Blue luminous rays on a dark background.
Position
Location
Timeline
Date Validated
Description
Contract
Agile Project Manager ECS2040
Washington, DC
Immediate
05/26/2022

Agile Project Manager:




Skill Level 3:


  • Skills and Task - Exceptionally Complex: Researches and evaluates new concepts and processes to improve   performance. Analyzes cross-functional problem sets, identifies root causes and   resolves issues. Assists more junior level technicians, specialists, and managers in their   activities. Can perform all tasks of lower level technicians, specialists, and/or   managers.

  • Leadership Management: Works individually, actively participates on integrated teams, and leads   multiple tasks, projects or teams. Oversees and monitors performance, and when required, takes steps to resolve issues.

  • Guidance: Directs multiple teams through to project completion. Provides guidance and direction to lower level technicians, specialists, and managers.




Responsibilities:


  • Lead a development team in current agile maturity and processes toward continuous improvement and quality

  • Drive execution of the team delivery and roadmap

  • Ensure quality standards of project deliverables

  • Interface with all stakeholders

  • Oversee a team as they plan, track and execute plans, development and testing from start to completion

  • Identify and coordinate removal of blockers to team objectives

  • Ensure the timely completion of specific, defined multi-discipline technical program or project of large complexity and scope

  • Report on progress, issues, risks, and dependencies

  • Elicit and capture business requirements in an Agile environment

  • Manage work using applicable tools and resources to include Agile Scrum & Kanban boards

  • Facilitate the Team in developing acceptance criteria for user stories

  • Formulate queries to validate identified issues and assist in the driving towards the development of solutions

  • Create Business Objects reports to demonstrate/showcase issues and/or solutions

  • Serve as backup Product Owner and/or Scrum Master

  • Model process flows using tools utilizing applicable tools to include MS Visio

  • Validate requirements fulfillment

  • Develop & decompose Epics, Features, and User Stories down to detailed functional and nonfunctional requirements.




Requirements:


  • Demonstrate strong understanding of database design, and perform database queries

  • Software Development Lifecycle experience at all phases

  • Ability to handle a fast-paced Agile software development environment

  • Experience using Agile Tools such as JIRA

  • Experience working with other Agile project teams and resolving cross-team dependencies with requirements that span multiple project teams

  • Experience with client-facing interactions including discussing , capturing, and prioritizing business needs

  • Strong technical background to ensure ability to work with Solution Architecture and Development staff to decompose business needs into Epics and Stories for the  Scrum Teams

  • Experience leading the analysis of current processes to identify areas of improvement and efficiency.

  • Ability to manage projects of various sizes (in terms of team size and complexity)

  • Experience developing and managing changes to project schedule plans for software development in multiple parallel releases, and sustainability of system

  • High responsiveness to business owners and other stakeholders

  • A positive attitude to drive individual and team performance and continuously improve processes

  • Experience working with other Agile project teams and resolving cross-team dependencies with requirements that span multiple project teams

  • Experience with client-facing interactions including discussing , capturing, and prioritizing business needs

  • Strong technical background to ensure ability to work with Solution Architecture and Development staff to decompose business needs into Epics and Stories for the Scrum Teams




Education and Experience:


  • High School Diploma + 9 years

  • Associate's Degree + 7 years

  • Bachelor's Degree + 5 years

  • Master's Degree + 3 years

  • PhD + 0 years




Training and Certifications:


  • 8570 Compliance, IAT Level II certification (Required)

  • Certified Scrum Master (CSM) - (Desired)

  • Project Management Professional (PMP) certification - (Desired)




Security Cleareance:


  • TS SCI CI poly



ECS2
Cyber System Administrator ECND037
Reston, VA
Immediate
05/19/2022

Cyber System Administrator:



Designs and evaluates end-to-end systems through their entire life cycle. Ensures products and systems comply with requirements and customer information assurance 

and cybersecurity standards and practices through formal verification methods with specific emphasis on network operations and cyber warfare tactics.




Skill Level 4:


  • Skills and Tasks: Exceptionally Complex, Inter-Discipline, Inter-Organizational. Can perform tasks of senior level technicians, specialists, and or managers not performed at Level 3 due to the size and/or complexity of the tasks

  • Individual Work / Teamwork or Leadership / Management: May work individually or as a key member of a senior leadership team. Oversees and monitors performance across several disciplines, and when required, takes steps to resolve issues.

  • Guidance: Provides expert guidance and direction to Government and Vendor senior level technicians and managers. Directs multiple contractor and subcontractors’ teams through to project completion.




Job Description:


  • Conducts software and systems engineering and software systems research to develop new capabilities, ensuring cybersecurity is fully integrated. 

  • Conducts comprehensive technology research to evaluate potential vulnerabilities in cyberspace systems.

  • Designs, develops, tests, and evaluates information system security throughout the systems development life cycle.

  • Tests, implements, deploys, maintains, and administers the infrastructure hardware and software.

  • Conducts risk assessment and provides recommendations for application design.

  • Handles the full range of security issues including architectures, firewalls, electronic data traffic, and network access.

  • Uses encryption technology, penetration and vulnerability analysis of various security technologies, and information technology security research.

  • Designs and develops new systems, applications, and solutions for external customer enterprise-wide cyber systems and networks.

  • Ensures the logical and systematic conversion of customer or product requirements into total systems solutions that acknowledge technical, schedule, and cost constraints.

  • Integrates new architectural features into existing infrastructures, designs cyber security architectural artifacts, provides architectural analysis and relates existing system to future needs and trends, embeds advanced forensic tools and techniques for attack reconstruction, provides engineering recommendations, and resolves integration/testing issues.

  • Has developed trusted relationships with customers.

  • Provides advanced guidance and leadership to less-experienced cybersecurity personnel.

  • May serve as a team or task leader. (Not a people manager)




Education and Experience:


  • HS/GED + 12 years

  • Associates Degree + 10 years

  • Bachelor’s Degree + 8 years

  • Master’s Degree + 6 years

  • PhD + 4 year




Training and Certifications:


  • Must be IAT Level 2 compliant




Security Clearance:


  • TS/SCI with CI poly

ECND
Network System Administrator 3 ARTH233
Kirtland AFB, NM
Immediate
05/19/2022

Network System Administrator 3:



The primary function will be to organize, install, and support government organization’s computer systems, including local area networks (LANs), wide area networks (WANs), network segments, intranets, and other data communication systems. This will also include helping architect, design and analyze network models. It will require participation in decisions about buying future hardware or software to upgrade organization’s infrastructure. This position might be called upon to provide technical support to computer users to help solve users’ problems. This position will support activities within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.




Performance shall include:


  • Able to perform self-sustaining and work with little to no oversight

  • Lead IT ops team on day-to-day management and operations of Networks and implement capabilities vetted through Cybersecurity, ISSE and higher headquarters to maintain JSIG/RMF Authority to Operate and maintain Continuous Monitoring tools and processes

  • Manage COTS & GOTS products to collect, display and remediate a variety of automated system security and system operations/performance functions and metrics.

  • Assist during security assessments of servers/network devices/security appliances

  • Assist during security assessments with regard to accuracy and efficiency

  • Assist with Creation of operational Operations and Maintenance (O&M) checklists to maintain the service (daily, weekly, monthly, yearly O&M checklists); build Tactics, Techniques and Processes (TTPs) and Standard Operating Processes (SOPs) associated with service checklists

  • Manage and operate monitoring tools/capabilities with the enterprise security information and event management (SIEM) and create/tailor complex event alarms/rules and summary reports

  • Execute cybersecurity operations procedures for day-to-day network management, operations and maintenance

  • Monitor/analyze output of cybersecurity related tools for reportable security incidents and residual risk

  • Assist in analyzing technical risk, upon request, of emerging cybersecurity tools and processes

  • Work as part of a security incident response team as needed

  • Assist ISSM/ISSO/ISSE with the Integration/Development new techniques to improve Confidentiality, Integrity, and Availability for networks/systems operating at various classification levels

  • Advanced technical competency in one or more of the following supported platforms: Microsoft Windows Server, Active Directory Red Hat Enterprise Linux servers, MS Hyper-V/VMWare/ESx/Xen Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems, forensic analysis/vulnerability assessment, Group Policy management and configuration, Scripting, BMC Footprints, WSUS, , Lumension, Bitlocker, SQL Server 2012, TomCat, IIS, Windows Server 2012r2/2016, Win 10, Red Hat 6.5, Microsoft Office

  • Toolkits, SEIMs, Logrhythm, ACAS/Nessus/SCAP, mandatory/role-based access control concepts (e. g. SE Linux extensions to RHEL, PitBull, AppArmor, and Sentris) , video teleconferencing/VOIP, Oracle/MS SQL database security, and Apache/IIS Web server security




Experience:


  • 5 - 7 years related experience




Education:


  • Bachelor’s degree in a related area or equivalent experience (4 years)




Certifications:


  • Must meet position and certification requirements outlined in DoD Directive 8570.01-M for      Information Assurance Technician Level III within 6 months of the date of hire




Security Clearance:


  • Current Top-Secret Clearance with SCI Eligibility

  • Eligibility for access to Special Access Program Information

  • Willingness to submit to a Counterintelligence polygraph



Other Requirements:


  • Thorough knowledge of Microsoft Windows desktop and server operating systems, Microsoft Exchange Server, and as needed RHEL operating systems administration and associated      hardware

  • Experience in effective communication and collaborating in a high-performance team environment.

  • Group Policy design and configuration

  • Working knowledge of CISCO network and switching and virtualization technologies

  • Working knowledge of  virtualization as it applies to users environments, operating systems, and network appliances

  • Working knowledge of Local Area Network (LAN) and Wide Area Network (WAN) technologies and data backup technologies

  • Working knowledge communication security (COMSEC) policies and integration

  • Working knowledge of Risk Management Framework, Common Criteria, and System Security Policy as they relate to assessments and authorization

  • Working knowledge and current relevant experience with PL2, PL3, and PL4 network      environments/systems

  • Working knowledge of WSUS and/or YUM patch deployment methodologies

  • Must be familiar with DoD policy as it applies to implementing and executing system and network administration

  • Working knowledge of Risk Management Framework and how to apply it to network/information system environments

  • Must be able to regularly lift up to 50 lbs

Arthur
All Source Intelligence Analyst Production Senior SIA3014
Fort Meade, MD
Immediate
05/11/2022

All Source Intelligence Analyst Production Senior:



Conducts analysis using intelligence and information from multiple sources to assess, interpret,

forecast, and explain a range of national security issues and developments that are regional or

functional in nature. Provides all-source analytic support to collections, operations, investigations,

and other defense intelligence analytic requirements.




Senior-level:


  • Demonstrates working knowledge of the concepts involved in the specific functions outlined in the specified labor category description.

  • Knowledgeable of and demonstrates ability to apply IC and DoD classification guidelines and procedures.

  • Demonstrates ability to use logic and systematic approaches to gather, evaluate, and synthesize multiple sources of information.

  • Demonstrates ability to work semi-independently with oversight and direction.

  • Demonstrates ability to use logic when evaluating and synthesizing multiple sources of information. Demonstrates ability interpreting analysis to include, but is not limited to, its meaning, importance, and implications.

  • Demonstrates ability to defend analytic judgements with sound, logical conclusions and adapt analytic judgments when presented with new information, evolving conditions, or unexpected developments.

  • Demonstrates ability to produce timely, logical, and concise analytic reports, documents, assessments, studies, and briefing materials in formats including Microsoft Office tools (e.g. Excel, Word, PowerPoint, etc.), electronic / soft copy matrices and / or web-enabled formats.

  • Demonstrates ability to communicate complex issues clearly in a concise and organized manner both verbally and non-verbally; with strong grammar skills.

  • Demonstrates proficiency using Microsoft Office tools.

  • Demonstrates ability to develop structured research including, but not limited to, obtaining, evaluating, organizing, and maintaining information within security and data protocols

  • Demonstrates ability to recognize nuances and resolve contradictions and inconsistencies in information.

  • Demonstrates comprehensive mission knowledge and skills that affirms completion of all developmental training and experiences for the labor category.

  • Demonstrates ability to work independently with minimal oversight and direction.

  • Demonstrates ability to collaborate and work with other IC members on information sharing, driving collection, and addressing analytic disputes and conflict resolution.

  • Demonstrates ability to develop concise, insightful, and comprehensive products for defense intelligence.

  • Demonstrates ability to guide teams in researching multifaceted or critical problems.

  • Demonstrates comprehensive mission knowledge and skills that affirms completion of all developmental training and experiences for the labor category.

  • Demonstrates the ability to communicate understanding from information that may be incomplete, indirect, highly complex, seemingly unrelated, and / or technically advanced.

  • Demonstrates ability to structure analysis based on trends in reporting and a range of analytic perspectives from other analysts, organizations, and intelligence disciplines.

  • Demonstrates ability to work independently with minimal oversight and direction.

  • Demonstrates ability to collaborate and work with other IC members on information sharing, driving collection, and addressing analytic disputes and conflict resolution.

  • Demonstrates ability to develop concise, insightful, and comprehensive products for defense intelligence.

  • Demonstrates ability to lead teams in researching multifaceted or critical problems. Provides guidance in selecting, designing, and applying analytic methodologies. Uses argument evaluation and validated analytic methodologies to challenge differing perspectives.

  • Demonstrates in-depth knowledge and understanding of the labor category activities required to meet mission requirements.

  • Demonstrates ability to work independently and with minimal oversight.




Job Responsibilities:


  • Provides all-source analysis to include: research, evaluation and deconfliction of single-source classified reporting, technical intrusion information, other agency all-source finished intelligence, open-source information and other relevant data.

  • Maintains cognizance of events occurring both within the U.S. government systems and internationally as directed to identify possible relationships to established knowledge base.

  • Possesses either a certificate of completion /or verified work experience/course work equivalent to the skills identified in DoD Directive 8570.01 for IAT level 1 or IAM level 1.

  • Uses intelligence production tools and databases, to include Tripwire Analytic Capability,Intellipedia, Palantir, MIDB, Cyber Common Operating Picture (CyberCOP), Target KnowledgeBase, Cyber Threat Matrix, Automated Message Handling System, WISE InformationManagement System, Network Knowledge Base, FoxTrail, CENTAUR, ispace, Pathfinder, andMicrosoft OneNote.




Education and Experience:


  • Minimum 12 years of experience related to the specific labor category with at least a portion of the experience within the last 2 years.

  • Desired Education: Master’s degree in an area related to the labor category from a college or university accredited by an agency recognized by the U.S. Department of Education; or have Bachelor’s degree related to the labor category from a college or university accredited by an agency recognized by the U.S. Department of Education and an additional 5 years of related senior experience, for a total of 17 years, as a substitute to the Master’s degree.




Security Clearance:


  • TS SCI

SIA3CybercomJ2TO
Intelligence Planner Intelligence Plans Integration Senior SIA3013
Fort Meade, MD
Immediate
05/11/2022

Intelligence Planner Intelligence Plans Integration Senior:



Employs intelligence expertise and knowledge to assist in the integration of Defense and

National intelligence support capabilities, including collection, analytic and targeting activities,

into overarching operational planning functions and efforts across the DoD. Mission areas for

Intelligence Planner assistance include, but not limited to, development of campaign plans,

deliberate planning, crisis management, and time sensitive planning in accordance with the Joint

Operations Planning and Execution System (JOPES). Additionally, planners assist with red

teaming, and intelligence operations feasibility assessments within the planning process.

Provides support in the conduct of Cyberspace Intelligence planning activities in support of

USCYBERCOM missions and recommend efficient use of resources throughout all planning

efforts.




Senior-level:


  • Demonstrates working knowledge of the concepts involved in the specific functions outlined in the specified labor category description.

  • Knowledgeable of and demonstrates ability to apply IC and DoD classification guidelines and procedures.

  • Demonstrates ability to use logic and systematic approaches to gather, evaluate, and synthesize multiple sources of information.

  • Demonstrates ability to work semi-independently with oversight and direction.

  • Demonstrates ability to use logic when evaluating and synthesizing multiple sources of information. Demonstrates ability interpreting analysis to include, but is not limited to, its meaning, importance, and implications.

  • Demonstrates ability to defend analytic judgements with sound, logical conclusions and adapt analytic judgments when presented with new information, evolving conditions, or unexpected developments.

  • Demonstrates ability to produce timely, logical, and concise analytic reports, documents, assessments, studies, and briefing materials in formats including Microsoft Office tools (e.g. Excel, Word, PowerPoint, etc.), electronic / soft copy matrices and / or web-enabled formats.

  • Demonstrates ability to communicate complex issues clearly in a concise and organized manner both verbally and non-verbally; with strong grammar skills.

  • Demonstrates proficiency using Microsoft Office tools.

  • Demonstrates ability to develop structured research including, but not limited to, obtaining, evaluating, organizing, and maintaining information within security and data protocols

  • Demonstrates ability to recognize nuances and resolve contradictions and inconsistencies in information.

  • Demonstrates comprehensive mission knowledge and skills that affirms completion of all developmental training and experiences for the labor category.

  • Demonstrates ability to work independently with minimal oversight and direction.

  • Demonstrates ability to collaborate and work with other IC members on information sharing, driving collection, and addressing analytic disputes and conflict resolution.

  • Demonstrates ability to develop concise, insightful, and comprehensive products for defense intelligence.

  • Demonstrates ability to guide teams in researching multifaceted or critical problems.

  • Demonstrates comprehensive mission knowledge and skills that affirms completion of all developmental training and experiences for the labor category.

  • Demonstrates the ability to communicate understanding from information that may be incomplete, indirect, highly complex, seemingly unrelated, and / or technically advanced.

  • Demonstrates ability to structure analysis based on trends in reporting and a range of analytic perspectives from other analysts, organizations, and intelligence disciplines.

  • Demonstrates ability to work independently with minimal oversight and direction.

  • Demonstrates ability to collaborate and work with other IC members on information sharing, driving collection, and addressing analytic disputes and conflict resolution.

  • Demonstrates ability to develop concise, insightful, and comprehensive products for defense intelligence.

  • Demonstrates ability to lead teams in researching multifaceted or critical problems. Provides guidance in selecting, designing, and applying analytic methodologies. Uses argument evaluation and validated analytic methodologies to challenge differing perspectives.

  • Demonstrates in-depth knowledge and understanding of the labor category activities required to meet mission requirements.

  • Demonstrates ability to work independently and with minimal oversight.




Job Responsibilities:


  • Reviews and reports on Strategic Guidance applicable to cyberspace intelligence operations.

  • Coordinates production of National Intelligence Support Plans (NISP), Annex B, and Functional Support Plans.

  • Assesses Intelligence Planning and recommends production adjustments as necessary.

  • Ensures intelligence planning activities are integrated and synchronized with J3, J5 and J7 battle rhythms as well as the planning of Cyberspace Intelligence Operations.

  • Assists the government personnel focal points to the Joint Planning Group (JPG) and/or Operational Planning Team (OPT) for all intelligence support activities and able to communicate feedback to the J2/JIOC matrix team.

  • Develops, manages, and coordinates an intelligence task list that identifies intelligence support products and designates divisions within the J2 responsible for completion.

  • Identifies, coordinates, and deconflicts deadlines and overall scope for intelligence production requests (PR) and services.

  • Coordinates and articulates requirements for JIPOE and other products that support planning.

  • Coordinates production of Functional Support Plans (FSP) (when required).

  • Provides a full range of policy and strategy support to assist the Intelligence Directorates’ policy and strategy professionals).

  • Participates in Intelligence Planning Steering Groups (IPSG) to determine scope and level of intelligence planning support.

  • Integrates CCMDs, service components, IC, and NSA into planning as necessary to ensureintelligence expertise and to deconflict and synchronize with other planning efforts.

  • Assists J2 support to USCYBERCOM Integrated Joint Special Technical Operations and facilitate Intelligence Estimate, Priority Intelligence Requirements (PIRs), Center of Gravity (CoG) analysis, Most Likely and Most Dangerous Adversary Course of Action (MLCOA/MDCOA), and any other intelligence related requirements to support JPG/OPT planning efforts.

  • Coordinates with targeting support for plans development and understands the J2 portion of the Combat Targeting / Combat Fires process and be able to synchronize intelligence efforts from across the JIOC to support the development of Entities of Interest (EOIs) into Target Development Nominations (TDN).

  • Works collaboratively with a broad range of Intelligence and Defense professionals and is capable of capturing and synthesizing a common picture of the current state of the Command, and then developing approaches to address shortfalls.

  • Develops methodologies for tracking Command progress against strategic initiatives and policy implementation. 

  • Demonstrates proficiency and timeliness if drafting and responding tasks related to policy and strategy inquiries.

  • Uses of intelligence tools and databases, to include Tripwire Analytic Capability, Intellipedia, Palantir, MIDB, Cyber Common Operating Picture (CyberCOP), Target Knowledge Base, Cyber Threat Matrix, Automated Message Handling System, WISE Information Management System, Network Knowledge Base, FoxTrail, CENTAUR, ispace, Pathfinder, and Microsoft OneNote.




Education and Experience:


  • Minimum 12 years of experience related to the specific labor category with at least a portion of the experience within the last 2 years.

  • Desired Education: Master’s degree in an area related to the labor category from a college or university accredited by an agency recognized by the U.S. Department of Education; or have Bachelor’s degree related to the labor category from a college or university accredited by an agency recognized by the U.S. Department of Education and an additional 5 years of related senior experience, for a total of 17 years, as a substitute to the Master’s degree.




Security Clearance:


  • TS/SCI

SIA3CybercomJ2TO
Software Test Engineer TALO060
Herndon, VA
Closed
05/11/2022

Test Engineer:



The selected Software Test Engineer will have a background in maintaining and enhancing automated test scripts and creating and executing test procedures to support development, integration, regression and user acceptance testing. Candidate will design and write automated test plans and procedures, analyze test results and develop and review code as necessary. Also will document bugs in Jira and provide test reports.



Candidate must be located in the metro DC area and be willing to come into the Herndon office if needed.




Required Qualifications:



• Bachelor’s degree with 9 years of relevant experience OR a Master’s degree with 7 years of relevant experience OR a PhD with 4 years of relevant experience; An additional 4 years of experience maybe considered in lieu of a degree requirement
• Extensive knowledge and experience with software testing
• Experience with automated test tools such as Robot Framework, Selenium, JMeter, SoapUI, and Junit.
• Experience documenting test plans/procedures.
• Experience in an Agile software development environment utilizing Java or Python
• Experience maintaining and enhancing existing automated software testing scripts
• Bachelor’s degree in related field
• Active TS/SCI



Desired Qualifications:



• Software development experience in a virtual environment like AWS
• Experience with Jira, Jenkins, and Gitlab
• Active TS/SCI CI poly




Security Clearance:



TS SCI

A CI poly is preferred but not required.

TALOS
Targeting Analyst Mid-Level Current Force Intelligence SIA3012
Fort Meade, MD
Immediate
05/09/2022

Targeting Analyst Mid-Level Current Force Intelligence:



Mid-Level:



  • Demonstrates working knowledge of the concepts involved in the specific functions outlined in the specified labor category description.  

  • Knowledgeable of and demonstrates ability to apply IC and DoD classification guidelines and procedures.

  • Demonstrates ability to use logic and systematic approaches to gather, evaluate, and synthesize multiple sources of information.

  • Demonstrates ability to work semi-independently with oversight and direction. 

  • Demonstrates ability to use logic when evaluating and synthesizing multiple sources of information. 

  • Demonstrates ability interpreting analysis to include, but is not limited to, its meaning, importance, and implications. 

  • Demonstrates ability to defend analytic judgements with sound, logical conclusions and adapt analytic judgments when presented with new information, evolving conditions, or unexpected developments.

  • Demonstrates ability to produce timely, logical, and concise analytic reports, documents, assessments, studies, and briefing materials in formats including Microsoft Office tools (e.g. Excel, Word, PowerPoint, etc.), electronic / soft copy matrices and / or web-enabled formats.

  • Demonstrates ability to communicate complex issues clearly in a concise and organized manner both verbally and non-verbally; with strong grammar skills. 

  • Demonstrates proficiency using Microsoft Office tools.

  • Demonstrates ability to develop structured research including, but not limited to, obtaining, evaluating, organizing, and maintaining information within security and data protocols.

  • Demonstrates ability to recognize nuances and resolve contradictions and inconsistencies in information.

  • Demonstrates comprehensive mission knowledge and skills that affirms completion of all developmental training and experiences for the labor category. 

  • Demonstrates ability to work independently with minimal oversight and direction.

  • Demonstrates ability to collaborate and work with other IC members on information sharing, driving collection, and addressing analytic disputes and conflict resolution.

  • Demonstrates ability to develop concise, insightful, and comprehensive products for defense intelligence.

  • Demonstrates ability to guide teams in researching multifaceted or critical problems. 

  • Demonstrates comprehensive mission knowledge and skills that affirms  completion of all developmental training and experiences for the labor category.

  • Demonstrates the ability to communicate understanding from information that may be incomplete, indirect, highly complex, seemingly unrelated, and /or technically advanced. 

  • Demonstrates ability to structure analysis based on trends in reporting and a range of analytic perspectives from other analysts, organizations, and   intelligence disciplines. 

  • Demonstrates ability to work independently with minimal oversight and   direction.

  • Demonstrates ability to collaborate and work with other IC members on information sharing, driving collection, and addressing analytic disputes and conflict  resolution.

  • Demonstrates ability to develop concise, insightful, and comprehensive products for defense intelligence.

  • Demonstrates ability to lead teams in researching multifaceted or critical problems. Provides guidance in selecting, designing, and applying   analytic methodologies. Uses argument evaluation and validated analytic methodologies to challenge differing perspectives.




Desired Experience:


  •  At least 8 years of experience conducting analysis relevant to the specific labor category with at least a   portion of the experience within the last 2 years. 




Desired Education


  •  Bachelor's degree in an area related to the labor category from a college or university accredited by an agency recognized by the U.S. Department of  Education.



Job Requirements:



  • Develops targets and target systems for joint lethal and / or non-lethal engagements. 

  • Develops target nominations, creates database records, and databases target intelligence products. 

  • Producesall-source analytic damage estimates and battle damage assessments and assists with combatassessment requirements. 

  • Conducts collateral damage estimation, performs target list management, target strategy development, and provides joint target intelligence support todeliberate and dynamic target engagements. 

  • Provides recommendations for target prioritizationto achieve commander objectives for plans and operations. 

  • Provides database nominations,creates and updates database and uploads TMs into databases.

  • Assists the Cyber National Mission Force (CNMF) Directorate of Intelligence (J2) indeveloping the processes and procedures to facilitate combat target development IAW CJCSI3122.06C, CJCSI 3160.01A, CJCSI 3370.01A, CJCSM 3370.01, and CJCSM 3375.01, battledamage assessment (BDA) IAW CJCSM 3162.01, and dynamic targeting IAW Joint Publication 3-60.

  • Participates in USCYBERCOM Target Development Working Groups, Joint Targeting Working Groups, and Joint Targeting Coordination Boards, coordinate target development nominations, sensitive target approval and review, and battle damage assessment with USCC/J2T, support USCC/J38 and CNMF advanced target development (weaponeering solutions, aimpoint election, and collateral damage estimation), train and mentor government military and civilian personnel IAW USCC/J2T and CNMF/J2 guidance, and closely collaborate with USCC/J2T/J3F/J38/SJA and CNMF Fires, National Mission Teams, and National Support Teams.

  • Provides all-source analysis to include: Cyber Intelligence Preparation of the Battlespace (CIPB), research, evaluation and de-confliction of single-source classified reporting, technical intrusion information, other agency all-source finished intelligence, open-source information and other relevant data.

  • Assists in the categorization and characterization of cyber threats and malware to help identify trends and changes in the activities of the cyber adversaries.

  • Adheres to Office of the Director of National Intelligence (ODNI) and Defense Intelligence Agency (DIA) all-source analytic tradecraft and standards (to include but not limited to ICD 203, 206, 208, and 209).

  • Establishes and maintains communications with counterparts in the Intelligence Community, USCYBERCOM, JFHQ-C, Department of Homeland Security/NCSD, CERTS and Information Assurance Centers to collaborate on analysis and identify changes in the environment, focusing on the tactical level of cyber intelligence (At the direction of CNMF leadership and in accordance with the guidance of government sponsors).

  • Maintains cognizance of events occurring both within the U.S. government systems and internationally as directed to identify possible relationships to established knowledge base

  • Possesses a minimum of 2 years’ experience producing all-source intelligence products within the U.S. intelligence community and either a certificate of completion /or verified work experience/course work equivalent to the skills identified in DoD Directive 8570.01 for IAT level 1 or IAM level.




Security Clearance:


  • TS SCI

SIA3CybercomJ2TO
Social Science Methodologist Senior SIA3011
Fort Meade, MD
Immediate
05/09/2022

Social Science Methodologist Senior:



Supports the development of new approaches for intelligence analysis to include analytic models

that leverage quantitative and qualitative techniques and innovative approaches to visualization

and dynamic content management to enable more accurate, complete, objective, and anticipatory

analysis. Applies social science methodologies to develop, vet, and employ theories against

DIA’s analysis of the strengths and weaknesses of selected foreign governments, non-state

actors, terrorist groups and other threats; security policy and capabilities; leadership and elite

dynamics; defense industrial production; civil and military resource allocation and investment;

threat finance transactions and networks; proliferation activities (including both state-sponsored

and non-state-sponsored activities); drug manufacture, trade, and smuggling; military programs,

capabilities, strategies (including WMD, missile, and general-purpose forces); and intentions.




Senior-level:


  • Demonstrates working knowledge of the concepts involved in the specific functions outlined in the specified labor category description.

  • Knowledgeable of and demonstrates ability to apply IC and DoD classification guidelines and procedures.

  • Demonstrates ability to use logic and systematic approaches to gather, evaluate, and synthesize multiple sources of information.

  • Demonstrates ability to work semi-independently with oversight and direction.

  • Demonstrates ability to use logic when evaluating and synthesizing multiple sources of information. Demonstrates ability interpreting analysis to include, but is not limited to, its meaning, importance, and implications.

  • Demonstrates ability to defend analytic judgements with sound, logical conclusions and adapt analytic judgments when presented with new information, evolving conditions, or unexpected developments.

  • Demonstrates ability to produce timely, logical, and concise analytic reports, documents, assessments, studies, and briefing materials in formats including Microsoft Office tools (e.g. Excel, Word, PowerPoint, etc.), electronic / soft copy matrices and / or web-enabled formats.

  • Demonstrates ability to communicate complex issues clearly in a concise and organized manner both verbally and non-verbally; with strong grammar skills.

  • Demonstrates proficiency using Microsoft Office tools.

  • Demonstrates ability to develop structured research including, but not limited to, obtaining, evaluating, organizing, and maintaining information within security and data protocols

  • Demonstrates ability to recognize nuances and resolve contradictions and inconsistencies in information.

  • Demonstrates comprehensive mission knowledge and skills that affirms completion of all developmental training and experiences for the labor category.

  • Demonstrates ability to work independently with minimal oversight and direction.

  • Demonstrates ability to collaborate and work with other IC members on information sharing, driving collection, and addressing analytic disputes and conflict resolution.

  • Demonstrates ability to develop concise, insightful, and comprehensive products for defense intelligence.

  • Demonstrates ability to guide teams in researching multifaceted or critical problems.

  • Demonstrates comprehensive mission knowledge and skills that affirms completion of all developmental training and experiences for the labor category.

  • Demonstrates the ability to communicate understanding from information that may be incomplete, indirect, highly complex, seemingly unrelated, and / or technically advanced.

  • Demonstrates ability to structure analysis based on trends in reporting and a range of analytic perspectives from other analysts, organizations, and intelligence disciplines.

  • Demonstrates ability to work independently with minimal oversight and direction.

  • Demonstrates ability to collaborate and work with other IC members on information sharing, driving collection, and addressing analytic disputes and conflict resolution.

  • Demonstrates ability to develop concise, insightful, and comprehensive products for defense intelligence.

  • Demonstrates ability to lead teams in researching multifaceted or critical problems. Provides guidance in selecting, designing, and applying analytic methodologies. Uses argument evaluation and validated analytic methodologies to challenge differing perspectives.

  • Demonstrates in-depth knowledge and understanding of the labor category activities required to meet mission requirements.

  • Demonstrates ability to work independently and with minimal oversight.




Job Requirements:



The Candidate shall provide intelligence support, including the following:

Cyber National Mission Force Build-out:


  • Supports the CNMF build-out process.

  • Creates a framework that enables the maturation of the CNMF through processes and initiatives that involve building capacity and capabilities, enhance relationships between CNMF, JFHQs, and USCYBERCOM JIOC.

  • Provides a means to institutionalize efficiencies for cyber intelligence within the CNMF.

  • Develops the intelligence processes and procedures to integrate the Cyber Mission Forces intelligence teams, structures, and infrastructure; status reports outlining updates and progress of accomplishments; and identification and developments of mission enhancement opportunities.

  • The Contractor shall provide recommendations on continual process improvement to during the maturity of the Cyber National Mission Force construct.




Education and Experience:


  • Minimum 12 years of experience related to the specific labor category with at least a portion of the experience within the last 2 years.

  • Desired Education: Master’s degree in an area related to the labor category from a college or university accredited by an agency recognized by the U.S. Department of Education; or have Bachelor’s degree related to the labor category from a college or university accredited by an agency recognized by the U.S. Department of Education and an additional 5 years of related senior experience, for a total of 17 years, as a substitute to the Master’s degree.




Security Clearance:


  • TS SCI

SIA3CybercomJ2TO
Russian Socio-Cultural Analyst Senior SIA3010
Fort Meade, MD
Immediate
05/09/2022

Russian Socio-Cultural Analyst Senior:




Senior-level:


  • Demonstrates working knowledge of the concepts involved in the specific functions outlined in the specified labor category description.

  • Knowledgeable of and demonstrates ability to apply IC and DoD classification guidelines and procedures.

  • Demonstrates ability to use logic and systematic approaches to gather, evaluate, and synthesize multiple sources of information.

  • Demonstrates ability to work semi-independently with oversight and direction.

  • Demonstrates ability to use logic when evaluating and synthesizing multiple sources of information. Demonstrates ability interpreting analysis to include, but is not limited to, its meaning, importance, and implications.

  • Demonstrates ability to defend analytic judgements with sound, logical conclusions and adapt analytic judgments when presented with new information, evolving conditions, or unexpected developments.

  • Demonstrates ability to produce timely, logical, and concise analytic reports, documents, assessments, studies, and briefing materials in formats including Microsoft Office tools (e.g. Excel, Word, PowerPoint, etc.), electronic / soft copy matrices and / or web-enabled formats.

  • Demonstrates ability to communicate complex issues clearly in a concise and organized manner both verbally and non-verbally; with strong grammar skills.

  • Demonstrates proficiency using Microsoft Office tools.

  • Demonstrates ability to develop structured research including, but not limited to, obtaining, evaluating, organizing, and maintaining information within security and data protocols

  • Demonstrates ability to recognize nuances and resolve contradictions and inconsistencies in information.

  • Demonstrates comprehensive mission knowledge and skills that affirms completion of all developmental training and experiences for the labor category.

  • Demonstrates ability to work independently with minimal oversight and direction.

  • Demonstrates ability to collaborate and work with other IC members on information sharing, driving collection, and addressing analytic disputes and conflict resolution.

  • Demonstrates ability to develop concise, insightful, and comprehensive products for defense intelligence.

  • Demonstrates ability to guide teams in researching multifaceted or critical problems.

  • Demonstrates comprehensive mission knowledge and skills that affirms completion of all developmental training and experiences for the labor category.

  • Demonstrates the ability to communicate understanding from information that may be incomplete, indirect, highly complex, seemingly unrelated, and / or technically advanced.

  • Demonstrates ability to structure analysis based on trends in reporting and a range of analytic perspectives from other analysts, organizations, and intelligence disciplines.

  • Demonstrates ability to work independently with minimal oversight and direction.

  • Demonstrates ability to collaborate and work with other IC members on information sharing, driving collection, and addressing analytic disputes and conflict resolution.

  • Demonstrates ability to develop concise, insightful, and comprehensive products for defense intelligence.

  • Demonstrates ability to lead teams in researching multifaceted or critical problems. Provides guidance in selecting, designing, and applying analytic methodologies. Uses argument evaluation and validated analytic methodologies to challenge differing perspectives.

  • Demonstrates in-depth knowledge and understanding of the labor category activities required to meet mission requirements.

  • Demonstrates ability to work independently and with minimal oversight.




Job Requirements:


  • Conducts all-source analytic production of socio-cultural elements within a region, human terrain, and human geography. Analysis includes, but is not limited, to religious, linguistic, ethnic, social, tribal, and occupational domains with respect to geography and resources to characterize the dynamics of groups of people worldwide. Incorporates expertise sociology, cultural anthropology, demography, psychology, geography, economics, and political science.

  • Performs as language specialist at the native level providing accurate reading, writing, speaking skills, as well as provide cultural understanding regarding geopolitical, economic and social issues.

  • Conducts research, HUMINT intelligence collection and analysis.

  • Provides accurate written gists, translations of transcripts, video and audio sources, from the target language to English and vice versa while preserving the original meaning and intent of the original source.

  • Devises and advise new methods of target language research and exploitation of information and determine the most effective methods for presenting and disseminating the information.

  • Possesses expertise in network defense principles and the intricacies of establishing network infrastructure for worldwide connectivity, to include hardware and software.

  • The native language requirements are as follows: Chinese (3); Russian (3); Farsi (3); Arabic (1); Korean (1). “Native Level” is defined as first/second generation speaking ability to understand current vernacular, colloquialisms, and terminology (Proficiency level of 4 required in speaking, reading, and writing).




Education and Experience:


  • Minimum 12 years of experience related to the specific labor category with at least a portion of the experience within the last 2 years.

  • Desired Education: Master’s degree in an area related to the labor category from a college or university accredited by an agency recognized by the U.S. Department of Education; or have Bachelor’s degree related to the labor category from a college or university accredited by an agency recognized by the U.S. Department of Education and an additional 5 years of related senior experience, for a total of 17 years, as a substitute to the Master’s degree.




Security Clearance:


  • TS SCI

SIA3CybercomJ2TO
All Source Analyst Current Intelligence Senior SIA3009
Fort Meade, MD
Immediate
05/09/2022

All Source Analyst Current Intelligence Senior:



  • Conducts analysis using intelligence and information from multiple sources to assess, interpret,forecast, and explain a range of national security issues and developments that are regional or functional in nature.

  • Provides all-source analytic support to collections, operations, investigations, and other defense intelligence analytic requirements.

  • Provides current intelligence briefs and products on a daily basis in support of DoDIN operations and defense with short suspense.

  • Includes research and development of current event topics related to cyber threats to the DoDIN and U.S. critical infrastructure/key resources or in support of current operations.

  • Ensures products submitted demonstrate knowledge of the pertinent subject matter that clearly articulates the adversaries’ doctrine, objectives and technical capabilities.

  • Ensures collection requirements adequately define the ongoing need for information on technically complex subjects.

  • Leverages Cyber Intelligence Update articles, J2 Daily Brief slides, or other current intelligence products, as required and uses Office of the Director of National Intelligence (ODNI) and

  • Defense Intelligence Agency (DIA) all-source analytic tradecraft and standards (to include but not limited to ICD 203, 206, 208, and 209).




Education and Experience:



  • Minimum 12 years of experience related to the specific labor category with at least a portion of the experience within the last 2 years.

  • Master’s degree in an area related to the labor category from a college or university accredited by an agency recognized by the U.S. Department of Education

  • Bachelor’s degree related to the labor category from a college or university accredited by an agency recognized by the U.S. Department of Education and an additional 5 years of related senior experience, for a total of 17 years, as a substitute to the Master’s degree.




Security Clearance:



TS/SCI

SIA3CybercomJ2TO
Senior Principal Cyber Systems Engineer Release Manager TALO059
Herndon, VA
Immediate
05/05/2022

Senior Principal Cyber Systems Engineer – Release Manager:



Job Description:  


As Release Manager the selected candidate will oversee the complete software delivery lifecycle. This includes working with the team from the planning phase to the deployment phase through the development and testing phases. This non-technical position requires strong communication skills, interacting with multiple people throughout the development lifecycle




Responsibilities include:


  • Create and manage the schedule

  • Manage parallel release schedules

  • Coordinate activities across multiple teams

  • Manage the Service Central schedules, updating dates and statuses

  • Work with the technical leads to complete the Change Description Document (CDD)

  • Coordinate the completion of required deliverables (i.e. IATT, User’s Guide, System Installation Procedure, Function Test Procedure, etc)

  • Coordinate with the ISSOs to ensure the Xacta work is completed on time

  • Anticipate blockers and assist with mitigation strategies

  • Coordinate activities with the government PMs to generate the required artifacts in Service Central (Demand, Program, Project, Change Request)

  • Coordinate with the government Configuration Management organization to ensure the materials are complete.

  • Oversee the deployment activities (i.e. generate Change Request, monitor the approval process, coordinate deployment team, complete the After Action Report)




Required:


  • A Bachelor’s degree with 9+ years of relevant experience OR a Master’s degree with 7 years of relevant experience OR a PhD with 4 years of relevant experience; an additional 4 years of experience maybe considered in lieu of the degree requirement

  • Systems Engineering experience

  • Experience developing and managing schedules

  • Strong communication skills

  • Strong organizational skills

  • Full SDLC experience

  • TS/ SCI CI poly




Desired:


  • Familiarity with Service Central

  • Familiarity with the DIA Configuration Management process

  • Familiarity with the DIA DevSecOps and RMF+ process is

  • Full SDLC experience across multiple environments and networks

  • Agile and SAFe experience




Security Clearance:


  • TS SCI CI poly

TALOS
Unified Communications Engineer ECS2039
Colorado Springs, CO
Immediate
04/14/2022

Unified Communications Engineer:



Responsible for the design and development of voice, video, radio frequency, and/or data communications networks.




Job Description:


  • Responsible for the design and development of Unified Communications systems.

  • Provides expert level analysis of voice, video, and integration with data communications networks, including planning, designing, evaluating, selecting, and upgrading operating systems and protocol suites.

  • Plans network layouts and configures systems for user environments.

  • Analyzes network topologies and traffic and capacity requirements.

  • Supports the acquisition of hardware and software as well as subcontractor services as needed.

  • May provide technical support and troubleshooting to users.

  • May perform network administration duties.

  • Provides guidance and work leadership to less-experienced network personnel and may have supervisory responsibilities.

  • Maintains current knowledge of relevant technology as assigned.

  • Participates in special projects as required.

  • Meet with various customers to determine strategic video and telephony needs

  • Maintain proper documentation of systems configurations, to include drawings and standard operating procedures

  • Review reports and logs for problems and identify appropriate solutions to include developing work flow for lower tier support levels

  • Provide primary and backup support in maintenance of Video and UC hardware and software

  • 10-15 years of directly related experience in network analysis and design.




Skills:


  • Experience in Voice and Video Engineering, Infrastructure including Design, Maintenance, Support, Deployment, Implementation, Systems Engineering..

  • Advanced knowledge in Cisco Unified Communications Systems, CUCM - Cisco Unified Communication Manager - Cisco Unified Call Manager, Cisco Call Manager, Cisco Voice DR, VoIP, Voice Engineering, Video Conferencing and Collaborative Tools, integrating video into Cisco Call Manager, Cisco Prime Collaboration Cisco Voice and Video Collaboration Systems, Cisco Voice Cluster, Cisco Voice DR.

  • Experience with Cisco Data Networking switching and routing but expertise is in Voice, VoIP, and DVTC QoS Quality of Service Cisco Unity Connection

  • VCS

  • Streaming Video

  • Tandberg and Cisco Video devices including end points and Mutli-point Control Units (MCU)s.

  • UCCX - Cisco Unified Contact Center Express

  • UCCE - Cisco Unified Customer Contact Enterprise

  • CUCME - Cisco Unified Communications Manager Express




Education and Experience:


  • High School Diploma + 9 years

  • Associate's Degree + 7 years

  • Bachelor's Degree + 5 years

  • Master's Degree + 3 years

  • PhD + 0 years




Training and Certifications:


  • IAT Level 2




Desired certifications:


  • Cisco CCIE Collaboration, CCNP Voice - Cisco Certified Network Professional Voice, CCNA Voice - Cisco Certified Network Associate Voice, CCVP - Cisco Certified Voice Professional




Security Clearance:


  • TS SCI CI poly

ECS2
Chinese Socio-Cultural Analyst Senior SIA3008
Fort Meade, MD
Immediate
04/13/2022

Chinese Socio-Cultural Analyst Senior:




Senior-level:


  • Demonstrates working knowledge of the concepts involved in the specific functions outlined in the specified labor category description.

  • Knowledgeable of and demonstrates ability to apply IC and DoD classification guidelines and procedures.

  • Demonstrates ability to use logic and systematic approaches to gather, evaluate, and synthesize multiple sources of information.

  • Demonstrates ability to work semi-independently with oversight and direction.

  • Demonstrates ability to use logic when evaluating and synthesizing multiple sources of information. Demonstrates ability interpreting analysis to include, but is not limited to, its meaning, importance, and implications.

  • Demonstrates ability to defend analytic judgements with sound, logical conclusions and adapt analytic judgments when presented with new information, evolving conditions, or unexpected developments.

  • Demonstrates ability to produce timely, logical, and concise analytic reports, documents, assessments, studies, and briefing materials in formats including Microsoft Office tools (e.g. Excel, Word, PowerPoint, etc.), electronic / soft copy matrices and / or web-enabled formats.

  • Demonstrates ability to communicate complex issues clearly in a concise and organized manner both verbally and non-verbally; with strong grammar skills.

  • Demonstrates proficiency using Microsoft Office tools.

  • Demonstrates ability to develop structured research including, but not limited to, obtaining, evaluating, organizing, and maintaining information within security and data protocols

  • Demonstrates ability to recognize nuances and resolve contradictions and inconsistencies in information.

  • Demonstrates comprehensive mission knowledge and skills that affirms completion of all developmental training and experiences for the labor category.

  • Demonstrates ability to work independently with minimal oversight and direction.

  • Demonstrates ability to collaborate and work with other IC members on information sharing, driving collection, and addressing analytic disputes and conflict resolution.

  • Demonstrates ability to develop concise, insightful, and comprehensive products for defense intelligence.

  • Demonstrates ability to guide teams in researching multifaceted or critical problems.

  • Demonstrates comprehensive mission knowledge and skills that affirms completion of all developmental training and experiences for the labor category.

  • Demonstrates the ability to communicate understanding from information that may be incomplete, indirect, highly complex, seemingly unrelated, and / or technically advanced.

  • Demonstrates ability to structure analysis based on trends in reporting and a range of analytic perspectives from other analysts, organizations, and intelligence disciplines.

  • Demonstrates ability to work independently with minimal oversight and direction.

  • Demonstrates ability to collaborate and work with other IC members on information sharing, driving collection, and addressing analytic disputes and conflict resolution.

  • Demonstrates ability to develop concise, insightful, and comprehensive products for defense intelligence.

  • Demonstrates ability to lead teams in researching multifaceted or critical problems. Provides guidance in selecting, designing, and applying analytic methodologies. Uses argument evaluation and validated analytic methodologies to challenge differing perspectives.

  • Demonstrates in-depth knowledge and understanding of the labor category activities required to meet mission requirements.

  • Demonstrates ability to work independently and with minimal oversight.




Job Requirements:


  • Conducts all-source analytic production of socio-cultural elements within a region, human terrain, and human geography. Analysis includes, but is not limited, to religious, linguistic, ethnic, social, tribal, and occupational domains with respect to geography and resources to characterize the dynamics of groups of people worldwide. Incorporates expertise sociology, cultural anthropology, demography, psychology, geography, economics, and political science.

  • Performs as language specialist at the native level providing accurate reading, writing, speaking skills, as well as provide cultural understanding regarding geopolitical, economic and social issues.

  • Conducts research, HUMINT intelligence collection and analysis.

  •  Provides accurate written gists, translations of transcripts, video and audio sources, from the target language to English and vice versa while preserving the original meaning and intent of the original source.

  • Devises and advise new methods of target language research and exploitation of information and determine the most effective methods for presenting and disseminating the information.

  • Possesses expertise in network defense principles and the intricacies of establishing network infrastructure for worldwide connectivity, to include hardware and software.

  • The native language requirements are as follows: Chinese (3); Russian (3); Farsi (3); Arabic (1); Korean (1). “Native Level” is defined as first/second generation speaking ability to understand current vernacular, colloquialisms, and terminology (Proficiency level of 4 required in speaking, reading, and writing).




Education and Experience:


  • Minimum 12 years of experience related to the specific labor category with at least a portion of the experience within the last 2 years.

  • Desired Education: Master’s degree in an area related to the labor category from a college or university accredited by an agency recognized by the U.S. Department of Education; or have Bachelor’s degree related to the labor category from a college or university accredited by an agency recognized by the U.S. Department of Education and an additional 5 years of related senior experience, for a total of 17 years, as a substitute to the Master’s degree.




Security Clearance


  • TS SCI

SIA3CybercomJ2TO
Data Engineer ASC008
Springfield, VA
Immediate
04/12/2022

Data Engineer:




Basic Qualifications:


  • 3+ years of experience with data engineering and data wrangling

  • Experience with programming languages such as Python, Javascript, Spark or R

  • Experience with data engineering tools, including Databricks, ElasticSearch, or Apache NiFi

  • Experience with data lakes, data warehouses, or data lake houses

  • TS/SCI required

 



Additional Qualifications:


  • Experience with consulting directly with clients

  • Experience with cloud services like AWS and enterprise DataOps, DevSecOps, and MLOps processes to operationalize and monitor data science models

  • Experience with CI/CD, including Git, Jenkins, and Docker

  • Knowledge of the software development life cycle, testing, and version control




Security Clearance:


  • TS SCI

ASC
Senior Analytic Methodologist MACS014
Springfield, VA
Immediate
04/07/2022

Senior Analytic Methodologist:




Skills and Experience:


  • Advanced formal training Operations Research and/or Program Management.  

  • Demonstrated experience leading team in deconstruction of a problem statement, and developing plan to articulate possible strategies to enable solutions.

  • Practical experience demonstrating workflow improvement: tactics, techniques, and procedures

  • Ability to facilitate analytic methods review and documentation.

  • Demonstrated hypothesis generation and testing skills.

  • Knowledge of GEOINT sensors and collection parameters.

  • Demonstrated strong writing and briefing skills consistent with national-level performance; this includes the skills needed to prepare NGA and/or Intelligence Community reports. 




Years of Experience:  


  • 10 to 20 (bachelor’s degree in a field related to the support services may count for up to four years of this experience.  A master’s degree in a field related to the support services may count for up to two additional years of this experience.)




Duties:


  • Experience in the Intelligence Community (IC) leading an integrated team of professionals to address key intelligence questions by introducing documented analytic methodologies

  • Experience with implementing and executing methodologies to enable customer satisfaction

  • Experience with data visualization, including matrix analytics, network analytics, or graphing data

  • Knowledge of advanced analytic methodologies

  • Knowledge of intelligence operations and GEOINT phenomenology

  • Knowledge of Activity-based Intelligence (ABI), Structured Observation Management (SOM), automation, scripting, data analysis, and a GEOINT methodology to help integrate statistically sound data analytics into GEOINT missions




Desired Experience


  • Python or other scripting languages to structure data for complex analysis




Desired Education


  • Bachelor's degree in Analytical Research Methodologies, Statistical Analysis, Earth Science, Geography, Remote Sensing, or a Geospatial Intelligence field




Security Clearance:


  • TS SCI CI poly

  • A CI Polygraph is required, but the candidate may start work and schedule the polygraph within the first 30 days. 



MACSS
Senior Principal Cyber System Engineer Administrator TALO058
Herndon, VA
Immediate
04/05/2022

Senior Principal Cyber Systems Engineer/Administrator:



Job Description



The selected Systems Administrator will work on site in the program’s Herndon SCIF 4 or 5 days/week and serve as a privileged user/PUA for assessments and other activities.




Duties include:


  • Creating and following DevOps procedures using tools such as Jenkins, Ansible, and AWS CloudFormation.

  • Assisting in conducting certification and accreditation assessment and authorization (A&A) on applications IAW within RMF.

  • Implementing, verifying, and maintaining DISA STIG compliance, including implementing automated STIG compliance.

  • Supporting ISSOs with technical expertise

  • Creating and updating documents and diagrams required to fulfill security accreditation requirements.

  • Willing to learn new technologies and ask for help when stuck




Required Qualifications:


  • A Bachelor’s degree with 9+ years of relevant experience OR a Master’s degree with 7 years of relevant experience OR a PhD with 4 years of relevant experience; an additional 4 years of experience maybe considered in lieu of a degree requirement.

  • Experience with developing, deploying, monitoring, and troubleshooting AWS cloud-based software solutions.

  • Hands-on system administrator.

  • Security+ or other IAT Level II certification (required to obtain PUA).

  • Active TS/SCI CI Poly




Desired Qualifications:


  • Experience with AWS CloudFormation.

  • Knowledge of scripting languages, such as Bash and Python.

  • Basic understanding of an Object-Oriented Programming Language, preferably Java.

  • Experience with Chef, Ansible, or Terraform for automation and configuration.

  • Experience integrating Jenkins and Docker for automated CI/CD pipelines

  • Basic understanding of Kubernetes or OpenShift Container Platform.

  • Experience with Git for Source Control.

  • Experience with one or more of these technologies is a bonus: Kafka, JumpMind, Immuta, Axway, NiFi (especially tuning NiFi)


TALOS
Program Security Representative 2 ARTH232
Pentagon, VA
Closed
04/02/2022

Program Security Representative 2:



The Program Security Representative’s primary function is to provide multi-discipline security support for one or more of the customer’s Special Access Programs (SAPs).  The position will provide “day-to-day” multi-discipline analysis for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.




Performance shall include:



•Ensure strict adherence to the provisions of the NISPOM, its Supplement, the DoD Overprint, DCID, ICD, and SAP policy

•Assist in developing and executing approved policies and procedures for safeguarding Special Access Program (SAP), Sensitive Compartmented Information (SCI) and collateral data in support of US military operations

•Provide day-to-day security support that includes continuous assessment of procedures to identify shortfalls and provide appropriate recommendations for revising and improving security policies, procedures, and systems

•Identify vulnerabilities, threats, and risks to test, training, and operational activities

•Assist in developing, implementing, and training the Operations Security program

•Assist in providing contractor and subordinate facility assistance and oversight

•Brief all levels of personnel, both in the government and senior civilian services, on a variety of security related topics

•Conduct and document SAP facility compliance reviews, follow-on facility reviews, and facility close-outs

•Monitor, report and track all corrective actions resulting from compliance reviews

•Ensure timely notification of pertinent security matters to program technical and management staff

•Conduct exploration of any loss, compromise, or suspected compromise of classified and/or sensitive information, including conducting preliminary inquiries and generating damage assessments resulting from the loss of classified information

•Coordinate with SAP security personnel to ensure lessons learned are incorporated into the curriculum for the SAP security education & awareness program




Experience:



•8 – 10 years related experience

•Security Fundamentals Professional Certification (SFPC) counts towards 3 years of experience

•Special Program Security Certification (SPSC) counts towards 5 years of experience

•Maximum equivalent experience for SPED Certifications is no more than 5 years




Education:



•Bachelor’s degree in a related area or equivalent experience (4 years)




Security Clearance:



•Current Top Secret Clearance with SCI Eligibility

•Eligibility for access to Special Access Program Information

•Willingness to submit to a Counterintelligence polygraph

Arthur
Program Security Representative 2 ARTH231
JBAB, Washington DC
Closed
04/02/2022

Program Security Representative 2:



The Program Security Representative’s primary function is to provide multi-discipline security support for one or more of the customer’s Special Access Programs (SAPs).  The position will provide “day-to-day” multi-discipline analysis for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.




Performance shall include:



•Ensure strict adherence to the provisions of the NISPOM, its Supplement, the DoD Overprint, DCID, ICD, and SAP policy

•Assist in developing and executing approved policies and procedures for safeguarding Special Access Program (SAP), Sensitive Compartmented Information (SCI) and collateral data in support of US military operations

•Provide day-to-day security support that includes continuous assessment of procedures to identify shortfalls and provide appropriate recommendations for revising and improving security policies, procedures, and systems

•Identify vulnerabilities, threats, and risks to test, training, and operational activities

•Assist in developing, implementing, and training the Operations Security program

•Assist in providing contractor and subordinate facility assistance and oversight

•Brief all levels of personnel, both in the government and senior civilian services, on a variety of security related topics

•Conduct and document SAP facility compliance reviews, follow-on facility reviews, and facility close-outs

•Monitor, report and track all corrective actions resulting from compliance reviews

•Ensure timely notification of pertinent security matters to program technical and management staff

•Conduct exploration of any loss, compromise, or suspected compromise of classified and/or sensitive information, including conducting preliminary inquiries and generating damage assessments resulting from the loss of classified information

•Coordinate with SAP security personnel to ensure lessons learned are incorporated into the curriculum for the SAP security education & awareness program




Experience:



•8 – 10 years related experience

•Security Fundamentals Professional Certification (SFPC) counts towards 3 years of experience

•Special Program Security Certification (SPSC) counts towards 5 years of experience

•Maximum equivalent experience for SPED Certifications is no more than 5 years




Education:



•Bachelor’s degree in a related area or equivalent experience (4 years)




Security Clearance:



•Current Top Secret Clearance with SCI Eligibility

•Eligibility for access to Special Access Program Information

•Willingness to submit to a Counterintelligence polygraph


Arthur
Activity Security Representative 3 ARTH230
Wright Patterson AFB, OH
Immediate
04/02/2022

Activity Security Representative 3:



The Activity Security Representative’s primary function is to provide multi-disciplined security support to a customer’s facility and organization.  The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.




Performance shall include:



•Classification reviews of inbound and outbound correspondence

•Assist in the maintenance of a document accountability database and associated correspondence

•Processing inbound and outbound classified mail and receipt records

•Perform destruction of classified materials

•Process magnetic media for accountability

•Reproduction support for classified materials

•Maintain various daily logs for a variety of administrative functions associated with document control

•Assist in the processing of inbound data and outbound data transfer files

•Transfer electronic data files to internal customers

•Maintain an extensive customer database point of contact listing

•Assist with researching, processing, filing, and maintaining inbound and outbound visit notices

•Escort facility visitors and maintains associated logs

•Assist in the preparation of facility access control badges

•Conduct entry and exit inspections

•Assist in the maintenance of facility access control entry systems, to include visitor control

•Perform data entry to the Personnel Access Security System database and maintain all customer sponsored billets and quota information

•Assist in maintaining personnel security files for all personnel of the supported element

•Follow and enforce the customer’s Standard Operating Procedures

•Provide support for the security awareness and education programs

•Perform miscellaneous administrative support functions as directed by the contractor site lead and/or the Senior Security Representative

•Review, track, and monitor security clearance processing activities with appropriate government personnel to achieve appropriate clearance actions

•Participate in Air Force SAP security compliance inspections of government organizations and industry

•Implement Top Secret Control for accountable material and associated correspondence

•Prepare and/or process inbound and outbound classified mail, faxes, courier packages and receipts

•Prepare, process, and/or review Program Access Request (PARs) for accuracy and access eligibility

•Execute Special Access Program Nomination Process Questionnaires

•Conduct Defense Central Index of Investigations (DCII), Joint Personnel Access System (JPAS), and SAPNP reviews of candidates being submitted for SAP access

•Perform data entry and record checks in the Air Force Access Data System (AFADS) and maintains all customer sponsored personnel access information current

•Perform indoctrinations

•Provide leadership, mentoring, and quality assurance for Team Members




Experience:



•5 - 7  years related experience

•Security Fundamentals Professional Certification (SFPC) counts towards 3 years of experience

•Special Program Security Certification (SPSC) counts towards 5 years of experience

•Maximum equivalent experience for SPED Certifications is no more than 5 years




Education:



•Bachelor’s degree or equivalent experience (4 years)




Certifications:



•Must complete the DoD SAPCO approved SAPNP training (if performing personnel security functions)




Security Clearance:



•Current Top Secret Clearance with SCI Eligibility

•Eligibility for access to Special Access Program Information

•Willingness to submit to a Counterintelligence polygraph


Arthur
Security Control Assessor 3 ARTH229
Pentagon, VA
Closed
04/02/2022

Security Control Assessor 3:



The SCA is responsible for conducting a comprehensive assessment of the management, operational, and technical security controls employed within or inherited by an IS to determine the overall effectiveness of the controls (i.e., the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting the security requirements for the system).  SCAs also provide an assessment of the severity of weaknesses or deficiencies discovered in the IS and its environment of operation and recommend corrective actions to address identified vulnerabilities. Responsibilities will cover Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities within the customer’s area of responsibility.




Performance shall include:



•Perform oversight of the development, implementation and evaluation of IS security program policy; special emphasis placed upon integration of existing SAP network infrastructure

•Perform assessment of ISs, based upon the Risk Management Framework (RMF) methodology in accordance with the Joint Special Access Program (SAP) Implementation Guide (JSIG)

•Advise the Information System Owner (ISO), Information Data Owner (IDO), Program Security Officer (PSO), and the Delegated and/or Authorizing Official (DAO/AO) on any assessment and authorization issues

•Evaluate Authorization packages and make recommendation to the AO and/or DAO for authorization

•Evaluate IS threats and vulnerabilities to determine whether additional safeguards are required

•Advise the Government concerning the impact levels for Confidentiality, Integrity, and Availability for the information on a system

•Ensure security assessments are completed and results documented and prepare the Security Assessment Report (SAR) for the Authorization boundary

•Initiate a Plan of Action and Milestones (POA&M) with identified weaknesses for each Authorization Boundaries assessed, based on findings and recommendations from the SAR

•Evaluate security assessment documentation and provide written recommendations for security authorization to the Government

•Discuss recommendation for authorization and submit the security authorization package to the AO/DAO

•Assess proposed changes to Authorization boundaries operating environment and mission needs to determine the continuation to operate.

•Review and concur with all sanitization and clearing procedures in accordance with Government guidance and/or policy

•Assist the Government compliance inspections

•Assist the Government with security incidents that relate to cybersecurity and ensure that the proper and corrective measures have been taken

•Ensure organization are addressing and conducting all phases of the system development life cycle (SDLC)

•Evaluate Hardware and Software to determine security impact that it might have on Authorization boundaries

•Evaluate the effectiveness and implementation of Continuous Monitoring Plans

•Evaluate the differences and have a working knowledge of Information Systems and Network Appliances operating at Protection Level 3 (PL3) and Protection Level 4 (PL4)

•Differentiate the differences between the various types of Cross-Domain Solutions (CDS)

•Assist with joint assessments of Cross-Domain Solutions with other DoD agencies




Experience:



•9 - 12 years related experience

•Minimum of nine (9) years’ experience in SAP, SCI or Collateral Information Systems (IS) Security and the implementation of regulations identified in the description of duties. 

•Prior performance in the role of ISSO and ISSM or SCA




Education:



•Bachelor’s degree in a related discipline or equivalent experience (4 years)




Certifications:



•Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level III or Information Assurance Manager Level III or  Information Assurance Architect and Engineer Level I within 6 months of the date of hire




Security Clearance:



•Current Top Secret Clearance with SCI Eligibility

•Eligibility for access to Special Access Program Information

•Willingness to submit to a Counterintelligence polygraph




Other Requirements:



•Must have expert knowledge of DoD, National and applicable service and agency security policy, manuals and standards Must have the ability to work in a dynamic environment and effectively interact with numerous DOD, military/civilian personnel and industry partners

•Mastery of Microsoft Office (Word, PowerPoint, and Excel)

•Must be able to regularly lift 50 lbs



Arthur
Program Security Representative 3 ARTH228
JBAB, Washington DC
Immediate
04/02/2022

Program Security Representative 3:



The Program Security Representative’s primary function is to provide multi-discipline security support for one or more of the customer’s Special Access Programs (SAPs).  The position will provide “day-to-day” multi-discipline analysis for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.




Performance shall include:



•Ensure strict adherence to the provisions of the NISPOM, its Supplement, the DoD Overprint, DCID, ICD, and SAP policy

•Assist in developing and executing approved policies and procedures for safeguarding Special Access Program (SAP), Sensitive Compartmented Information (SCI) and collateral data in support of US military operations

•Provide day-to-day security support that includes continuous assessment of procedures to identify shortfalls and provide appropriate recommendations for revising and improving security policies, procedures, and systems

•Identify vulnerabilities, threats, and risks to test, training, and operational activities

•Assist in developing, implementing, and training the Operations Security program

•Assist in providing contractor and subordinate facility assistance and oversight

•Brief all levels of personnel, both in the government and senior civilian services, on a variety of security related topics

•Conduct and document SAP facility compliance reviews, follow-on facility reviews, and facility close-outs

•Monitor, report and track all corrective actions resulting from compliance reviews

•Ensure timely notification of pertinent security matters to program technical and management staff

•Conduct exploration of any loss, compromise, or suspected compromise of classified and/or sensitive information, including conducting preliminary inquiries and generating damage assessments resulting from the loss of classified information

•Coordinate with SAP security personnel to ensure lessons learned are incorporated into the curriculum for the SAP security education & awareness program

•Provide leadership, mentoring, and oversight of team members




Experience:



•10 - 12 years related experience

•Security Fundamentals Professional Certification (SFPC) counts towards 3 years of experience

•Special Program Security Certification (SPSC) counts towards 5 years of experience

•Maximum equivalent experience for SPED Certifications is no more than 5 years




Education:



•Bachelor’s degree in a related area or equivalent experience (4 years)




Security Clearance:



•Current Top Secret Clearance with SCI Eligibility

•Eligibility for access to Special Access Program Information

•Willingness to submit to a Counterintelligence polygraph

Arthur
Program Security Representative 3 ARTH227
JBAB, Washington DC
Immediate
04/02/2022

Program Security Representative 3:



The Program Security Representative’s primary function is to provide multi-discipline security support for one or more of the customer’s Special Access Programs (SAPs).  The position will provide “day-to-day” multi-discipline analysis for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.




Performance shall include:



•Ensure strict adherence to the provisions of the NISPOM, its Supplement, the DoD Overprint, DCID, ICD, and SAP policy

•Assist in developing and executing approved policies and procedures for safeguarding Special Access Program (SAP), Sensitive Compartmented Information (SCI) and collateral data in support of US military operations

•Provide day-to-day security support that includes continuous assessment of procedures to identify shortfalls and provide appropriate recommendations for revising and improving security policies, procedures, and systems

•Identify vulnerabilities, threats, and risks to test, training, and operational activities

•Assist in developing, implementing, and training the Operations Security program

•Assist in providing contractor and subordinate facility assistance and oversight

•Brief all levels of personnel, both in the government and senior civilian services, on a variety of security related topics

•Conduct and document SAP facility compliance reviews, follow-on facility reviews, and facility close-outs

•Monitor, report and track all corrective actions resulting from compliance reviews

•Ensure timely notification of pertinent security matters to program technical and management staff

•Conduct exploration of any loss, compromise, or suspected compromise of classified and/or sensitive information, including conducting preliminary inquiries and generating damage assessments resulting from the loss of classified information

•Coordinate with SAP security personnel to ensure lessons learned are incorporated into the curriculum for the SAP security education & awareness program

•Provide leadership, mentoring, and oversight of team members




Experience:



•10 - 12 years related experience

•Security Fundamentals Professional Certification (SFPC) counts towards 3 years of experience

•Special Program Security Certification (SPSC) counts towards 5 years of experience

•Maximum equivalent experience for SPED Certifications is no more than 5 years




Education:



•Bachelor’s degree in a related area or equivalent experience (4 years)




Security Clearance:



•Current Top Secret Clearance with SCI Eligibility

•Eligibility for access to Special Access Program Information

•Willingness to submit to a Counterintelligence polygraph


Arthur
Activity Security Representative 2 ARTH226
Hill AFB, UT
Closed
04/02/2022

Activity Security Representative 2:



The Activity Security Representative’s primary function is to provide multi-disciplined security support to a customer’s facility and organization.  The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.




Performance shall include:



•Classification reviews of inbound and outbound correspondence

•Assist in the maintenance of a document accountability database and associated correspondence

•Processing inbound and outbound classified mail and receipt records

•Perform destruction of classified materials

•Process magnetic media for accountability

•Reproduction support for classified materials

•Maintain various daily logs for a variety of administrative functions associated with document control

•Assist in the processing of inbound data and outbound data transfer files

•Transfer electronic data files to internal customers

•Maintain an extensive customer database point of contact listing

•Assist with researching, processing, filing, and maintaining inbound and outbound visit notices

•Escort facility visitors and maintains associated logs

•Assist in the preparation of facility access control badges

•Conduct entry and exit inspections

•Assist in the maintenance of facility access control entry systems, to include visitor control

•Perform data entry to the Personnel Access Security System database and maintain all customer sponsored billets and quota information

•Assist in maintaining personnel security files for all personnel of the supported element

•Follow and enforce the customer’s Standard Operating Procedures

•Provide support for the security awareness and education programs

•Perform miscellaneous administrative support functions as directed by the contractor site lead and/or the Senior Security Representative

•Review, track, and monitor security clearance processing activities with appropriate government personnel to achieve appropriate clearance actions

•Participate in Air Force SAP security compliance inspections of government organizations and industry

•Implement Top Secret Control for accountable material and associated correspondence

•Prepare and/or process inbound and outbound classified mail, faxes, courier packages and receipts

•Prepare, process, and/or review Program Access Request (PARs) for accuracy and access eligibility

•Execute Special Access Program Nomination Process Questionnaires

•Conduct Defense Central Index of Investigations (DCII), Joint Personnel Access System (JPAS), and SAPNP reviews of candidates being submitted for SAP access

•Perform data entry and record checks in the Air Force Access Data System (AFADS) and maintains all customer sponsored personnel access information current

•Perform indoctrinations




Experience:



•3-5  years related experience

•Security Fundamentals Professional Certification (SFPC) counts towards 3 years of experience

•Special Program Security Certification (SPSC) counts towards 5 years of experience

•Maximum equivalent experience for SPED Certifications is no more than 5 years




Education:



•Bachelor’s degree or equivalent experience (4 years)




Certifications:



•Must complete the DoD SAPCO approved SAPNP training (if performing personnel security functions)




Security Clearance:



•Current Top Secret Clearance with SCI Eligibility

•Eligibility for access to Special Access Program Information

•Willingness to submit to a Counterintelligence polygraph





Arthur
Information System Security Officer 1 ARTH225
Truax Field Madison, WI
Immediate
04/02/2022

Information System Security Officer 1:



The ISSO is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO.  The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is assigned responsibility for the day-to-day security operations of a system.  This also will include physical and environmental protection, personnel security, incident handling, and security training and awareness. It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configuration management across authorization boundaries.  This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts.  The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.




Performance shall include:



•Assist the ISSM in meeting their duties and responsibilities

•Prepare, review, and update authorization packages

•Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media

•Notify ISSM when changes occur that might affect the authorization determination of the information system(s)

•Conduct periodic reviews of information systems to ensure compliance with the security authorization package

•Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change

•Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly

•Ensure all IS security-related documentation is current and accessible to properly authorized individuals

•Ensure audit records are collected, reviewed, and documented (to include any anomalies)

•Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties

•Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans

•Identify cyber security vulnerabilities and assist with the implementation of the countermeasures for them

•Prepare reports on the status of security safeguards applied to computer systems

•Perform ISSO duties in support of in-house and external customers




Experience:



•1 - 2 years related experience

•Prior performance in roles such as System or Network Administrator




Education:



•Bachelor’s degree or equivalent experience (4 years)




Certifications:



•Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level I or Information Assurance Manager I within 6 months of the date of hire




Security Clearance:



•Current Top Secret Clearance with SCI Eligibility

•Eligibility for access to Special Access Program Information

•Willingness to submit to a Counterintelligence polygraph




Other Requirements:



•Must be able to regularly lift up to 50 lbs


Arthur
Information Systems Security Officer 2 ARTH224
Colorado Springs, CO
Closed
04/02/2022

Information Systems Security Officer 2:



The ISSO is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO.  The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is assigned responsibility for the day-to-day security operations of a system. This also will include physical and environmental protection, personnel security, incident handling, and security training and awareness.  It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configuration management across authorization boundaries.  This will include assessing the security impact of those changes and making recommendation to the ISSM.  The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts.  The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.




Performance shall include:



•Assist the ISSM in meeting their duties and responsibilities

•Prepare, review, and update authorization packages

•Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media

•Notify ISSM when changes occur that might affect the authorization determination of the information system(s)

•Conduct periodic reviews of information systems to ensure compliance with the security authorization package

•Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change

•Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly

•Ensure all IS security-related documentation is current and accessible to properly authorized individuals

•Ensure audit records are collected, reviewed, and documented (to include any anomalies)

•Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties

•Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans

•Identify cyber security vulnerabilities and assist with the implementation of the countermeasures for them

•Prepare reports on the status of security safeguards applied to computer systems

•Perform ISSO duties in support of in-house and external customers

•Conduct security impact analysis activities and provide to the ISSM on all configuration management changes to the authorization boundaries




Experience:



•2 - 5 years related experience

•Prior performance in roles such as System, Network Administrator or ISSO




Education:



•Bachelor’s degree or equivalent experience (4 years)




Certifications:



•Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level II or Information Assurance Manager II within 6 months of the date of hire




Security Clearance:



•Current Top Secret Clearance with SCI Eligibility

•Eligibility for access to Special Access Program Information

•Willingness to submit to a Counterintelligence polygraph




Other Requirements



•Must be able to regularly lift up to 50 lbs


Arthur
Information System Security Officer 2 ARTH223
Hanscom AFB, MA
Immediate
04/02/2022

Information System Security Officer 2:



The ISSO is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO.  The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is assigned responsibility for the day-to-day security operations of a system. This also will include physical and environmental protection, personnel security, incident handling, and security training and awareness.  It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configuration management across authorization boundaries.  This will include assessing the security impact of those changes and making recommendation to the ISSM.  The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts.  The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.




Performance shall include:



•Assist the ISSM in meeting their duties and responsibilities

•Prepare, review, and update authorization packages

•Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media

•Notify ISSM when changes occur that might affect the authorization determination of the information system(s)

•Conduct periodic reviews of information systems to ensure compliance with the security authorization package

•Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change

•Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly

•Ensure all IS security-related documentation is current and accessible to properly authorized individuals

•Ensure audit records are collected, reviewed, and documented (to include any anomalies)

•Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties

•Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans

•Identify cyber security vulnerabilities and assist with the implementation of the countermeasures for them

•Prepare reports on the status of security safeguards applied to computer systems

•Perform ISSO duties in support of in-house and external customers

•Conduct security impact analysis activities and provide to the ISSM on all configuration management changes to the authorization boundaries




Experience:



•2 - 5 years related experience

•Prior performance in roles such as System, Network Administrator or ISSO




Education:



•Bachelor’s degree or equivalent experience (4 years)




Certifications:



•Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level II or Information Assurance Manager II within 6 months of the date of hire




Security Clearance:



•Current Top Secret Clearance with SCI Eligibility

•Eligibility for access to Special Access Program Information

•Willingness to submit to a Counterintelligence polygraph




Other Requirements



•Must be able to regularly lift up to 50 lbs



Arthur
Network System Administrator 3 ARTH222
Schriever AFB, CO
Closed
04/02/2022

Network System Administrator 3:



The primary function will be to organize, install, and support government organization’s computer systems, including local area networks (LANs), wide area networks (WANs), network segments, intranets, and other data communication systems. This will also include helping architect, design and analyze network models. It will require participation in decisions about buying future hardware or software to upgrade organization’s infrastructure. This position might be called upon to provide technical support to computer users to help solve users’ problems. This position will support activities within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.




Performance shall include:



•Able to perform self-sustaining and work with little to no oversight

•Lead IT ops team on day to day management and operations of Networks and implement capabilities vetted through Cybersecurity, ISSE and higher headquarters to maintain JSIG/RMF Authority to Operate and maintain Continuous Monitoring tools and processes

•Manage COTS & GOTS products to collect, display and remediate a variety of automated system security and system operations/performance functions and metrics.

•Assist during security assessments of servers/network devices/security appliances

•Assist during security assessments with regard to accuracy and efficiency

•Assist with Creation of operational Operations and Maintenance (O&M) checklists to maintain the service (daily, weekly, monthly, yearly O&M checklists); build Tactics, Techniques and Processes (TTPs) and Standard Operating Processes (SOPs) associated with service checklists

•Manage and operate monitoring tools/capabilities with the enterprise security information and event management (SIEM) and create/tailor complex event alarms/rules and summary reports

•Execute cybersecurity operations procedures for day to day network management, operations and maintenance

•Monitor/analyze output of cybersecurity related tools for reportable security incidents and residual risk

•Assist in analyzing technical risk, upon request, of emerging cybersecurity tools and processes

•Work as part of a security incident response team as needed

•Assist ISSM/ISSO/ISSE  with the Integration/Development new techniques to improve Confidentiality, Integrity, and Availability for networks/systems operating at various classification levels

•Advanced technical competency in one or more of the following supported platforms: Microsoft Windows Server, Active Directory Red Hat Enterprise Linux servers, MS Hyper-V/VMWare/ESx/Xen Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems, forensic analysis/vulnerability assessment, Group Policy management and configuration, Scripting, BMC Footprints, WSUS, , Lumension, Bitlocker, SQL Server 2012, TomCat, IIS, Windows Server 2012r2/2016, Win 10, Red Hat 6.5, Microsoft Office

•Toolkits, SEIMs, Logrhythm, ACAS/Nessus/SCAP, mandatory/role-based access control concepts (e. g. SE Linux extensions to RHEL, PitBull, AppArmor, and Sentris) , video teleconferencing/VOIP, Oracle/MS SQL database security, and Apache/IIS Web server security




Experience:



•5 - 7 years related experience




Education:



•Bachelor’s degree in a related area or equivalent experience (4 years)




Certifications:



•Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level III within 6 months of the date of hire




Security Clearance



•Current Top Secret Clearance with SCI Eligibility

•Eligibility for access to Special Access Program Information

•Willingness to submit to a Counterintelligence polygraph




Other Requirements:



•Thorough knowledge of Microsoft Windows desktop and server operating systems, Microsoft Exchange Server, and as needed RHEL operating systems administration and associated hardware

•Experience in effective communication and collaborating in a high performance team environment.

•Group Policy design and configuration

•Working knowledge of CISCO network and switching and virtualization technologies

•Working knowledge of virtualization as it applies to users environments, operating systems, and network appliances

•Working knowledge of Local Area Network (LAN) and Wide Area Network (WAN) technologies and data backup technologies

•Working knowledge communication security (COMSEC) policies and integration

•Working knowledge of Risk Management Framework, Common Criteria, and System Security Policy as they relate to assessments and authorization

•Working knowledge and current relevant experience with PL2, PL3, and PL4 network environments/systems

•Working knowledge of WSUS and/or YUM patch deployment methodologies

•Must be familiar with DoD policy as it applies to implementing and executing system and network administration

•Working knowledge of Risk Management Framework and how to apply it to network/information system environments

•Must be able to regularly lift up to 50 lbs


Arthur
Network System Administrator 2 ARTH221
Schriever AFB, CO
Closed
04/02/2022

Network System Administrator 2 :



The primary function will be to organize, install, and support government organization’s computer systems, including local area networks (LANs), wide area networks (WANs), network segments, intranets, and other data communication systems. This will also include helping architect, design and analyze network models. It will require participation in decisions about buying future hardware or software to upgrade organization’s infrastructure. This position might be called upon to provide technical support to computer users to help solve users’ problems. This position will support activities within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.




Performance shall include:



•Ability to operate under minimal supervision

•Execute day to day management and operations of systems and networks

•Manage COTS & GOTS products to collect, display and remediate a variety of automated system security and system operations/performance functions and metrics

•Follow Operations and Maintenance (O&M) checklists to maintain the service (daily, weekly, monthly, yearly O&M checklists); build Tactics, Techniques and Processes (TTPs) and Standard Operating Processes (SOPs) associated with service checklists

•Operate monitoring tools/capabilities with the enterprise security information and event management (SIEM) and create/tailor complex event alarms/rules and summary reports

•Assist in analyzing technical risk, upon request, of emerging cybersecurity tools and processes

•Work as part of a security incident response team as needed

•Working technical competency in one or more of the following supported platforms: Microsoft Windows Server, Red Hat Enterprise Linux servers, MS Hyper-V/VMWare/ESx/Xen Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems, forensic analysis/vulnerability assessment, Group Policy management and configuration, Scripting, BMC Footprints, WSUS, , Lumension, Bitlocker, SQL Server 2012, TomCat, IIS, Windows Server 2012r2/2016, Win 10, Red Hat 6.5, Microsoft Office

•Toolkits, SEIMs, Logrhythm, ACAS/Nessus/SCAP, mandatory/role-based access control concepts (e. g. SE Linux extensions to RHEL, PitBull, AppArmor, and Sentris) , video teleconferencing/VOIP, Oracle/MS SQL database security, and Apache/IIS Web server security




Experience:



•3 - 5 years related experience

Education:

•Bachelor’s degree in a related area or equivalent experience (4 years)

Certifications:

•Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level II within 6 months of the date of hire




Security Clearance



•Current Top Secret Clearance with SCI Eligibility

•Eligibility for access to Special Access Program Information

•Willingness to submit to a Counterintelligence polygraph




Other Requirements:



•Thorough knowledge of Microsoft Windows desktop and server operating systems, Microsoft Exchange Server, and as needed RHEL operating systems administration and associated hardware

•Working knowledge of CISCO network and switching and virtualization technologies

•Working knowledge of Local Area Network (LAN) and Wide Area Network (WAN) technologies and data backup technologies

•Working knowledge communication security (COMSEC) policies and integration

•Working knowledge of Risk Management Framework, Common Criteria, and System Security Policy as they relate to assessments and authorization

•Working knowledge and current relevant experience with PL2 and PL3 network environments/systems

•Experience providing technical support in a customer service role

•Experience applying industry standards and best practices in an enterprise-level Windows system environment. 

•Experience solving technical problems quickly and identifying opportunities to automate repetitive processes. 

•Working knowledge of WSUS and/or YUM patch deployment methodologies

•Must be familiar with DoD policy as it applies to implementing and executing system and network administration

•Must be able to regularly lift up to 50 lbs


Arthur
Information Technology Information Assurance 1 ARTH220
Schriever AFB, CO
Closed
04/02/2022

Information Technology Information Assurance 1:



The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts.  The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.




Performance shall include:



•Establish complex operational software configuration controls and system interfaces for computer system(s) assigned

•Maintain file servers, Firewalls, network access, Security Monitoring Systems and system documentation as required

•Analyze and troubleshoot system anomalies to ensure optimum equipment performance

•Prepare system for operational use and support operational tests

•Review, prepare, and update authorization packages

•Notify customer when changes occur that might affect authorization accreditation

•Conduct cybersecurity portion of the self-inspection’s checklist

•Review and provide technical and cyber security coordination on all Bodies of Evidence that make-up the authorization package

•Identify any and all vulnerabilities and implement countermeasures

•Ensure information systems and network appliances are operated, maintained, and disposed of in accordance with security policies and practices

•Perform Video-Teleconferencing VTC System Administration, Scheduling, & Configuration

•Provide External Information System(s) Client Support

•Perform account creations, changes, & deletions on multiple authorization boundaries

•Perform Help Desk & troubleshooting activities

•Perform Hardware/Software System Configuration, upgrades and modifications

•Perform system and network appliance patching activities

•Provide Government-Issued Laptop Support

•Assist in Media Control & Accountability activities

•Perform COMSEC account/equipment management activities




Experience:



•2 - 5 years related experience

•Prior performance in roles such as System or Network Administrator




Education:



•Bachelor’s degree or equivalent experience (4 years)




Certifications:



•Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level I or Information Assurance Manager I within 6 months of the date of hire.




Security Clearance



•Current Top Secret Clearance with SCI Eligibility

•Eligibility for access to Special Access Program Information

•Willingness to submit to a Counterintelligence polygraph




Other Requirements:



•Thorough knowledge of Microsoft Windows 2012R2 Server, Microsoft Exchange Server 2010/2016, Microsoft Windows 7/10 operating systems (OS) administration and associated hardware

•Working knowledge of Local Area Network (LAN) and Wide Area Network (WAN) technologies and data backup technologies to include communication security (COMSEC) integration

•Working knowledge of Risk Management Framework, Common Criteria, and System Security Policy as they relate to Assessments and Authorizations

•Working knowledge and current relevant experience with PL2 systems

•Must be able to regularly lift up to 50 lbs


Arthur
Security Education and Training Specialist ARTH219
Schriever AFB, CO
Closed
04/02/2022

Security Education and Training Specialist:



The primary function is to implement a community-wide security education, awareness, and training program within the Air Force Special Access Program community.




Performance shall include:



•Interpret customer needs and through collaboration with subject matter experts and independent research, support the development of effective, high-quality training materials on matters pertaining to the full scope of the JAFAN and DCID series of publications

•Incorporate Executive Orders and any other applicable regulatory documentation governing the protection of national security information by program accessed personnel and Career security professional into the education and awareness program

•Support the development, dissemination and presentation of security education materials that provide blended learning opportunities. Materials may include training plans, briefings, slides, newsletter, web-based products, refresher training, and specialized training for all classification levels and accesses

•Serve as a member of the Special Programs Security Education Council

•Coordinate with external security educators to obtain education materials for dissemination to industry

•Support the development and implementation of web-based security education and awareness tools

•Evaluate security education and awareness program efficiency by identifying and gathering performance improvement metrics

•Develop recommended improvements




Experience:



•8 - 10 years related experience

Education:

•Bachelor’s degree in a related area or equivalent experience (4 years)




Security Clearance



•Current Top Secret Clearance with SCI Eligibility

•Eligibility for access to Special Access Program Information

•Willingness to submit to a Counterintelligence polygraph


Arthur
Activity Security Representative 2 ARTH218
Kirtland AFB, NM
Closed
04/01/2022

Activity Security Representative 2:



Performance shall include:



•Classification reviews of inbound and outbound correspondence

•Assist in the maintenance of a document accountability database and associated correspondence

•Processing inbound and outbound classified mail and receipt records

•Perform destruction of classified materials

•Process magnetic media for accountability

•Reproduction support for classified materials

•Maintain various daily logs for a variety of administrative functions associated with document control

•Assist in the processing of inbound data and outbound data transfer files

•Transfer electronic data files to internal customers

•Maintain an extensive customer database point of contact listing

•Assist with researching, processing, filing, and maintaining inbound and outbound visit notices

•Escort facility visitors and maintains associated logs

•Assist in the preparation of facility access control badges

•Conduct entry and exit inspections

•Assist in the maintenance of facility access control entry systems, to include visitor control

•Perform data entry to the Personnel Access Security System database and maintain all customer sponsored billets and quota information

•Assist in maintaining personnel security files for all personnel of the supported element

•Follow and enforce the customer’s Standard Operating Procedures

•Provide support for the security awareness and education programs

•Perform miscellaneous administrative support functions as directed by the contractor site lead and/or the Senior Security Representative

•Review, track, and monitor security clearance processing activities with appropriate government personnel to achieve appropriate clearance actions

•Participate in Air Force SAP security compliance inspections of government organizations and industry

•Implement Top Secret Control for accountable material and associated correspondence

•Prepare and/or process inbound and outbound classified mail, faxes, courier packages and receipts

•Prepare, process, and/or review Program Access Request (PARs) for accuracy and access eligibility

•Execute Special Access Program Nomination Process Questionnaires

•Conduct Defense Central Index of Investigations (DCII), Joint Personnel Access System (JPAS), and SAPNP reviews of candidates being submitted for SAP access

•Perform data entry and record checks in the Air Force Access Data System (AFADS) and maintains all customer sponsored personnel access information current

•Perform indoctrinations




Experience:



•3-5  years related experience

•Security Fundamentals Professional Certification (SFPC) counts towards 3 years of experience

•Special Program Security Certification (SPSC) counts towards 5 years of experience

•Maximum equivalent experience for SPED Certifications is no more than 5 years




Education:



•Bachelor’s degree or equivalent experience (4 years)




Certifications:



•Must complete the DoD SAPCO approved SAPNP training (if performing personnel security functions)




Security Clearance:



•Current Top Secret Clearance with SCI Eligibility

•Eligibility for access to Special Access Program Information

•Willingness to submit to a Counterintelligence polygraph


Arthur
Information System Security Manager 2 ARTH217
Crystal City, VA
Closed
04/01/2022

Information System Security Manager 2:



The ISSM’s primary function serves as a principal advisor on all matters, technical and otherwise, involving the security of information systems under their purview.  Primary support will be working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense, and Military Compartment efforts.  The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.




Performance shall include:



•Perform oversight of the development, implementation and evaluation of information system security program policy; special emphasis placed upon integration of existing SAP network infrastructures

•Develop and oversee operational information systems security implementation policy and guidelines of network security, based upon the Risk Management Framework (RMF) with emphasize on Joint Special Access Program Implementation Guide (JSIG) authorization process

•Advise customer on Risk Management Framework (RMF) assessment and authorization issues

•Perform risk assessments and make recommendations to DoD agency customers

•Advise government program managers on security testing methodologies and processes

•Evaluate authorization documentation and provide written recommendations for authorization to government PM’s

•Develop and maintain a formal Information Systems Security Program

•Ensure that all IAOs, network administrators, and other cyber security personnel receive the necessary technical and security training to carry out their duties

•Develop, review, endorse, and recommend action by the AO or DAO of system assessment documentation

•Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media

•Develop and execute security assessment plans that include verification that the features and assurances required for each protection level functioning

•Maintain a and/or applicable repository for all system authorization documentation and modifications

•Develop policies and procedures for responding to security incidents, to include investigating and reporting security violations and incidents

•Ensure proper protection or corrective measures have been taken when an incident or vulnerability has been discovered within a system

•Ensure that data ownership and responsibilities are established for each authorization boundary, to include accountability, access rights, and special handling requirements

•Ensure development and implementation of an information security education, training, and awareness program, to include attending, monitoring, and presenting local cyber security training.

•Evaluate threats and vulnerabilities to ascertain whether additional safeguards are needed

•Assess changes in the system, its environment, and operational needs that could affect the authorization

•Ensure that authorization is accomplished a valid Authorization determination has been given for all authorization boundaries under your purview

•Review AIS assessment plans

•Coordinate with PSO or cognizant security official on approval of external information systems (e.g., guest systems, interconnected system with another organization)

•Conduct periodic assessments of the security posture of the authorization boundaries

•Institute and implement a Configuration Control Board (CCB) charter

•Ensure configuration management (CM) for security-relevant changes to software, hardware, and firmware and that they are properly documented

•Ensure periodic testing is conducted to evaluate the security posture of IS by employing various intrusion/attack detection and monitoring tools (shared responsibility with ISSOs)

•Ensure that system recovery and reconstitution processes developed and monitored to ensure that the authorization boundary can be recovered based on its availability level determination

•Ensure all authorization documentation is current and accessible to properly authorized individuals

•Ensure that system security requirements are addressed during all phases of the system life cycle

•Participate in self-inspections

•Periodically review system security to accommodate changes to policy or technology

•Coordinate all technical security issues outside of area of expertise or responsibility with ISSE

•Provide expert research and analysis in support of expanding programs and area of responsibility as it pertains to cyber security and information technology activities

•Develop Assured File Transfers (AFT) on accordance with the JSIG

•Provide leadership, mentoring, and quality assurance for Cyber Security and Information Technology team members




Experience:



•7 - 9 years related experience

•Prior performance in roles such as ISSO or ISSM




Education:



•Bachelor’s degree or equivalent experience (4 years)




Certifications:



•Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level 2 or Information Assurance Manager Level 2 within 6 months of the date of hire




Security Clearance:



•Current Top Secret Clearance with SCI Eligibility

•Eligibility for access to Special Access Program Information

•Willingness to submit to a Counterintelligence polygraph




Other Requirements:



•Must be able to regularly lift up to 50 lbs


Arthur
Activity Security Representative 2 ARTH216
Peterson AFB, CO
Closed
04/01/2022

Activity Security Representative 2:



The Activity Security Representative’s primary function is to provide multi-disciplined security support to a customer’s facility and organization.  The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.




Performance shall include:



•Classification reviews of inbound and outbound correspondence

•Assist in the maintenance of a document accountability database and associated correspondence

•Processing inbound and outbound classified mail and receipt records

•Perform destruction of classified materials

•Process magnetic media for accountability

•Reproduction support for classified materials

•Maintain various daily logs for a variety of administrative functions associated with document control

•Assist in the processing of inbound data and outbound data transfer files

•Transfer electronic data files to internal customers

•Maintain an extensive customer database point of contact listing

•Assist with researching, processing, filing, and maintaining inbound and outbound visit notices

•Escort facility visitors and maintains associated logs

•Assist in the preparation of facility access control badges

•Conduct entry and exit inspections

•Assist in the maintenance of facility access control entry systems, to include visitor control

•Perform data entry to the Personnel Access Security System database and maintain all customer sponsored billets and quota information

•Assist in maintaining personnel security files for all personnel of the supported element

•Follow and enforce the customer’s Standard Operating Procedures

•Provide support for the security awareness and education programs

•Perform miscellaneous administrative support functions as directed by the contractor site lead and/or the Senior Security Representative

•Review, track, and monitor security clearance processing activities with appropriate government personnel to achieve appropriate clearance actions

•Participate in Air Force SAP security compliance inspections of government organizations and industry

•Implement Top Secret Control for accountable material and associated correspondence

•Prepare and/or process inbound and outbound classified mail, faxes, courier packages and receipts

•Prepare, process, and/or review Program Access Request (PARs) for accuracy and access eligibility

•Execute Special Access Program Nomination Process Questionnaires

•Conduct Defense Central Index of Investigations (DCII), Joint Personnel Access System (JPAS), and SAPNP reviews of candidates being submitted for SAP access

•Perform data entry and record checks in the Air Force Access Data System (AFADS) and maintains all customer sponsored personnel access information current

•Perform indoctrinations




Experience:


•3-5  years related experience

•Security Fundamentals Professional Certification (SFPC) counts towards 3 years of experience

•Special Program Security Certification (SPSC) counts towards 5 years of experience

•Maximum equivalent experience for SPED Certifications is no more than 5 years




Education:



•Bachelor’s degree or equivalent experience (4 years)




Certifications:



•Must complete the DoD SAPCO approved SAPNP training (if performing personnel security functions)




Security Clearance:



•Current Top Secret Clearance with SCI Eligibility

•Eligibility for access to Special Access Program Information

•Willingness to submit to a Counterintelligence polygraph


Arthur
Security Control Assessor 2 ARTH215
Hanscom AFB, MA
Closed
04/01/2022

Security Conrol Assessor 2:



The SCA is responsible for conducting a comprehensive assessment of the management, operational, and technical security controls employed within or inherited by an IS to determine the overall effectiveness of the controls (i.e., the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting the security requirements for the system).  SCAs also provide an assessment of the severity of weaknesses or deficiencies discovered in the IS and its environment of operation and recommend corrective actions to address identified vulnerabilities. Responsibilities will cover Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities within the customer’s area of responsibility.




Performance shall include:



•Perform oversight of the development, implementation and evaluation of IS security program policy; special emphasis placed upon integration of existing SAP network infrastructure

•Perform assessment of ISs, based upon the Risk Management Framework (RMF) methodology in accordance with the Joint Special Access Program (SAP) Implementation Guide (JSIG)

•Advise the Information System Owner (ISO), Information Data Owner (IDO), Program Security Officer (PSO), and the Delegated and/or Authorizing Official (DAO/AO) on any assessment and authorization issues

•Evaluate Authorization packages and make recommendation to the AO and/or DAO for authorization

•Evaluate IS threats and vulnerabilities to determine whether additional safeguards are required

•Advise the Government concerning the impact levels for Confidentiality, Integrity, and Availability for the information on a system

•Ensure security assessments are completed and results documented and prepare the Security Assessment Report (SAR) for the Authorization boundary

•Initiate a Plan of Action and Milestones (POA&M) with identified weaknesses for each Authorization Boundaries assessed, based on findings and recommendations from the SAR

•Evaluate security assessment documentation and provide written recommendations for security authorization to the Government

•Discuss recommendation for authorization and submit the security authorization package to the AO/DAO

•Assess proposed changes to Authorization boundaries operating environment and mission needs to determine the continuation to operate.

•Review and concur with all sanitization and clearing procedures in accordance with Government guidance and/or policy

•Assist the Government compliance inspections

•Assist the Government with security incidents that relate to cybersecurity and ensure that the proper and corrective measures have been taken

•Ensure organization are addressing and conducting all phases of the system development life cycle (SDLC)

•Evaluate Hardware and Software to determine security impact that it might have on Authorization boundaries

•Evaluate the effectiveness and implementation of Continuous Monitoring Plans

•Represent the customer on inspection teams




Experience:



•7 - 9 years related experience

•Minimum of four (4) years’ experience in SAP, SCI or Collateral Information Systems (IS) Security and the implementation of regulations identified in the description of duties. 

•Prior performance in the role of ISSO and ISSM or SCA




Education:



•Bachelor’s degree in a related discipline or equivalent experience (4 years)




Certifications:



•Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level III or Information Assurance Manager Level II within 6 months of the date of hire




Security Clearance:



•Current Top Secret Clearance with SCI Eligibility

•Eligibility for access to Special Access Program Information

•Willingness to submit to a Counterintelligence polygraph




Other Requirements



•Must be able to regularly lift 50lbs


Arthur
Acquisition Security Analyst ARTH214
Pentagon, VA
Closed
04/01/2022

Acquisition Security Analyst:



The Acquisition Security Analyst will assist the Government Program Manager with the development and implementation of comprehensive program protection methodologies to protect advanced technology programs throughout the system’s life cycle.




Performance shall include:



•In-depth lifecycle program analysis to identify critical program information (CPI), Critical System Resources (CSR), and their associated vulnerabilities

•Assist with the identification and implementation of countermeasures

•Develop and implement a risk managed based program protection plan and strategy

•Provide technical advice and security support to collateral and SAP programs and emerging mission areas

•Provide security guidance to the GSSO and PM, as it relates to the Air Force acquisition and sustainment process

•Provide specific guidance pertaining to the contract security requirements in reference to cost, feasibility and appropriateness of requirement

•Maintain a working relationship with the Program Manager, Contracting Officer and contractor security officers to ensure a standardized and correct format/process is utilized for all DD Form 254 efforts throughout the acquisition and sustainment lifecycle

•Directly support customer program protection/security officers in the development, execution and implementation of Program Protection Planning (PPP)

•Assess threat and risk, develop risk management actions and implements long term courses of actions

•Assist in the development and writing of operations security (OPSEC) plans, transition plans, emergency action plans, transportation plans and any other security documents as needed for the customer

•Review program documentation for public release, to include ensuring Controlled Unclassified Information (CUI) has proper markings, classifications and distribution statements per Air Force doctrine

•Conduct analysis of foreign intelligence threats against programs involving customer's critical research, sensitive technologies or CPI

•Prepare and produce analytical products from numerous resources, to include various databases, to ensure a real-time, tailored product is provided

•Provide classification guidance and assistance for all security programs to include collateral and SAP programs

•Analyze Counterintelligence reports and prepare written summaries of activities with potential impact to customer resources

•Write, review, and/or edit Security Classification Guides (SCG), Exposure Contingency Plans (ECP), Managed Access Plans (MAP), Security Operating Procedures (SOPs), System Test Plans (STP)

•Assist government system security engineers performing close out actions for SAPs as needed

•Develop and implement quarterly and annual security education and training for personnel

•Provide technical analysis and OPSEC support to SAF/AAZ and SAF/AQ Special programs and other associated operations, missions, and organizational elements involved in developing system requirements to associated systems RDT&E




Experience:



•10 - 12 years related experience, minimum two (2) years of direct SAP experience

•Security Fundamentals Professional Certification (SFPC) counts towards 3 years of experience

•Special Program Security Certification (SPSC) counts towards 5 years of experience

•Maximum equivalent experience for SPED Certifications is no more than 5 years




Education:



•Bachelor’s degree in a related area or equivalent experience (4 years)




Security Clearance:



•Current Top Secret Clearance with SCI Eligibility

•Eligibility for access to Special Access Program Information

•Willingness to submit to a Counterintelligence polygraph




Other Requirements:



•Must have extensive knowledge of the DD Form 254 and how it is incorporated in the Air Force acquisition process


Arthur
Activity Security Representative 2 ARTH213
Pentagon, VA
Closed
04/01/2022

Activity Security Representative 2:



Performance shall include:



•Classification reviews of inbound and outbound correspondence

•Assist in the maintenance of a document accountability database and associated correspondence

•Processing inbound and outbound classified mail and receipt records

•Perform destruction of classified materials

•Process magnetic media for accountability

•Reproduction support for classified materials

•Maintain various daily logs for a variety of administrative functions associated with document control

•Assist in the processing of inbound data and outbound data transfer files

•Transfer electronic data files to internal customers

•Maintain an extensive customer database point of contact listing

•Assist with researching, processing, filing, and maintaining inbound and outbound visit notices

•Escort facility visitors and maintains associated logs

•Assist in the preparation of facility access control badges

•Conduct entry and exit inspections

•Assist in the maintenance of facility access control entry systems, to include visitor control

•Perform data entry to the Personnel Access Security System database and maintain all customer sponsored billets and quota information

•Assist in maintaining personnel security files for all personnel of the supported element

•Follow and enforce the customer’s Standard Operating Procedures

•Provide support for the security awareness and education programs

•Perform miscellaneous administrative support functions as directed by the contractor site lead and/or the Senior Security Representative

•Review, track, and monitor security clearance processing activities with appropriate government personnel to achieve appropriate clearance actions

•Participate in Air Force SAP security compliance inspections of government organizations and industry

•Implement Top Secret Control for accountable material and associated correspondence

•Prepare and/or process inbound and outbound classified mail, faxes, courier packages and receipts

•Prepare, process, and/or review Program Access Request (PARs) for accuracy and access eligibility

•Execute Special Access Program Nomination Process Questionnaires

•Conduct Defense Central Index of Investigations (DCII), Joint Personnel Access System (JPAS), and SAPNP reviews of candidates being submitted for SAP access

•Perform data entry and record checks in the Air Force Access Data System (AFADS) and maintains all customer sponsored personnel access information current

•Perform indoctrinations




Experience:



•3-5  years related experience

•Security Fundamentals Professional Certification (SFPC) counts towards 3 years of experience

•Special Program Security Certification (SPSC) counts towards 5 years of experience

•Maximum equivalent experience for SPED Certifications is no more than 5 years




Education:



•Bachelor’s degree or equivalent experience (4 years)




Certifications:



•Must complete the DoD SAPCO approved SAPNP training (if performing personnel security functions)




Security Clearance:



•Current Top Secret Clearance with SCI Eligibility

•Eligibility for access to Special Access Program Information

•Willingness to submit to a Counterintelligence polygraph


Arthur
Information Assurance System Security Engineer 2 ARTH212
Hill AFB, UT
Immediate
04/01/2022

Information Assurance System Security Engineer 2:



The Information System Security Engineer (ISSE) is primarily responsible for conducting information system security engineering activities with a focus on lifecycle of current systems and future requirement scoping.  The position will collect and process the captured information security requirements and ensures that the requirements are effectively integrated into information systems through purposeful security architecting, design, development, and configuration.  The position is an integral part of the development team designing and developing organizational information systems or upgrading legacy systems. The ISSE employs best practices when implementing security requirements within an information system including software engineering methodologies, system/security engineering principles, secure design, secure architecture, and secure coding techniques.  This position’s main function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts.  The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.




Performance shall include:



•Perform oversight of the development, implementation and evaluation of information system security program policy; special emphasis placed upon integration of existing SAP network infrastructures

•Perform analysis of network security, based upon the Risk Management Framework (RMF) with emphasize on Joint Special Access Program Implementation Guide (JSIG) authorization process

•Provides expert support, research and analysis of exceptionally complex problems, and processes relating to them

•Provides expert level consultation and technical services on all aspects of Information Security

•Serves as technical expert to the Cybersecurity Assessment Program providing technical direction, interpretation and alternatives to complex problems

•Thinks independently and demonstrates exceptional written and oral communications skills. Applies advanced technical principles, theories, and concepts

•Contributes to the development of new principles, concepts, and methodologies

•Works on unusually complex technical problems and provides highly innovative and ingenious solutions

•Lead a team of System Security Engineers and Certification and Accreditation Analysts responsible for ensuring the customers national and international security interests are protected as support equipment are designed and tested

•Recommends cybersecurity software tools and assists in the development of software tool requirements and selection criteria to include the development of product specific STIGs from applicable DISA SRGs

•Review ISSE related designs and provides security compliance recommendations

•Leads technical teams in implementation of predetermined long-range goals and objectives

•Supports customer and SAP community IA working groups, participate in SSE IPT reviews

•Provides expert level consultation and technical services on all aspects of Information Security

•Review ISSE related designs and provides security compliance recommendations

•Develop and provide IA risk management recommendations to the customer

•Provide ISSE support for Mission and Training systems design and development 

•Assist with development and maintenance of the Program Protection Plan

•Assist with site activation activities and design reviews

•Represent the customer in various ISSE related working groups, advisory groups, and advisory council meetings

•Chair and or Co-Chair customer and SAP community IA working groups, participate in ISSE IPT reviews

•Represent the customer in various SSE related working groups, advisory groups, and advisory council meetings

•Strong background in Patch/Configuration management, DevOps, and tier 3 support

•Assist team to design, integrate, and implement JSIG/RMF Continuous Monitoring tools and processes

•Integrate COTS & GOTS products to collect, display and remediate a variety of automated system security and system operations/performance functions and metrics

•Perform security assessments of servers/network devices/security appliances

•Develop improvements to security assessments with regard to accuracy and efficiency

•Integrate ancillary monitoring tools/capabilities with the enterprise security information and event management (SIEM) and create/tailor complex event alarms/rules and summary reports

•Write and execute cybersecurity test procedures for validation of control compliance

•Monitor/analyze output of cybersecurity related tools for reportable security incidents and residual risk

•Analyze technical risk of emerging cybersecurity tools and processes

•Work as part of a security incident response team as needed

•Build operational Operations and Maintenance (O&M) checklists to maintain the service (daily, weekly, monthly, yearly O&M checklists); build Tactics, Techniques and Processes (TTPs) and Standard Operating Processes (SOPs) associated with service checklists

•Integrate/Develop new techniques to improve Confidentiality, Integrity, and Availability for networks/systems operating at various classification levels

•Advanced technical competency in one or more of the following supported platforms: Microsoft Windows Server, Active Directory, Red Hat Enterprise Linux servers, MS Hyper-V/VMWare/ESx/Xen Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems, forensic analysis/vulnerability assessment, Group Policy management and configuration, Scripting, BMC Footprints, WSUS, , Lumension, Bitlocker, SQL Server 2012, TomCat, IIS, Windows Server 2012r2/2016, Win 10, Red Hat 6.5, Microsoft Office

•Toolkits, SEIMs, Logrhythm, ACAS/Nessus/SCAP, mandatory/role-based access control concepts (e. g. SE Linux extensions to RHEL, PitBull, AppArmor, and Sentris) , video teleconferencing/VOIP, Oracle/MS SQL database security, and Apache/IIS Web server security




Experience:



•12 - 15 years related experience

•Prior performance in roles such as ISSO, ISSM, SCA or SAP IT Technical Director




Education:



•Bachelor’s degree in a related discipline or equivalent experience (4 years)




Certifications:



•Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Architect and Engineer Level I or Information Assurance Architect and Engineer Level II within 6 months of the date of hire




Security Clearance:



•Current Top Secret Clearance with SCI Eligibility

•Eligibility for access to Special Access Program Information

•Willingness to submit to a Counterintelligence polygraph




Other Requirements:



•Must have expert knowledge of DoD, National and applicable service and agency security policy, manuals and standards.  Must have the ability to work in a dynamic environment and effectively interact with numerous DOD, military/civilian personnel and industry partners 


Arthur
Network System Administrator 1 ARTH211
Hill AFB, UT
Closed
04/01/2022

Network System Administrator:



The primary function will be to organize, install, and support government organization’s computer systems, including local area networks (LANs), wide area networks (WANs), network segments, intranets, and other data communication systems. This will also include helping architect, design and analyze network models. It will require participation in decisions about buying future hardware or software to upgrade organization’s infrastructure. This position might be called upon to provide technical support to computer users to help solve users’ problems. This position will support activities within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.




Performance shall include:



•Ability to operate under supervision

•Execute day to day management and operations of systems and networks

•Manage COTS & GOTS products to collect, display and remediate a variety of automated system security and system operations/performance functions and metrics

•Follow Operations and Maintenance (O&M) checklists to maintain the service (daily, weekly, monthly, yearly O&M checklists); build Tactics, Techniques and Processes (TTPs) and Standard Operating Processes (SOPs) associated with service checklists

•Operate monitoring tools/capabilities with the enterprise security information and event management (SIEM) and create/tailor complex event alarms/rules and summary reports

•Assist in analyzing technical risk, upon request, of emerging cybersecurity tools and processes

•Work as part of a security incident response team as needed

•Working technical competency in one or more of the following supported platforms: Microsoft Windows Server, Red Hat Enterprise Linux servers, MS Hyper-V/VMWare/ESx/Xen Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems, forensic analysis/vulnerability assessment, Group Policy management and configuration, Scripting, BMC Footprints, WSUS, , Lumension, Bitlocker, SQL Server 2012, TomCat, IIS, Windows Server 2012r2/2016, Win 10, Red Hat 6.5, Microsoft Office

•Toolkits, SEIMs, Logrhythm, ACAS/Nessus/SCAP, mandatory/role-based access control concepts (e. g. SE Linux extensions to RHEL, PitBull, AppArmor, and Sentris) , video teleconferencing/VOIP, Oracle/MS SQL database security, and Apache/IIS Web server security




Experience:



•1 - 3 years related experience




Education:



•Bachelor’s degree in a related area or equivalent experience (4 years)




Certifications:



•Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level I within 6 months of the date of hire




Security Clearance



•Current Top Secret Clearance with SCI Eligibility

•Eligibility for access to Special Access Program Information

•Willingness to submit to a Counterintelligence polygraph




Other Requirements:



•Thorough knowledge of Microsoft Windows desktop and server operating systems, Microsoft Exchange Server, and as needed RHEL operating systems administration and associated hardware

•Working knowledge of CISCO network and switching and virtualization technologies

•Working knowledge of Local Area Network (LAN) and Wide Area Network (WAN) technologies and data backup technologies to include communication security (COMSEC) integration

•Working knowledge of Risk Management Framework, Common Criteria, and System Security Policy as they relate to assessments and authorization

•Working knowledge and current relevant experience with PL2 network environments/systems

•Must be familiar with DoD policy as it applies to implementing and executing system and network administration

•Must be able to regularly lift up to 50 lb


Arthur
Program Security Representative 3 ARTH210
JBAB, Washington DC
Closed
04/01/2022

Program Security Representative 3:



Performance shall include:



•Ensure strict adherence to the provisions of the NISPOM, its Supplement, the DoD Overprint, DCID, ICD, and SAP policy

•Assist in developing and executing approved policies and procedures for safeguarding Special Access Program (SAP), Sensitive Compartmented Information (SCI) and collateral data in support of US military operations

•Provide day-to-day security support that includes continuous assessment of procedures to identify shortfalls and provide appropriate recommendations for revising and improving security policies, procedures, and systems

•Identify vulnerabilities, threats, and risks to test, training, and operational activities

•Assist in developing, implementing, and training the Operations Security program

•Assist in providing contractor and subordinate facility assistance and oversight

•Brief all levels of personnel, both in the government and senior civilian services, on a variety of security related topics

•Conduct and document SAP facility compliance reviews, follow-on facility reviews, and facility close-outs

•Monitor, report and track all corrective actions resulting from compliance reviews

•Ensure timely notification of pertinent security matters to program technical and management staff

•Conduct exploration of any loss, compromise, or suspected compromise of classified and/or sensitive information, including conducting preliminary inquiries and generating damage assessments resulting from the loss of classified information

•Coordinate with SAP security personnel to ensure lessons learned are incorporated into the curriculum for the SAP security education & awareness program

•Provide leadership, mentoring, and oversight of team members




Experience:



•10 - 12 years related experience

•Security Fundamentals Professional Certification (SFPC) counts towards 3 years of experience

•Special Program Security Certification (SPSC) counts towards 5 years of experience

•Maximum equivalent experience for SPED Certifications is no more than 5 years




Education:



•Bachelor’s degree in a related area or equivalent experience (4 years)




Security Clearance:



•Current Top Secret Clearance with SCI Eligibility

•Eligibility for access to Special Access Program Information

•Willingness to submit to a Counterintelligence polygraph


Arthur
Activity Security Representative 3 ARTH209
Kirtland AFB, NM
Immediate
04/01/2022

Activity Security Representative 3:



The Activity Security Representative’s primary function is to provide multi-disciplined security support to a customer’s facility and organization.  The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.




Performance shall include:



•Classification reviews of inbound and outbound correspondence

•Assist in the maintenance of a document accountability database and associated correspondence

•Processing inbound and outbound classified mail and receipt records

•Perform destruction of classified materials

•Process magnetic media for accountability

•Reproduction support for classified materials

•Maintain various daily logs for a variety of administrative functions associated with document control

•Assist in the processing of inbound data and outbound data transfer files

•Transfer electronic data files to internal customers

•Maintain an extensive customer database point of contact listing

•Assist with researching, processing, filing, and maintaining inbound and outbound visit notices

•Escort facility visitors and maintains associated logs

•Assist in the preparation of facility access control badges

•Conduct entry and exit inspections

•Assist in the maintenance of facility access control entry systems, to include visitor control

•Perform data entry to the Personnel Access Security System database and maintain all customer sponsored billets and quota information

•Assist in maintaining personnel security files for all personnel of the supported element

•Follow and enforce the customer’s Standard Operating Procedures

•Provide support for the security awareness and education programs

•Perform miscellaneous administrative support functions as directed by the contractor site lead and/or the Senior Security Representative

•Review, track, and monitor security clearance processing activities with appropriate government personnel to achieve appropriate clearance actions

•Participate in Air Force SAP security compliance inspections of government organizations and industry

•Implement Top Secret Control for accountable material and associated correspondence

•Prepare and/or process inbound and outbound classified mail, faxes, courier packages and receipts

•Prepare, process, and/or review Program Access Request (PARs) for accuracy and access eligibility

•Execute Special Access Program Nomination Process Questionnaires

•Conduct Defense Central Index of Investigations (DCII), Joint Personnel Access System (JPAS), and SAPNP reviews of candidates being submitted for SAP access

•Perform data entry and record checks in the Air Force Access Data System (AFADS) and maintains all customer sponsored personnel access information current

•Perform indoctrinations

•Provide leadership, mentoring, and quality assurance for Team Members




Experience:



•5 - 7  years related experience

•Security Fundamentals Professional Certification (SFPC) counts towards 3 years of experience

•Special Program Security Certification (SPSC) counts towards 5 years of experience

•Maximum equivalent experience for SPED Certifications is no more than 5 years




Education:



•Bachelor’s degree or equivalent experience (4 years)




Certifications:



•Must complete the DoD SAPCO approved SAPNP training (if performing personnel security functions)




Security Clearance:



•Current Top Secret Clearance with SCI Eligibility

•Eligibility for access to Special Access Program Information

•Willingness to submit to a Counterintelligence polygraph



Arthur
Information System Security Manager 2 ARTH208
Schriever AFB, CO
Closed
04/01/2022

Information System Security Manager 2:



Performance shall include:



•Perform oversight of the development, implementation and evaluation of information system security program policy; special emphasis placed upon integration of existing SAP network infrastructures

•Develop and oversee operational information systems security implementation policy and guidelines of network security, based upon the Risk Management Framework (RMF) with emphasize on Joint Special Access Program Implementation Guide (JSIG) authorization process

•Advise customer on Risk Management Framework (RMF) assessment and authorization issues

•Perform risk assessments and make recommendations to DoD agency customers

•Advise government program managers on security testing methodologies and processes

•Evaluate authorization documentation and provide written recommendations for authorization to government PM’s

•Develop and maintain a formal Information Systems Security Program

•Ensure that all IAOs, network administrators, and other cyber security personnel receive the necessary technical and security training to carry out their duties

•Develop, review, endorse, and recommend action by the AO or DAO of system assessment documentation

•Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media

•Develop and execute security assessment plans that include verification that the features and assurances required for each protection level functioning

•Maintain a and/or applicable repository for all system authorization documentation and modifications

•Develop policies and procedures for responding to security incidents, to include investigating and reporting security violations and incidents

•Ensure proper protection or corrective measures have been taken when an incident or vulnerability has been discovered within a system

•Ensure that data ownership and responsibilities are established for each authorization boundary, to include accountability, access rights, and special handling requirements

•Ensure development and implementation of an information security education, training, and awareness program, to include attending, monitoring, and presenting local cyber security training.

•Evaluate threats and vulnerabilities to ascertain whether additional safeguards are needed

•Assess changes in the system, its environment, and operational needs that could affect the authorization

•Ensure that authorization is accomplished a valid Authorization determination has been given for all authorization boundaries under your purview

•Review AIS assessment plans

•Coordinate with PSO or cognizant security official on approval of external information systems (e.g., guest systems, interconnected system with another organization)

•Conduct periodic assessments of the security posture of the authorization boundaries

•Institute and implement a Configuration Control Board (CCB) charter

•Ensure configuration management (CM) for security-relevant changes to software, hardware, and firmware and that they are properly documented

•Ensure periodic testing is conducted to evaluate the security posture of IS by employing various intrusion/attack detection and monitoring tools (shared responsibility with ISSOs)

•Ensure that system recovery and reconstitution processes developed and monitored to ensure that the authorization boundary can be recovered based on its availability level determination

•Ensure all authorization documentation is current and accessible to properly authorized individuals

•Ensure that system security requirements are addressed during all phases of the system life cycle

•Participate in self-inspections

•Periodically review system security to accommodate changes to policy or technology

•Coordinate all technical security issues outside of area of expertise or responsibility with ISSE

•Provide expert research and analysis in support of expanding programs and area of responsibility as it pertains to cyber security and information technology activities

•Develop Assured File Transfers (AFT) on accordance with the JSIG

•Provide leadership, mentoring, and quality assurance for Cyber Security and Information Technology team members




Experience:



•7 - 9 years related experience

•Prior performance in roles such as ISSO or ISSM




Education:



•Bachelor’s degree or equivalent experience (4 years)




Certifications:



•Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level 2 or Information Assurance Manager Level 2 within 6 months of the date of hire




Security Clearance:



•Current Top Secret Clearance with SCI Eligibility

•Eligibility for access to Special Access Program Information

•Willingness to submit to a Counterintelligence polygraph




Other Requirements:



•Must be able to regularly lift up to 50 lbs


Arthur
Program Security Representative 3 ARTH207
Barksdale AFB, LA
Closed
04/01/2022

Program Security Representative 3:



The Program Security Representative’s primary function is to provide multi-discipline security support for one or more of the customer’s Special Access Programs (SAPs).  The position will provide “day-to-day” multi-discipline analysis for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.




Performance shall include:



•Ensure strict adherence to the provisions of the NISPOM, its Supplement, the DoD Overprint, DCID, ICD, and SAP policy

•Assist in developing and executing approved policies and procedures for safeguarding Special Access Program (SAP), Sensitive Compartmented Information (SCI) and collateral data in support of US military operations

•Provide day-to-day security support that includes continuous assessment of procedures to identify shortfalls and provide appropriate recommendations for revising and improving security policies, procedures, and systems

•Identify vulnerabilities, threats, and risks to test, training, and operational activities

•Assist in developing, implementing, and training the Operations Security program

•Assist in providing contractor and subordinate facility assistance and oversight

•Brief all levels of personnel, both in the government and senior civilian services, on a variety of security related topics

•Conduct and document SAP facility compliance reviews, follow-on facility reviews, and facility close-outs

•Monitor, report and track all corrective actions resulting from compliance reviews

•Ensure timely notification of pertinent security matters to program technical and management staff

•Conduct exploration of any loss, compromise, or suspected compromise of classified and/or sensitive information, including conducting preliminary inquiries and generating damage assessments resulting from the loss of classified information

•Coordinate with SAP security personnel to ensure lessons learned are incorporated into the curriculum for the SAP security education & awareness program

•Provide leadership, mentoring, and oversight of team members




Experience:



•10 - 12 years related experience

•Security Fundamentals Professional Certification (SFPC) counts towards 3 years of experience

•Special Program Security Certification (SPSC) counts towards 5 years of experience

•Maximum equivalent experience for SPED Certifications is no more than 5 years




Education:



•Bachelor’s degree in a related area or equivalent experience (4 years)




Security Clearance:



•Current Top Secret Clearance with SCI Eligibility

•Eligibility for access to Special Access Program Information

•Willingness to submit to a Counterintelligence polygraph


Arthur
Program Security Representative 2 ARTH206
Langley AFB, VA
Immediate
04/01/2022

Program Security Representative 2:



The Program Security Representative’s primary function is to provide multi-discipline security support for one or more of the customer’s Special Access Programs (SAPs).  The position will provide “day-to-day” multi-discipline analysis for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.




Performance shall include:



•Ensure strict adherence to the provisions of the NISPOM, its Supplement, the DoD Overprint, DCID, ICD, and SAP policy

•Assist in developing and executing approved policies and procedures for safeguarding Special Access Program (SAP), Sensitive Compartmented Information (SCI) and collateral data in support of US military operations

•Provide day-to-day security support that includes continuous assessment of procedures to identify shortfalls and provide appropriate recommendations for revising and improving security policies, procedures, and systems

•Identify vulnerabilities, threats, and risks to test, training, and operational activities

•Assist in developing, implementing, and training the Operations Security program

•Assist in providing contractor and subordinate facility assistance and oversight

•Brief all levels of personnel, both in the government and senior civilian services, on a variety of security related topics

•Conduct and document SAP facility compliance reviews, follow-on facility reviews, and facility close-outs

•Monitor, report and track all corrective actions resulting from compliance reviews

•Ensure timely notification of pertinent security matters to program technical and management staff

•Conduct exploration of any loss, compromise, or suspected compromise of classified and/or sensitive information, including conducting preliminary inquiries and generating damage assessments resulting from the loss of classified information

•Coordinate with SAP security personnel to ensure lessons learned are incorporated into the curriculum for the SAP security education & awareness program




Experience:



•8 – 10 years related experience

•Security Fundamentals Professional Certification (SFPC) counts towards 3 years of experience

•Special Program Security Certification (SPSC) counts towards 5 years of experience

•Maximum equivalent experience for SPED Certifications is no more than 5 years




Education:



•Bachelor’s degree in a related area or equivalent experience (4 years)




Security Clearance:



•Current Top Secret Clearance with SCI Eligibility

•Eligibility for access to Special Access Program Information

•Willingness to submit to a Counterintelligence polygraph



Arthur
Information System Security Manager 1 ARTH205
JBAB, Washington DC
Closed
04/01/2022

Information System Security Manger 1:



The ISSM’s primary function serves as a principal advisor on all matters, technical and otherwise, involving the security of information systems under their purview.  Primary support will be working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense, and Military Compartment efforts.  The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.




Performance shall include:



•Perform oversight of the development, implementation and evaluation of information system security program policy; special emphasis placed upon integration of existing SAP network infrastructures

•Develop and oversee operational information systems security implementation policy and guidelines of network security, based upon the Risk Management Framework (RMF) with emphasize on Joint Special Access Program Implementation Guide (JSIG) authorization process

•Advise customer on Risk Management Framework (RMF) assessment and authorization issues

•Perform risk assessments and make recommendations to DoD agency customers

•Advise government program managers on security testing methodologies and processes

•Evaluate authorization documentation and provide written recommendations for authorization to government PMs

•Develop and maintain a formal Information Systems Security Program

•Ensure that all IAOs, network administrators, and other cyber security personnel receive the necessary technical and security training to carry out their duties

•Develop, review, endorse, and recommend action by the AO or DAO of system assessment documentation

•Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media

•Develop and execute security assessment plans that include verification that the features and assurances required for each protection level functioning

•Maintain a and/or applicable repository for all system authorization documentation and modifications

•Institute and implement a Configuration Control Board (CCB) charter

•Develop policies and procedures for responding to security incidents, to include investigating and reporting security violations and incidents

•Ensure proper protection or corrective measures have been taken when an incident or vulnerability has been discovered within a system

•Ensure that data ownership and responsibilities are established for each authorization boundary, to include accountability, access rights, and special handling requirements

•Ensure development and implementation of an information security education, training, and awareness program, to include attending, monitoring, and presenting local cyber security training.

•Evaluate threats and vulnerabilities to ascertain whether additional safeguards are needed

•Assess changes in the system, its environment, and operational needs that could affect the authorization

•Ensure that authorization is accomplished a valid Authorization determination has been given for all authorization boundaries under your purview

•Review AIS assessment plans

•Coordinate with PSO or cognizant security official on approval of external information systems (e.g., guest systems, interconnected system with another organization)

•Conduct periodic assessments of the security posture of the authorization boundaries

•Ensure configuration management (CM) for security-relevant changes to software, hardware, and firmware and that they are properly documented

•Ensure periodic testing is conducted to evaluate the security posture of IS by employing various intrusion/attack detection and monitoring tools (shared responsibility with ISSOs)

•Ensure that system recovery and reconstitution processes developed and monitored to ensure that the authorization boundary can be recovered based on its availability level determination

•Ensure all authorization documentation is current and accessible to properly authorized individuals

•Ensure that system security requirements are addressed during all phases of the system life cycle

•Develop Assured File Transfers (AFT) on accordance with the JSIG

•Participate in self-inspections

•Conduct the duties of the Information System Security Officer (ISSO) if one is not present and/or available




Experience:



•5 - 7 years related experience

•Prior performance in roles such as ISSO or ISSM




Education:



•Bachelor’s degree in a related area or equivalent experience (4 years)




Certifications:



•Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level II or Information Assurance Manager Level I within 6 months of the date of hire.




Security Clearance



•Current Top Secret Clearance with SCI Eligibility

•Eligibility for access to Special Access Program Information

•Willingness to submit to a Counterintelligence polygraph




Other Requirements



•Must having working knowledge of DoD, National and applicable service and agency security policy, manuals and standards.

•Must be able to regularly lift up-to 50lbs


Arthur
Network System Administrator 3 ARTH204
San Antonio, TX
Immediate
04/01/2022

Network System Administrator 3:



The primary function will be to organize, install, and support government organization’s computer systems, including local area networks (LANs), wide area networks (WANs), network segments, intranets, and other data communication systems. This will also include helping architect, design and analyze network models. It will require participation in decisions about buying future hardware or software to upgrade organization’s infrastructure. This position might be called upon to provide technical support to computer users to help solve users’ problems. This position will support activities within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.




Performance shall include:


•Able to perform self-sustaining and work with little to no oversight

•Lead IT ops team on day to day management and operations of Networks and implement capabilities vetted through Cybersecurity, ISSE and higher headquarters to maintain JSIG/RMF Authority to Operate and maintain Continuous Monitoring tools and processes

•Manage COTS & GOTS products to collect, display and remediate a variety of automated system security and system operations/performance functions and metrics.

•Assist during security assessments of servers/network devices/security appliances

•Assist during security assessments with regard to accuracy and efficiency

•Assist with Creation of operational Operations and Maintenance (O&M) checklists to maintain the service (daily, weekly, monthly, yearly O&M checklists); build Tactics, Techniques and Processes (TTPs) and Standard Operating Processes (SOPs) associated with service checklists

•Manage and operate monitoring tools/capabilities with the enterprise security information and event management (SIEM) and create/tailor complex event alarms/rules and summary reports

•Execute cybersecurity operations procedures for day to day network management, operations and maintenance

•Monitor/analyze output of cybersecurity related tools for reportable security incidents and residual risk

•Assist in analyzing technical risk, upon request, of emerging cybersecurity tools and processes

•Work as part of a security incident response team as needed

•Assist ISSM/ISSO/ISSE  with the Integration/Development new techniques to improve Confidentiality, Integrity, and Availability for networks/systems operating at various classification levels

•Advanced technical competency in one or more of the following supported platforms: Microsoft Windows Server, Active Directory Red Hat Enterprise Linux servers, MS Hyper-V/VMWare/ESx/Xen Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems, forensic analysis/vulnerability assessment, Group Policy management and configuration, Scripting, BMC Footprints, WSUS, , Lumension, Bitlocker, SQL Server 2012, TomCat, IIS, Windows Server 2012r2/2016, Win 10, Red Hat 6.5, Microsoft Office

•Toolkits, SEIMs, Logrhythm, ACAS/Nessus/SCAP, mandatory/role-based access control concepts (e. g. SE Linux extensions to RHEL, PitBull, AppArmor, and Sentris) , video teleconferencing/VOIP, Oracle/MS SQL database security, and Apache/IIS Web server security




Experience:



•5 - 7 years related experience




Education:



•Bachelor’s degree in a related area or equivalent experience (4 years)




Certifications:



•Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level III within 6 months of the date of hire




Security Clearance



•Current Top Secret Clearance with SCI Eligibility

•Eligibility for access to Special Access Program Information

•Willingness to submit to a Counterintelligence polygraph




Other Requirements:



•Thorough knowledge of Microsoft Windows desktop and server operating systems, Microsoft Exchange Server, and as needed RHEL operating systems administration and associated hardware

•Experience in effective communication and collaborating in a high performance team environment.

•Group Policy design and configuration

•Working knowledge of CISCO network and switching and virtualization technologies

•Working knowledge of virtualization as it applies to users environments, operating systems, and network appliances

•Working knowledge of Local Area Network (LAN) and Wide Area Network (WAN) technologies and data backup technologies

•Working knowledge communication security (COMSEC) policies and integration

•Working knowledge of Risk Management Framework, Common Criteria, and System Security Policy as they relate to assessments and authorization

•Working knowledge and current relevant experience with PL2, PL3, and PL4 network environments/systems

•Working knowledge of WSUS and/or YUM patch deployment methodologies

•Must be familiar with DoD policy as it applies to implementing and executing system and network administration

•Working knowledge of Risk Management Framework and how to apply it to network/information system environments

•Must be able to regularly lift up to 50 lbs


Arthur
Information System Security Officer 3 ARTH203
Hanscom AFB, MA
Closed
04/01/2022

Information System Security Officer 3:



The ISSO is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO.  The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is assigned responsibility for the day-to-day security operations of a system.  This also will include physical and environmental protection, personnel security, incident handling, and security training and awareness.  It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configuration management across authorization boundaries.  This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts.  The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.




Performance shall include:


•Assist the ISSM in meeting their duties and responsibilities

•Prepare, review, and update authorization packages

•Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media

•Notify ISSM when changes occur that might affect the authorization determination of the information system(s)

•Conduct periodic reviews of information systems to ensure compliance with the security authorization package

•Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change

•Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly

•Ensure all IS security-related documentation is current and accessible to properly authorized individuals

•Ensure audit records are collected, reviewed, and documented (to include any anomalies)

•Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties

•Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans

•Identify cyber security vulnerabilities and assist with the implementation of the countermeasures for them

•Prepare reports on the status of security safeguards applied to computer systems

•Perform ISSO duties in support of in-house and external customers

•Conduct continuous monitoring activities for authorization boundaries under your preview

•Assist Department of Defense, National Agency and Contractor organizations with the development of assessment and authorization (A&A) efforts




Experience:



•5 - 7 years related experience

•Prior performance in roles such as System, Network Administrator or ISSO




Education:


•Bachelor’s degree or equivalent experience (4 years)




Certifications:


•Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level II or Information Assurance Manager II within 6 months of the date of hire.




Security Clearance:



•Current Top Secret Clearance with SCI Eligibility

•Eligibility for access to Special Access Program Information

•Willingness to submit to a Counterintelligence polygraph




Other Requirements:



•Must be able to regularly lift up to 50 lbs


Arthur
Information System Security Manager 1 ARTH202
Hanscom AFB, MA
Closed
04/01/2022

Information System Security Manager 1:



The ISSM’s primary function serves as a principal advisor on all matters, technical and otherwise, involving the security of information systems under their purview.  Primary support will be working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense, and Military Compartment efforts.  The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.




Performance shall include:



•Perform oversight of the development, implementation and evaluation of information system security program policy; special emphasis placed upon integration of existing SAP network infrastructures

•Develop and oversee operational information systems security implementation policy and guidelines of network security, based upon the Risk Management Framework (RMF) with emphasize on Joint Special Access Program Implementation Guide (JSIG) authorization process

•Advise customer on Risk Management Framework (RMF) assessment and authorization issues

•Perform risk assessments and make recommendations to DoD agency customers

•Advise government program managers on security testing methodologies and processes

•Evaluate authorization documentation and provide written recommendations for authorization to government PMs

•Develop and maintain a formal Information Systems Security Program

•Ensure that all IAOs, network administrators, and other cyber security personnel receive the necessary technical and security training to carry out their duties

•Develop, review, endorse, and recommend action by the AO or DAO of system assessment documentation

•Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media

•Develop and execute security assessment plans that include verification that the features and assurances required for each protection level functioning

•Maintain a and/or applicable repository for all system authorization documentation and modifications

•Institute and implement a Configuration Control Board (CCB) charter

•Develop policies and procedures for responding to security incidents, to include investigating and reporting security violations and incidents

•Ensure proper protection or corrective measures have been taken when an incident or vulnerability has been discovered within a system

•Ensure that data ownership and responsibilities are established for each authorization boundary, to include accountability, access rights, and special handling requirements

•Ensure development and implementation of an information security education, training, and awareness program, to include attending, monitoring, and presenting local cyber security training.

•Evaluate threats and vulnerabilities to ascertain whether additional safeguards are needed

•Assess changes in the system, its environment, and operational needs that could affect the authorization

•Ensure that authorization is accomplished a valid Authorization determination has been given for all authorization boundaries under your purview

•Review AIS assessment plans

•Coordinate with PSO or cognizant security official on approval of external information systems (e.g., guest systems, interconnected system with another organization)

•Conduct periodic assessments of the security posture of the authorization boundaries

•Ensure configuration management (CM) for security-relevant changes to software, hardware, and firmware and that they are properly documented

•Ensure periodic testing is conducted to evaluate the security posture of IS by employing various intrusion/attack detection and monitoring tools (shared responsibility with ISSOs)

•Ensure that system recovery and reconstitution processes developed and monitored to ensure that the authorization boundary can be recovered based on its availability level determination

•Ensure all authorization documentation is current and accessible to properly authorized individuals

•Ensure that system security requirements are addressed during all phases of the system life cycle

•Develop Assured File Transfers (AFT) on accordance with the JSIG

•Participate in self-inspections

•Conduct the duties of the Information System Security Officer (ISSO) if one is not present and/or available




Experience:



•5 - 7 years related experience

•Prior performance in roles such as ISSO or ISSM




Education:



•Bachelor’s degree in a related area or equivalent experience (4 years)

Certifications:

•Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level II or Information Assurance Manager Level I within 6 months of the date of hire.




Security Clearance


•Current Top Secret Clearance with SCI Eligibility

•Eligibility for access to Special Access Program Information

•Willingness to submit to a Counterintelligence polygraph




Other Requirements



•Must having working knowledge of DoD, National and applicable service and agency security policy, manuals and standards.

•Must be able to regularly lift up-to 50lbs


Arthur
Information Technology Information Assurance 1 ARTH201
Pentagon, VA
Closed
04/01/2022

Information Technology Information Assurance 1:



The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts.  The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.




Performance shall include:



•Establish complex operational software configuration controls and system interfaces for computer system(s) assigned

•Maintain file servers, Firewalls, network access, Security Monitoring Systems and system documentation as required

•Analyze and troubleshoot system anomalies to ensure optimum equipment performance

•Prepare system for operational use and support operational tests

•Review, prepare, and update authorization packages

•Notify customer when changes occur that might affect authorization accreditation

•Conduct cybersecurity portion of the self-inspection’s checklist

•Review and provide technical and cyber security coordination on all Bodies of Evidence that make-up the authorization package

•Identify any and all vulnerabilities and implement countermeasures

•Ensure information systems and network appliances are operated, maintained, and disposed of in accordance with security policies and practices

•Perform Video-Teleconferencing VTC System Administration, Scheduling, & Configuration

•Provide External Information System(s) Client Support

•Perform account creations, changes, & deletions on multiple authorization boundaries

•Perform Help Desk & troubleshooting activities

•Perform Hardware/Software System Configuration, upgrades and modifications

•Perform system and network appliance patching activities

•Provide Government-Issued Laptop Support

•Assist in Media Control & Accountability activities

•Perform COMSEC account/equipment management activities




Experience:



•2 - 5 years related experience

•Prior performance in roles such as System or Network Administrator




Education:



•Bachelor’s degree or equivalent experience (4 years)




Certifications:



•Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level I or Information Assurance Manager I within 6 months of the date of hire.




Security Clearance



•Current Top Secret Clearance with SCI Eligibility

•Eligibility for access to Special Access Program Information

•Willingness to submit to a Counterintelligence polygraph




Other Requirements:



•Thorough knowledge of Microsoft Windows 2012R2 Server, Microsoft Exchange Server 2010/2016, Microsoft Windows 7/10 operating systems (OS) administration and associated hardware

•Working knowledge of Local Area Network (LAN) and Wide Area Network (WAN) technologies and data backup technologies to include communication security (COMSEC) integration

•Working knowledge of Risk Management Framework, Common Criteria, and System Security Policy as they relate to Assessments and Authorizations

•Working knowledge and current relevant experience with PL2 systems

•Must be able to regularly lift up to 50 lbs



Arthur
Activity Security Representative 3 ARTH200
Pentagon, VA
Immediate
04/01/2022

Activity Security Representative:



The Activity Security Representative’s primary function is to provide multi-disciplined security support to a customer’s facility and organization.  The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.




Performance shall include:



•Classification reviews of inbound and outbound correspondence

•Assist in the maintenance of a document accountability database and associated correspondence

•Processing inbound and outbound classified mail and receipt records

•Perform destruction of classified materials

•Process magnetic media for accountability

•Reproduction support for classified materials

•Maintain various daily logs for a variety of administrative functions associated with document control

•Assist in the processing of inbound data and outbound data transfer files

•Transfer electronic data files to internal customers

•Maintain an extensive customer database point of contact listing

•Assist with researching, processing, filing, and maintaining inbound and outbound visit notices

•Escort facility visitors and maintains associated logs

•Assist in the preparation of facility access control badges

•Conduct entry and exit inspections

•Assist in the maintenance of facility access control entry systems, to include visitor control

•Perform data entry to the Personnel Access Security System database and maintain all customer sponsored billets and quota information

•Assist in maintaining personnel security files for all personnel of the supported element

•Follow and enforce the customer’s Standard Operating Procedures

•Provide support for the security awareness and education programs

•Perform miscellaneous administrative support functions as directed by the contractor site lead and/or the Senior Security Representative

•Review, track, and monitor security clearance processing activities with appropriate government personnel to achieve appropriate clearance actions

•Participate in Air Force SAP security compliance inspections of government organizations and industry

•Implement Top Secret Control for accountable material and associated correspondence

•Prepare and/or process inbound and outbound classified mail, faxes, courier packages and receipts

•Prepare, process, and/or review Program Access Request (PARs) for accuracy and access eligibility

•Execute Special Access Program Nomination Process Questionnaires

•Conduct Defense Central Index of Investigations (DCII), Joint Personnel Access System (JPAS), and SAPNP reviews of candidates being submitted for SAP access

•Perform data entry and record checks in the Air Force Access Data System (AFADS) and maintains all customer sponsored personnel access information current

•Perform indoctrinations

•Provide leadership, mentoring, and quality assurance for Team Members




Experience:



•5 - 7  years related experience

•Security Fundamentals Professional Certification (SFPC) counts towards 3 years of experience

•Special Program Security Certification (SPSC) counts towards 5 years of experience

•Maximum equivalent experience for SPED Certifications is no more than 5 years




Education:



•Bachelor’s degree or equivalent experience (4 years)




Certifications:



•Must complete the DoD SAPCO approved SAPNP training (if performing personnel security functions)




Security Clearance:



•Current Top Secret Clearance with SCI Eligibility

•Eligibility for access to Special Access Program Information

•Willingness to submit to a Counterintelligence polygraph


Arthur
Information Assurance System Security Engineer ARTH199
Eglin AFB, FL
Immediate
04/01/2022

Information Assurance System Security Engineer:



The Information System Security Engineer (ISSE) is primarily responsible for conducting information system security engineering activities with a focus on lifecycle of current systems and future requirement scoping.  The position will collect and process the captured information security requirements and ensures that the requirements are effectively integrated into information systems through purposeful security architecting, design, development, and configuration.  The position is an integral part of the development team designing and developing organizational information systems or upgrading legacy systems. The ISSE employs best practices when implementing security requirements within an information system including software engineering methodologies, system/security engineering principles, secure design, secure architecture, and secure coding techniques.  This position’s main function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts.  The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.




Performance shall include:



•Perform oversight of the development, implementation and evaluation of information system security program policy; special emphasis placed upon integration of existing SAP network infrastructures

•Perform analysis of network security, based upon the Risk Management Framework (RMF) with emphasize on Joint Special Access Program Implementation Guide (JSIG) authorization process

•Provides expert support, research and analysis of exceptionally complex problems, and processes relating to them

•Provides expert level consultation and technical services on all aspects of Information Security

•Serves as technical expert to the Cybersecurity Assessment Program providing technical direction, interpretation and alternatives to complex problems

•Thinks independently and demonstrates exceptional written and oral communications skills. Applies advanced technical principles, theories, and concepts

•Contributes to the development of new principles, concepts, and methodologies

•Works on unusually complex technical problems and provides highly innovative and ingenious solutions

•Lead a team of System Security Engineers and Certification and Accreditation Analysts responsible for ensuring the customers national and international security interests are protected as support equipment are designed and tested

•Recommends cybersecurity software tools and assists in the development of software tool requirements and selection criteria to include the development of product specific STIGs from applicable DISA SRGs

•Review ISSE related designs and provides security compliance recommendations

•Leads technical teams in implementation of predetermined long-range goals and objectives

•Supports customer and SAP community IA working groups, participate in SSE IPT reviews

•Provides expert level consultation and technical services on all aspects of Information Security

•Review ISSE related designs and provides security compliance recommendations

•Develop and provide IA risk management recommendations to the customer

•Provide ISSE support for Mission and Training systems design and development 

•Assist with development and maintenance of the Program Protection Plan

•Assist with site activation activities and design reviews

•Represent the customer in various ISSE related working groups, advisory groups, and advisory council meetings

•Chair and or Co-Chair customer and SAP community IA working groups, participate in ISSE IPT reviews

•Represent the customer in various SSE related working groups, advisory groups, and advisory council meetings

•Strong background in Patch/Configuration management, DevOps, and tier 3 support

•Assist team to design, integrate, and implement JSIG/RMF Continuous Monitoring tools and processes

•Integrate COTS & GOTS products to collect, display and remediate a variety of automated system security and system operations/performance functions and metrics

•Perform security assessments of servers/network devices/security appliances

•Develop improvements to security assessments with regard to accuracy and efficiency

•Integrate ancillary monitoring tools/capabilities with the enterprise security information and event management (SIEM) and create/tailor complex event alarms/rules and summary reports

•Write and execute cybersecurity test procedures for validation of control compliance

•Monitor/analyze output of cybersecurity related tools for reportable security incidents and residual risk

•Analyze technical risk of emerging cybersecurity tools and processes

•Work as part of a security incident response team as needed

•Build operational Operations and Maintenance (O&M) checklists to maintain the service (daily, weekly, monthly, yearly O&M checklists); build Tactics, Techniques and Processes (TTPs) and Standard Operating Processes (SOPs) associated with service checklists

•Integrate/Develop new techniques to improve Confidentiality, Integrity, and Availability for networks/systems operating at various classification levels

•Advanced technical competency in one or more of the following supported platforms: Microsoft Windows Server, Active Directory, Red Hat Enterprise Linux servers, MS Hyper-V/VMWare/ESx/Xen Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems, forensic analysis/vulnerability assessment, Group Policy management and configuration, Scripting, BMC Footprints, WSUS, , Lumension, Bitlocker, SQL Server 2012, TomCat, IIS, Windows Server 2012r2/2016, Win 10, Red Hat 6.5, Microsoft Office

•Toolkits, SEIMs, Logrhythm, ACAS/Nessus/SCAP, mandatory/role-based access control concepts (e. g. SE Linux extensions to RHEL, PitBull, AppArmor, and Sentris) , video teleconferencing/VOIP, Oracle/MS SQL database security, and Apache/IIS Web server security




Experience:



•12 - 15 years related experience

•Prior performance in roles such as ISSO, ISSM, SCA or SAP IT Technical Director




Education:



•Bachelor’s degree in a related discipline or equivalent experience (4 years)




Certifications:



•Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Architect and Engineer Level I or Information Assurance Architect and Engineer Level II within 6 months of the date of hire




Security Clearance:



•Current Top Secret Clearance with SCI Eligibility

•Eligibility for access to Special Access Program Information

•Willingness to submit to a Counterintelligence polygraph




Other Requirements:



•Must have expert knowledge of DoD, National and applicable service and agency security policy, manuals and standards.  Must have the ability to work in a dynamic environment and effectively interact with numerous DOD, military/civilian personnel and industry partners 



Arthur
Information System Security Officer 1 ARTH198
JBAB, Washington DC
Closed
04/01/2022

Information System Security Officer 1:



The ISSO is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO.  The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is assigned responsibility for the day-to-day security operations of a system.  This also will include physical and environmental protection, personnel security, incident handling, and security training and awareness. It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configuration management across authorization boundaries.  This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts.  The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.




Performance shall include:



•Assist the ISSM in meeting their duties and responsibilities

•Prepare, review, and update authorization packages

•Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media

•Notify ISSM when changes occur that might affect the authorization determination of the information system(s)

•Conduct periodic reviews of information systems to ensure compliance with the security authorization package

•Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change

•Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly

•Ensure all IS security-related documentation is current and accessible to properly authorized individuals

•Ensure audit records are collected, reviewed, and documented (to include any anomalies)

•Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties

•Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans

•Identify cyber security vulnerabilities and assist with the implementation of the countermeasures for them

•Prepare reports on the status of security safeguards applied to computer systems

•Perform ISSO duties in support of in-house and external customers




Experience:



•1 - 2 years related experience

•Prior performance in roles such as System or Network Administrator




Education:



•Bachelor’s degree or equivalent experience (4 years)




Certifications:



•Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level I or Information Assurance Manager I within 6 months of the date of hire




Security Clearance:



•Current Top Secret Clearance with SCI Eligibility

•Eligibility for access to Special Access Program Information

•Willingness to submit to a Counterintelligence polygraph




Other Requirements:



•Must be able to regularly lift up to 50 lbs


Arthur
Information Assurance System Security Engineer 1 ARTH197
JBAB, Washington DC
Closed
04/01/2022

Information Assurance Security System Engineer:



The Information System Security Engineer (ISSE) is primarily responsible for conducting information system security engineering activities with a focus on lifecycle of current systems and future requirement scoping.  The position will collect and process the captured information security requirements and ensures that the requirements are effectively integrated into information systems through purposeful security architecting, design, development, and configuration.  The position is an integral part of the development team designing and developing organizational information systems or upgrading legacy systems.  The ISSE employs best practices when implementing security requirements within an information system including software engineering methodologies, system/security engineering principles, secure design, secure architecture, and secure coding techniques.  This position’s main function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts.  The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.




Performance shall include:



•Perform oversight of the development, implementation and evaluation of information system security program policy; special emphasis placed upon integration of existing SAP network infrastructures

•Perform analysis of network security, based upon the Risk Management Framework (RMF) with emphasize on Joint Special Access Program Implementation Guide (JSIG) authorization process

•Provides expert support, research and analysis of exceptionally complex problems, and processes relating to them

•Serves as technical expert to the Cybersecurity Assessment Program providing technical direction, interpretation and alternatives to complex problems

•Thinks independently and demonstrates exceptional written and oral communications skills. Applies advanced technical principles, theories, and concepts

•Contributes to the development of new principles, concepts, and methodologies.

•Works on unusually complex technical problems and provides highly innovative and ingenious solutions

•Recommends cybersecurity software tools and assists in the development of software tool requirements and selection criteria to include the development of product specific STIGs from applicable DISA SRGs

•Leads technical teams in implementation of predetermined long-range goals and objectives

•Support customer and SAP community IA working groups, participate in SSE IPT reviews

•Provides expert level consultation and technical services on all aspects of Information Security

•Review ISSE related designs and provides security compliance recommendations

•Develop and provide IA risk management recommendations to the customer

•Provide ISSE support for Mission and Training systems design and development 

•Assist with development and maintenance of the Program Protection Plan

•Assist with site activation activities and design reviews

•Represent the customer in various ISSE related working groups, advisory groups, and advisory council meetings

•Strong background in Patch/Configuration management, DevOps, and tier 3 support

•Assist team to design, integrate, and implement JSIG/RMF Continuous Monitoring tools and processes

•Integrate COTS & GOTS products to collect, display and remediate a variety of automated system security and system operations/performance functions and metrics.

•Perform security assessments of servers/network devices/security appliances

•Develop improvements to security assessments with regard to accuracy and efficiency

•Integrate ancillary monitoring tools/capabilities with the enterprise security information and event management (SIEM) and create/tailor complex event alarms/rules and summary reports

•Write and execute cybersecurity test procedures for validation of control compliance

•Monitor/analyze output of cybersecurity related tools for reportable security incidents and residual risk

•Analyze technical risk of emerging cybersecurity tools and processes

•Work as part of a security incident response team as needed

•Build operational Operations and Maintenance (O&M) checklists to maintain the service (daily, weekly, monthly, yearly O&M checklists); build Tactics, Techniques and Processes (TTPs) and Standard Operating Processes (SOPs) associated with service checklists

•Integrate/Develop new techniques to improve Confidentiality, Integrity, and Availability for networks/systems operating at various classification levels

•Advanced technical competency in one or more of the following supported platforms: Microsoft Windows Server, Active Directory, Red Hat Enterprise Linux servers, MS Hyper-V/VMWare/ESx/Xen Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems, forensic analysis/vulnerability assessment, Group Policy management and configuration, Scripting, BMC Footprints, WSUS, Lumension, Bitlocker, SQL Server 2012, TomCat, IIS, Windows Server 2012r2/2016, Win 10, Red Hat 6.5, Microsoft Office

•Toolkits, SEIMs, Logrhythm, ACAS/Nessus/SCAP, mandatory/role-based access control concepts (e. g. SE Linux extensions to RHEL, PitBull, AppArmor, and Sentris) , video teleconferencing/VOIP, Oracle/MS SQL database security, and Apache/IIS Web server security




Experience:



•10 - 12 years related experience

•Prior performance in roles such as ISSO, ISSM, SCA or SAP IT Technical Director

Education:

•Bachelor’s degree in a related discipline or equivalent experience (4 years)




Certifications:



•Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Manager Level III or Information Assurance Architect and Engineer Level I within 6 months of the date of hire




Security Clearance



•Current Top Secret Clearance with SCI Eligibility

•Eligibility for access to Special Access Program Information

•Willingness to submit to a Counterintelligence polygraph




Other Requirements



•Must have expert knowledge of DoD, National and applicable service and agency security policy, manuals and standards.  Must have the ability to work in a dynamic environment and effectively interact with numerous DOD, military/civilian personnel and industry partners


Arthur
Program Security Representative 2 ARTH196
Pentagon, VA
Closed
04/01/2022

Program Security Representative 2:



The Program Security Representative’s primary function is to provide multi-discipline security support for one or more of the customer’s Special Access Programs (SAPs).  The position will provide “day-to-day” multi-discipline analysis for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.




Performance shall include:



•Ensure strict adherence to the provisions of the NISPOM, its Supplement, the DoD Overprint, DCID, ICD, and SAP policy

•Assist in developing and executing approved policies and procedures for safeguarding Special Access Program (SAP), Sensitive Compartmented Information (SCI) and collateral data in support of US military operations

•Provide day-to-day security support that includes continuous assessment of procedures to identify shortfalls and provide appropriate recommendations for revising and improving security policies, procedures, and systems

•Identify vulnerabilities, threats, and risks to test, training, and operational activities

•Assist in developing, implementing, and training the Operations Security program

•Assist in providing contractor and subordinate facility assistance and oversight

•Brief all levels of personnel, both in the government and senior civilian services, on a variety of security related topics

•Conduct and document SAP facility compliance reviews, follow-on facility reviews, and facility close-outs

•Monitor, report and track all corrective actions resulting from compliance reviews

•Ensure timely notification of pertinent security matters to program technical and management staff

•Conduct exploration of any loss, compromise, or suspected compromise of classified and/or sensitive information, including conducting preliminary inquiries and generating damage assessments resulting from the loss of classified information

•Coordinate with SAP security personnel to ensure lessons learned are incorporated into the curriculum for the SAP security education & awareness program




Experience:


•8 – 10 years related experience

•Security Fundamentals Professional Certification (SFPC) counts towards 3 years of experience

•Special Program Security Certification (SPSC) counts towards 5 years of experience

•Maximum equivalent experience for SPED Certifications is no more than 5 years




Education:



•Bachelor’s degree in a related area or equivalent experience (4 years)




Security Clearance:



•Current Top Secret Clearance with SCI Eligibility

•Eligibility for access to Special Access Program Information

•Willingness to submit to a Counterintelligence polygraph


Arthur
Network System Administrator 3 ARTH195
JBAB, Washington DC
Closed
04/01/2022

Network System Administrator 3:



The primary function will be to organize, install, and support government organization’s computer systems, including local area networks (LANs), wide area networks (WANs), network segments, intranets, and other data communication systems. This will also include helping architect, design and analyze network models. It will require participation in decisions about buying future hardware or software to upgrade organization’s infrastructure. This position might be called upon to provide technical support to computer users to help solve users’ problems. This position will support activities within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.




Performance shall include:



•Able to perform self-sustaining and work with little to no oversight

•Lead IT ops team on day to day management and operations of Networks and implement capabilities vetted through Cybersecurity, ISSE and higher headquarters to maintain JSIG/RMF Authority to Operate and maintain Continuous Monitoring tools and processes

•Manage COTS & GOTS products to collect, display and remediate a variety of automated system security and system operations/performance functions and metrics.

•Assist during security assessments of servers/network devices/security appliances

•Assist during security assessments with regard to accuracy and efficiency.

•Assist with Creation of operational Operations and Maintenance (O&M) checklists to maintain the service (daily, weekly, monthly, yearly O&M checklists); build Tactics, Techniques and Processes (TTPs) and Standard Operating Processes (SOPs) associated with service checklists

•Manage and operate monitoring tools/capabilities with the enterprise security information and event management (SIEM) and create/tailor complex event alarms/rules and summary reports

•Execute cybersecurity operations procedures for day to day network management, operations and maintenance

•Monitor/analyze output of cybersecurity related tools for reportable security incidents and residual risk

•Assist in analyzing technical risk, upon request, of emerging cybersecurity tools and processes

•Work as part of a security incident response team as needed

•Assist ISSM/ISSO/ISSE  with the Integration/Development new techniques to improve Confidentiality, Integrity, and Availability for networks/systems operating at various classification levels

•Advanced technical competency in one or more of the following supported platforms: Microsoft Windows Server, Active Directory Red Hat Enterprise Linux servers, MS Hyper-V/VMWare/ESx/Xen Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems, forensic analysis/vulnerability assessment, Group Policy management and configuration, Scripting, BMC Footprints, WSUS, , Lumension, Bitlocker, SQL Server 2012, TomCat, IIS, Windows Server 2012r2/2016, Win 10, Red Hat 6.5, Microsoft Office

•Toolkits, SEIMs, Logrhythm, ACAS/Nessus/SCAP, mandatory/role-based access control concepts (e. g. SE Linux extensions to RHEL, PitBull, AppArmor, and Sentris) , video teleconferencing/VOIP, Oracle/MS SQL database security, and Apache/IIS Web server security




Experience:



•5 - 7 years related experience




Education:



•Bachelor’s degree in a related area or equivalent experience (4 years)




Certifications:



•Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level III within 6 months of the date of hire




Security Clearance:



•Current Top Secret Clearance with SCI Eligibility

•Eligibility for access to Special Access Program Information

•Willingness to submit to a Counterintelligence polygraph




Other Requirements:



•Thorough knowledge of Microsoft Windows desktop and server operating systems, Microsoft Exchange Server, and as needed RHEL operating systems administration and associated hardware

•Experience in effective communication and collaborating in a high performance team environment.

•Group Policy design and configuration

•Working knowledge of CISCO network and switching and virtualization technologies

•Working knowledge of virtualization as it applies to users environments, operating systems, and network appliances

•Working knowledge of Local Area Network (LAN) and Wide Area Network (WAN) technologies and data backup technologies

•Working knowledge communication security (COMSEC) policies and integration

•Working knowledge of Risk Management Framework, Common Criteria, and System Security Policy as they relate to assessments and authorization

•Working knowledge and current relevant experience with PL2, PL3, and PL4 network environments/systems

•Working knowledge of WSUS and/or YUM patch deployment methodologies

•Must be familiar with DoD policy as it applies to implementing and executing system and network administration

•Working knowledge of Risk Management Framework and how to apply it to network/information system environments

•Must be able to regularly lift up to 50 lbs

Arthur
Information System Security Manager 2 ARTH194
Langley AFB, VA
Immediate
04/01/2022

Information System Security Manager 2:



The ISSM’s primary function serves as a principal advisor on all matters, technical and otherwise, involving the security of information systems under their purview.  Primary support will be working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense, and Military Compartment efforts.  The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.




Performance shall include:



•Perform oversight of the development, implementation and evaluation of information system security program policy; special emphasis placed upon integration of existing SAP network infrastructures

•Develop and oversee operational information systems security implementation policy and guidelines of network security, based upon the Risk Management Framework (RMF) with emphasize on Joint Special Access Program Implementation Guide (JSIG) authorization process

•Advise customer on Risk Management Framework (RMF) assessment and authorization issues

•Perform risk assessments and make recommendations to DoD agency customers

•Advise government program managers on security testing methodologies and processes

•Evaluate authorization documentation and provide written recommendations for authorization to government PM’s.

•Develop and maintain a formal Information Systems Security Program

•Ensure that all IAOs, network administrators, and other cyber security personnel receive the necessary technical and security training to carry out their duties

•Develop, review, endorse, and recommend action by the AO or DAO of system assessment documentation

•Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media

•Develop and execute security assessment plans that include verification that the features and assurances required for each protection level functioning

•Maintain a and/or applicable repository for all system authorization documentation and modifications

•Develop policies and procedures for responding to security incidents, to include investigating and reporting security violations and incidents

•Ensure proper protection or corrective measures have been taken when an incident or vulnerability has been discovered within a system

•Ensure that data ownership and responsibilities are established for each authorization boundary, to include accountability, access rights, and special handling requirements

•Ensure development and implementation of an information security education, training, and awareness program, to include attending, monitoring, and presenting local cyber security training.

•Evaluate threats and vulnerabilities to ascertain whether additional safeguards are needed

•Assess changes in the system, its environment, and operational needs that could affect the authorization

•Ensure that authorization is accomplished a valid Authorization determination has been given for all authorization boundaries under your purview

•Review AIS assessment plans

•Coordinate with PSO or cognizant security official on approval of external information systems (e.g., guest systems, interconnected system with another organization)

•Conduct periodic assessments of the security posture of the authorization boundaries

•Institute and implement a Configuration Control Board (CCB) charter

•Ensure configuration management (CM) for security-relevant changes to software, hardware, and firmware and that they are properly documented

•Ensure periodic testing is conducted to evaluate the security posture of IS by employing various intrusion/attack detection and monitoring tools (shared responsibility with ISSOs)

•Ensure that system recovery and reconstitution processes developed and monitored to ensure that the authorization boundary can be recovered based on its availability level determination

•Ensure all authorization documentation is current and accessible to properly authorized individuals

•Ensure that system security requirements are addressed during all phases of the system life cycle

•Participate in self-inspections

•Periodically review system security to accommodate changes to policy or technology

•Coordinate all technical security issues outside of area of expertise or responsibility with ISSE

•Provide expert research and analysis in support of expanding programs and area of responsibility as it pertains to cyber security and information technology activities

•Develop Assured File Transfers (AFT) on accordance with the JSIG

•Provide leadership, mentoring, and quality assurance for Cyber Security and Information Technology team members




Experience:



•7 - 9 years related experience

•Prior performance in roles such as ISSO or ISSM




Education:



•Bachelor’s degree or equivalent experience (4 years)




Certifications:


•Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level 2 or Information Assurance Manager Level 2 within 6 months of the date of hire




Security Clearance:



•Current Top Secret Clearance with SCI Eligibility

•Eligibility for access to Special Access Program Information

•Willingness to submit to a Counterintelligence polygraph




Other Requirements:



•Must be able to regularly lift up to 50 lbs


Arthur
Program Security Representative 1 ARTH193
Wright Patterson AFB, OH
Immediate
04/01/2022

Program Security Representative 1:



The Program Security Representative’s primary function is to provide multi-discipline security support for one or more of the customer’s Special Access Programs (SAPs).  The position will provide “day-to-day” multi-discipline analysis for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.




Performance shall include:



•Ensure strict adherence to the provisions of the NISPOM, its Supplement, the DoD Overprint, DCID, ICD, and SAP policy

•Assist in developing and executing approved policies and procedures for safeguarding Special Access Program (SAP), Sensitive Compartmented Information (SCI) and collateral data in support of US military operations.

•Provide day-to-day security support that includes continuous assessment of procedures to identify shortfalls and provide appropriate recommendations for revising and improving security policies, procedures, and systems

•Identify vulnerabilities, threats, and risks to test, training, and operational activities 

•Assist in developing, implementing, and training the Operations Security program

•Assist in providing contractor and subordinate facility assistance and oversight

•Brief all levels of personnel, both in the government and senior civilian services, on a variety of security related topics

•Conduct and document SAP facility compliance reviews, follow-on facility reviews, and facility close-outs

•Monitor, report and track all corrective actions resulting from compliance reviews

•Ensure timely notification of pertinent security matters to program technical and management staff

•Conduct exploration of any loss, compromise, or suspected compromise of classified and/or sensitive information, including conducting preliminary inquiries and generating damage assessments resulting from the loss of classified information.

•Coordinate with SAP security personnel to ensure lessons learned are incorporated into the curriculum for the SAP security education & awareness program




Experience:



•5 - 7 years related experience

•Security Fundamentals Professional Certification (SFPC) counts towards 3 years of experience

•Special Program Security Certification (SPSC) counts towards 5 years of experience

•Maximum equivalent experience for SPED Certifications is no more than 5 years




Education:



•Bachelor’s degree in a related area or equivalent experience (4 years)




Security Clearance:



•Current Top Secret Clearance with SCI Eligibility

•Eligibility for access to Special Access Program Information

•Willingness to submit to a Counterintelligence polygraph


Arthur
Security Control Assessor 1 ARTH192
Eglin AFB, FL
Immediate
04/01/2022

Security Control Assessor 1:



The SCA is responsible for conducting a comprehensive assessment of the management, operational, and technical security controls employed within or inherited by an IS to determine the overall effectiveness of the controls (i.e., the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting the security requirements for the system).  SCAs also provide an assessment of the severity of weaknesses or deficiencies discovered in the IS and its environment of operation and recommend corrective actions to address identified vulnerabilities. Responsibilities will cover Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities within the customer’s area of responsibility.




Performance shall include:



•Perform oversight of the development, implementation and evaluation of IS security program policy; special emphasis placed upon integration of existing SAP network infrastructure

•Perform assessment of ISs, based upon the Risk Management Framework (RMF) methodology in accordance with the Joint Special Access Program (SAP) Implementation Guide (JSIG)

•Advise the Information System Owner (ISO), Information Data Owner (IDO), Program Security Officer (PSO), and the Delegated and/or Authorizing Official (DAO/AO) on any assessment and authorization issues.

•Evaluate Authorization packages and make recommendation to the AO and/or DAO for authorization

•Evaluate IS threats and vulnerabilities to determine whether additional safeguards are required

•Advise the Government concerning the impact levels for Confidentiality, Integrity, and Availability for the information on a system

•Ensure security assessments are completed and results documented and prepare the Security Assessment Report (SAR) for the Authorization boundary

•Initiate a Plan of Action and Milestones (POA&M) with identified weaknesses for each Authorization Boundaries assessed, based on findings and recommendations from the SAR

•Evaluate security assessment documentation and provide written recommendations for security authorization to the Government

•Discuss recommendation for authorization and submit the security authorization package to the AO/DAO

•Assess proposed changes to Authorization boundaries operating environment and mission needs to determine the continuation to operate.

•Review and concur with all sanitization and clearing procedures in accordance with Government guidance and/or policy

•Assist the Government compliance inspections

•Assist the Government with security incidents that relate to cybersecurity and ensure that the proper and corrective measures have been taken

•Ensure organization are addressing and conducting all phases of the system development life cycle (SDLC)

•Evaluate Hardware and Software to determine security impact that it might have on Authorization boundaries

•Evaluate the effectiveness and implementation of Continuous Monitoring Plans

•Represent the customer on inspection teams




Experience:



•5 - 7 years related experience

•Minimum of three (3) years’ experience in SAP, SCI or Collateral Information Systems (IS) Security and the implementation of regulations identified in the description of duties

•Prior performance in the role of ISSO and ISSM




Education:



•Bachelor’s degree in a related discipline or equivalent experience (4 years)




Certifications:



•Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level III or Information Assurance Manager Level I within 6 months of the date of hire




Security Clearance:



•Current Top Secret Clearance with SCI Eligibility

•Eligibility for access to Special Access Program Information

•Willingness to submit to a Counterintelligence polygraph




Other Requirements:


•Must be able to regularly lift 50lbs

Arthur
Security Control Assessor 1 ARTH191
Palmdale, CA
Immediate
04/01/2022

Security Control Assessor 1:



The SCA is responsible for conducting a comprehensive assessment of the management, operational, and technical security controls employed within or inherited by an IS to determine the overall effectiveness of the controls (i.e., the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting the security requirements for the system).  SCAs also provide an assessment of the severity of weaknesses or deficiencies discovered in the IS and its environment of operation and recommend corrective actions to address identified vulnerabilities. Responsibilities will cover Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities within the customer’s area of responsibility.




Performance shall include:



•Perform oversight of the development, implementation and evaluation of IS security program policy; special emphasis placed upon integration of existing SAP network infrastructure

•Perform assessment of ISs, based upon the Risk Management Framework (RMF) methodology in accordance with the Joint Special Access Program (SAP) Implementation Guide (JSIG)

•Advise the Information System Owner (ISO), Information Data Owner (IDO), Program Security Officer (PSO), and the Delegated and/or Authorizing Official (DAO/AO) on any assessment and authorization issues

•Evaluate Authorization packages and make recommendation to the AO and/or DAO for authorization

•Evaluate IS threats and vulnerabilities to determine whether additional safeguards are required

•Advise the Government concerning the impact levels for Confidentiality, Integrity, and Availability for the information on a system

•Ensure security assessments are completed and results documented and prepare the Security Assessment Report (SAR) for the Authorization boundary

•Initiate a Plan of Action and Milestones (POA&M) with identified weaknesses for each Authorization Boundaries assessed, based on findings and recommendations from the SAR

•Evaluate security assessment documentation and provide written recommendations for security authorization to the Government

•Discuss recommendation for authorization and submit the security authorization package to the AO/DAO

•Assess proposed changes to Authorization boundaries operating environment and mission needs to determine the continuation to operate.

•Review and concur with all sanitization and clearing procedures in accordance with Government guidance and/or policy

•Assist the Government compliance inspections

•Assist the Government with security incidents that relate to cybersecurity and ensure that the proper and corrective measures have been taken

•Ensure organization are addressing and conducting all phases of the system development life cycle (SDLC)

•Evaluate Hardware and Software to determine security impact that it might have on Authorization boundaries

•Evaluate the effectiveness and implementation of Continuous Monitoring Plans

•Represent the customer on inspection teams.




Experience:



•5 - 7 years related experience

•Minimum of three (3) years’ experience in SAP, SCI or Collateral Information Systems (IS) Security and the implementation of regulations identified in the description of duties

•Prior performance in the role of ISSO and ISSM




Education:



•Bachelor’s degree in a related discipline or equivalent experience (4 years)




Certifications:



•Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level III or Information Assurance Manager Level I within 6 months of the date of hire




Security Clearance:



•Current Top Secret Clearance with SCI Eligibility

•Eligibility for access to Special Access Program Information

•Willingness to submit to a Counterintelligence polygraph




Other Requirements:



•Must be able to regularly lift 50lbs


Arthur
Network System Administrator 3 ARTH190
JBAB, Washington DC
Closed
04/01/2022

Network System Administrator 3:



The primary function will be to organize, install, and support government organization’s computer systems, including local area networks (LANs), wide area networks (WANs), network segments, intranets, and other data communication systems. This will also include helping architect, design and analyze network models. It will require participation in decisions about buying future hardware or software to upgrade organization’s infrastructure. This position might be called upon to provide technical support to computer users to help solve users’ problems. This position will support activities within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.




Performance shall include:



•Able to perform self-sustaining and work with little to no oversight

•Lead IT ops team on day to day management and operations of Networks and implement capabilities vetted through Cybersecurity, ISSE and higher headquarters to maintain JSIG/RMF Authority to Operate and maintain Continuous Monitoring tools and processes

•Manage COTS & GOTS products to collect, display and remediate a variety of automated system security and system operations/performance functions and metrics.

•Assist during security assessments of servers/network devices/security appliances

•Assist during security assessments with regard to accuracy and efficiency

•Assist with Creation of operational Operations and Maintenance (O&M) checklists to maintain the service (daily, weekly, monthly, yearly O&M checklists); build Tactics, Techniques and Processes (TTPs) and Standard Operating Processes (SOPs) associated with service checklists

•Manage and operate monitoring tools/capabilities with the enterprise security information and event management (SIEM) and create/tailor complex event alarms/rules and summary reports

•Execute cybersecurity operations procedures for day to day network management, operations and maintenance

•Monitor/analyze output of cybersecurity related tools for reportable security incidents and residual risk

•Assist in analyzing technical risk, upon request, of emerging cybersecurity tools and processes

•Work as part of a security incident response team as needed

•Assist ISSM/ISSO/ISSE  with the Integration/Development new techniques to improve Confidentiality, Integrity, and Availability for networks/systems operating at various classification levels

•Advanced technical competency in one or more of the following supported platforms: Microsoft Windows Server, Active Directory Red Hat Enterprise Linux servers, MS Hyper-V/VMWare/ESx/Xen Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems, forensic analysis/vulnerability assessment, Group Policy management and configuration, Scripting, BMC Footprints, WSUS, , Lumension, Bitlocker, SQL Server 2012, TomCat, IIS, Windows Server 2012r2/2016, Win 10, Red Hat 6.5, Microsoft Office

•Toolkits, SEIMs, Logrhythm, ACAS/Nessus/SCAP, mandatory/role-based access control concepts (e. g. SE Linux extensions to RHEL, PitBull, AppArmor, and Sentris) , video teleconferencing/VOIP, Oracle/MS SQL database security, and Apache/IIS Web server security




Experience:



•5 - 7 years related experience




Education:



•Bachelor’s degree in a related area or equivalent experience (4 years)




Certifications:



•Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level III within 6 months of the date of hire




Security Clearance



•Current Top Secret Clearance with SCI Eligibility

•Eligibility for access to Special Access Program Information

•Willingness to submit to a Counterintelligence polygraph




Other Requirements:



•Thorough knowledge of Microsoft Windows desktop and server operating systems, Microsoft Exchange Server, and as needed RHEL operating systems administration and associated hardware

•Experience in effective communication and collaborating in a high performance team environment.

•Group Policy design and configuration

•Working knowledge of CISCO network and switching and virtualization technologies

•Working knowledge of virtualization as it applies to users environments, operating systems, and network appliances

•Working knowledge of Local Area Network (LAN) and Wide Area Network (WAN) technologies and data backup technologies

•Working knowledge communication security (COMSEC) policies and integration

•Working knowledge of Risk Management Framework, Common Criteria, and System Security Policy as they relate to assessments and authorization

•Working knowledge and current relevant experience with PL2, PL3, and PL4 network environments/systems

•Working knowledge of WSUS and/or YUM patch deployment methodologies

•Must be familiar with DoD policy as it applies to implementing and executing system and network administration

•Working knowledge of Risk Management Framework and how to apply it to network/information system environments

•Must be able to regularly lift up to 50 lbs.


Arthur
Security Control Assessor 2 ARTH189
Crystal City, VA
Immediate
04/01/2022

Security Control Assessor 2:



The SCA is responsible for conducting a comprehensive assessment of the management, operational, and technical security controls employed within or inherited by an IS to determine the overall effectiveness of the controls (i.e., the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting the security requirements for the system).  SCAs also provide an assessment of the severity of weaknesses or deficiencies discovered in the IS and its environment of operation and recommend corrective actions to address identified vulnerabilities. Responsibilities will cover Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities within the customer’s area of responsibility.




Performance shall include:



•Perform oversight of the development, implementation and evaluation of IS security program policy; special emphasis placed upon integration of existing SAP network infrastructure

•Perform assessment of ISs, based upon the Risk Management Framework (RMF) methodology in accordance with the Joint Special Access Program (SAP) Implementation Guide (JSIG)

•Advise the Information System Owner (ISO), Information Data Owner (IDO), Program Security Officer (PSO), and the Delegated and/or Authorizing Official (DAO/AO) on any assessment and authorization issues

•Evaluate Authorization packages and make recommendation to the AO and/or DAO for authorization

•Evaluate IS threats and vulnerabilities to determine whether additional safeguards are required

•Advise the Government concerning the impact levels for Confidentiality, Integrity, and Availability for the information on a system

•Ensure security assessments are completed and results documented and prepare the Security Assessment Report (SAR) for the Authorization boundary

•Initiate a Plan of Action and Milestones (POA&M) with identified weaknesses for each Authorization Boundaries assessed, based on findings and recommendations from the SAR

•Evaluate security assessment documentation and provide written recommendations for security authorization to the Government

•Discuss recommendation for authorization and submit the security authorization package to the AO/DAO

•Assess proposed changes to Authorization boundaries operating environment and mission needs to determine the continuation to operate.

•Review and concur with all sanitization and clearing procedures in accordance with Government guidance and/or policy

•Assist the Government compliance inspections

•Assist the Government with security incidents that relate to cybersecurity and ensure that the proper and corrective measures have been taken

•Ensure organization are addressing and conducting all phases of the system development life cycle (SDLC)

•Evaluate Hardware and Software to determine security impact that it might have on Authorization boundaries

•Evaluate the effectiveness and implementation of Continuous Monitoring Plans

•Represent the customer on inspection teams




Experience:



•7 - 9 years related experience

•Minimum of four (4) years’ experience in SAP, SCI or Collateral Information Systems (IS) Security and the implementation of regulations identified in the description of duties. 

•Prior performance in the role of ISSO and ISSM or SCA




Education:



•Bachelor’s degree in a related discipline or equivalent experience (4 years)




Certifications:



•Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level III or Information Assurance Manager Level II within 6 months of the date of hire.




Security Clearance:



•Current Top Secret Clearance with SCI Eligibility

•Eligibility for access to Special Access Program Information

•Willingness to submit to a Counterintelligence polygraph




Other Requirements



•Must be able to regularly lift 50lbs


Arthur
Security Control Assessor 1 ARTH188
Hill AFB, UT
Closed
04/01/2022

Security Control Assessor 1:



The SCA is responsible for conducting a comprehensive assessment of the management, operational, and technical security controls employed within or inherited by an IS to determine the overall effectiveness of the controls (i.e., the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting the security requirements for the system). SCAs also provide an assessment of the severity of weaknesses or deficiencies discovered in the IS and its environment of operation and recommend corrective actions to address identified vulnerabilities. Responsibilities will cover Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities within the customer’s area of responsibility.




Performance shall include:



•Perform oversight of the development, implementation and evaluation of IS security program policy; special emphasis placed upon integration of existing SAP network infrastructure

•Perform assessment of ISs, based upon the Risk Management Framework (RMF) methodology in accordance with the Joint Special Access Program (SAP) Implementation Guide (JSIG)

•Advise the Information System Owner (ISO), Information Data Owner (IDO), Program Security Officer (PSO), and the Delegated and/or Authorizing Official (DAO/AO) on any assessment and authorization issues

•Evaluate Authorization packages and make recommendation to the AO and/or DAO for authorization

•Evaluate IS threats and vulnerabilities to determine whether additional safeguards are required

•Advise the Government concerning the impact levels for Confidentiality, Integrity, and Availability for the information on a system

•Ensure security assessments are completed and results documented and prepare the Security Assessment Report (SAR) for the Authorization boundary

•Initiate a Plan of Action and Milestones (POA&M) with identified weaknesses for each Authorization Boundaries assessed, based on findings and recommendations from the SAR

•Evaluate security assessment documentation and provide written recommendations for security authorization to the Government

•Discuss recommendation for authorization and submit the security authorization package to the AO/DAO

•Assess proposed changes to Authorization boundaries operating environment and mission needs to determine the continuation to operate.

•Review and concur with all sanitization and clearing procedures in accordance with Government guidance and/or policy

•Assist the Government compliance inspections

•Assist the Government with security incidents that relate to cybersecurity and ensure that the proper and corrective measures have been taken

•Ensure organization are addressing and conducting all phases of the system development life cycle (SDLC)

•Evaluate Hardware and Software to determine security impact that it might have on Authorization boundaries

•Evaluate the effectiveness and implementation of Continuous Monitoring Plans

•Represent the customer on inspection teams




Experience:



•5 - 7 years related experience

•Minimum of three (3) years’ experience in SAP, SCI or Collateral Information Systems (IS) Security and the implementation of regulations identified in the description of duties

•Prior performance in the role of ISSO and ISSM




Education:



•Bachelor’s degree in a related discipline or equivalent experience (4 years)




Certifications:


•Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level III or Information Assurance Manager Level I within 6 months of the date of hire




Security Clearance:



•Current Top Secret Clearance with SCI Eligibility

•Eligibility for access to Special Access Program Information

•Willingness to submit to a Counterintelligence polygraph




Other Requirements



•Must be able to regularly lift 50lbs


Arthur
Information System Security Officer 2 ARTH187
Dahlgren, VA
Immediate
04/01/2022

Information System Security Officer 2:



The ISSO is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO.  The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is assigned responsibility for the day-to-day security operations of a system. This also will include physical and environmental protection, personnel security, incident handling, and security training and awareness.  It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configuration management across authorization boundaries.  This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts.  The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.




Performance shall include:



•Assist the ISSM in meeting their duties and responsibilities

•Prepare, review, and update authorization packages

•Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media

•Notify ISSM when changes occur that might affect the authorization determination of the information system(s)

•Conduct periodic reviews of information systems to ensure compliance with the security authorization package

•Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change

•Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly

•Ensure all IS security-related documentation is current and accessible to properly authorized individuals

•Ensure audit records are collected, reviewed, and documented (to include any anomalies)

•Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties

•Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans

•Identify cyber security vulnerabilities and assist with the implementation of the countermeasures for them

•Prepare reports on the status of security safeguards applied to computer systems

•Perform ISSO duties in support of in-house and external customers

•Conduct security impact analysis activities and provide to the ISSM on all configuration management changes to the authorization boundaries




Experience:



•2 - 5 years related experience

•Prior performance in roles such as System, Network Administrator or ISSO




Education:



•Bachelor’s degree or equivalent experience (4 years)




Certifications:



•Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level II or Information Assurance Manager II within 6 months of the date of hire




Security Clearance:



•Current Top Secret Clearance with SCI Eligibility

•Eligibility for access to Special Access Program Information

•Willingness to submit to a Counterintelligence polygraph




Other Requirements



•Must be able to regularly lift up to 50 lbs


Arthur
Information Assurance System Security Engineer Level 1 ARTH186
Robins AFB, GA
Immediate
04/01/2022

Information Assurance System Security Engineer Level 1:



The Information System Security Engineer (ISSE) is primarily responsible for conducting information system security engineering activities with a focus on lifecycle of current systems and future requirement scoping.  The position will collect and process the captured information security requirements and ensures that the requirements are effectively integrated into information systems through purposeful security architecting, design, development, and configuration.  The position is an integral part of the development team designing and developing organizational information systems or upgrading legacy systems. The ISSE employs best practices when implementing security requirements within an information system including software engineering methodologies, system/security engineering principles, secure design, secure architecture, and secure coding techniques.  This position’s main function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts.  The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.




Performance shall include:



•Perform oversight of the development, implementation and evaluation of information system security program policy; special emphasis placed upon integration of existing SAP network infrastructures

•Perform analysis of network security, based upon the Risk Management Framework (RMF) with emphasize on Joint Special Access Program Implementation Guide (JSIG) authorization process

•Provides expert support, research and analysis of exceptionally complex problems, and processes relating to them

•Serves as technical expert to the Cybersecurity Assessment Program providing technical direction, interpretation and alternatives to complex problems

•Thinks independently and demonstrates exceptional written and oral communications skills. Applies advanced technical principles, theories, and concepts

•Contributes to the development of new principles, concepts, and methodologies.

•Works on unusually complex technical problems and provides highly innovative and ingenious solutions

•Recommends cybersecurity software tools and assists in the development of software tool requirements and selection criteria to include the development of product specific STIGs from applicable DISA SRGs

•Leads technical teams in implementation of predetermined long-range goals and objectives

•Support customer and SAP community IA working groups, participate in SSE IPT reviews

•Provides expert level consultation and technical services on all aspects of Information Security

•Review ISSE related designs and provides security compliance recommendations

•Develop and provide IA risk management recommendations to the customer

•Provide ISSE support for Mission and Training systems design and development 

•Assist with development and maintenance of the Program Protection Plan

•Assist with site activation activities and design reviews

•Represent the customer in various ISSE related working groups, advisory groups, and advisory council meetings

•Strong background in Patch/Configuration management, DevOps, and tier 3 support

•Assist team to design, integrate, and implement JSIG/RMF Continuous Monitoring tools and processes

•Integrate COTS & GOTS products to collect, display and remediate a variety of automated system security and system operations/performance functions and metrics.

•Perform security assessments of servers/network devices/security appliances

•Develop improvements to security assessments with regard to accuracy and efficiency

•Integrate ancillary monitoring tools/capabilities with the enterprise security information and event management (SIEM) and create/tailor complex event alarms/rules and summary reports

•Write and execute cybersecurity test procedures for validation of control compliance

•Monitor/analyze output of cybersecurity related tools for reportable security incidents and residual risk

•Analyze technical risk of emerging cybersecurity tools and processes

•Work as part of a security incident response team as needed

•Build operational Operations and Maintenance (O&M) checklists to maintain the service (daily, weekly, monthly, yearly O&M checklists); build Tactics, Techniques and Processes (TTPs) and Standard Operating Processes (SOPs) associated with service checklists

•Integrate/Develop new techniques to improve Confidentiality, Integrity, and Availability for networks/systems operating at various classification levels

•Advanced technical competency in one or more of the following supported platforms: Microsoft Windows Server, Active Directory, Red Hat Enterprise Linux servers, MS Hyper-V/VMWare/ESx/Xen Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems, forensic analysis/vulnerability assessment, Group Policy management and configuration, Scripting, BMC Footprints, WSUS, Lumension, Bitlocker, SQL Server 2012, TomCat, IIS, Windows Server 2012r2/2016, Win 10, Red Hat 6.5, Microsoft Office

•Toolkits, SEIMs, Logrhythm, ACAS/Nessus/SCAP, mandatory/role-based access control concepts (e. g. SE Linux extensions to RHEL, PitBull, AppArmor, and Sentris) , video teleconferencing/VOIP, Oracle/MS SQL database security, and Apache/IIS Web server security




Experience:



•10 - 12 years related experience

•Prior performance in roles such as ISSO, ISSM, SCA or SAP IT Technical Director




Education:



•Bachelor’s degree in a related discipline or equivalent experience (4 years)




Certifications:



•Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Manager Level III or Information Assurance Architect and Engineer Level I within 6 months of the date of hire




Security Clearance



•Current Top Secret Clearance with SCI Eligibility

•Eligibility for access to Special Access Program Information

•Willingness to submit to a Counterintelligence polygraph




Other Requirements



•Must have expert knowledge of DoD, National and applicable service and agency security policy, manuals and standards.  Must have the ability to work in a dynamic environment and effectively interact with numerous DOD, military/civilian personnel and industry partners



Arthur
Activity Security Representative 3 ARTH185
JBAB, Washington DC
Closed
04/01/2022

Activity Security Representative 3:




Performance shall include:



•Classification reviews of inbound and outbound correspondence

•Assist in the maintenance of a document accountability database and associated correspondence

•Processing inbound and outbound classified mail and receipt records

•Perform destruction of classified materials

•Process magnetic media for accountability

•Reproduction support for classified materials

•Maintain various daily logs for a variety of administrative functions associated with document control

•Assist in the processing of inbound data and outbound data transfer files

•Transfer electronic data files to internal customers

•Maintain an extensive customer database point of contact listing

•Assist with researching, processing, filing, and maintaining inbound and outbound visit notices

•Escort facility visitors and maintains associated logs

•Assist in the preparation of facility access control badges

•Conduct entry and exit inspections

•Assist in the maintenance of facility access control entry systems, to include visitor control

•Perform data entry to the Personnel Access Security System database and maintain all customer sponsored billets and quota information

•Assist in maintaining personnel security files for all personnel of the supported element

•Follow and enforce the customer’s Standard Operating Procedures

•Provide support for the security awareness and education programs

•Perform miscellaneous administrative support functions as directed by the contractor site lead and/or the Senior Security Representative

•Review, track, and monitor security clearance processing activities with appropriate government personnel to achieve appropriate clearance actions

•Participate in Air Force SAP security compliance inspections of government organizations and industry

•Implement Top-Secret Control for accountable material and associated correspondence

•Prepare and/or process inbound and outbound classified mail, faxes, courier packages and receipts

•Prepare, process, and/or review Program Access Request (PARs) for accuracy and access eligibility

•Execute Special Access Program Nomination Process Questionnaires

•Conduct Defense Central Index of Investigations (DCII), Joint Personnel Access System (JPAS), and SAPNP reviews of candidates being submitted for SAP access

•Perform data entry and record checks in the Air Force Access Data System (AFADS) and maintains all customer sponsored personnel access information current

•Perform indoctrinations

•Provide leadership, mentoring, and quality assurance for Team Members




Experience:



•5 - 7  years related experience

•Security Fundamentals Professional Certification (SFPC) counts towards 3 years of experience

•Special Program Security Certification (SPSC) counts towards 5 years of experience

•Maximum equivalent experience for SPED Certifications is no more than 5 years




Education:



•Bachelor’s degree or equivalent experience (4 years)




Certifications:



•Must complete the DoD SAPCO approved SAPNP training (if performing personnel security functions)




Security Clearance:



•Current Top Secret Clearance with SCI Eligibility

•Eligibility for access to Special Access Program Information

•Willingness to submit to a Counterintelligence polygraph


Arthur
Information Technology Information Assurance Level 3 ARTH184
Kirtland AFB, NM
Immediate
04/01/2022

Information Technology Information Assurance Level 3:



The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. 




Performance shall include:



•Establish complex operational software configuration controls and system interfaces for computer system(s) assigned

•Maintain file servers, Firewalls, network access, Security Monitoring Systems and system documentation as required

•Analyze and troubleshoot system anomalies to ensure optimum equipment performance

•Prepare system for operational use and support operational tests

•Review, prepare, and update authorization packages

•Notify customer when changes occur that might affect authorization accreditation

•Conduct cybersecurity portion of the self-inspection’s checklist

•Review and provide technical and cyber security coordination on all Bodies of Evidence that make-up the authorization package

•Identify any and all vulnerabilities and implement countermeasures

•Ensure information systems and network appliances are operated, maintained, and disposed of in accordance with security policies and practices

•Perform Video-Teleconferencing VTC System Administration, Scheduling, & Configuration

•Provide External Information System(s) Client Support

•Perform account creations, changes, & deletions on multiple authorization boundaries

•Perform Help Desk & troubleshooting activities

•Perform Hardware/Software System Configuration, upgrades and modifications

•Perform system and network appliance patching activities

•Provide Government-Issued Laptop Support

•Assist in Media Control & Accountability activities

•Perform COMSEC account/equipment management activities 




Experience:



•8-10 years related experience

•Prior performance in roles such as System, Network Administrator or Information Technology/Assurance Specialists

Education:

•Bachelor’s degree or equivalent experience (4 years)




Certifications:



•Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level II or Information Assurance Manager II within 6 months of the date of hire.




Security Clearance



•Current Top Secret Clearance with SCI Eligibility

•Eligibility for access to Special Access Program Information

•Willingness to submit to a Counterintelligence polygraph




Other Requirements:



•Thorough knowledge of Microsoft Windows 2012R2 Server, Microsoft Exchange Server 2010/2016, Microsoft Windows 7/10 operating systems (OS) administration and associated hardware.

•Working knowledge of Local Area Network (LAN) and Wide Area Network (WAN) technologies and data backup technologies to include communication security (COMSEC) integration

•Working knowledge of Risk Management Framework, and Joint DODIIS/Cryptologic SCI Information Systems Security Standards, Common Criteria, and System Security Policy as they relate to C&A

•Working knowledge and current relevant experience with PL2 systems; experience with PL3 & PL4 cross domain solutions

•Must be able to regularly lift up to 50 lbs


Arthur
Senior Principal Computer Systems Security Analyst TALO057
Herndon, VA
Closed
03/24/2022

Senior Principal Computer Systems Security Analyst:



In this position, candidates will be expected to:


  • Design and implement safety measures and controls. Monitor network activity to identify vulnerable points. Address privacy breaches and malware threats.

  • Support the Assessment and Authorization (A&A) processes and Information Assurance documentation for multiple analytic and mission systems across all CLINs

  • Generate and maintain the complete security Body of Evidence (BoE) while leading the A&A activities according to the Risk Management Framework (RMF) processes (ICD 503, CNSSI-1253, NIST 800-37, NIST 800-53, etc.) for all multiple information systems

  • Author, complete and maintain the System Security Plan (SSP) within XACTA

  • Develop the Security Controls Traceability Matrices (SCTM), and the Security Test Plan (STP) procedures within Xacta.

  • Analyze existing security systems and make recommendations for changes or improvements.

  • Prepare reports and action plans in the event that a security breach does occur.

  • Monitor the network and provide early warning of abnormalities or problems.

  • Communicate the system status and keep users informed of downtime or changes to the system.

  • Provide system updates and write code fixes.

  • Experience working with software developers and architects to understand security requirements.

  • Experience guiding the application developers on security policy, identifying security requirements, providing technical guidance for the satisfaction of requirements.

  • Experience creating and managing the plan of action and milestones (POA&Ms), and working with project managers and engineers to develop schedules and engineering actions that mitigate open findings.

  • Experience supporting the Continuous Monitoring of operational systems; experience monitoring and auditing operational systems for proper use




Basic Qualifications:


  • 9+ years supporting Assessment and Authorization (A&A) and information assurance processes and documentation using RMF, BS degree; 7 years of experience with a masters; an additional 4 years of experience required in lieu of a degree (will consider at Staff level with the appropriate years of experience.

  • Knowledge of current security risks and protocols

  • Willingness to work on-call in the event of a security breech or other emergency

  • Good analytic and problem solving skills

  • DoD Approved 8570 Baseline Certifications (eg, Security+) certifications

  • RMF, Xacta experience

  • TS/SCI with CI Poly (no exceptions)




Preferred Qualifications:


  • Experience working with AWS/Google cloud-hosted information systems or applications

  • Experience working with Redhat or CentOS Linux operating systems

  • Experience working in a DevSecOps environment and tool chain




Security Clearance:


  • TS SCI CI poly

TALOS
Supply Technician ESOC107
Washington, DC
Closed
03/24/2022

Supply Technician:



Performs clerical and manual tasks to maintain an inventory of materials, parts, supplies, and equipment. Shift Time : 6:00 am - 2:00 pm OR 10:00 am - 06:00 pm.




Job Description:


  • Performs clerical and manual tasks to maintain an inventory of materials, parts, supplies, and equipment.

  • Must be able to lift up to 50lbs and work in a warehouse environment where physical and manual tasks are expected to include (but not limited to): operation of pallet jack, packaging several items of various hardware items onto pallets, and preparing pallets for shipping.

  • There will need to be some flexibility to report from time to time to alternate locations within the National Capital Region as needed, permanent stations will be considered.



Education and Experience:


  • High School Diploma/ GED + Relevant experience: 8 years + CCC Academy graduate

  • Associates Degree + Relevant experience: 6 years + CCC Academy graduate

  • Bachelors Degree + Relevant experience: 4 years + CCC Academy graduate

  • Masters Degree + Relevant experience: 2 years + CCC Academy graduate

  • PhD + Relevant experience: 0 years + CCC Academy graduate.




Security Clearance:


  • TS SCI CI poly



CCC
On-site Support Technician ESOC106
Washington, DC
Closed
03/24/2022

On-site Support Technician:



Responsible for providing installation, maintenance and troubleshooting support of information systems applications and related peripheral hardware. Assesses user needs and is able to solve a range of problems. Provides installation of new equipment and performs equipment modifications or enhancements. Prepares and maintains documentation for processes for policies and procedures related to computer systems and operations.




Job Description:


  • Provides service to end-users for operation, restoration, and configuration of information systems. 

  • Reports security incidents and executes corrective security procedures.

  • Understands minor system tasks (e.g., loading software, rebooting, systems) in support of software and hardware maintenance and operations functions

  • Installs and incorporates new releases, updates/patches, or other changes to COTS hardware and software (diagnostics failures or potential failure predictions)

  • Operates and applies automated H/W management and diagnostics systems (to include remote management and diagnostics) and interprets findings to maintain, repair, or upgrade H/W

  • Conducts hardware maintenance and minor installations on equipment listed in the specified task order and understands the inter-operational relationships of all components, to the extent required to perform maintenance services

  • Provides technical assistance to responding field service personnel

  • Ability to communicate effectively and interact with customers




Qualifications:


  • Security+ or other technical certification to meet 8570 compliance required (IAT II).

  • Physical requirements (walking, lifting up to 50 lbs, crawling for extended periods of time)



Education and Experience:


  • High School Diploma/ GED + Relevant experience: 10 years + CCC Academy graduate

  • Associates Degree + Relevant experience: 8 years + CCC Academy graduate

  • Bachelors Degree + Relevant experience: 6 years + CCC Academy graduate

  • Masters Degree + Relevant experience: 4 years + CCC Academy graduate

  • PhD + Relevant experience: 2 years + CCC Academy graduate




Security Clearance:


  • TS SCI CI poly


CCC
Instructional Designer Lead LMSS009
Springfield, VA
Future
03/23/2022

This is a future position that may come open but is not open at the present moment.  We are willing to prescreen personnel for these positions if you are interested.




Instructional Designer Lead:


Provides subject matter expertise throughout the curriculum creation process, including content review and feedback to development staff.  Relevant experience includes, but is not limited to, experience developing and delivering technical training and educational courses in academic, commercial, government, or industrial organizations. Relevant subject matter expertise experience includes, but is not limited to, experience in subject areas such as GEOINT Analysis, Imagery Analysis, Imagery Science, Remote Sensing, Data Science and Analysis, Human Geography, Geographic Science, Applied Science, Emerging Technologies, Workforce Professional Development, and NGA Mandatory Training Requirements.




Required Education


  • Master's Degree or equivalent experience within related field.




Desired Education


  • A Doctorate degree in related field from an accredited (i.e., regional, national, or institutional) academic institution




Required Experience:


  • 15+ years

  • Minimum Education/Experience: a combination of higher education and experience that comprises 15+ years.




Desired Experience


  • 15 years of experience in the subject area. 5 years of experience developing and delivering technical training and educational courses in academic, commercial, government, or industrial organizations.



Security Clearance:


  • Top-Secret


LMSS
Instructional Designer Senior LMSS008
Springfield, VA
Future
03/23/2022

This is a future position that may come open but is not open at the present moment.  We are willing to prescreen personnel for these positions if you are interested.




Instructional Designer Senior:


Provides subject matter expertise throughout the curriculum creation process, including content review and feedback to development staff.  Relevant experience includes, but is not limited to, experience developing and delivering technical training and educational courses in academic, commercial, government, or industrial organizations. Relevant subject matter expertise experience includes, but is not limited to, experience in subject areas such as GEOINT Analysis, Imagery Analysis, Imagery Science, Remote Sensing, Data Science and Analysis, Human Geography, Geographic Science, Applied Science, Emerging Technologies, Workforce Professional Development, and NGA Mandatory Training Requirements.




Required Education


  • Bachelor Degree or equivalent experience within related field.




Desired Education


  • A Master’s degree in related field from an accredited (i.e., regional, national, or institutional) academic institution.



Required Experience:


  • 10-14 years

  • Minimum Education/Experience: a combination of higher education and experience that comprises 10 years.



Desired Experience


  • 10 years of experience in the subject area. Some experience developing and delivering technical training and educational courses in academic, commercial, government, or industrial organizations.




Security Clearance:


  • Top-Secret












LMSS
Instructional Designer Mid-level LMSS007
Springfield, VA
Future
03/23/2022

This is a future position that may come open but is not open at the present moment.  We are willing to prescreen personnel for these positions if you are interested.




Instructional Designer Mid-level:



Provides subject matter expertise throughout the curriculum creation process, including content review and feedback to development staff. Relevant experience includes, but is not limited to, experience developing and delivering technical training and educational courses in academic, commercial, government, or industrial organizations. Relevant subject matter expertise experience includes, but is not limited to, experience in subject areas such as GEOINT Analysis, Imagery Analysis, Imagery Science, Remote Sensing, Data Science and Analysis, Human Geography, Geographic Science, Applied Science, Emerging Technologies, Workforce Professional Development, and NGA Mandatory Training Requirements.




Required Education


  • Bachelor’s Degree or equivalent experience within related field.   




Desired Education


  • A Master’s degree in a related field from an   accredited (i.e., regional, national, or institutional) academic institution




Required Education


  • 5 - 9 years

  • Minimum Education/Experience: a combination of higher education and experience that comprises 5 years.



Desired Education


  • 5 or more years of experience in the subject area. Some experience developing and delivering technical training and educational courses in academic, commercial, government, or industrial organizations.




Security Clearance:


  • Top-Secret











LMSS
Program Manager Lead LMSS006
Springfield, VA
Closed
03/23/2022

This is a future position that may come open but is not open at the present moment.  We are willing to prescreen personnel for these positions if you are interested.




Program Manger Lead:



Responsible for planning, executing, oversight, and day-to-day management of business activities within assigned program. Develops plans and procedures for area of responsibility within government-approved scope, to include Program Management, Contract Transition, Subcontractor, and Quality Control plans. Experience overseeing subcontractor performance, reviewing subcontractor invoices, and projecting forecasts. Reviews resumes, interviews job candidates, makes candidate selections, and holds staff to high performance standards.




Required Education


  • Master’s Degree or equivalent experience within related field   




Desired Education


  • A Master’s degree in Business Administration, Industrial/Organizational Psychology, Human Resources Management, Organizational Development, or related area from an accredited (i.e.,   regional, national, or institutional) academic institution.




Required Experience


  • 15+ years  

  • Minimum  Education/Experience: a combination of higher education and experience that comprises 15 years




Desired Experience


  • 10 years of experience as a program manager in a formal academic or professional education and training environment   



Desired   Certification


  • Project Management Professional (PMP)  




Security Clearance:


  • Top-Secret

LMSS
Program Manager Senior LMSS005
Springfield, VA
Closed
03/23/2022

This is a future position that may come open but is not open at the present moment.  We are willing to prescreen personnel for these positions if you are interested.




Program Manager Senior:



Responsible for planning, executing, oversight, and day-to-day management of business activities within assigned program. Develops plans and procedures for area of responsibility within government-approved scope, to include Program Management, Contract Transition, Subcontractor, and Quality Control plans. Experience overseeing subcontractor performance, reviewing subcontractor invoices, and projecting forecasts. Reviews resumes, interviews job candidates, makes candidate selections, and holds staff to high performance standards.




Required Experience


  • Master’s Degree or equivalent experience within related field




Desired Education


  • A Master’s or Bachelor’s degree in Business Administration, Industrial/Organizational Psychology, Human Resources Management, Organizational Development, or related area from an accredited (i.e., regional, national, or institutional) academic institution.




Required


  • 10 - 14 years

  • Minimum Education/Experience: a combination of higher education and experience that comprises 10 years.




Desired Experience


  • 3 years of experience as a program man- ager in a formal academic or professional education and training environment




Desired Certification


  • Project Management Professional (PMP)




Security Clearance:


  • Top-Secret





LMSS
Program Manager Mid-level LMSS004
Springfield, VA
Closed
03/23/2022

This is a future position that may come open but is not open at the present moment.  We are willing to prescreen personnel for these positions if you are interested.




Program Manger Junior:



Responsible for planning, executing, oversight, and day-to-day management of business activities within assigned program. Develops plans and procedures for area of responsibility within government-approved scope, to include Program Management, Contract Transition, Subcontractor, and Quality Control plans. Experience overseeing subcontractor performance, reviewing subcontractor invoices, and projecting forecasts. Reviews resumes, interviews job candidates, makes candidate selections, and holds staff to high performance standards.




Required Education


  • Bachelor's or Master’s Degree or equivalent experience within related field




Desired Education


  • A Master’s or Bachelor’s degree in Business Administration, Industrial/Organizational Psychology, Human Resources Management, Organizational Development, or related area from an accredited (i.e., regional, national, or institutional) academic institution.




Required Experience


  • 5 -9 years  

  • Minimum Education/Experience: a combination of higher education and experience that comprises 5 years.




Desired Experience


  • 3 years of experience as a program man- ager   in a formal academic or professional education and training environment   




Security Clearance:


  • Top-Secret



LMSS
Technical Editor Senior LMSS003
Springfield, VA
Future
03/23/2022

This is a future position that may come open but is not open at the present moment.  We are willing to prescreen personnel for these positions if you are interested.



Technical Editor Senior:



Superior English written language skills and   knowledge of technical editing conventions. Perform final edits of document drafts, as re- quested, to ensure that documents are accurate, complete, and con- form to editorial, institutional, and branch standards for quality and style. Highly skilled in identifying content problems and communicating fixes; providing feedback, guidance, and advice. Understanding of options for using various types of graphics and layout alternatives and integrate graphics with text documents; prepare professional-quality tables and graphic elements such as various types of charts, graphs, figures, photographs, and drawings to illustrate narrative content.




Required Education


  • Bachelor's Degree or equivalent experience within related field.




Desired Education


  • A Bachelor’s or Master’s degree in English, Journalism, Communications Studies, Technical Writing, or related area from an accredited (i.e., regional, national, or institutional) academic institution.




Required Experience


  • 10+ years   

  • Minimum Education/Experience: a combination of higher education and experience that comprises 10 years.




Desired Experience


  • 10 or more years of professional experience as an editor, technical writer, copywriter or simiar position in a formal   academic or professional Education and training environment    




Security Clearance:


  • Top-Secret


LMSS
Technical Editor Mid-level LMSS002
Springfield, VA
Future
03/23/2022

This is a future position that may come open but is not open at the present moment.  We are willing to prescreen personnel for these positions if you are interested.



Technical Editor Mid-level:



Superior English written language skills and   knowledge of technical editing conventions. Perform final edits of document drafts, as re- quested, to ensure that documents are accurate, complete, and con- form to editorial, institutional, and branch standards for quality and style. Highly skilled in identifying content problems and communicating fixes; providing feedback, guidance, and advice. Understanding of options for using various types of graphics and layout alternatives and integrate graphics with text documents; prepare professional-quality tables and graphic elements such as various types of charts, graphs, figures, photographs, and drawings to illustrate narrative content.




Required Education


  • Bachelor's Degree or equivalent experience within related field.




Desired Education


  • A Bachelor’s degree in English, Journalism, Communications Studies, Technical Writing, or related area from an accredited (i.e., regional, national, or institutional) academic institution 




Required Experience


  • 5 - 9 years

  • Minimum Education/Experience: a combination of higher education and experience that comprises 5 years.




Desired Experience


  • 5 or more years of professional Experience as an editor, technical writer, copywriter or similar position in a formal academic or professional education and training environment.



Security Clearance:


  • Top-Secret




LMSS
Technical Editor Junior LMSS001
Springfield, VA
Future
03/23/2022

This is a future position that may come open but is not open at the present moment.  We are willing to prescreen personnel for these positions if you are interested.



Technical Editor Junior:



Superior English written language skills and   knowledge of technical editing conventions. Perform final edits of document drafts, as re- quested, to ensure that documents are accurate, complete, and con- form to editorial, institutional, and branch standards for quality and style. Highly skilled in identifying content problems and communicating fixes; providing feedback, guidance, and advice. Understanding of options for using various types of graphics and layout alternatives and integrate graphics with text documents; prepare professional-quality tables and graphic elements such as various types of charts, graphs, figures, photographs, and drawings to illustrate narrative content.




Required


  • Bachelor's Degree or equivalent experience within related field.



Desired Education


  • A Bachelor’s degree in English, Journalism, Communications Studies, Technical Writing, or related area from an accredited (i.e., regional, national, or institutional) academic institution.



Required Experience


  • 0 - 4 years




Desired Experience


  • Some professional experience as an editor, technical writer, copy- writer or similar position in a formal academic or professional education and training environment



Security Clearance:


  • Top Secret



LMSS
VDI Engineer ISEE148
Sterling, VA
Immediate
03/22/2022

VDI Lead Engineer:



IC-CAP is seeking a VDI SME who specializes in Windows Virtual Desktop (WVD). WVD is a comprehensive desktop and app virtualization service running on Azure and Hybrid that delivers simplified management, multi-session Windows 10, optimizations for Office 365 ProPlus, and support for Remote Desktop Services environment




Main Responsibilities:


As a VDI Lead, the candidate will deliver quality engagements with your expertise, either as an advisor, workshop, troubleshooting, assessment, reviewer or resource in high profile projects to ensure customer value. The ideal candidate must have the ability to combine their technical skills, creativity and customer focus to deliver great solutions to the customers and ensure they get the best out of our technologies and solutions. Person in this position should be able to focus on deep experience with technologies.




Skill Level 4:


  • Skills and Tasks: Exceptionally Complex, Inter-Discipline, Inter-Organizational. Can perform tasks of senior level technicians, specialists, and/or managers not performed at Level 3 due to the size and/or complexity of the tasks.

  • Leadership Management: May work individually or as a key member of a senior leadership team. Oversees and monitors performance across several disciplines, and when required, takes steps to resolve issues.

  • Guidance: Provides experts guidance and direction to Government and Vendor senior level technicians and managers. Directs multiple contractor and subcontractors teams through project completion.




Experience in leading, designing and implementing Microsoft infrastructure solutions including:


  • Windows Virtual Desktop, on-prem, cloud and hybrid;

  • Experience in managing, deploying, transforming to Windows 10 Modern Management (Intune, Autopilot, Windows Virtual Desktop, etc);

  • Expertise in Windows 10 area - SOE, imaging, evergreen;

  • Good understanding of Microsoft Endpoint Manager(SCCM); designing, deploying, managing will be a plus;

  • Awareness of Mobile Devices management systems (Android, iOS) (Vmware Workspace One, Citrix Workspace, Vmware Airwatch);

  • Understanding of Microsoft 365 products (Office365, SharePoint, EM+S, etc.);

  • Experience with Citrix products (Virtual Apps, Virtual Desktops, ADC, Provisioning) will be a plus;

  • Experience with scripting skills in Powershell or Python;

  • Azure certification will be advantageous.

  • Experience with one or more cloud service providers including Microsoft Azure (preferred)

  • Design, implement, configure, and maintain various Azure SaaS Cloud Services such as Azure AD, AIP, ATP, ASR, CAS, EM+S, Teams, Intune, AAD Connect, Exchange Online and O365.

  • Deploy and maintain Azure IaaS Virtual Machines and Azure Application and Networking Services to support growth into the cloud.

  • Optimize Azure buildouts for cost/performance (VM optimization, reserved instances, etc.)

  • Knowledge of cloud, networking, and enterprise architectures

  • Experience securing systems to one or more compliance standards (e.g. NIST 800-171, NIST 800-53)

  • Experience with at least one programming/scripting language (e.g. PoweShell Python, BASH)

  • Experience with SQL Clustering Failover.




Education and Experience:


  • High School Diploma + 12 years

  • Associate's Degree + 10 years

  • Bachelor's Degree + 8 years

  • Master's Degree + 6 years

  • PhD + 4 years




Training and Certifications:


  • IAT Level 2




Security Clearance:


  • TS SCI CI poly

ISEE
Senior Principal DevOps System Engineer TALO056
Herndon, VA
Closed
03/17/2022

Senior Principal DevOps System Engineer:



Candidate will develop CI/CD build and deploy pipelines; integrate tools into the pipeline and manage debugging integration issues. In addition, candidate will help integrate with various tools for the DevOps process.




Job Duties include:


  • Development of CI/CD Build and Deployment Pipelines: Write/modify Jenkins-based groovy scripts. Write/update CloudFormation scripts Troubleshoot pipeline issues across Jenkins and AWS Environments (Linux EC2, RDS, CloudFormation, ElasticSearch, etc…) Document key features for developer use

  • Integrate tools into the pipeline: Work with the development teams to bring in new microservices into the pipeline. Helping troubleshoot as necessary. Work through steps to automate installations of COTS products into the architecture. Debugging integration issues. Help identify issues in the deployment (i.e. potentially intermittent connectivity issues from an API Server to the Database). Monitor (and help develop scripts to monitor) the AWS services to ensure everything is functioning as necessary

  • DevOps Tool Integration: Help integrate with various tools for the DevOps process (SonarQube, Fortify, Jenkins, Robot Framework/Selenium, Artifactory, etc…)



Required:


  • A Bachelor’s degree and 9 years of relevant experience OR a Master’s degree with 7 years of relevant experience OR a PhD with 4 years of relevant experience; an additional 4 years of experience may be considered in lieu of the degree requirement

  • Experience with Linux Environments

  • Experience with scripting languages, such as Bash and Python

  • Strong problem solving, analytical, and technical troubleshooting skills

  • Experience with Git for Source Control

  • Understanding and willingness to work in a DevSecOps oriented environment with an Infrastructure as Code mindset

  • TS/ SCI




Desired:


  • Active CompTIA Security+ CE Certification

  • Basic understanding of an Object-Oriented Programming Language, preferably Java or Python

  • Experience integrating Jenkins and Docker for automated CI/CD pipelines

  • Basic understanding of Kubernetes or OpenShift Container Platform

  • TS/ SCI CI Poly


TALOS
Staff DevOps System Engineer TALO055
Herndon, VA
Closed
03/17/2022

Staff DevOps System Engineer:



Candidate will develop CI/CD build and deploy pipelines; integrate tools into the pipeline and manage debugging integration issues. In addition, candidate will help integrate with various tools for the DevOps process.




Job Duties include:


  • Development of CI/CD Build and Deployment Pipelines: Write/modify Jenkins-based groovy scripts Write/update CloudFormation scripts. Troubleshoot pipeline issues across Jenkins and AWS Environments (Linux EC2, RDS, CloudFormation, Elasticsearch, etc…) Document key features for developer use Help write and maintain scripts for process improvements (ex: stage/unstage builds, branch tag automation, automating variance corrections across networks)

  •  Integrate tools into the pipeline: Work with the development teams to bring in new microservices into the pipeline. Helping troubleshoot as necessary. Work through steps to automate installations of COTS products into the architecture

  • Debugging integration issues: Help identify issues in the deployment (i.e. potentially intermittent connectivity issues from an API Server to the Database). Monitor (and help develop scripts to monitor) the AWS services to ensure everything is functioning as necessary

  •  DevOps Tool Integration: Help integrate with various tools for the DevOps process (SonarQube, Fortify, Jenkins, Robot Framework/Selenium, Artifactory, etc…)



Required:


  • A Bachelor’s degree and 14 years of relevant experience OR a Master’s degree with 12 years of relevant experience OR a PhD with 9 years of relevant experience; an additional 4 years of experience may be considered in lieu of the degree requirement

  • Experience with Linux Environments

  • Experience with scripting languages, such as Bash and Python

  • Strong problem solving, analytical, and technical troubleshooting skills

  • Experience with Git for Source Control

  • Understanding and willingness to work in a DevSecOps oriented environment with an Infrastructure as Code mindset

  • TS/ SCI




Desired:


  • Active CompTIA Security+ CE Certification

  • Basic understanding of an Object-Oriented Programming Language, preferably Java or Python

  • Experience developing, deploying, monitoring, and troubleshooting Cloud-based software solutions

  • Experience integrating Jenkins and Docker for automated CI/CD pipelines

  • Basic understanding of Kubernetes or OpenShift Container Platform

  • TS/ SCI CI Poly

TALOS
Senior Biometrics Exploitation Examiner (Senior Identity Intelligence Analyst) SIA3007
Bethesda, MD
Immediate
03/16/2022

Senior Biometrics Exploitation Examiner (Senior Identity Intelligence Analyst)



The Candidate conducts analytic production on modalities to include, but not limited to, facial recognition features and behaviors for the purposes of identifying persons and networks. Fuses identity attributes to include, but not limited to, biographical, biological, behavioral, contextual, and reputational information related to individuals and intelligence associated with those attributes to identify and assess threat individuals and networks, their capabilities and capacity, centers of gravity, objectives, intent, and potential courses of action. The Biometrics / I2 analysts shall perform biometric examination services and produce reporting in accordance with agency guidance. Additionally, the Biometrics / I2 analysts shall conduct thorough identity exploitation of media devices and routinely interact with interagency partners on exploitation findings.




Senior-level:


  • Demonstrates working knowledge of the concepts involved in the specific functions outlined in the specified labor category description.  

  • Knowledgeable of and demonstrates ability to apply IC and DoD classification guidelines and procedures.

  • Demonstrates ability to use logic and systematic approaches to gather, evaluate, and synthesize multiple sources of information.

  • Demonstrates ability to work semi-independently with oversight and direction. 

  • Demonstrates ability to use logic when evaluating and synthesizing multiple sources of information. Demonstrates ability interpreting analysis to include, but is not limited to, its meaning, importance, and implications. 

  • Demonstrates ability to defend analytic judgements with sound, logical conclusions and adapt analytic judgments when presented with new information, evolving conditions, or unexpected developments.

  • Demonstrates ability to produce timely, logical, and concise analytic reports, documents, assessments, studies, and briefing materials in formats including Microsoft Office tools (e.g. Excel, Word, PowerPoint, etc.), electronic / soft copy matrices and / or web-enabled formats.

  • Demonstrates ability to communicate complex issues clearly in a concise and organized manner both verbally and non-verbally; with strong grammar skills. 

  • Demonstrates proficiency using Microsoft Office tools.

  • Demonstrates ability to develop structured research including, but not limited to, obtaining, evaluating, organizing, and maintaining information within security and data protocols

  • Demonstrates ability to recognize nuances and resolve contradictions and inconsistencies in information.

  • Demonstrates comprehensive mission knowledge and skills that affirms completion of all developmental training and experiences for the labor category. 

  • Demonstrates ability to work independently with minimal oversight and direction.

  • Demonstrates ability to collaborate and work with other IC members on information sharing, driving collection, and addressing analytic disputes and conflict resolution.

  • Demonstrates ability to develop concise, insightful, and comprehensive products for defense intelligence.

  • Demonstrates ability to guide teams in researching multifaceted or critical problems. 

  • Demonstrates comprehensive mission knowledge and skills that affirms completion of all developmental training and experiences for the labor category.

  • Demonstrates the ability to communicate understanding from information that may be incomplete, indirect, highly complex, seemingly unrelated, and / or technically advanced. 

  • Demonstrates ability to structure analysis based on trends in reporting and a range of analytic perspectives from other analysts, organizations, and intelligence disciplines. 

  • Demonstrates ability to work independently with minimal oversight and direction.

  • Demonstrates ability to collaborate and work with other IC members on information sharing, driving collection, and addressing analytic disputes and conflict resolution. 

  • Demonstrates ability to develop concise, insightful, and comprehensive products for defense intelligence.

  • Demonstrates ability to lead teams in researching multifaceted or critical problems. Provides guidance in selecting, designing, and applying analytic methodologies. Uses argument evaluation and validated analytic methodologies to challenge differing perspectives.

  • Demonstrates in-depth knowledge and understanding of the labor category activities required to meet mission requirements. 

  • Demonstrates ability to work independently and with minimal oversight.




Minimum Qualifications:


  • Demonstrates knowledge, expertise, and training in image comparison, facial recognition, or facial identification.

  • Possesses experience demonstrating a thorough understanding of tools / systems used for identity exploitation of biometric identity attributes and I2 tradecraft, to include biometric and biographic persona development.




Highly Desired Qualifications:


  • Knowledge and expertise in photography concepts, basic image science to include multi-media file specifications/formats/processing

  • Experience demonstrating an understanding of computer forensics principles, file systems, and forensics tools.




Education and Experience:


  • Minimum 12 years of experience related to the specific labor category with at least a portion of the experience within the last 2 years.

  • Desired Education: Master’s degree in an area related to the labor category from a college or university accredited by an agency recognized by the U.S. Department of Education; or have Bachelor’s degree related to the labor category from a college or university accredited by an agency recognized by the U.S. Department of Education and an additional 5 years of related senior experience, for a total of 17 years, as a substitute to the Master’s degree.




Security Clearance:


  • TS SCI

SIA3CybercomJ2TO
Insider Threat Auditor ECND036
Washington, DC
Closed
03/14/2022

Insider Threat Auditor:



Performs all procedures necessary to ensure the safety of information systems assets and to protect systems from intentional or inadvertent access or destruction.




Job Description:


Join a team that leads in cyber with the top technical cyber talent, range of customer experience, and emerging technology to address tomorrow’s cyber threats. Our service model approach to secure, operate, and defend is predicated on ensuring the skill-set of our staff remains on the cutting edge of technology through our virtual training platform and Cyber Range.




Skill Level 4:


  • Skills and Tasks: Exceptionally Complex, Inter-Discipline, Inter-Organizational.  Can perform tasks of senior level technicians, specialists, and or managers not performed at Level 3 due to the size and/or complexity of the tasks.

  • Leadership/Management: May work individually or as a key member of a senior leadership team. Oversees and monitors performance across several disciplines, and when required, takes steps to resolve issues.

  • Guidance: Provides expert guidance and direction to Government and Vendor senior level technicians and managers. Directs multiple contractor and subcontractor teams through to project completion.




Functional duties consist of:


  • Identify and manage network computer and system security events relative to fraud, waste and abuse, including content inappropriate to the workplace, Illegal Activity, Productivity Loss and Non-Compliant Activity, as well as Identity Leakage (PII).

  • Perform forensic analysis of digital information and gathers and handles evidence.

  • Utilization of tools such as Archer, Splunk, Fidelis, Solera, Proofpoint, etc.

  • Prepare case evidence and incident reports. - Work on special projects as assigned.

  • May provide guidance and work leadership to less-experienced technical staff members.

  • Position may require evening, weekend or shift-work (depending on operational tempo)




Education and Experience:


  • HS/GED + 12 years

  • Associates Degree + 10 years

  • Bachelor’s Degree + 8 years

  • Master’s Degree + 6 years

  • PhD + 4 years




Training and Certifications:


  • IAT Level 2




Security Clearance:


  • TS/SCI with CI poly

ECND
Full Stack Developer ASC007
Springfield, VA
Immediate
03/05/2022

Full Stack Developer:



Researches, designs, develops, and/or modifies enterprise-wide systems and/or applications software. Involved in planning of system and development deployment as well as responsible for meeting software compliance standards.  Evaluates interface between hardware and software, operational requirements, and characteristics of overall system. Documents testing and maintenance of system corrections. 




Basic Qualifications:


  • 3+ years of experience with Java, JavaScript, or Python

  • TS/SCI required

  • Experience with front end technologies such as Angular, React, HTML, CSS

  • Experience with Agile software development

  • Experience developing applications in a fast-paced environment or experience with rapid prototyping

  • Knowledge of relational databases




 Additional Qualifications:


  • Experience with consulting directly with clients

  • Experience with UI design

  • Experience building cloud-based applications

  • Experience building and using graph databases

  • Experience with building APIs and REST services




Security Clearance:


  • Top Secret

ASC
All-Source Analyst Information Network Mgt Analysis and Production Senior SIA3006
Fort Meade, MD
Immediate
03/01/2022

All-Source Analyst Information Network Mgt Analysis and Production Senior:



Conducts analysis using intelligence and information from multiple sources to assess, interpret, forecast, and explain a range of national security issues and developments that are regional or functional in nature. Provides all-source analytic support to collections, operations, investigations, and other defense intelligence analytic requirements.


 Provides all-source analysis to include: research, evaluation and deconfliction of single-source classified reporting, technical intrusion information, other agency all-source finished intelligence, open-source information and other relevant data.


 Adheres to Office of the Director of National Intelligence (ODNI) and Defense Intelligence Agency (DIA) all-source analytic tradecraft and standards.


 Establishes and maintains communications with counterparts in the Intelligence Community, the USCYBERCOM service components, other combatant commands, Cyber National Mission Force, Department of Homeland Security/NCSD, CERTS and Information Assurance Centers to collaborate on analysis and identify changes in the environment (at the direction of USCYBERCOM leadership and in accordance with the guidance of government sponsors within assigned division).


 Maintains cognizance of events occurring both within the U.S. government systems and internationally as directed to identify possible relationships to established knowledge base.


 

Possesses a minimum 2 years education of computer science/engineering, software design/engineering from an accredited college or university would substitute for the certificate completion/work experience requirement.


 

Uses intelligence production tools and databases, to include: Tripwire Analytic Capability, Intellipedia, Palantir, MIDB, Cyber Common Operating Picture (CyberCOP), Target Knowledge Base, Cyber Threat Matrix, Automated Message Handling System, WISE Information Management System, Network Knowledge Base, FoxTrail, CENTAUR, ispace, Pathfinder, and Microsoft OneNote.


 

Provides intelligence support, including the following:


 

Intelligence Support to Planning and Operations:



Provide all-source JIPOE support to offensive cyber operations / defensive cyber operations (OCO/DCO) planning and execution to include production of cyber related Intelligence estimates and associated products. This analysis shall include direct support to the Intelligence Planning Teams (IPTs), as required.


 

Threat Trends and Indicators:



Produce bulletins and briefs related to assigned area of responsibility. These shall include specific changes in tactics, techniques and procedures (TTP) and technical trends in cyber threats directed at the DoDIN and U.S. critical infrastructure/key resources (CI/KR), as required. Monitors threat activities to develop specific cyber indicators to support the USCYBERCOM role in the Defense Warning Program.


 

Cyber-related Exercise Support:



Provides scenario development, white cell or role playing support to cyber related exercises, as required.


 

USCYBERCOM Staff Support:



Responds expeditiously to J2 or other USCYBERCOM staff requests for information, as required.


 

Product Development:



Assists in the production, editing, publishing and dissemination of clear, concise, timely and relevant cyber analytic products, as required.



 Briefing:



Develops and presents intelligence slides and in-depth briefings and presentations related to assigned area of responsibility to USCYBERCOM staff up to GO/FO level.



 Meeting Support:



Provides support to meetings related to assigned area of responsibility. This shall include meetings within the Command or held at other government or cleared defense contractor facilities. Travel may be required for long distance meetings, but virtual participation is preferred.




Desired Experience:


  • Minimum 12 years of experience related to the specific labor category with at least a portion of the experience within the last 2 years.



Desired Education:


  • Master’s degree in an area related to the labor category from a college or university accredited by an agency recognized by the U.S. Department of Education

  • Bachelor’s degree related to the labor category from a college or university accredited by an agency recognized by the U.S. Department of Education and an additional 5 years of related senior experience, for a total of 17 years, as a substitute to the Master’s degree.



Security Clearance:


  • TS SCI CI poly

SIA3CybercomJ2TO
Intelligence Technician Operations Mission Team Support Senior SIA3005
Fort Meade, MD
Immediate
03/01/2022

Intelligence Technician Operations Mission Team Support Senior:



Provides a full range of intelligence and administrative support to assist analysts, engineers, and 

scientists involved in a variety of intelligence disciplines and activities. Activities include, but 

are not limited to, building and maintaining databases; monitor intelligence; assists with 

administration and management of RFIs; produces metrics; provides cross-domain data transfer 

and intelligence dissemination support, system-high to -low transfers between JWICS, SIPRNet, 

NIPRNet, and other U.S. and Allied / Partner systems. Produces metrics, graphics, and briefings 

as required to support production management and mission management functions. 




Job Duties:


  • Provides operations mission team research and analytical support to the Directorate of  Intelligence, where specific tasks may include identification and developments of mission  enhancement opportunities, status reports outlining updates and progress of accomplishments,  task management through completion, strategic engagements and visits.

  • Provides recommendations on continual process improvement to support the directorate’s  mission.

  • Provides full range coordination with command partners, both foreign and domestic, to inform  the Intelligence Directorate leadership assisting them in strategic decision-making.

  •  Activities  include, but are not limited to: managing portfolios for various governmental and non-governmental partners, close coordination and collaboration with relevant subject matter experts,  and in supporting intelligence related partner visits hosted by the command.

  • Coordinates  intelligence and information exchanges, enables persistent partnership engagement, and develops  and implements processes for long-term sharing agreements.

  • Works collaboratively with a broad  range of Intelligence and Defense professionals and is capable of capturing and synthesizing a  common picture of the current state of the Command with regard to partnership engagement, and  then developing approaches to address identified shortfalls. 

  • Establishes effective communication  procedures and practices to facilitate command level engagements, conferences, working groups  and planning teams. 

  • Demonstrates proficiency and timeliness if drafting and responding to tasks  related to partner engagement inquiries.




Desired Experience


  • Minimum 12 years of experience related to the specific labor category with at least a portion of the experience within the last 2 years.




Desired Education


  • Master’s degree in an area related to the labor category from a college or university accredited by an agency recognized by the U.S. Department of Education

  • Bachelor’s degree related to the labor category from a college or university accredited by an agency recognized by the U.S. Department of Education and an additional 5 years of related senior experience, for a total of 17 years, as a substitute to the Master’s degree.




Security Clearance:


  • TS SCI CI poly


SIA3CybercomJ2TO
Staff Engineer Database TALO054
Herndon, VA
Closed
02/26/2022

Staff Engineer Database:



The selected Database Engineer will work within a cross-functional Scrum team with experience supporting data management processes, database engineering and management; designing, developing, maintaining, and enhancing database systems




Job Duties:


  • Database engineering and management activities associated with high volume, multi-format data management services

  • Designs large-scale data management solutions including developing efficient storage, indexing, and access approaches

  • Updates data enterprise architecture models (if needed) and data abstraction layer to enable access to new data sources

  • Designs and implements indexing strategies for ingested data.

  • Designs and implements storage and indexing strategies across the multiple repositories to provide efficient storage and retrieval

  • Supports design and development of data access APIs




Basic Qualifications:


  • Bachelor’s degree with 14 years of relevant experience OR a Master’s degree with 12 years of relevant experience OR A PhD and 9 years; an additional 4 years of experience maybe considered in lieu of a degree requirement

  • Active TS/SCI clearance

  • Experience with Postgres, SQL, data modeling, Cameo

  • Experience installing application software in an operational environment

  • Experience with Agile, AWS, RDBMS technology, Elasticsearch, Linux

  • Familiarity with NoSQL technology (Hadoop and/or EMR)

  • Security+




Preferred:


  • CentOS System Administration

  • Linux




Security Clearance:


  • TS SCI CI poly


TALOS
Software Engineer Level 4 TALO053
Herndon, VA
Immediate
02/26/2022

Software Engineer Level 4:




Software Engineer 4:



The selected Software Engineer should have experience with Agile software methodology, and software engineering design best practices. The candidate will work within a cross-functional Scrum team, and will be responsible for developing software, participating in acceptance criteria development, creating scripts and utilizing Open Source and COTS tools to automate testing, documenting instructions, and participating in integration activities.




Job Duties:


  • Performs software engineering and development activities associated with supporting, maintaining, and enhancing software using an Agile DevSecOps model

  • Develops and integrates bug fixes and new feature enhancements using DIA standard development tools and processes (e.g., Java, Jira, Git).

  • Identifies and integrates DIA and IC shared services (e.g., IC PKI and IAA)

  • Designs and develops APIs and data access services for machine learning, and integrates microservices using the API gateway to enable enterprise access to data

  • Supports trade studies/analyses of alternatives and assessments of potential technologies that may be applicable to the system, and provides recommendations




Required Qualifications:


  • A Bachelor’s degree with 9+ years of relevant experience OR a master’s degree with 7 years of relevant experience OR a PhD with 4 years of relevant experience; an additional 4 years of experience maybe considered in lieu of a degree requirement

  • Java, Spring/Spring Boot

  • Software Automation and DevSecOps experience

  • AWS, Solr, and PostgreSQL experience

  • Experience using modern techniques such as NiFi, REST, JSON, Spring, Spring Boot, JavaScript frameworks (e.g., JQuery, Angular, React), and Docker

  • Programming Language Experience such as Java, Python and JavaScript

  • TS/SCI




Desired Qualifications:


  • Experience with Solr

  • Python API rest services development or machine learning experience

  • TS/SCI CI poly




Security Clearance:


  • TS SCI

  • CI poly is preferred but not required


TALOS
Journeyman Source Strategies Analyst GEOINT Collections Manager MACS013
Fort Belvoir, VA
Closed
02/25/2022

Journeyman Source Strategies Analyst GEOINT Collections Manager:




Candidates must possess the following:


  • 3-10 years of experience as a geospatial intelligence (GEOINT) collection manager or source strategies analyst (SSA), including managing geospatial information needs within the GEOINT Information Management Services (GIMS)

  • GIMS training certification and active operational account status

  • Knowledge of GEOINT tasking and collection processes and protocols

  • Knowledge of national, commercial, and airborne GEOINT sensors and capabilities

  • Knowledge of multi-INT sources and capabilities

  • Ability to work independently or as part of a team to develop GEOINT collection strategies

  • Ability to collaborate with GEOINT analysts to deconstruct problems and develop effective collection approaches

  • Ability to liaise with partners across the intelligence community (IC) and DoD to innovate and enable intelligence integration

  • TS/SCI clearance + CI Polygraph

  • HS diploma or GED




Candidates meeting ALL these requirements and possessing one or more of the following will rank higher for consideration:


  • Experience with GEOINT SAP collection

  • Experience as an adjudicator within GIMS

  • Experience as an imagery or geospatial analyst

  • Experience with GIMS Advanced Search and Net-centric GEOINT Discovery Services (NGDS)

  • Knowledge of multi-disciplinary intelligence (MDI) or event portal strategy (EPS) development

  • Ability to facilitate interagency collaboration

  • BA or BS degree preferred; MA or MS degree a plus




Security Clearance:


  • TOP SECRET security clearance with active SCI access and a current CI Polygraph

MACSS
FSA RIM Training Tools Manager Level 4 MOJA100
Springfield, VA
Closed
02/22/2022

Functional Specialist Advisor/Records