure the accomplishment of the mission/task
Ensure that detailed coordination for sensitive activities and SAPs does not disclose National Security intent, capabilities, or vulnerabilities, and be prepared to brief selected portions to Senior AF and DoD officials, both verbally or in writing
Experience:
Education:
Security Clearance:
Current Top Secret Clearance with SCI Eligibility
Eligibility for access to Special Access Program Information
Willingness to submit to a Counterintelligence polygraph
| |
Network-System Administrator III 118-018 | Bolling AFB, Washington DC | | 01/16/2023 | Network/System Administrator III:
The primary function will be to organize, install, and support government organization’s computer systems, including local area networks (LANs), wide area networks (WANs), network segments, intranets, and other data communication systems. This will also include helping architect, design and analyze network models. It will require participation in decisions about buying future hardware or software to upgrade organization’s infrastructure. This position might be called upon to provide technical support to computer users to help solve users’ problems. This position will support activities within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
Performance shall include:
Able to perform self-sustaining and work with little to no oversight
Lead IT ops team on day to day management and operations of Networks and implement capabilities vetted through Cybersecurity, ISSE and higher headquarters to maintain JSIG/RMF Authority to Operate and maintain Continuous Monitoring tools and processes
Manage COTS & GOTS products to collect, display and remediate a variety of automated system security and system operations/performance functions and metrics.
Assist during security assessments of servers/network devices/security appliances
Assist during security assessments with regard to accuracy and efficiency
Assist with Creation of operational Operations and Maintenance (O&M) checklists to maintain the service (daily, weekly, monthly, yearly O&M checklists); build Tactics, Techniques and Processes (TTPs) and Standard Operating Processes (SOPs) associated with service checklists
Manage and operate monitoring tools/capabilities with the enterprise security information and event management (SIEM) and create/tailor complex event alarms/rules and summary reports
Execute cybersecurity operations procedures for day to day network management, operations and maintenance
Monitor/analyze output of cybersecurity related tools for reportable security incidents and residual risk
Assist in analyzing technical risk, upon request, of emerging cybersecurity tools and processes
Work as part of a security incident response team as needed
Assist ISSM/ISSO/ISSE with the Integration/Development new techniques to improve Confidentiality, Integrity, and Availability for networks/systems operating at various classification levels.
Advanced technical competency in one or more of the following supported platforms: Microsoft Windows Server, Active Directory Red Hat Enterprise Linux servers, MS Hyper-V/VMWare/ESx/Xen Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems, forensic analysis/vulnerability assessment, Group Policy management and configuration, Scripting, BMC Footprints, WSUS, , Lumension, Bitlocker, SQL Server 2012, TomCat, IIS, Windows Server 2012r2/2016, Win 10, Red Hat 6.5, Microsoft Office.
Toolkits, SEIMs, Logrhythm, ACAS/Nessus/SCAP, mandatory/role-based access control concepts (e. g. SE Linux extensions to RHEL, PitBull, AppArmor, and Sentris) , video teleconferencing/VOIP, Oracle/MS SQL database security, and Apache/IIS Web server security
Experience:
Education:
Certifications:
Security Clearance:
Current Top Secret Clearance with SCI Eligibility
Eligibility for access to Special Access Program Information
Willingness to submit to a Counterintelligence polygraph
Other Requirements:
Thorough knowledge of Microsoft Windows desktop and server operating systems, Microsoft Exchange Server, and as needed RHEL operating systems administration and associated hardware.
Experience in effective communication and collaborating in a high performance team environment.
Group Policy design and configuration.
Working knowledge of CISCO network and switching and virtualization technologies.
Working knowledge of virtualization as it applies to users environments, operating systems, and network appliances.
Working knowledge of Local Area Network (LAN) and Wide Area Network (WAN) technologies and data backup technologies.
Working knowledge communication security (COMSEC) policies and integration.
Working knowledge of Risk Management Framework, Common Criteria, and System Security Policy as they relate to assessments and authorization.
Working knowledge and current relevant experience with PL2, PL3, and PL4 network environments/systems.
Working knowledge of WSUS and/or YUM patch deployment methodologies.
Must be familiar with DoD policy as it applies to implementing and executing system and network administration.
Working knowledge of Risk Management Framework and how to apply it to network/information system environments.
Must be able to regularly lift up to 50 lbs.
| |
Information Assurance (IA) System Security Engineer II 118-017 | | | 01/16/2023 | Information Assurance (IA) System Security Engineer II:
The Information System Security Engineer (ISSE) is primarily responsible for conducting information system security engineering activities with a focus on lifecycle of current systems and future requirement scoping. The position will collect and process the captured information security requirements and ensures that the requirements are effectively integrated into information systems through purposeful security architecting, design, development, and configuration. The position is an integral part of the development team designing and developing organizational information systems or upgrading legacy systems. The ISSE employs best practices when implementing security requirements within an information system including software engineering methodologies, system/security engineering principles, secure design, secure architecture, and secure coding techniques. This position’s main function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
Performance shall include:
Perform oversight of the development, implementation and evaluation of information system security program policy; special emphasis placed upon integration of existing SAP network infrastructures
Perform analysis of network security, based upon the Risk Management Framework (RMF) with emphasize on Joint Special Access Program Implementation Guide (JSIG) authorization process
Provides expert support, research and analysis of exceptionally complex problems, and processes relating to them
Provides expert level consultation and technical services on all aspects of Information Security
Serves as technical expert to the Cybersecurity Assessment Program providing technical direction, interpretation and alternatives to complex problems
Thinks independently and demonstrates exceptional written and oral communications skills. Applies advanced technical principles, theories, and concepts
Contributes to the development of new principles, concepts, and methodologies
Works on unusually complex technical problems and provides highly innovative and ingenious solutions
Lead a team of System Security Engineers and Certification and Accreditation Analysts responsible for ensuring the customers national and international security interests are protected as support equipment are designed and tested
Recommends cybersecurity software tools and assists in the development of software tool requirements and selection criteria to include the development of product specific STIGs from applicable DISA SRGs
Review ISSE related designs and provides security compliance recommendations
Leads technical teams in implementation of predetermined long-range goals and objectives
Supports customer and SAP community IA working groups, participate in SSE IPT reviews
Provides expert level consultation and technical services on all aspects of Information Security
Review ISSE related designs and provides security compliance recommendations
Develop and provide IA risk management recommendations to the customer
Provide ISSE support for Mission and Training systems design and development
Assist with development and maintenance of the Program Protection Plan
Assist with site activation activities and design reviews
Represent the customer in various ISSE related working groups, advisory groups, and advisory council meetings
Chair and or Co-Chair customer and SAP community IA working groups, participate in ISSE IPT reviews
Represent the customer in various SSE related working groups, advisory groups, and advisory council meetings
Strong background in Patch/Configuration management, DevOps, and tier 3 support
Assist team to design, integrate, and implement JSIG/RMF Continuous Monitoring tools and processes.
Integrate COTS & GOTS products to collect, display and remediate a variety of automated system security and system operations/performance functions and metrics.
Perform security assessments of servers/network devices/security appliances.
Develop improvements to security assessments with regard to accuracy and efficiency.
Integrate ancillary monitoring tools/capabilities with the enterprise security information and event management (SIEM) and create/tailor complex event alarms/rules and summary reports.
Write and execute cybersecurity test procedures for validation of control compliance.
Monitor/analyze output of cybersecurity related tools for reportable security incidents and residual risk.
Analyze technical risk of emerging cybersecurity tools and processes.
Work as part of a security incident response team as needed.
Build operational Operations and Maintenance (O&M) checklists to maintain the service (daily, weekly, monthly, yearly O&M checklists); build Tactics, Techniques and Processes (TTPs) and Standard Operating Processes (SOPs) associated with service checklists.
Integrate/Develop new techniques to improve Confidentiality, Integrity, and Availability for networks/systems operating at various classification levels.
Advanced technical competency in one or more of the following supported platforms: Microsoft Windows Server, Active Directory, Red Hat Enterprise Linux servers, MS Hyper-V/VMWare/ESx/Xen Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems, forensic analysis/vulnerability assessment, Group Policy management and configuration, Scripting, BMC Footprints, WSUS, , Lumension, Bitlocker, SQL Server 2012, TomCat, IIS, Windows Server 2012r2/2016, Win 10, Red Hat 6.5, Microsoft Office
Toolkits, SEIMs, Logrhythm, ACAS/Nessus/SCAP, mandatory/role-based access control concepts (e. g. SE Linux extensions to RHEL, PitBull, AppArmor, and Sentris) , video teleconferencing/VOIP, Oracle/MS SQL database security, and Apache/IIS Web server security
Experience:
12 - 15 years related experience
Prior performance in roles such as ISSO, ISSM, SCA or SAP IT Technical Director
Education:
Certifications:
Security Clearance:
Current Top Secret Clearance with SCI Eligibility
Eligibility for access to Special Access Program Information
Willingness to submit to a Counterintelligence polygraph
Other Requirements:
Must have expert knowledge of DoD, National and applicable service and agency security policy, manuals and standards. Must have the ability to work in a dynamic environment and effectively interact with numerous DOD, military/civilian personnel and industry partners
| |
Information Systems Security Officer (ISSO) III 118-016 | | | 01/16/2023 | Information Systems Security Officer (ISSO) III:
The ISSO is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO. The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is assigned responsibility for the day-to-day security operations of a system. This also will include physical and environmental protection, personnel security, incident handling, and security training and awareness. It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configuration management across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
Performance shall include:
Assist the ISSM in meeting their duties and responsibilities
Prepare, review, and update authorization packages
Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media
Notify ISSM when changes occur that might affect the authorization determination of the information system(s)
Conduct periodic reviews of information systems to ensure compliance with the security authorization package
Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change
Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly
Ensure all IS security-related documentation is current and accessible to properly authorized individuals
Ensure audit records are collected, reviewed, and documented (to include any anomalies)
Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties
Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans
Identify cyber security vulnerabilities and assist with the implementation of the countermeasures for them
Prepare reports on the status of security safeguards applied to computer systems
Perform ISSO duties in support of in-house and external customers
Conduct continuous monitoring activities for authorization boundaries under your preview
Assist Department of Defense, National Agency and Contractor organizations with the development of assessment and authorization (A&A) efforts
Experience:
5 - 7 years related experience
Prior performance in roles such as System, Network Administrator or ISSO
Education:
Certifications:
Security Clearance:
Current Top Secret Clearance with SCI Eligibility
Eligibility for access to Special Access Program Information
Willingness to submit to a Counterintelligence polygraph
Other Requirements:
| |
Information Systems Security Manager (ISSM) I 118-015 | | | 01/16/2023 | Information Systems Security Manager (ISSM) I:
The ISSM’s primary function serves as a principal advisor on all matters, technical and otherwise, involving the security of information systems under their purview. Primary support will be working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense, and Military Compartment efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
Performance shall include:
Perform oversight of the development, implementation and evaluation of information system security program policy; special emphasis placed upon integration of existing SAP network infrastructures.
Develop and oversee operational information systems security implementation policy and guidelines of network security, based upon the Risk Management Framework (RMF) with emphasize on Joint Special Access Program Implementation Guide (JSIG) authorization process.
Advise customer on Risk Management Framework (RMF) assessment and authorization issues.
Perform risk assessments and make recommendations to DoD agency customers.
Advise government program managers on security testing methodologies and processes.
Evaluate authorization documentation and provide written recommendations for authorization to government PMs.
Develop and maintain a formal Information Systems Security Program.
Ensure that all IAOs, network administrators, and other cyber security personnel receive the necessary technical and security training to carry out their duties.
Develop, review, endorse, and recommend action by the AO or DAO of system assessment documentation.
Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media.
Develop and execute security assessment plans that include verification that the features and assurances required for each protection level functioning.
Maintain a and/or applicable repository for all system authorization documentation and modifications.
Institute and implement a Configuration Control Board (CCB) charter.
Develop policies and procedures for responding to security incidents, to include investigating and reporting security violations and incidents.
Ensure proper protection or corrective measures have been taken when an incident or vulnerability has been discovered within a system.
Ensure that data ownership and responsibilities are established for each authorization boundary, to include accountability, access rights, and special handling requirements.
Ensure development and implementation of an information security education, training, and awareness program, to include attending, monitoring, and presenting local cyber security training.
Evaluate threats and vulnerabilities to ascertain whether additional safeguards are needed.
Assess changes in the system, its environment, and operational needs that could affect the authorization.
Ensure that authorization is accomplished a valid Authorization determination has been given for all authorization boundaries under your purview.
Review AIS assessment plans.
Coordinate with PSO or cognizant security official on approval of external information systems (e.g., guest systems, interconnected system with another organization).
Conduct periodic assessments of the security posture of the authorization boundaries.
Ensure configuration management (CM) for security-relevant changes to software, hardware, and firmware and that they are properly documented.
Ensure periodic testing is conducted to evaluate the security posture of IS by employing various intrusion/attack detection and monitoring tools (shared responsibility with ISSOs)
Ensure that system recovery and reconstitution processes developed and monitored to ensure that the authorization boundary can be recovered based on its availability level determination.
Ensure all authorization documentation is current and accessible to properly authorized individuals.
Ensure that system security requirements are addressed during all phases of the system life cycle.
Develop Assured File Transfers (AFT) on accordance with the JSIG.
Participate in self-inspections.
Conduct the duties of the Information System Security Officer (ISSO) if one is not present and/or available
Experience:
Education:
Certifications:
Security Clearance:
Current Top Secret Clearance with SCI Eligibility
Eligibility for access to Special Access Program Information
Willingness to submit to a Counterintelligence polygraph
Other Requirements:
Must having working knowledge of DoD, National and applicable service and agency security policy, manuals and standards.
Must be able to regularly lift up-to 50lbs
| |
Activity Security Representative II 118-014 | | | 01/16/2023 | Activity Security Representative II:
The Activity Security Representative’s primary function is to provide multi-disciplined security support to a customer’s facility and organization. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
Performance shall include:
Classification reviews of inbound and outbound correspondence
Assist in the maintenance of a document accountability database and associated correspondence
Processing inbound and outbound classified mail and receipt records
Perform destruction of classified materials
Process magnetic media for accountability
Reproduction support for classified materials
Maintain various daily logs for a variety of administrative functions associated with document control
Assist in the processing of inbound data and outbound data transfer files
Transfer electronic data files to internal customers
Maintain an extensive customer database point of contact listing
Assist with researching, processing, filing, and maintaining inbound and outbound visit notices
Escort facility visitors and maintains associated logs
Assist in the preparation of facility access control badges
Conduct entry and exit inspections
Assist in the maintenance of facility access control entry systems, to include visitor control
Perform data entry to the Personnel Access Security System database and maintain all customer sponsored billets and quota information
Assist in maintaining personnel security files for all personnel of the supported element
Follow and enforce the customer’s Standard Operating Procedures
Provide support for the security awareness and education programs
Perform miscellaneous administrative support functions as directed by the contractor site lead and/or the Senior Security Representative
Review, track, and monitor security clearance processing activities with appropriate government personnel to achieve appropriate clearance actions
Participate in Air Force SAP security compliance inspections of government organizations and industry
Implement Top Secret Control for accountable material and associated correspondence
Prepare and/or process inbound and outbound classified mail, faxes, courier packages and receipts
Prepare, process, and/or review Program Access Request (PARs) for accuracy and access eligibility
Execute Special Access Program Nomination Process Questionnaires
Conduct Defense Central Index of Investigations (DCII), Joint Personnel Access System (JPAS), and SAPNP reviews of candidates being submitted for SAP access
Perform data entry and record checks in the Air Force Access Data System (AFADS) and maintains all customer sponsored personnel access information current
Perform indoctrinations
Experience:
3-5 years related experience
Security Fundamentals Professional Certification (SFPC) counts towards 3 years of experience
Special Program Security Certification (SPSC) counts towards 5 years of experience
Maximum equivalent experience for SPED Certifications is no more than 5 years
Education:
Certifications:
Security Clearance:
Current Top Secret Clearance with SCI Eligibility
Eligibility for access to Special Access Program Information
Willingness to submit to a Counterintelligence polygraph
| |
Information Assurance (IA) System Security Engineer I 118-013 | Bolling AFB, Washington DC | | 01/16/2023 | Information Assurance (IA) System Security Engineer I:
The Information System Security Engineer (ISSE) is primarily responsible for conducting information system security engineering activities with a focus on lifecycle of current systems and future requirement scoping. The position will collect and process the captured information security requirements and ensures that the requirements are effectively integrated into information systems through purposeful security architecting, design, development, and configuration. The position is an integral part of the development team designing and developing organizational information systems or upgrading legacy systems. The ISSE employs best practices when implementing security requirements within an information system including software engineering methodologies, system/security engineering principles, secure design, secure architecture, and secure coding techniques. This position’s main function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
Performance shall include:
Perform oversight of the development, implementation and evaluation of information system security program policy; special emphasis placed upon integration of existing SAP network infrastructures
Perform analysis of network security, based upon the Risk Management Framework (RMF) with emphasize on Joint Special Access Program Implementation Guide (JSIG) authorization process
Provides expert support, research and analysis of exceptionally complex problems, and processes relating to them
Serves as technical expert to the Cybersecurity Assessment Program providing technical direction, interpretation and alternatives to complex problems
Thinks independently and demonstrates exceptional written and oral communications skills. Applies advanced technical principles, theories, and concepts
Contributes to the development of new principles, concepts, and methodologies.
Works on unusually complex technical problems and provides highly innovative and ingenious solutions
Recommends cybersecurity software tools and assists in the development of software tool requirements and selection criteria to include the development of product specific STIGs from applicable DISA SRGs
Leads technical teams in implementation of predetermined long-range goals and objectives
Support customer and SAP community IA working groups, participate in SSE IPT reviews
Provides expert level consultation and technical services on all aspects of Information Security
Review ISSE related designs and provides security compliance recommendations
Develop and provide IA risk management recommendations to the customer
Provide ISSE support for Mission and Training systems design and development
Assist with development and maintenance of the Program Protection Plan
Assist with site activation activities and design reviews
Represent the customer in various ISSE related working groups, advisory groups, and advisory council meetings
Strong background in Patch/Configuration management, DevOps, and tier 3 support
Assist team to design, integrate, and implement JSIG/RMF Continuous Monitoring tools and processes.
Integrate COTS & GOTS products to collect, display and remediate a variety of automated system security and system operations/performance functions and metrics.
Perform security assessments of servers/network devices/security appliances
Develop improvements to security assessments with regard to accuracy and efficiency
Integrate ancillary monitoring tools/capabilities with the enterprise security information and event management (SIEM) and create/tailor complex event alarms/rules and summary reports
Write and execute cybersecurity test procedures for validation of control compliance
Monitor/analyze output of cybersecurity related tools for reportable security incidents and residual risk
Analyze technical risk of emerging cybersecurity tools and processes
Work as part of a security incident response team as needed.
Build operational Operations and Maintenance (O&M) checklists to maintain the service (daily, weekly, monthly, yearly O&M checklists); build Tactics, Techniques and Processes (TTPs) and Standard Operating Processes (SOPs) associated with service checklists.
Integrate/Develop new techniques to improve Confidentiality, Integrity, and Availability for networks/systems operating at various classification levels.
Advanced technical competency in one or more of the following supported platforms: Microsoft Windows Server, Active Directory, Red Hat Enterprise Linux servers, MS Hyper-V/VMWare/ESx/Xen Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems, forensic analysis/vulnerability assessment, Group Policy management and configuration, Scripting, BMC Footprints, WSUS, Lumension, Bitlocker, SQL Server 2012, TomCat, IIS, Windows Server 2012r2/2016, Win 10, Red Hat 6.5, Microsoft Office.
Toolkits, SEIMs, Logrhythm, ACAS/Nessus/SCAP, mandatory/role-based access control concepts (e. g. SE Linux extensions to RHEL, PitBull, AppArmor, and Sentris) , video teleconferencing/VOIP, Oracle/MS SQL database security, and Apache/IIS Web server security
Experience:
10 - 12 years related experience
Prior performance in roles such as ISSO, ISSM, SCA or SAP IT Technical Director
Education:
Certifications:
Security Clearance:
Current Top Secret Clearance with SCI Eligibility
Eligibility for access to Special Access Program Information
Willingness to submit to a Counterintelligence polygraph
Other Requirements:
Must have expert knowledge of DoD, National and applicable service and agency security policy, manuals and standards. Must have the ability to work in a dynamic environment and effectively interact with numerous DOD, military/civilian personnel and industry partners
| |
Information Systems Security Officer (ISSO) II 118-012 | | | 01/16/2023 | Information Systems Security Officer (ISSO) II:
The ISSO is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO. The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is assigned responsibility for the day-to-day security operations of a system. This also will include physical and environmental protection, personnel security, incident handling, and security training and awareness. It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configuration management across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
Performance shall include:
Assist the ISSM in meeting their duties and responsibilities
Prepare, review, and update authorization packages
Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media
Notify ISSM when changes occur that might affect the authorization determination of the information system(s)
Conduct periodic reviews of information systems to ensure compliance with the security authorization package
Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change
Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly
Ensure all IS security-related documentation is current and accessible to properly authorized individuals
Ensure audit records are collected, reviewed, and documented (to include any anomalies)
Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties
Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans
Identify cyber security vulnerabilities and assist with the implementation of the countermeasures for them
Prepare reports on the status of security safeguards applied to computer systems
Perform ISSO duties in support of in-house and external customers
Conduct security impact analysis activities and provide to the ISSM on all configuration management changes to the authorization boundaries
Experience:
2 - 5 years related experience
Prior performance in roles such as System, Network Administrator or ISSO
Education:
Certifications:
Security Clearance:
Current Top-Secret Clearance with SCI Eligibility
Eligibility for access to Special Access Program Information
Willingness to submit to a Counterintelligence polygraph
Other Requirements:
| |
Information Systems Security Officer (ISSO) II 118-011 | | | 01/16/2023 | Information Systems Security Officer (ISSO) II:
The ISSO is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO. The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is assigned responsibility for the day-to-day security operations of a system. This also will include physical and environmental protection, personnel security, incident handling, and security training and awareness. It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configuration management across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
Performance shall include:
Assist the ISSM in meeting their duties and responsibilities
Prepare, review, and update authorization packages
Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media
Notify ISSM when changes occur that might affect the authorization determination of the information system(s)
Conduct periodic reviews of information systems to ensure compliance with the security authorization package
Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change
Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly
Ensure all IS security-related documentation is current and accessible to properly authorized individuals
Ensure audit records are collected, reviewed, and documented (to include any anomalies)
Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties
Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans
Identify cyber security vulnerabilities and assist with the implementation of the countermeasures for them
Prepare reports on the status of security safeguards applied to computer systems
Perform ISSO duties in support of in-house and external customers
Conduct security impact analysis activities and provide to the ISSM on all configuration management changes to the authorization boundaries
Experience:
2 - 5 years related experience
Prior performance in roles such as System, Network Administrator or ISSO
Education:
Certifications:
Security Clearance:
Current Top-Secret Clearance with SCI Eligibility
Eligibility for access to Special Access Program Information
Willingness to submit to a Counterintelligence polygraph
Other Requirements:
| |
Information Systems Security Officer (ISSO) II 118-010 | | | 01/15/2023 | Information Systems Security Officer (ISSO) II:
The ISSO is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO. The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is assigned responsibility for the day-to-day security operations of a system. This also will include physical and environmental protection, personnel security, incident handling, and security training and awareness. It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configuration management across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
Performance shall include:
Assist the ISSM in meeting their duties and responsibilities
Prepare, review, and update authorization packages
Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media
Notify ISSM when changes occur that might affect the authorization determination of the information system(s)
Conduct periodic reviews of information systems to ensure compliance with the security authorization package
Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change
Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly
Ensure all IS security-related documentation is current and accessible to properly authorized individuals
Ensure audit records are collected, reviewed, and documented (to include any anomalies)
Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties
Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans
Identify cyber security vulnerabilities and assist with the implementation of the countermeasures for them
Prepare reports on the status of security safeguards applied to computer systems
Perform ISSO duties in support of in-house and external customers
Conduct security impact analysis activities and provide to the ISSM on all configuration management changes to the authorization boundaries
Experience:
2 - 5 years related experience
Prior performance in roles such as System, Network Administrator or ISSO
Education:
Certifications:
Security Clearance:
Current Top-Secret Clearance with SCI Eligibility
Eligibility for access to Special Access Program Information
Willingness to submit to a Counterintelligence polygraph
Other Requirements:
| |
Information Technology-Assurance Specialist III 118-009 | | | 01/15/2023 | Information Technology/Assurance Specialist III:
The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
Performance shall include:
Establish complex operational software configuration controls and system interfaces for computer system(s) assigned
Maintain file servers, Firewalls, network access, Security Monitoring Systems and system documentation as required
Analyze and troubleshoot system anomalies to ensure optimum equipment performance
Prepare system for operational use and support operational tests
Review, prepare, and update authorization packages
Notify customer when changes occur that might affect authorization accreditation
Conduct cybersecurity portion of the self-inspection’s checklist
Review and provide technical and cyber security coordination on all Bodies of Evidence that make-up the authorization package
Identify any and all vulnerabilities and implement countermeasures
Ensure information systems and network appliances are operated, maintained, and disposed of in accordance with security policies and practices
Perform Video-Teleconferencing VTC System Administration, Scheduling, & Configuration
Provide External Information System(s) Client Support
Perform account creations, changes, & deletions on multiple authorization boundaries
Perform Help Desk & troubleshooting activities
Perform Hardware/Software System Configuration, upgrades and modifications
Perform system and network appliance patching activities
Provide Government-Issued Laptop Support
Assist in Media Control & Accountability activities
Perform COMSEC account/equipment management activities
Experience:
8-10 years related experience
Prior performance in roles such as System, Network Administrator or Information Technology/Assurance Specialists
Education:
Certifications:
Security Clearance:
Current Top Secret Clearance with SCI Eligibility
Eligibility for access to Special Access Program Information
Willingness to submit to a Counterintelligence polygraph
Other Requirements:
Thorough knowledge of Microsoft Windows 2012R2 Server, Microsoft Exchange Server 2010/2016, Microsoft Windows 7/10 operating systems (OS) administration and associated hardware.
Working knowledge of Local Area Network (LAN) and Wide Area Network (WAN) technologies and data backup technologies to include communication security (COMSEC) integration
Working knowledge of Risk Management Framework, and Joint DODIIS/Cryptologic SCI Information Systems Security Standards, Common Criteria, and System Security Policy as they relate to C&A
Working knowledge and current relevant experience with PL2 systems; experience with PL3 & PL4 cross domain solutions
Must be able to regularly lift up to 50 lbs
| |
Information Technology-Assurance Specialist III 118-008 | | | 01/15/2023 | Information Technology/Assurance Specialist III:
The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
Performance shall include:
Establish complex operational software configuration controls and system interfaces for computer system(s) assigned
Maintain file servers, Firewalls, network access, Security Monitoring Systems and system documentation as required
Analyze and troubleshoot system anomalies to ensure optimum equipment performance
Prepare system for operational use and support operational tests
Review, prepare, and update authorization packages
Notify customer when changes occur that might affect authorization accreditation
Conduct cybersecurity portion of the self-inspection’s checklist
Review and provide technical and cyber security coordination on all Bodies of Evidence that make-up the authorization package
Identify any and all vulnerabilities and implement countermeasures
Ensure information systems and network appliances are operated, maintained, and disposed of in accordance with security policies and practices
Perform Video-Teleconferencing VTC System Administration, Scheduling, & Configuration
Provide External Information System(s) Client Support
Perform account creations, changes, & deletions on multiple authorization boundaries
Perform Help Desk & troubleshooting activities
Perform Hardware/Software System Configuration, upgrades and modifications
Perform system and network appliance patching activities
Provide Government-Issued Laptop Support
Assist in Media Control & Accountability activities
Perform COMSEC account/equipment management activities
Experience:
8-10 years related experience
Prior performance in roles such as System, Network Administrator or Information Technology/Assurance Specialists
Education:
Certifications:
Security Clearance:
Current Top Secret Clearance with SCI Eligibility
Eligibility for access to Special Access Program Information
Willingness to submit to a Counterintelligence polygraph
Other Requirements:
Thorough knowledge of Microsoft Windows 2012R2 Server, Microsoft Exchange Server 2010/2016, Microsoft Windows 7/10 operating systems (OS) administration and associated hardware.
Working knowledge of Local Area Network (LAN) and Wide Area Network (WAN) technologies and data backup technologies to include communication security (COMSEC) integration
Working knowledge of Risk Management Framework, and Joint DODIIS/Cryptologic SCI Information Systems Security Standards, Common Criteria, and System Security Policy as they relate to C&A
Working knowledge and current relevant experience with PL2 systems; experience with PL3 & PL4 cross domain solutions
Must be able to regularly lift up to 50 lbs
| |
Security Control Assessor (SCA) I 118-007 | | | 01/15/2023 | Security Control Assessor (SCA) I:
The SCA is responsible for conducting a comprehensive assessment of the management, operational, and technical security controls employed within or inherited by an IS to determine the overall effectiveness of the controls (i.e., the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting the security requirements for the system). SCAs also provide an assessment of the severity of weaknesses or deficiencies discovered in the IS and its environment of operation and recommend corrective actions to address identified vulnerabilities. Responsibilities will cover Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities within the customer’s area of responsibility.
Performance shall include:
Perform oversight of the development, implementation and evaluation of IS security program policy; special emphasis placed upon integration of existing SAP network infrastructure
Perform assessment of ISs, based upon the Risk Management Framework (RMF) methodology in accordance with the Joint Special Access Program (SAP) Implementation Guide (JSIG)
Advise the Information System Owner (ISO), Information Data Owner (IDO), Program Security Officer (PSO), and the Delegated and/or Authorizing Official (DAO/AO) on any assessment and authorization issues
Evaluate Authorization packages and make recommendation to the AO and/or DAO for authorization
Evaluate IS threats and vulnerabilities to determine whether additional safeguards are required
Advise the Government concerning the impact levels for Confidentiality, Integrity, and Availability for the information on a system
Ensure security assessments are completed and results documented and prepare the Security Assessment Report (SAR) for the Authorization boundary
Initiate a Plan of Action and Milestones (POA&M) with identified weaknesses for each Authorization Boundaries assessed, based on findings and recommendations from the SAR
Evaluate security assessment documentation and provide written recommendations for security authorization to the Government
Discuss recommendation for authorization and submit the security authorization package to the AO/DAO
Assess proposed changes to Authorization boundaries operating environment and mission needs to determine the continuation to operate.
Review and concur with all sanitization and clearing procedures in accordance with Government guidance and/or policy
Assist the Government compliance inspections
Assist the Government with security incidents that relate to cybersecurity and ensure that the proper and corrective measures have been taken
Ensure organization are addressing and conducting all phases of the system development life cycle (SDLC)
Evaluate Hardware and Software to determine security impact that it might have on Authorization boundaries
Evaluate the effectiveness and implementation of Continuous Monitoring Plans
Represent the customer on inspection teams
Experience:
5 - 7 years related experience
Minimum of three (3) years’ experience in SAP, SCI or Collateral Information Systems (IS) Security and the implementation of regulations identified in the description of duties
Prior performance in the role of ISSO and ISSM
Education:
Certifications:
Security Clearance:
Current Top Secret Clearance with SCI Eligibility
Eligibility for access to Special Access Program Information
Willingness to submit to a Counterintelligence polygraph
Other Requirements:
| |
Information Systems Security Manager (ISSM) II 118-006 | | | 01/15/2023 | Information Systems Security Manager (ISSM) II:
The ISSM’s primary function serves as a principal advisor on all matters, technical and otherwise, involving the security of information systems under their purview. Primary support will be working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense, and Military Compartment efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
Performance shall include:
Perform oversight of the development, implementation and evaluation of information system security program policy; special emphasis placed upon integration of existing SAP network infrastructures
Develop and oversee operational information systems security implementation policy and guidelines of network security, based upon the Risk Management Framework (RMF) with emphasize on Joint Special Access Program Implementation Guide (JSIG) authorization process
Advise customer on Risk Management Framework (RMF) assessment and authorization issues
Perform risk assessments and make recommendations to DoD agency customers
Advise government program managers on security testing methodologies and processes
Evaluate authorization documentation and provide written recommendations for authorization to government PM’s
Develop and maintain a formal Information Systems Security Program
Ensure that all IAOs, network administrators, and other cyber security personnel receive the necessary technical and security training to carry out their duties
Develop, review, endorse, and recommend action by the AO or DAO of system assessment documentation
Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media
Develop and execute security assessment plans that include verification that the features and assurances required for each protection level functioning
Maintain a and/or applicable repository for all system authorization documentation and modifications
Develop policies and procedures for responding to security incidents, to include investigating and reporting security violations and incidents
Ensure proper protection or corrective measures have been taken when an incident or vulnerability has been discovered within a system
Ensure that data ownership and responsibilities are established for each authorization boundary, to include accountability, access rights, and special handling requirements
Ensure development and implementation of an information security education, training, and awareness program, to include attending, monitoring, and presenting local cyber security training.
Evaluate threats and vulnerabilities to ascertain whether additional safeguards are needed
Assess changes in the system, its environment, and operational needs that could affect the authorization
Ensure that authorization is accomplished a valid Authorization determination has been given for all authorization boundaries under your purview
Review AIS assessment plans
Coordinate with PSO or cognizant security official on approval of external information systems (e.g., guest systems, interconnected system with another organization)
Conduct periodic assessments of the security posture of the authorization boundaries
Institute and implement a Configuration Control Board (CCB) charter
Ensure configuration management (CM) for security-relevant changes to software, hardware, and firmware and that they are properly documented
Ensure periodic testing is conducted to evaluate the security posture of IS by employing various intrusion/attack detection and monitoring tools (shared responsibility with ISSOs)
Ensure that system recovery and reconstitution processes developed and monitored to ensure that the authorization boundary can be recovered based on its availability level determination
Ensure all authorization documentation is current and accessible to properly authorized individuals
Ensure that system security requirements are addressed during all phases of the system life cycle
Participate in self-inspections
Periodically review system security to accommodate changes to policy or technology
Coordinate all technical security issues outside of area of expertise or responsibility with ISSE
Provide expert research and analysis in support of expanding programs and area of responsibility as it pertains to cyber security and information technology activities
Develop Assured File Transfers (AFT) on accordance with the JSIG
Provide leadership, mentoring, and quality assurance for Cyber Security and Information Technology team members
Experience:
Education:
Certifications:
Security Clearance:
Current Top Secret Clearance with SCI Eligibility
Eligibility for access to Special Access Program Information
Willingness to submit to a Counterintelligence polygraph
Other Requirements:
| |
Information Systems Security Manager (ISSM) II 118-005 | | | 01/15/2023 | Information Systems Security Manager (ISSM) II:
The ISSM’s primary function serves as a principal advisor on all matters, technical and otherwise, involving the security of information systems under their purview. Primary support will be working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense, and Military Compartment efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
Performance shall include:
Perform oversight of the development, implementation and evaluation of information system security program policy; special emphasis placed upon integration of existing SAP network infrastructures
Develop and oversee operational information systems security implementation policy and guidelines of network security, based upon the Risk Management Framework (RMF) with emphasize on Joint Special Access Program Implementation Guide (JSIG) authorization process
Advise customer on Risk Management Framework (RMF) assessment and authorization issues
Perform risk assessments and make recommendations to DoD agency customers
Advise government program managers on security testing methodologies and processes
Evaluate authorization documentation and provide written recommendations for authorization to government PM’s
Develop and maintain a formal Information Systems Security Program
Ensure that all IAOs, network administrators, and other cyber security personnel receive the necessary technical and security training to carry out their duties
Develop, review, endorse, and recommend action by the AO or DAO of system assessment documentation
Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media
Develop and execute security assessment plans that include verification that the features and assurances required for each protection level functioning
Maintain a and/or applicable repository for all system authorization documentation and modifications
Develop policies and procedures for responding to security incidents, to include investigating and reporting security violations and incidents
Ensure proper protection or corrective measures have been taken when an incident or vulnerability has been discovered within a system
Ensure that data ownership and responsibilities are established for each authorization boundary, to include accountability, access rights, and special handling requirements
Ensure development and implementation of an information security education, training, and awareness program, to include attending, monitoring, and presenting local cyber security training.
Evaluate threats and vulnerabilities to ascertain whether additional safeguards are needed
Assess changes in the system, its environment, and operational needs that could affect the authorization
Ensure that authorization is accomplished a valid Authorization determination has been given for all authorization boundaries under your purview
Review AIS assessment plans
Coordinate with PSO or cognizant security official on approval of external information systems (e.g., guest systems, interconnected system with another organization)
Conduct periodic assessments of the security posture of the authorization boundaries
Institute and implement a Configuration Control Board (CCB) charter
Ensure configuration management (CM) for security-relevant changes to software, hardware, and firmware and that they are properly documented
Ensure periodic testing is conducted to evaluate the security posture of IS by employing various intrusion/attack detection and monitoring tools (shared responsibility with ISSOs)
Ensure that system recovery and reconstitution processes developed and monitored to ensure that the authorization boundary can be recovered based on its availability level determination
Ensure all authorization documentation is current and accessible to properly authorized individuals
Ensure that system security requirements are addressed during all phases of the system life cycle
Participate in self-inspections
Periodically review system security to accommodate changes to policy or technology
Coordinate all technical security issues outside of area of expertise or responsibility with ISSE
Provide expert research and analysis in support of expanding programs and area of responsibility as it pertains to cyber security and information technology activities
Develop Assured File Transfers (AFT) on accordance with the JSIG
Provide leadership, mentoring, and quality assurance for Cyber Security and Information Technology team members
Experience:
Education:
Certifications:
Security Clearance:
Current Top Secret Clearance with SCI Eligibility
Eligibility for access to Special Access Program Information
Willingness to submit to a Counterintelligence polygraph
Other Requirements:
| |
Information Systems Security Manager (ISSM) II 118-004 | | | 01/15/2023 | Information Systems Security Manager (ISSM) II:
The ISSM’s primary function serves as a principal advisor on all matters, technical and otherwise, involving the security of information systems under their purview. Primary support will be working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense, and Military Compartment efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
Performance shall include:
Perform oversight of the development, implementation and evaluation of information system security program policy; special emphasis placed upon integration of existing SAP network infrastructures
Develop and oversee operational information systems security implementation policy and guidelines of network security, based upon the Risk Management Framework (RMF) with emphasize on Joint Special Access Program Implementation Guide (JSIG) authorization process
Advise customer on Risk Management Framework (RMF) assessment and authorization issues
Perform risk assessments and make recommendations to DoD agency customers
Advise government program managers on security testing methodologies and processes
Evaluate authorization documentation and provide written recommendations for authorization to government PM’s
Develop and maintain a formal Information Systems Security Program
Ensure that all IAOs, network administrators, and other cyber security personnel receive the necessary technical and security training to carry out their duties
Develop, review, endorse, and recommend action by the AO or DAO of system assessment documentation
Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media
Develop and execute security assessment plans that include verification that the features and assurances required for each protection level functioning
Maintain a and/or applicable repository for all system authorization documentation and modifications
Develop policies and procedures for responding to security incidents, to include investigating and reporting security violations and incidents
Ensure proper protection or corrective measures have been taken when an incident or vulnerability has been discovered within a system
Ensure that data ownership and responsibilities are established for each authorization boundary, to include accountability, access rights, and special handling requirements
Ensure development and implementation of an information security education, training, and awareness program, to include attending, monitoring, and presenting local cyber security training.
Evaluate threats and vulnerabilities to ascertain whether additional safeguards are needed
Assess changes in the system, its environment, and operational needs that could affect the authorization
Ensure that authorization is accomplished a valid Authorization determination has been given for all authorization boundaries under your purview
Review AIS assessment plans
Coordinate with PSO or cognizant security official on approval of external information systems (e.g., guest systems, interconnected system with another organization)
Conduct periodic assessments of the security posture of the authorization boundaries
Institute and implement a Configuration Control Board (CCB) charter
Ensure configuration management (CM) for security-relevant changes to software, hardware, and firmware and that they are properly documented
Ensure periodic testing is conducted to evaluate the security posture of IS by employing various intrusion/attack detection and monitoring tools (shared responsibility with ISSOs)
Ensure that system recovery and reconstitution processes developed and monitored to ensure that the authorization boundary can be recovered based on its availability level determination
Ensure all authorization documentation is current and accessible to properly authorized individuals
Ensure that system security requirements are addressed during all phases of the system life cycle
Participate in self-inspections
Periodically review system security to accommodate changes to policy or technology
Coordinate all technical security issues outside of area of expertise or responsibility with ISSE
Provide expert research and analysis in support of expanding programs and area of responsibility as it pertains to cyber security and information technology activities
Develop Assured File Transfers (AFT) on accordance with the JSIG
Provide leadership, mentoring, and quality assurance for Cyber Security and Information Technology team members
Experience:
Education:
Certifications:
Security Clearance:
Current Top Secret Clearance with SCI Eligibility
Eligibility for access to Special Access Program Information
Willingness to submit to a Counterintelligence polygraph
Other Requirements:
| |
Activity Security Representative II 118-003 | | | 01/15/2023 | Activity Security Representative II:
The Activity Security Representative’s primary function is to provide multi-disciplined security support to a customer’s facility and organization. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
Performance shall include:
Classification reviews of inbound and outbound correspondence.
Assist in the maintenance of a document accountability database and associated correspondence
Processing inbound and outbound classified mail and receipt records
Perform destruction of classified materials
Process magnetic media for accountability
Reproduction support for classified materials
Maintain various daily logs for a variety of administrative functions associated with document control
Assist in the processing of inbound data and outbound data transfer files
Transfer electronic data files to internal customers
Maintain an extensive customer database point of contact listing
Assist with researching, processing, filing, and maintaining inbound and outbound visit notices
Escort facility visitors and maintains associated logs
Assist in the preparation of facility access control badges
Conduct entry and exit inspections
Assist in the maintenance of facility access control entry systems, to include visitor control
Perform data entry to the Personnel Access Security System database and maintain all customer sponsored billets and quota information
Assist in maintaining personnel security files for all personnel of the supported element
Follow and enforce the customer’s Standard Operating Procedures
Provide support for the security awareness and education programs
Perform miscellaneous administrative support functions as directed by the contractor site lead and/or the Senior Security Representative
Review, track, and monitor security clearance processing activities with appropriate government personnel to achieve appropriate clearance actions
Participate in Air Force SAP security compliance inspections of government organizations and industry
Implement Top Secret Control for accountable material and associated correspondence
Prepare and/or process inbound and outbound classified mail, faxes, courier packages and receipts
Prepare, process, and/or review Program Access Request (PARs) for accuracy and access eligibility
Execute Special Access Program Nomination Process Questionnaires
Conduct Defense Central Index of Investigations (DCII), Joint Personnel Access System (JPAS), and SAPNP reviews of candidates being submitted for SAP access
Perform data entry and record checks in the Air Force Access Data System (AFADS) and maintains all customer sponsored personnel access information current
Perform indoctrinations
Experience:
3-5 years related experience
Security Fundamentals Professional Certification (SFPC) counts towards 3 years of experience
Special Program Security Certification (SPSC) counts towards 5 years of experience
Maximum equivalent experience for SPED Certifications is no more than 5 years
Education:
Certifications:
Security Clearance:
Current Top Secret Clearance with SCI Eligibility
Eligibility for access to Special Access Program Information
Willingness to submit to a Counterintelligence polygraph
| |
Activity Security Representative II 118-002 | | | 01/15/2023 | Activity Security Representative 2:
The Activity Security Representative’s primary function is to provide multi-disciplined security support to a customer’s facility and organization. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
Performance shall include:
Classification reviews of inbound and outbound correspondence
Assist in the maintenance of a document accountability database and associated correspondence
Processing inbound and outbound classified mail and receipt records
Perform destruction of classified materials
Process magnetic media for accountability
Reproduction support for classified materials
Maintain various daily logs for a variety of administrative functions associated with document control
Assist in the processing of inbound data and outbound data transfer files
Transfer electronic data files to internal customers
Maintain an extensive customer database point of contact listing
Assist with researching, processing, filing, and maintaining inbound and outbound visit notices
Escort facility visitors and maintains associated logs
Assist in the preparation of facility access control badges
Conduct entry and exit inspections
Assist in the maintenance of facility access control entry systems, to include visitor control
Perform data entry to the Personnel Access Security System database and maintain all customer sponsored billets and quota information
Assist in maintaining personnel security files for all personnel of the supported element
Follow and enforce the customer’s Standard Operating Procedures
Provide support for the security awareness and education programs
Perform miscellaneous administrative support functions as directed by the contractor site lead and/or the Senior Security Representative
Review, track, and monitor security clearance processing activities with appropriate government personnel to achieve appropriate clearance actions
Participate in Air Force SAP security compliance inspections of government organizations and industry
Implement Top Secret Control for accountable material and associated correspondence
Prepare and/or process inbound and outbound classified mail, faxes, courier packages and receipts
Prepare, process, and/or review Program Access Request (PARs) for accuracy and access eligibility
Execute Special Access Program Nomination Process Questionnaires
Conduct Defense Central Index of Investigations (DCII), Joint Personnel Access System (JPAS), and SAPNP reviews of candidates being submitted for SAP access
Perform data entry and record checks in the Air Force Access Data System (AFADS) and maintains all customer sponsored personnel access information current
Perform indoctrinations
Experience:
3-5 years related experience
Security Fundamentals Professional Certification (SFPC) counts towards 3 years of experience
Special Program Security Certification (SPSC) counts towards 5 years of experience
Maximum equivalent experience for SPED Certifications is no more than 5 years
Education:
Certifications:
Security Clearance:
Current Top Secret Clearance with SCI Eligibility
Eligibility for access to Special Access Program Information
Willingness to submit to a Counterintelligence polygraph
| |
Information Assurance (IA) System Security Engineer 2 118-001 | | | 01/15/2023 | Information Assurance (IA) System Security Engineer 2:
The Information System Security Engineer (ISSE) is primarily responsible for conducting information system security engineering activities with a focus on lifecycle of current systems and future requirement scoping. The position will collect and process the captured information security requirements and ensures that the requirements are effectively integrated into information systems through purposeful security architecting, design, development, and configuration. The position is an integral part of the development team designing and developing organizational information systems or upgrading legacy systems. The ISSE employs best practices when implementing security requirements within an information system including software engineering methodologies, system/security engineering principles, secure design, secure architecture, and secure coding techniques. This position’s main function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
Performance shall include:
Perform oversight of the development, implementation and evaluation of information system security program policy; special emphasis placed upon integration of existing SAP network infrastructures
Perform analysis of network security, based upon the Risk Management Framework (RMF) with emphasize on Joint Special Access Program Implementation Guide (JSIG) authorization process
Provides expert support, research and analysis of exceptionally complex problems, and processes relating to them
Provides expert level consultation and technical services on all aspects of Information Security
Serves as technical expert to the Cybersecurity Assessment Program providing technical direction, interpretation and alternatives to complex problems
Thinks independently and demonstrates exceptional written and oral communications skills. Applies advanced technical principles, theories, and concepts
Contributes to the development of new principles, concepts, and methodologies
Works on unusually complex technical problems and provides highly innovative and ingenious solutions
Lead a team of System Security Engineers and Certification and Accreditation Analysts responsible for ensuring the customers national and international security interests are protected as support equipment are designed and tested
Recommends cybersecurity software tools and assists in the development of software tool requirements and selection criteria to include the development of product specific STIGs from applicable DISA SRGs
Review ISSE related designs and provides security compliance recommendations
Leads technical teams in implementation of predetermined long-range goals and objectives
Supports customer and SAP community IA working groups, participate in SSE IPT reviews
Provides expert level consultation and technical services on all aspects of Information Security
Review ISSE related designs and provides security compliance recommendations
Develop and provide IA risk management recommendations to the customer
Provide ISSE support for Mission and Training systems design and development
Assist with development and maintenance of the Program Protection Plan
Assist with site activation activities and design reviews
Represent the customer in various ISSE related working groups, advisory groups, and advisory council meetings
Chair and or Co-Chair customer and SAP community IA working groups, participate in ISSE IPT reviews
Represent the customer in various SSE related working groups, advisory groups, and advisory council meetings
Strong background in Patch/Configuration management, DevOps, and tier 3 support
Assist team to design, integrate, and implement JSIG/RMF Continuous Monitoring tools and processes.
Integrate COTS & GOTS products to collect, display and remediate a variety of automated system security and system operations/performance functions and metrics.
Perform security assessments of servers/network devices/security appliances.
Develop improvements to security assessments with regard to accuracy and efficiency.
Integrate ancillary monitoring tools/capabilities with the enterprise security information and event management (SIEM) and create/tailor complex event alarms/rules and summary reports.
Write and execute cybersecurity test procedures for validation of control compliance.
Monitor/analyze output of cybersecurity related tools for reportable security incidents and residual risk.
Analyze technical risk of emerging cybersecurity tools and processes.
Work as part of a security incident response team as needed
Build operational Operations and Maintenance (O&M) checklists to maintain the service (daily, weekly, monthly, yearly O&M checklists); build Tactics, Techniques and Processes (TTPs) and Standard Operating Processes (SOPs) associated with service checklists.
Integrate/Develop new techniques to improve Confidentiality, Integrity, and Availability for networks/systems operating at various classification levels.
Advanced technical competency in one or more of the following supported platforms: Microsoft Windows Server, Active Directory, Red Hat Enterprise Linux servers, MS Hyper-V/VMWare/ESx/Xen Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems, forensic analysis/vulnerability assessment, Group Policy management and configuration, Scripting, BMC Footprints, WSUS, , Lumension, Bitlocker, SQL Server 2012, TomCat, IIS, Windows Server 2012r2/2016, Win 10, Red Hat 6.5, Microsoft Office.
Toolkits, SEIMs, Logrhythm, ACAS/Nessus/SCAP, mandatory/role-based access control concepts (e. g. SE Linux extensions to RHEL, PitBull, AppArmor, and Sentris) , video teleconferencing/VOIP, Oracle/MS SQL database security, and Apache/IIS Web server security
Experience:
12 - 15 years related experience
Prior performance in roles such as ISSO, ISSM, SCA or SAP IT Technical Director
Education:
Certifications:
Security Clearance:
Current Top Secret Clearance with SCI Eligibility
Eligibility for access to Special Access Program Information
Willingness to submit to a Counterintelligence polygraph
Other Requirements:
Must have expert knowledge of DoD, National and applicable service and agency security policy, manuals and standards. Must have the ability to work in a dynamic environment and effectively interact with numerous DOD, military/civilian personnel and industry partners
| |
Network Engineer ISEE155 | | | 02/01/2023 | Network Engineer:
As a Network Engineer, supporting the Government, you will be trusted to assist with designs, plans, builds, and execution of configurations in the lab before introduction into the live environment.
In this role, a typical day may include:
Managing and configuring network hardware and software, operating systems, and attached devices for custom networks.
Designing and building hardware and software components for computer or telecommunications networks.
Maintaining current knowledge of relevant technology as assigned.
Creating and maintaining as built and other systems drawings (flowcharts, diagrams, etc).
Configuring, monitoring, and maintaining servers to ensure network and system integrity.
Working closely with network architects towards implementation in the network.
WHAT YOU'LL NEED:
Experience in network/systems analysis, design, installation, and maintenance.
Windows and Linux operating systems experience.
Experience with Cisco and Juniper routers, switches, firewalls experience (installation, configuration, and maintenance).
Possess skills to manage exceptionally complex, inter-disciplinary, and inter-organizational tasks.
Hands-on coding experience in Python, JavaScript, Ruby, SQL, or other relevant languages.
Education and Experience:
High School Diploma + 16 years
Associate's Degree + 14 years
Bachelor's Degree + 12 years
Master's Degree + 10 years
PhD + 8 years
Training and Certficiations:
Security Clearance:
| |
DevOps Engineer ISEE154 | | | 02/01/2023 | DevOps Engineer:
As a DevOps Engineer, supporting the Government, you will be trusted to assist with designs, plans, builds, and execution of configurations in the lab before introduction into the live environment.
In this role, a typical day may include:
Interacting with the Government regarding Systems Engineering technical considerations and for associated problems, issues, or conflicts; communicate with other program personnel, government overseers, and senior executives.
Establishing state-of-the-art techniques for designing, developing, modifying, and troubleshooting highly complex computer operating hardware system in a lab
environment.
Designing operating/hardware systems, tools, and infrastructure; formulating system concepts and architecture, specific requirements, and developing implementation approaches.
Understanding the needs of stakeholders and conveying them to architects.
Working on ways to automate and improve development and release processes.
Architecting, building, and maintaining on-premise and/or cloud infrastructure to support team and customer initiatives.
Guiding system development and implementation planning through assessment or preparation of system engineering management plans and system integration and test plans.
Maintaining and improving existing infrastructure (build out autoscaling, support new services, optimize for cost efficiencies/authentication/search, etc).
Administering production, staging, and development environments.
Collaborating cross-functionally with data scientists, analyst, project managers, and other engineers to build apps and solve complex problems.
WHAT YOU'LL NEED:
Good understanding of object-oriented programming, data structures, algorithms, and design patterns.
Hands-on experience in: Building REST endpoints / Data modeling, SQL, and/or Python / Redhat and/or Centos/ Server builds using automated mechanism / Ansible or Puppet / Gitlab / Deploying Docker engines in virtualized platforms for containerization for multiple apps / CI/CD automation / Building and deploying data pipelines / Good coding practices.
Strong verbal and written communication skills.
Proficient attention to detail and problem-solving skills.
Education and Experience:
High School Diploma + 10 years
Associate's Degree + 8 years
Bachelor's Degree + 6 years
Master's Degree + 4 years
PhD + 2 years
Training and Certifications:
Security Clearance:
| |
Lab Administrator ISEE153 | | | 01/12/2023 | Lab Administrator:
As a Lab Administrator, supporting the Government, you will be trusted to assist with designs, plans, builds, and execution of configurations in the lab before introduction into the live environment.
In this role, a typical day may include:
Developing, installing, maintaining, and supporting the technical infrastructure, hardware, and system software components.
Managing an IT lab environment that includes network equipment, servers, builds, and virtualized applications.
Configuring, debugging, and supporting multiple infrastructure platforms.
Administering Linux and Unix operating systems and provisioning applications and software.
Administering Microsoft Windows Server OS environments (including patching) and Active Directory.
Administering VMWare hypervisor environment and provisioning software.
Administering storage platforms and provisioning within the environment.
Evaluating system problems of workflow, organization, and planning and develop appropriate corrective actions.
Performing quality control of processes and products produced.
Assisting with formulating technical strategies and processes for administered systems.
Writing, interpreting, and analyzing technical documentation related to system administration.
WHAT YOU'LL NEED:
2+ years supporting current Windows desktop technologies and LANs.
Hands-on experience in Cisco, Arista, Checkpoint, Palo Alto or F5 platform configuration (certification preferred).
Understanding of common networking protocols and designs (e.g., BGP4, OSPF, IPSEC, HSRP, QoS, Spine and Leaf Architecture).
Knowledge of telecommunications technologies, systems, and circuits (e.g., Ethernet, Sonet, TDM circuits, etc.).
Experience with Big Data environments such as Hadoop and Acumulo provisioning software.
Strong analytical, written, listening, and oral communication skills.
Education and Experience:
High School Diploma + 12 years
Associate's Degree + 10 years
Bachelor's Degree + 8 years
Master's Degree + 6 years
PhD + 4 years
Training and Certifications:
Security Clearance:
| |
Data Modeler Mid-Level NEE122 | | | 01/11/2023 | Data Modeler (Mid-Level):
Overall Assignment Description:
Mid-level Data Modelers conduct data modeling activities in support of business stakeholders,
analysts, and workforce to define and analyze system and data requirements to support NGA
business operation and related processes to ensure timely and accurate execution of
corporate mission and functions.
Duties include:
Assists Government with the development and use of complex models, tools and algorithms to identify trends and patterns in corporate data.
Work with the Business Architect to model the business processes for re-engineering,optimization, or integration of technical solutions (i.e. automation, advancedlearning/machine learning, etc.)
Supports developing models of NGA’s architectures, requirements, and systems performance and considers NGA strategies and overall vision for the future of corporate mission and
Supports creating models to support analysis of alternatives, performance trades, design trades and new capabilities and develops alternatives for deployment based on MS&A results in existing NSG architectures and cloud environments.
Skills and Experience:
Bachelor’s degree or higher in Engineering, Computer Science, Information Technology, Management Information Systems, or related STEM degree program, or equivalent Mid level work experience as an Data Modeler.
Mid-level working experience in government or industry modeling large complex System of
Systems or Service Oriented Architecture/Cloud environments.
Demonstrated experience with Model Based Systems Engineering, processes, tools and languages.
Mid-level working experience in Operations Research.
Security Clearance:
| |
Systems Integrator Mid-Level NEE121 | | | 01/22/2023 | Systems Integrator (Mid-Level)
Overall Assignment Description:
Mid-level Systems Integrators support the Government by coordinating and overseeing the integrity of the NSG/ASG systems-of-systems enterprise. They coordinate with system owners with planning, implementation approaches, testing, documenting, and maintaining solutions for cloud, on premise, and hybrid services, systems or subsystems using defined processes and tools.
Duties may include:
Assists with coordinating and performing systems integration activities across the NSG, ASG and Federal Agencies to ensure timely and accurate GEOINT.
Assists with coordinating and overseeing a total systems perspective including a technical understanding of relationships, dependencies and requirements of cloud, on premise, and hybrid services, infrastructure and security domains.
Assists with the coordination of engineering plans and site installation technical design packages.
Skills and Experience:
Required:
Bachelor's degree or higher in Computer Science, Information Technology, Engineering, Engineering Management, Management Information Systems, or related STEM degree program, or related equivalent additional experience.
Mid-level or higher systems integration experience working in government or industry integrating large complex System of Systems or Service Oriented Architecture environments residing in cloud, on premise, or hybrid infrastructures.
Desired:
Working knowledge of Model-Based Systems Engineering, processes, tools and languages.
Previous NGA and/or NSG/ASG program/project work experience.
Previous IC or DoD program/project work experience.
Security Clearance:
| |
Targeting Analyst Senior-Level SPAC022 | | | 01/08/2023 | This is a future position that may come open but is not open at the present moment. We are willing to prescreen personnel for these positions if you are interested.
Targeting Analyst Senior-Level:
Targeting Analyst – Develops targets and target systems for joint lethal and / or nonlethal engagements. Develops target nominations, creates database records, and databases target intelligence products. Produces all-source analytic damage estimates and battle damage assessments and assists with combat assessment requirements. Conducts collateral damage estimation, performs target list management, target strategy development, and provides joint target intelligence support to deliberate and dynamic target engagements. Provides recommendations for target prioritization to achieve commander objectives for plans and operations. Provides database nominations, creates, and updates database and uploads TMs into databases.
Job Requirements:
Experience with databases such as MIDB, and tools like the Joint Targeting Toolkit
Knowledge of the joint targeting process
Knowledge of DoD and IC research and analysis methods, procedures, and documentation processes
Ability to work with engineers to translate research and analysis into top level prototype development and integration plans
Education and Experience:
Security Clearance:
| |
Targeting Analyst Mid-Level SPAC021 | | | 01/08/2023 | This is a future position that may come open but is not open at the present moment. We are willing to prescreen personnel for these positions if you are interested.
Targeting Analyst Mid-Level:
Targeting Analyst – Develops targets and target systems for joint lethal and / or nonlethal engagements. Develops target nominations, creates database records, and databases target intelligence products. Produces all-source analytic damage estimates and battle damage assessments and assists with combat assessment requirements. Conducts collateral damage estimation, performs target list management, target strategy development, and provides joint target intelligence support to deliberate and dynamic target engagements. Provides recommendations for target prioritization to achieve commander objectives for plans and operations. Provides database nominations, creates and updates database and uploads TMs into databases.
Job Requirements:
Knowledge of Defense Department and Intelligence Community research and analysis methods, procedures, and documentation processes
Ability to work with engineers to translate research and analysis into top level prototype development and integration plans
Education and Experience:
Security Clearance:
| |
Special Security Technician Senior-Level SPAC020 | | | 01/08/2023 | This is a future position that may come open but is not open at the present moment. We are willing to prescreen personnel for these positions if you are interested.
Special Security Technician Senior-Level:
Special Security Technician – Assists the Special Security Officer (SSO) to ensure control of access to SCI and SCI facilities (SCIFs); certifying and receiving SCI visitor clearances / accesses; conducts SCI security briefings, indoctrinations, debriefings, training on classified material / SSO-related material and topics; obtains signed nondisclosure agreements; and provides guidance and assistance for processing SCI position and eligibility requests for assigned military, Government and contractor personnel. Other duties may include, but not limited to audits of classified material; inspections of classified material storage facilities / SCIFs / containers; and, researching and preparing classified material-related policy and management recommendations, reports and recommendations. Other requirements and skills, consistent with the forgoing description, may be specified in individual TOs.
Education and Experience:
Security Clearance:
| |
Special Security Technician Mid-Level SPAC019 | |