

Position | Location | Timeline | Date Validated | Description | Contract |
---|---|---|---|---|---|
Agile Project Manager ECS2040 | Washington, DC | Immediate | 05/26/2022 | Agile Project Manager: Skill Level 3:
Responsibilities:
Requirements:
Education and Experience:
Training and Certifications:
Security Cleareance:
| ECS2 |
Cyber System Administrator ECND037 | Reston, VA | Immediate | 05/19/2022 | Cyber System Administrator: Designs and evaluates end-to-end systems through their entire life cycle. Ensures products and systems comply with requirements and customer information assurance and cybersecurity standards and practices through formal verification methods with specific emphasis on network operations and cyber warfare tactics. Skill Level 4:
Job Description:
Education and Experience:
Training and Certifications:
Security Clearance:
| ECND |
Network System Administrator 3 ARTH233 | Kirtland AFB, NM | Immediate | 05/19/2022 | Network System Administrator 3: The primary function will be to organize, install, and support government organization’s computer systems, including local area networks (LANs), wide area networks (WANs), network segments, intranets, and other data communication systems. This will also include helping architect, design and analyze network models. It will require participation in decisions about buying future hardware or software to upgrade organization’s infrastructure. This position might be called upon to provide technical support to computer users to help solve users’ problems. This position will support activities within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. Performance shall include:
Experience:
Education:
Certifications:
Security Clearance:
Other Requirements:
| Arthur |
All Source Intelligence Analyst Production Senior SIA3014 | Fort Meade, MD | Immediate | 05/11/2022 | All Source Intelligence Analyst Production Senior: Conducts analysis using intelligence and information from multiple sources to assess, interpret, forecast, and explain a range of national security issues and developments that are regional or functional in nature. Provides all-source analytic support to collections, operations, investigations, and other defense intelligence analytic requirements. Senior-level:
Job Responsibilities:
Education and Experience:
Security Clearance:
| SIA3CybercomJ2TO |
Intelligence Planner Intelligence Plans Integration Senior SIA3013 | Fort Meade, MD | Immediate | 05/11/2022 | Intelligence Planner Intelligence Plans Integration Senior: Employs intelligence expertise and knowledge to assist in the integration of Defense and National intelligence support capabilities, including collection, analytic and targeting activities, into overarching operational planning functions and efforts across the DoD. Mission areas for Intelligence Planner assistance include, but not limited to, development of campaign plans, deliberate planning, crisis management, and time sensitive planning in accordance with the Joint Operations Planning and Execution System (JOPES). Additionally, planners assist with red teaming, and intelligence operations feasibility assessments within the planning process. Provides support in the conduct of Cyberspace Intelligence planning activities in support of USCYBERCOM missions and recommend efficient use of resources throughout all planning efforts. Senior-level:
Job Responsibilities:
Education and Experience:
Security Clearance:
| SIA3CybercomJ2TO |
Software Test Engineer TALO060 | Herndon, VA | Closed | 05/11/2022 | Test Engineer: The selected Software Test Engineer will have a background in maintaining and enhancing automated test scripts and creating and executing test procedures to support development, integration, regression and user acceptance testing. Candidate will design and write automated test plans and procedures, analyze test results and develop and review code as necessary. Also will document bugs in Jira and provide test reports. Candidate must be located in the metro DC area and be willing to come into the Herndon office if needed. Required Qualifications:
Desired Qualifications:
Security Clearance: TS SCI A CI poly is preferred but not required. | TALOS |
Targeting Analyst Mid-Level Current Force Intelligence SIA3012 | Fort Meade, MD | Immediate | 05/09/2022 | Targeting Analyst Mid-Level Current Force Intelligence: Mid-Level:
Desired Experience:
Desired Education:
Job Requirements:
Security Clearance:
| SIA3CybercomJ2TO |
Social Science Methodologist Senior SIA3011 | Fort Meade, MD | Immediate | 05/09/2022 | Social Science Methodologist Senior: Supports the development of new approaches for intelligence analysis to include analytic models that leverage quantitative and qualitative techniques and innovative approaches to visualization and dynamic content management to enable more accurate, complete, objective, and anticipatory analysis. Applies social science methodologies to develop, vet, and employ theories against DIA’s analysis of the strengths and weaknesses of selected foreign governments, non-state actors, terrorist groups and other threats; security policy and capabilities; leadership and elite dynamics; defense industrial production; civil and military resource allocation and investment; threat finance transactions and networks; proliferation activities (including both state-sponsored and non-state-sponsored activities); drug manufacture, trade, and smuggling; military programs, capabilities, strategies (including WMD, missile, and general-purpose forces); and intentions. Senior-level:
Job Requirements: The Candidate shall provide intelligence support, including the following: Cyber National Mission Force Build-out:
Education and Experience:
Security Clearance:
| SIA3CybercomJ2TO |
Russian Socio-Cultural Analyst Senior SIA3010 | Fort Meade, MD | Immediate | 05/09/2022 | Russian Socio-Cultural Analyst Senior: Senior-level:
Job Requirements:
Education and Experience:
Security Clearance:
| SIA3CybercomJ2TO |
All Source Analyst Current Intelligence Senior SIA3009 | Fort Meade, MD | Immediate | 05/09/2022 | All Source Analyst Current Intelligence Senior:
Education and Experience:
Security Clearance: TS/SCI | SIA3CybercomJ2TO |
Senior Principal Cyber Systems Engineer Release Manager TALO059 | Herndon, VA | Immediate | 05/05/2022 | Senior Principal Cyber Systems Engineer – Release Manager: Job Description: As Release Manager the selected candidate will oversee the complete software delivery lifecycle. This includes working with the team from the planning phase to the deployment phase through the development and testing phases. This non-technical position requires strong communication skills, interacting with multiple people throughout the development lifecycle Responsibilities include:
Required:
Desired:
Security Clearance:
| TALOS |
Unified Communications Engineer ECS2039 | Colorado Springs, CO | Immediate | 04/14/2022 | Unified Communications Engineer: Responsible for the design and development of voice, video, radio frequency, and/or data communications networks. Job Description:
Skills:
Education and Experience:
Training and Certifications:
Desired certifications:
Security Clearance:
| ECS2 |
Chinese Socio-Cultural Analyst Senior SIA3008 | Fort Meade, MD | Immediate | 04/13/2022 | Chinese Socio-Cultural Analyst Senior: Senior-level:
Job Requirements:
Education and Experience:
Security Clearance:
| SIA3CybercomJ2TO |
Data Engineer ASC008 | Springfield, VA | Immediate | 04/12/2022 | Data Engineer: Basic Qualifications:
Additional Qualifications:
Security Clearance:
| ASC |
Senior Analytic Methodologist MACS014 | Springfield, VA | Immediate | 04/07/2022 | Senior Analytic Methodologist: Skills and Experience:
Years of Experience:
Duties:
Desired Experience:
Desired Education:
Security Clearance:
| MACSS |
Senior Principal Cyber System Engineer Administrator TALO058 | Herndon, VA | Immediate | 04/05/2022 | Senior Principal Cyber Systems Engineer/Administrator: Job Description: The selected Systems Administrator will work on site in the program’s Herndon SCIF 4 or 5 days/week and serve as a privileged user/PUA for assessments and other activities. Duties include:
Required Qualifications:
Desired Qualifications:
| TALOS |
Program Security Representative 2 ARTH232 | Pentagon, VA | Closed | 04/02/2022 | Program Security Representative 2: The Program Security Representative’s primary function is to provide multi-discipline security support for one or more of the customer’s Special Access Programs (SAPs). The position will provide “day-to-day” multi-discipline analysis for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. Performance shall include: •Ensure strict adherence to the provisions of the NISPOM, its Supplement, the DoD Overprint, DCID, ICD, and SAP policy •Assist in developing and executing approved policies and procedures for safeguarding Special Access Program (SAP), Sensitive Compartmented Information (SCI) and collateral data in support of US military operations •Provide day-to-day security support that includes continuous assessment of procedures to identify shortfalls and provide appropriate recommendations for revising and improving security policies, procedures, and systems •Identify vulnerabilities, threats, and risks to test, training, and operational activities •Assist in developing, implementing, and training the Operations Security program •Assist in providing contractor and subordinate facility assistance and oversight •Brief all levels of personnel, both in the government and senior civilian services, on a variety of security related topics •Conduct and document SAP facility compliance reviews, follow-on facility reviews, and facility close-outs •Monitor, report and track all corrective actions resulting from compliance reviews •Ensure timely notification of pertinent security matters to program technical and management staff •Conduct exploration of any loss, compromise, or suspected compromise of classified and/or sensitive information, including conducting preliminary inquiries and generating damage assessments resulting from the loss of classified information •Coordinate with SAP security personnel to ensure lessons learned are incorporated into the curriculum for the SAP security education & awareness program Experience: •8 – 10 years related experience •Security Fundamentals Professional Certification (SFPC) counts towards 3 years of experience •Special Program Security Certification (SPSC) counts towards 5 years of experience •Maximum equivalent experience for SPED Certifications is no more than 5 years Education: •Bachelor’s degree in a related area or equivalent experience (4 years) Security Clearance: •Current Top Secret Clearance with SCI Eligibility •Eligibility for access to Special Access Program Information •Willingness to submit to a Counterintelligence polygraph | Arthur |
Program Security Representative 2 ARTH231 | JBAB, Washington DC | Closed | 04/02/2022 | Program Security Representative 2: The Program Security Representative’s primary function is to provide multi-discipline security support for one or more of the customer’s Special Access Programs (SAPs). The position will provide “day-to-day” multi-discipline analysis for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. Performance shall include: •Ensure strict adherence to the provisions of the NISPOM, its Supplement, the DoD Overprint, DCID, ICD, and SAP policy •Assist in developing and executing approved policies and procedures for safeguarding Special Access Program (SAP), Sensitive Compartmented Information (SCI) and collateral data in support of US military operations •Provide day-to-day security support that includes continuous assessment of procedures to identify shortfalls and provide appropriate recommendations for revising and improving security policies, procedures, and systems •Identify vulnerabilities, threats, and risks to test, training, and operational activities •Assist in developing, implementing, and training the Operations Security program •Assist in providing contractor and subordinate facility assistance and oversight •Brief all levels of personnel, both in the government and senior civilian services, on a variety of security related topics •Conduct and document SAP facility compliance reviews, follow-on facility reviews, and facility close-outs •Monitor, report and track all corrective actions resulting from compliance reviews •Ensure timely notification of pertinent security matters to program technical and management staff •Conduct exploration of any loss, compromise, or suspected compromise of classified and/or sensitive information, including conducting preliminary inquiries and generating damage assessments resulting from the loss of classified information •Coordinate with SAP security personnel to ensure lessons learned are incorporated into the curriculum for the SAP security education & awareness program Experience: •8 – 10 years related experience •Security Fundamentals Professional Certification (SFPC) counts towards 3 years of experience •Special Program Security Certification (SPSC) counts towards 5 years of experience •Maximum equivalent experience for SPED Certifications is no more than 5 years Education: •Bachelor’s degree in a related area or equivalent experience (4 years) Security Clearance: •Current Top Secret Clearance with SCI Eligibility •Eligibility for access to Special Access Program Information •Willingness to submit to a Counterintelligence polygraph | Arthur |
Activity Security Representative 3 ARTH230 | Wright Patterson AFB, OH | Immediate | 04/02/2022 | Activity Security Representative 3: The Activity Security Representative’s primary function is to provide multi-disciplined security support to a customer’s facility and organization. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. Performance shall include: •Classification reviews of inbound and outbound correspondence •Assist in the maintenance of a document accountability database and associated correspondence •Processing inbound and outbound classified mail and receipt records •Perform destruction of classified materials •Process magnetic media for accountability •Reproduction support for classified materials •Maintain various daily logs for a variety of administrative functions associated with document control •Assist in the processing of inbound data and outbound data transfer files •Transfer electronic data files to internal customers •Maintain an extensive customer database point of contact listing •Assist with researching, processing, filing, and maintaining inbound and outbound visit notices •Escort facility visitors and maintains associated logs •Assist in the preparation of facility access control badges •Conduct entry and exit inspections •Assist in the maintenance of facility access control entry systems, to include visitor control •Perform data entry to the Personnel Access Security System database and maintain all customer sponsored billets and quota information •Assist in maintaining personnel security files for all personnel of the supported element •Follow and enforce the customer’s Standard Operating Procedures •Provide support for the security awareness and education programs •Perform miscellaneous administrative support functions as directed by the contractor site lead and/or the Senior Security Representative •Review, track, and monitor security clearance processing activities with appropriate government personnel to achieve appropriate clearance actions •Participate in Air Force SAP security compliance inspections of government organizations and industry •Implement Top Secret Control for accountable material and associated correspondence •Prepare and/or process inbound and outbound classified mail, faxes, courier packages and receipts •Prepare, process, and/or review Program Access Request (PARs) for accuracy and access eligibility •Execute Special Access Program Nomination Process Questionnaires •Conduct Defense Central Index of Investigations (DCII), Joint Personnel Access System (JPAS), and SAPNP reviews of candidates being submitted for SAP access •Perform data entry and record checks in the Air Force Access Data System (AFADS) and maintains all customer sponsored personnel access information current •Perform indoctrinations •Provide leadership, mentoring, and quality assurance for Team Members Experience: •5 - 7 years related experience •Security Fundamentals Professional Certification (SFPC) counts towards 3 years of experience •Special Program Security Certification (SPSC) counts towards 5 years of experience •Maximum equivalent experience for SPED Certifications is no more than 5 years Education: •Bachelor’s degree or equivalent experience (4 years) Certifications: •Must complete the DoD SAPCO approved SAPNP training (if performing personnel security functions) Security Clearance: •Current Top Secret Clearance with SCI Eligibility •Eligibility for access to Special Access Program Information •Willingness to submit to a Counterintelligence polygraph | Arthur |
Security Control Assessor 3 ARTH229 | Pentagon, VA | Closed | 04/02/2022 | Security Control Assessor 3: The SCA is responsible for conducting a comprehensive assessment of the management, operational, and technical security controls employed within or inherited by an IS to determine the overall effectiveness of the controls (i.e., the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting the security requirements for the system). SCAs also provide an assessment of the severity of weaknesses or deficiencies discovered in the IS and its environment of operation and recommend corrective actions to address identified vulnerabilities. Responsibilities will cover Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities within the customer’s area of responsibility. Performance shall include: •Perform oversight of the development, implementation and evaluation of IS security program policy; special emphasis placed upon integration of existing SAP network infrastructure •Perform assessment of ISs, based upon the Risk Management Framework (RMF) methodology in accordance with the Joint Special Access Program (SAP) Implementation Guide (JSIG) •Advise the Information System Owner (ISO), Information Data Owner (IDO), Program Security Officer (PSO), and the Delegated and/or Authorizing Official (DAO/AO) on any assessment and authorization issues •Evaluate Authorization packages and make recommendation to the AO and/or DAO for authorization •Evaluate IS threats and vulnerabilities to determine whether additional safeguards are required •Advise the Government concerning the impact levels for Confidentiality, Integrity, and Availability for the information on a system •Ensure security assessments are completed and results documented and prepare the Security Assessment Report (SAR) for the Authorization boundary •Initiate a Plan of Action and Milestones (POA&M) with identified weaknesses for each Authorization Boundaries assessed, based on findings and recommendations from the SAR •Evaluate security assessment documentation and provide written recommendations for security authorization to the Government •Discuss recommendation for authorization and submit the security authorization package to the AO/DAO •Assess proposed changes to Authorization boundaries operating environment and mission needs to determine the continuation to operate. •Review and concur with all sanitization and clearing procedures in accordance with Government guidance and/or policy •Assist the Government compliance inspections •Assist the Government with security incidents that relate to cybersecurity and ensure that the proper and corrective measures have been taken •Ensure organization are addressing and conducting all phases of the system development life cycle (SDLC) •Evaluate Hardware and Software to determine security impact that it might have on Authorization boundaries •Evaluate the effectiveness and implementation of Continuous Monitoring Plans •Evaluate the differences and have a working knowledge of Information Systems and Network Appliances operating at Protection Level 3 (PL3) and Protection Level 4 (PL4) •Differentiate the differences between the various types of Cross-Domain Solutions (CDS) •Assist with joint assessments of Cross-Domain Solutions with other DoD agencies Experience: •9 - 12 years related experience •Minimum of nine (9) years’ experience in SAP, SCI or Collateral Information Systems (IS) Security and the implementation of regulations identified in the description of duties. •Prior performance in the role of ISSO and ISSM or SCA Education: •Bachelor’s degree in a related discipline or equivalent experience (4 years) Certifications: •Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level III or Information Assurance Manager Level III or Information Assurance Architect and Engineer Level I within 6 months of the date of hire Security Clearance: •Current Top Secret Clearance with SCI Eligibility •Eligibility for access to Special Access Program Information •Willingness to submit to a Counterintelligence polygraph Other Requirements: •Must have expert knowledge of DoD, National and applicable service and agency security policy, manuals and standards Must have the ability to work in a dynamic environment and effectively interact with numerous DOD, military/civilian personnel and industry partners •Mastery of Microsoft Office (Word, PowerPoint, and Excel) •Must be able to regularly lift 50 lbs | Arthur |
Program Security Representative 3 ARTH228 | JBAB, Washington DC | Immediate | 04/02/2022 | Program Security Representative 3: The Program Security Representative’s primary function is to provide multi-discipline security support for one or more of the customer’s Special Access Programs (SAPs). The position will provide “day-to-day” multi-discipline analysis for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. Performance shall include: •Ensure strict adherence to the provisions of the NISPOM, its Supplement, the DoD Overprint, DCID, ICD, and SAP policy •Assist in developing and executing approved policies and procedures for safeguarding Special Access Program (SAP), Sensitive Compartmented Information (SCI) and collateral data in support of US military operations •Provide day-to-day security support that includes continuous assessment of procedures to identify shortfalls and provide appropriate recommendations for revising and improving security policies, procedures, and systems •Identify vulnerabilities, threats, and risks to test, training, and operational activities •Assist in developing, implementing, and training the Operations Security program •Assist in providing contractor and subordinate facility assistance and oversight •Brief all levels of personnel, both in the government and senior civilian services, on a variety of security related topics •Conduct and document SAP facility compliance reviews, follow-on facility reviews, and facility close-outs •Monitor, report and track all corrective actions resulting from compliance reviews •Ensure timely notification of pertinent security matters to program technical and management staff •Conduct exploration of any loss, compromise, or suspected compromise of classified and/or sensitive information, including conducting preliminary inquiries and generating damage assessments resulting from the loss of classified information •Coordinate with SAP security personnel to ensure lessons learned are incorporated into the curriculum for the SAP security education & awareness program •Provide leadership, mentoring, and oversight of team members Experience: •10 - 12 years related experience •Security Fundamentals Professional Certification (SFPC) counts towards 3 years of experience •Special Program Security Certification (SPSC) counts towards 5 years of experience •Maximum equivalent experience for SPED Certifications is no more than 5 years Education: •Bachelor’s degree in a related area or equivalent experience (4 years) Security Clearance: •Current Top Secret Clearance with SCI Eligibility •Eligibility for access to Special Access Program Information •Willingness to submit to a Counterintelligence polygraph | Arthur |
Program Security Representative 3 ARTH227 | JBAB, Washington DC | Immediate | 04/02/2022 | Program Security Representative 3: The Program Security Representative’s primary function is to provide multi-discipline security support for one or more of the customer’s Special Access Programs (SAPs). The position will provide “day-to-day” multi-discipline analysis for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. Performance shall include: •Ensure strict adherence to the provisions of the NISPOM, its Supplement, the DoD Overprint, DCID, ICD, and SAP policy •Assist in developing and executing approved policies and procedures for safeguarding Special Access Program (SAP), Sensitive Compartmented Information (SCI) and collateral data in support of US military operations •Provide day-to-day security support that includes continuous assessment of procedures to identify shortfalls and provide appropriate recommendations for revising and improving security policies, procedures, and systems •Identify vulnerabilities, threats, and risks to test, training, and operational activities •Assist in developing, implementing, and training the Operations Security program •Assist in providing contractor and subordinate facility assistance and oversight •Brief all levels of personnel, both in the government and senior civilian services, on a variety of security related topics •Conduct and document SAP facility compliance reviews, follow-on facility reviews, and facility close-outs •Monitor, report and track all corrective actions resulting from compliance reviews •Ensure timely notification of pertinent security matters to program technical and management staff •Conduct exploration of any loss, compromise, or suspected compromise of classified and/or sensitive information, including conducting preliminary inquiries and generating damage assessments resulting from the loss of classified information •Coordinate with SAP security personnel to ensure lessons learned are incorporated into the curriculum for the SAP security education & awareness program •Provide leadership, mentoring, and oversight of team members Experience: •10 - 12 years related experience •Security Fundamentals Professional Certification (SFPC) counts towards 3 years of experience •Special Program Security Certification (SPSC) counts towards 5 years of experience •Maximum equivalent experience for SPED Certifications is no more than 5 years Education: •Bachelor’s degree in a related area or equivalent experience (4 years) Security Clearance: •Current Top Secret Clearance with SCI Eligibility •Eligibility for access to Special Access Program Information •Willingness to submit to a Counterintelligence polygraph | Arthur |
Activity Security Representative 2 ARTH226 | Hill AFB, UT | Closed | 04/02/2022 | Activity Security Representative 2: The Activity Security Representative’s primary function is to provide multi-disciplined security support to a customer’s facility and organization. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. Performance shall include: •Classification reviews of inbound and outbound correspondence •Assist in the maintenance of a document accountability database and associated correspondence •Processing inbound and outbound classified mail and receipt records •Perform destruction of classified materials •Process magnetic media for accountability •Reproduction support for classified materials •Maintain various daily logs for a variety of administrative functions associated with document control •Assist in the processing of inbound data and outbound data transfer files •Transfer electronic data files to internal customers •Maintain an extensive customer database point of contact listing •Assist with researching, processing, filing, and maintaining inbound and outbound visit notices •Escort facility visitors and maintains associated logs •Assist in the preparation of facility access control badges •Conduct entry and exit inspections •Assist in the maintenance of facility access control entry systems, to include visitor control •Perform data entry to the Personnel Access Security System database and maintain all customer sponsored billets and quota information •Assist in maintaining personnel security files for all personnel of the supported element •Follow and enforce the customer’s Standard Operating Procedures •Provide support for the security awareness and education programs •Perform miscellaneous administrative support functions as directed by the contractor site lead and/or the Senior Security Representative •Review, track, and monitor security clearance processing activities with appropriate government personnel to achieve appropriate clearance actions •Participate in Air Force SAP security compliance inspections of government organizations and industry •Implement Top Secret Control for accountable material and associated correspondence •Prepare and/or process inbound and outbound classified mail, faxes, courier packages and receipts •Prepare, process, and/or review Program Access Request (PARs) for accuracy and access eligibility •Execute Special Access Program Nomination Process Questionnaires •Conduct Defense Central Index of Investigations (DCII), Joint Personnel Access System (JPAS), and SAPNP reviews of candidates being submitted for SAP access •Perform data entry and record checks in the Air Force Access Data System (AFADS) and maintains all customer sponsored personnel access information current •Perform indoctrinations Experience: •3-5 years related experience •Security Fundamentals Professional Certification (SFPC) counts towards 3 years of experience •Special Program Security Certification (SPSC) counts towards 5 years of experience •Maximum equivalent experience for SPED Certifications is no more than 5 years Education: •Bachelor’s degree or equivalent experience (4 years) Certifications: •Must complete the DoD SAPCO approved SAPNP training (if performing personnel security functions) Security Clearance: •Current Top Secret Clearance with SCI Eligibility •Eligibility for access to Special Access Program Information •Willingness to submit to a Counterintelligence polygraph | Arthur |
Information System Security Officer 1 ARTH225 | Truax Field Madison, WI | Immediate | 04/02/2022 | Information System Security Officer 1: The ISSO is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO. The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is assigned responsibility for the day-to-day security operations of a system. This also will include physical and environmental protection, personnel security, incident handling, and security training and awareness. It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configuration management across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. Performance shall include: •Assist the ISSM in meeting their duties and responsibilities •Prepare, review, and update authorization packages •Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media •Notify ISSM when changes occur that might affect the authorization determination of the information system(s) •Conduct periodic reviews of information systems to ensure compliance with the security authorization package •Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change •Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly •Ensure all IS security-related documentation is current and accessible to properly authorized individuals •Ensure audit records are collected, reviewed, and documented (to include any anomalies) •Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties •Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans •Identify cyber security vulnerabilities and assist with the implementation of the countermeasures for them •Prepare reports on the status of security safeguards applied to computer systems •Perform ISSO duties in support of in-house and external customers Experience: •1 - 2 years related experience •Prior performance in roles such as System or Network Administrator Education: •Bachelor’s degree or equivalent experience (4 years) Certifications: •Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level I or Information Assurance Manager I within 6 months of the date of hire Security Clearance: •Current Top Secret Clearance with SCI Eligibility •Eligibility for access to Special Access Program Information •Willingness to submit to a Counterintelligence polygraph Other Requirements: •Must be able to regularly lift up to 50 lbs | Arthur |
Information Systems Security Officer 2 ARTH224 | Colorado Springs, CO | Closed | 04/02/2022 | Information Systems Security Officer 2: The ISSO is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO. The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is assigned responsibility for the day-to-day security operations of a system. This also will include physical and environmental protection, personnel security, incident handling, and security training and awareness. It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configuration management across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. Performance shall include: •Assist the ISSM in meeting their duties and responsibilities •Prepare, review, and update authorization packages •Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media •Notify ISSM when changes occur that might affect the authorization determination of the information system(s) •Conduct periodic reviews of information systems to ensure compliance with the security authorization package •Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change •Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly •Ensure all IS security-related documentation is current and accessible to properly authorized individuals •Ensure audit records are collected, reviewed, and documented (to include any anomalies) •Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties •Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans •Identify cyber security vulnerabilities and assist with the implementation of the countermeasures for them •Prepare reports on the status of security safeguards applied to computer systems •Perform ISSO duties in support of in-house and external customers •Conduct security impact analysis activities and provide to the ISSM on all configuration management changes to the authorization boundaries Experience: •2 - 5 years related experience •Prior performance in roles such as System, Network Administrator or ISSO Education: •Bachelor’s degree or equivalent experience (4 years) Certifications: •Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level II or Information Assurance Manager II within 6 months of the date of hire Security Clearance: •Current Top Secret Clearance with SCI Eligibility •Eligibility for access to Special Access Program Information •Willingness to submit to a Counterintelligence polygraph Other Requirements: •Must be able to regularly lift up to 50 lbs | Arthur |
Information System Security Officer 2 ARTH223 | Hanscom AFB, MA | Immediate | 04/02/2022 | Information System Security Officer 2: The ISSO is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO. The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is assigned responsibility for the day-to-day security operations of a system. This also will include physical and environmental protection, personnel security, incident handling, and security training and awareness. It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configuration management across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. Performance shall include: •Assist the ISSM in meeting their duties and responsibilities •Prepare, review, and update authorization packages •Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media •Notify ISSM when changes occur that might affect the authorization determination of the information system(s) •Conduct periodic reviews of information systems to ensure compliance with the security authorization package •Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change •Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly •Ensure all IS security-related documentation is current and accessible to properly authorized individuals •Ensure audit records are collected, reviewed, and documented (to include any anomalies) •Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties •Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans •Identify cyber security vulnerabilities and assist with the implementation of the countermeasures for them •Prepare reports on the status of security safeguards applied to computer systems •Perform ISSO duties in support of in-house and external customers •Conduct security impact analysis activities and provide to the ISSM on all configuration management changes to the authorization boundaries Experience: •2 - 5 years related experience •Prior performance in roles such as System, Network Administrator or ISSO Education: •Bachelor’s degree or equivalent experience (4 years) Certifications: •Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level II or Information Assurance Manager II within 6 months of the date of hire Security Clearance: •Current Top Secret Clearance with SCI Eligibility •Eligibility for access to Special Access Program Information •Willingness to submit to a Counterintelligence polygraph Other Requirements: •Must be able to regularly lift up to 50 lbs | Arthur |
Network System Administrator 3 ARTH222 | Schriever AFB, CO | Closed | 04/02/2022 | Network System Administrator 3: The primary function will be to organize, install, and support government organization’s computer systems, including local area networks (LANs), wide area networks (WANs), network segments, intranets, and other data communication systems. This will also include helping architect, design and analyze network models. It will require participation in decisions about buying future hardware or software to upgrade organization’s infrastructure. This position might be called upon to provide technical support to computer users to help solve users’ problems. This position will support activities within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. Performance shall include: •Able to perform self-sustaining and work with little to no oversight •Lead IT ops team on day to day management and operations of Networks and implement capabilities vetted through Cybersecurity, ISSE and higher headquarters to maintain JSIG/RMF Authority to Operate and maintain Continuous Monitoring tools and processes •Manage COTS & GOTS products to collect, display and remediate a variety of automated system security and system operations/performance functions and metrics. •Assist during security assessments of servers/network devices/security appliances •Assist during security assessments with regard to accuracy and efficiency •Assist with Creation of operational Operations and Maintenance (O&M) checklists to maintain the service (daily, weekly, monthly, yearly O&M checklists); build Tactics, Techniques and Processes (TTPs) and Standard Operating Processes (SOPs) associated with service checklists •Manage and operate monitoring tools/capabilities with the enterprise security information and event management (SIEM) and create/tailor complex event alarms/rules and summary reports •Execute cybersecurity operations procedures for day to day network management, operations and maintenance •Monitor/analyze output of cybersecurity related tools for reportable security incidents and residual risk •Assist in analyzing technical risk, upon request, of emerging cybersecurity tools and processes •Work as part of a security incident response team as needed •Assist ISSM/ISSO/ISSE with the Integration/Development new techniques to improve Confidentiality, Integrity, and Availability for networks/systems operating at various classification levels •Advanced technical competency in one or more of the following supported platforms: Microsoft Windows Server, Active Directory Red Hat Enterprise Linux servers, MS Hyper-V/VMWare/ESx/Xen Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems, forensic analysis/vulnerability assessment, Group Policy management and configuration, Scripting, BMC Footprints, WSUS, , Lumension, Bitlocker, SQL Server 2012, TomCat, IIS, Windows Server 2012r2/2016, Win 10, Red Hat 6.5, Microsoft Office •Toolkits, SEIMs, Logrhythm, ACAS/Nessus/SCAP, mandatory/role-based access control concepts (e. g. SE Linux extensions to RHEL, PitBull, AppArmor, and Sentris) , video teleconferencing/VOIP, Oracle/MS SQL database security, and Apache/IIS Web server security Experience: •5 - 7 years related experience Education: •Bachelor’s degree in a related area or equivalent experience (4 years) Certifications: •Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level III within 6 months of the date of hire Security Clearance: •Current Top Secret Clearance with SCI Eligibility •Eligibility for access to Special Access Program Information •Willingness to submit to a Counterintelligence polygraph Other Requirements: •Thorough knowledge of Microsoft Windows desktop and server operating systems, Microsoft Exchange Server, and as needed RHEL operating systems administration and associated hardware •Experience in effective communication and collaborating in a high performance team environment. •Group Policy design and configuration •Working knowledge of CISCO network and switching and virtualization technologies •Working knowledge of virtualization as it applies to users environments, operating systems, and network appliances •Working knowledge of Local Area Network (LAN) and Wide Area Network (WAN) technologies and data backup technologies •Working knowledge communication security (COMSEC) policies and integration •Working knowledge of Risk Management Framework, Common Criteria, and System Security Policy as they relate to assessments and authorization •Working knowledge and current relevant experience with PL2, PL3, and PL4 network environments/systems •Working knowledge of WSUS and/or YUM patch deployment methodologies •Must be familiar with DoD policy as it applies to implementing and executing system and network administration •Working knowledge of Risk Management Framework and how to apply it to network/information system environments •Must be able to regularly lift up to 50 lbs | Arthur |
Network System Administrator 2 ARTH221 | Schriever AFB, CO | Closed | 04/02/2022 | Network System Administrator 2 : The primary function will be to organize, install, and support government organization’s computer systems, including local area networks (LANs), wide area networks (WANs), network segments, intranets, and other data communication systems. This will also include helping architect, design and analyze network models. It will require participation in decisions about buying future hardware or software to upgrade organization’s infrastructure. This position might be called upon to provide technical support to computer users to help solve users’ problems. This position will support activities within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. Performance shall include: •Ability to operate under minimal supervision •Execute day to day management and operations of systems and networks •Manage COTS & GOTS products to collect, display and remediate a variety of automated system security and system operations/performance functions and metrics •Follow Operations and Maintenance (O&M) checklists to maintain the service (daily, weekly, monthly, yearly O&M checklists); build Tactics, Techniques and Processes (TTPs) and Standard Operating Processes (SOPs) associated with service checklists •Operate monitoring tools/capabilities with the enterprise security information and event management (SIEM) and create/tailor complex event alarms/rules and summary reports •Assist in analyzing technical risk, upon request, of emerging cybersecurity tools and processes •Work as part of a security incident response team as needed •Working technical competency in one or more of the following supported platforms: Microsoft Windows Server, Red Hat Enterprise Linux servers, MS Hyper-V/VMWare/ESx/Xen Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems, forensic analysis/vulnerability assessment, Group Policy management and configuration, Scripting, BMC Footprints, WSUS, , Lumension, Bitlocker, SQL Server 2012, TomCat, IIS, Windows Server 2012r2/2016, Win 10, Red Hat 6.5, Microsoft Office •Toolkits, SEIMs, Logrhythm, ACAS/Nessus/SCAP, mandatory/role-based access control concepts (e. g. SE Linux extensions to RHEL, PitBull, AppArmor, and Sentris) , video teleconferencing/VOIP, Oracle/MS SQL database security, and Apache/IIS Web server security Experience: •3 - 5 years related experience Education: •Bachelor’s degree in a related area or equivalent experience (4 years) Certifications: •Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level II within 6 months of the date of hire Security Clearance: •Current Top Secret Clearance with SCI Eligibility •Eligibility for access to Special Access Program Information •Willingness to submit to a Counterintelligence polygraph Other Requirements: •Thorough knowledge of Microsoft Windows desktop and server operating systems, Microsoft Exchange Server, and as needed RHEL operating systems administration and associated hardware •Working knowledge of CISCO network and switching and virtualization technologies •Working knowledge of Local Area Network (LAN) and Wide Area Network (WAN) technologies and data backup technologies •Working knowledge communication security (COMSEC) policies and integration •Working knowledge of Risk Management Framework, Common Criteria, and System Security Policy as they relate to assessments and authorization •Working knowledge and current relevant experience with PL2 and PL3 network environments/systems •Experience providing technical support in a customer service role •Experience applying industry standards and best practices in an enterprise-level Windows system environment. •Experience solving technical problems quickly and identifying opportunities to automate repetitive processes. •Working knowledge of WSUS and/or YUM patch deployment methodologies •Must be familiar with DoD policy as it applies to implementing and executing system and network administration •Must be able to regularly lift up to 50 lbs | Arthur |
Information Technology Information Assurance 1 ARTH220 | Schriever AFB, CO | Closed | 04/02/2022 | Information Technology Information Assurance 1: The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. Performance shall include: •Establish complex operational software configuration controls and system interfaces for computer system(s) assigned •Maintain file servers, Firewalls, network access, Security Monitoring Systems and system documentation as required •Analyze and troubleshoot system anomalies to ensure optimum equipment performance •Prepare system for operational use and support operational tests •Review, prepare, and update authorization packages •Notify customer when changes occur that might affect authorization accreditation •Conduct cybersecurity portion of the self-inspection’s checklist •Review and provide technical and cyber security coordination on all Bodies of Evidence that make-up the authorization package •Identify any and all vulnerabilities and implement countermeasures •Ensure information systems and network appliances are operated, maintained, and disposed of in accordance with security policies and practices •Perform Video-Teleconferencing VTC System Administration, Scheduling, & Configuration •Provide External Information System(s) Client Support •Perform account creations, changes, & deletions on multiple authorization boundaries •Perform Help Desk & troubleshooting activities •Perform Hardware/Software System Configuration, upgrades and modifications •Perform system and network appliance patching activities •Provide Government-Issued Laptop Support •Assist in Media Control & Accountability activities •Perform COMSEC account/equipment management activities Experience: •2 - 5 years related experience •Prior performance in roles such as System or Network Administrator Education: •Bachelor’s degree or equivalent experience (4 years) Certifications: •Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level I or Information Assurance Manager I within 6 months of the date of hire. Security Clearance: •Current Top Secret Clearance with SCI Eligibility •Eligibility for access to Special Access Program Information •Willingness to submit to a Counterintelligence polygraph Other Requirements: •Thorough knowledge of Microsoft Windows 2012R2 Server, Microsoft Exchange Server 2010/2016, Microsoft Windows 7/10 operating systems (OS) administration and associated hardware •Working knowledge of Local Area Network (LAN) and Wide Area Network (WAN) technologies and data backup technologies to include communication security (COMSEC) integration •Working knowledge of Risk Management Framework, Common Criteria, and System Security Policy as they relate to Assessments and Authorizations •Working knowledge and current relevant experience with PL2 systems •Must be able to regularly lift up to 50 lbs | Arthur |
Security Education and Training Specialist ARTH219 | Schriever AFB, CO | Closed | 04/02/2022 | Security Education and Training Specialist: The primary function is to implement a community-wide security education, awareness, and training program within the Air Force Special Access Program community. Performance shall include: •Interpret customer needs and through collaboration with subject matter experts and independent research, support the development of effective, high-quality training materials on matters pertaining to the full scope of the JAFAN and DCID series of publications •Incorporate Executive Orders and any other applicable regulatory documentation governing the protection of national security information by program accessed personnel and Career security professional into the education and awareness program •Support the development, dissemination and presentation of security education materials that provide blended learning opportunities. Materials may include training plans, briefings, slides, newsletter, web-based products, refresher training, and specialized training for all classification levels and accesses •Serve as a member of the Special Programs Security Education Council •Coordinate with external security educators to obtain education materials for dissemination to industry •Support the development and implementation of web-based security education and awareness tools •Evaluate security education and awareness program efficiency by identifying and gathering performance improvement metrics •Develop recommended improvements Experience: •8 - 10 years related experience Education: •Bachelor’s degree in a related area or equivalent experience (4 years) Security Clearance: •Current Top Secret Clearance with SCI Eligibility •Eligibility for access to Special Access Program Information •Willingness to submit to a Counterintelligence polygraph | Arthur |
Activity Security Representative 2 ARTH218 | Kirtland AFB, NM | Closed | 04/01/2022 | Activity Security Representative 2: Performance shall include: •Classification reviews of inbound and outbound correspondence •Assist in the maintenance of a document accountability database and associated correspondence •Processing inbound and outbound classified mail and receipt records •Perform destruction of classified materials •Process magnetic media for accountability •Reproduction support for classified materials •Maintain various daily logs for a variety of administrative functions associated with document control •Assist in the processing of inbound data and outbound data transfer files •Transfer electronic data files to internal customers •Maintain an extensive customer database point of contact listing •Assist with researching, processing, filing, and maintaining inbound and outbound visit notices •Escort facility visitors and maintains associated logs •Assist in the preparation of facility access control badges •Conduct entry and exit inspections •Assist in the maintenance of facility access control entry systems, to include visitor control •Perform data entry to the Personnel Access Security System database and maintain all customer sponsored billets and quota information •Assist in maintaining personnel security files for all personnel of the supported element •Follow and enforce the customer’s Standard Operating Procedures •Provide support for the security awareness and education programs •Perform miscellaneous administrative support functions as directed by the contractor site lead and/or the Senior Security Representative •Review, track, and monitor security clearance processing activities with appropriate government personnel to achieve appropriate clearance actions •Participate in Air Force SAP security compliance inspections of government organizations and industry •Implement Top Secret Control for accountable material and associated correspondence •Prepare and/or process inbound and outbound classified mail, faxes, courier packages and receipts •Prepare, process, and/or review Program Access Request (PARs) for accuracy and access eligibility •Execute Special Access Program Nomination Process Questionnaires •Conduct Defense Central Index of Investigations (DCII), Joint Personnel Access System (JPAS), and SAPNP reviews of candidates being submitted for SAP access •Perform data entry and record checks in the Air Force Access Data System (AFADS) and maintains all customer sponsored personnel access information current •Perform indoctrinations Experience: •3-5 years related experience •Security Fundamentals Professional Certification (SFPC) counts towards 3 years of experience •Special Program Security Certification (SPSC) counts towards 5 years of experience •Maximum equivalent experience for SPED Certifications is no more than 5 years Education: •Bachelor’s degree or equivalent experience (4 years) Certifications: •Must complete the DoD SAPCO approved SAPNP training (if performing personnel security functions) Security Clearance: •Current Top Secret Clearance with SCI Eligibility •Eligibility for access to Special Access Program Information •Willingness to submit to a Counterintelligence polygraph | Arthur |
Information System Security Manager 2 ARTH217 | Crystal City, VA | Closed | 04/01/2022 | Information System Security Manager 2: The ISSM’s primary function serves as a principal advisor on all matters, technical and otherwise, involving the security of information systems under their purview. Primary support will be working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense, and Military Compartment efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. Performance shall include: •Perform oversight of the development, implementation and evaluation of information system security program policy; special emphasis placed upon integration of existing SAP network infrastructures •Develop and oversee operational information systems security implementation policy and guidelines of network security, based upon the Risk Management Framework (RMF) with emphasize on Joint Special Access Program Implementation Guide (JSIG) authorization process •Advise customer on Risk Management Framework (RMF) assessment and authorization issues •Perform risk assessments and make recommendations to DoD agency customers •Advise government program managers on security testing methodologies and processes •Evaluate authorization documentation and provide written recommendations for authorization to government PM’s •Develop and maintain a formal Information Systems Security Program •Ensure that all IAOs, network administrators, and other cyber security personnel receive the necessary technical and security training to carry out their duties •Develop, review, endorse, and recommend action by the AO or DAO of system assessment documentation •Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media •Develop and execute security assessment plans that include verification that the features and assurances required for each protection level functioning •Maintain a and/or applicable repository for all system authorization documentation and modifications •Develop policies and procedures for responding to security incidents, to include investigating and reporting security violations and incidents •Ensure proper protection or corrective measures have been taken when an incident or vulnerability has been discovered within a system •Ensure that data ownership and responsibilities are established for each authorization boundary, to include accountability, access rights, and special handling requirements •Ensure development and implementation of an information security education, training, and awareness program, to include attending, monitoring, and presenting local cyber security training. •Evaluate threats and vulnerabilities to ascertain whether additional safeguards are needed •Assess changes in the system, its environment, and operational needs that could affect the authorization •Ensure that authorization is accomplished a valid Authorization determination has been given for all authorization boundaries under your purview •Review AIS assessment plans •Coordinate with PSO or cognizant security official on approval of external information systems (e.g., guest systems, interconnected system with another organization) •Conduct periodic assessments of the security posture of the authorization boundaries •Institute and implement a Configuration Control Board (CCB) charter •Ensure configuration management (CM) for security-relevant changes to software, hardware, and firmware and that they are properly documented •Ensure periodic testing is conducted to evaluate the security posture of IS by employing various intrusion/attack detection and monitoring tools (shared responsibility with ISSOs) •Ensure that system recovery and reconstitution processes developed and monitored to ensure that the authorization boundary can be recovered based on its availability level determination •Ensure all authorization documentation is current and accessible to properly authorized individuals •Ensure that system security requirements are addressed during all phases of the system life cycle •Participate in self-inspections •Periodically review system security to accommodate changes to policy or technology •Coordinate all technical security issues outside of area of expertise or responsibility with ISSE •Provide expert research and analysis in support of expanding programs and area of responsibility as it pertains to cyber security and information technology activities •Develop Assured File Transfers (AFT) on accordance with the JSIG •Provide leadership, mentoring, and quality assurance for Cyber Security and Information Technology team members Experience: •7 - 9 years related experience •Prior performance in roles such as ISSO or ISSM Education: •Bachelor’s degree or equivalent experience (4 years) Certifications: •Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level 2 or Information Assurance Manager Level 2 within 6 months of the date of hire Security Clearance: •Current Top Secret Clearance with SCI Eligibility •Eligibility for access to Special Access Program Information •Willingness to submit to a Counterintelligence polygraph Other Requirements: •Must be able to regularly lift up to 50 lbs | Arthur |
Activity Security Representative 2 ARTH216 | Peterson AFB, CO | Closed | 04/01/2022 | Activity Security Representative 2: The Activity Security Representative’s primary function is to provide multi-disciplined security support to a customer’s facility and organization. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. Performance shall include: •Classification reviews of inbound and outbound correspondence •Assist in the maintenance of a document accountability database and associated correspondence •Processing inbound and outbound classified mail and receipt records •Perform destruction of classified materials •Process magnetic media for accountability •Reproduction support for classified materials •Maintain various daily logs for a variety of administrative functions associated with document control •Assist in the processing of inbound data and outbound data transfer files •Transfer electronic data files to internal customers •Maintain an extensive customer database point of contact listing •Assist with researching, processing, filing, and maintaining inbound and outbound visit notices •Escort facility visitors and maintains associated logs •Assist in the preparation of facility access control badges •Conduct entry and exit inspections •Assist in the maintenance of facility access control entry systems, to include visitor control •Perform data entry to the Personnel Access Security System database and maintain all customer sponsored billets and quota information •Assist in maintaining personnel security files for all personnel of the supported element •Follow and enforce the customer’s Standard Operating Procedures •Provide support for the security awareness and education programs •Perform miscellaneous administrative support functions as directed by the contractor site lead and/or the Senior Security Representative •Review, track, and monitor security clearance processing activities with appropriate government personnel to achieve appropriate clearance actions •Participate in Air Force SAP security compliance inspections of government organizations and industry •Implement Top Secret Control for accountable material and associated correspondence •Prepare and/or process inbound and outbound classified mail, faxes, courier packages and receipts •Prepare, process, and/or review Program Access Request (PARs) for accuracy and access eligibility •Execute Special Access Program Nomination Process Questionnaires •Conduct Defense Central Index of Investigations (DCII), Joint Personnel Access System (JPAS), and SAPNP reviews of candidates being submitted for SAP access •Perform data entry and record checks in the Air Force Access Data System (AFADS) and maintains all customer sponsored personnel access information current •Perform indoctrinations Experience: •3-5 years related experience •Security Fundamentals Professional Certification (SFPC) counts towards 3 years of experience •Special Program Security Certification (SPSC) counts towards 5 years of experience •Maximum equivalent experience for SPED Certifications is no more than 5 years Education: •Bachelor’s degree or equivalent experience (4 years) Certifications: •Must complete the DoD SAPCO approved SAPNP training (if performing personnel security functions) Security Clearance: •Current Top Secret Clearance with SCI Eligibility •Eligibility for access to Special Access Program Information •Willingness to submit to a Counterintelligence polygraph | Arthur |
Security Control Assessor 2 ARTH215 | Hanscom AFB, MA | Closed | 04/01/2022 | Security Conrol Assessor 2: The SCA is responsible for conducting a comprehensive assessment of the management, operational, and technical security controls employed within or inherited by an IS to determine the overall effectiveness of the controls (i.e., the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting the security requirements for the system). SCAs also provide an assessment of the severity of weaknesses or deficiencies discovered in the IS and its environment of operation and recommend corrective actions to address identified vulnerabilities. Responsibilities will cover Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities within the customer’s area of responsibility. Performance shall include: •Perform oversight of the development, implementation and evaluation of IS security program policy; special emphasis placed upon integration of existing SAP network infrastructure •Perform assessment of ISs, based upon the Risk Management Framework (RMF) methodology in accordance with the Joint Special Access Program (SAP) Implementation Guide (JSIG) •Advise the Information System Owner (ISO), Information Data Owner (IDO), Program Security Officer (PSO), and the Delegated and/or Authorizing Official (DAO/AO) on any assessment and authorization issues •Evaluate Authorization packages and make recommendation to the AO and/or DAO for authorization •Evaluate IS threats and vulnerabilities to determine whether additional safeguards are required •Advise the Government concerning the impact levels for Confidentiality, Integrity, and Availability for the information on a system •Ensure security assessments are completed and results documented and prepare the Security Assessment Report (SAR) for the Authorization boundary •Initiate a Plan of Action and Milestones (POA&M) with identified weaknesses for each Authorization Boundaries assessed, based on findings and recommendations from the SAR •Evaluate security assessment documentation and provide written recommendations for security authorization to the Government •Discuss recommendation for authorization and submit the security authorization package to the AO/DAO •Assess proposed changes to Authorization boundaries operating environment and mission needs to determine the continuation to operate. •Review and concur with all sanitization and clearing procedures in accordance with Government guidance and/or policy •Assist the Government compliance inspections •Assist the Government with security incidents that relate to cybersecurity and ensure that the proper and corrective measures have been taken •Ensure organization are addressing and conducting all phases of the system development life cycle (SDLC) •Evaluate Hardware and Software to determine security impact that it might have on Authorization boundaries •Evaluate the effectiveness and implementation of Continuous Monitoring Plans •Represent the customer on inspection teams Experience: •7 - 9 years related experience •Minimum of four (4) years’ experience in SAP, SCI or Collateral Information Systems (IS) Security and the implementation of regulations identified in the description of duties. •Prior performance in the role of ISSO and ISSM or SCA Education: •Bachelor’s degree in a related discipline or equivalent experience (4 years) Certifications: •Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level III or Information Assurance Manager Level II within 6 months of the date of hire Security Clearance: •Current Top Secret Clearance with SCI Eligibility •Eligibility for access to Special Access Program Information •Willingness to submit to a Counterintelligence polygraph Other Requirements: •Must be able to regularly lift 50lbs | Arthur |
Acquisition Security Analyst ARTH214 | Pentagon, VA | Closed | 04/01/2022 | Acquisition Security Analyst: The Acquisition Security Analyst will assist the Government Program Manager with the development and implementation of comprehensive program protection methodologies to protect advanced technology programs throughout the system’s life cycle. Performance shall include: •In-depth lifecycle program analysis to identify critical program information (CPI), Critical System Resources (CSR), and their associated vulnerabilities •Assist with the identification and implementation of countermeasures •Develop and implement a risk managed based program protection plan and strategy •Provide technical advice and security support to collateral and SAP programs and emerging mission areas •Provide security guidance to the GSSO and PM, as it relates to the Air Force acquisition and sustainment process •Provide specific guidance pertaining to the contract security requirements in reference to cost, feasibility and appropriateness of requirement •Maintain a working relationship with the Program Manager, Contracting Officer and contractor security officers to ensure a standardized and correct format/process is utilized for all DD Form 254 efforts throughout the acquisition and sustainment lifecycle •Directly support customer program protection/security officers in the development, execution and implementation of Program Protection Planning (PPP) •Assess threat and risk, develop risk management actions and implements long term courses of actions •Assist in the development and writing of operations security (OPSEC) plans, transition plans, emergency action plans, transportation plans and any other security documents as needed for the customer •Review program documentation for public release, to include ensuring Controlled Unclassified Information (CUI) has proper markings, classifications and distribution statements per Air Force doctrine •Conduct analysis of foreign intelligence threats against programs involving customer's critical research, sensitive technologies or CPI •Prepare and produce analytical products from numerous resources, to include various databases, to ensure a real-time, tailored product is provided •Provide classification guidance and assistance for all security programs to include collateral and SAP programs •Analyze Counterintelligence reports and prepare written summaries of activities with potential impact to customer resources •Write, review, and/or edit Security Classification Guides (SCG), Exposure Contingency Plans (ECP), Managed Access Plans (MAP), Security Operating Procedures (SOPs), System Test Plans (STP) •Assist government system security engineers performing close out actions for SAPs as needed •Develop and implement quarterly and annual security education and training for personnel •Provide technical analysis and OPSEC support to SAF/AAZ and SAF/AQ Special programs and other associated operations, missions, and organizational elements involved in developing system requirements to associated systems RDT&E Experience: •10 - 12 years related experience, minimum two (2) years of direct SAP experience •Security Fundamentals Professional Certification (SFPC) counts towards 3 years of experience •Special Program Security Certification (SPSC) counts towards 5 years of experience •Maximum equivalent experience for SPED Certifications is no more than 5 years Education: •Bachelor’s degree in a related area or equivalent experience (4 years) Security Clearance: •Current Top Secret Clearance with SCI Eligibility •Eligibility for access to Special Access Program Information •Willingness to submit to a Counterintelligence polygraph Other Requirements: •Must have extensive knowledge of the DD Form 254 and how it is incorporated in the Air Force acquisition process | Arthur |
Activity Security Representative 2 ARTH213 | Pentagon, VA | Closed | 04/01/2022 | Activity Security Representative 2: Performance shall include: •Classification reviews of inbound and outbound correspondence •Assist in the maintenance of a document accountability database and associated correspondence •Processing inbound and outbound classified mail and receipt records •Perform destruction of classified materials •Process magnetic media for accountability •Reproduction support for classified materials •Maintain various daily logs for a variety of administrative functions associated with document control •Assist in the processing of inbound data and outbound data transfer files •Transfer electronic data files to internal customers •Maintain an extensive customer database point of contact listing •Assist with researching, processing, filing, and maintaining inbound and outbound visit notices •Escort facility visitors and maintains associated logs •Assist in the preparation of facility access control badges •Conduct entry and exit inspections •Assist in the maintenance of facility access control entry systems, to include visitor control •Perform data entry to the Personnel Access Security System database and maintain all customer sponsored billets and quota information •Assist in maintaining personnel security files for all personnel of the supported element •Follow and enforce the customer’s Standard Operating Procedures •Provide support for the security awareness and education programs •Perform miscellaneous administrative support functions as directed by the contractor site lead and/or the Senior Security Representative •Review, track, and monitor security clearance processing activities with appropriate government personnel to achieve appropriate clearance actions •Participate in Air Force SAP security compliance inspections of government organizations and industry •Implement Top Secret Control for accountable material and associated correspondence •Prepare and/or process inbound and outbound classified mail, faxes, courier packages and receipts •Prepare, process, and/or review Program Access Request (PARs) for accuracy and access eligibility •Execute Special Access Program Nomination Process Questionnaires •Conduct Defense Central Index of Investigations (DCII), Joint Personnel Access System (JPAS), and SAPNP reviews of candidates being submitted for SAP access •Perform data entry and record checks in the Air Force Access Data System (AFADS) and maintains all customer sponsored personnel access information current •Perform indoctrinations Experience: •3-5 years related experience •Security Fundamentals Professional Certification (SFPC) counts towards 3 years of experience •Special Program Security Certification (SPSC) counts towards 5 years of experience •Maximum equivalent experience for SPED Certifications is no more than 5 years Education: •Bachelor’s degree or equivalent experience (4 years) Certifications: •Must complete the DoD SAPCO approved SAPNP training (if performing personnel security functions) Security Clearance: •Current Top Secret Clearance with SCI Eligibility •Eligibility for access to Special Access Program Information •Willingness to submit to a Counterintelligence polygraph | Arthur |
Information Assurance System Security Engineer 2 ARTH212 | Hill AFB, UT | Immediate | 04/01/2022 | Information Assurance System Security Engineer 2: The Information System Security Engineer (ISSE) is primarily responsible for conducting information system security engineering activities with a focus on lifecycle of current systems and future requirement scoping. The position will collect and process the captured information security requirements and ensures that the requirements are effectively integrated into information systems through purposeful security architecting, design, development, and configuration. The position is an integral part of the development team designing and developing organizational information systems or upgrading legacy systems. The ISSE employs best practices when implementing security requirements within an information system including software engineering methodologies, system/security engineering principles, secure design, secure architecture, and secure coding techniques. This position’s main function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. Performance shall include: •Perform oversight of the development, implementation and evaluation of information system security program policy; special emphasis placed upon integration of existing SAP network infrastructures •Perform analysis of network security, based upon the Risk Management Framework (RMF) with emphasize on Joint Special Access Program Implementation Guide (JSIG) authorization process •Provides expert support, research and analysis of exceptionally complex problems, and processes relating to them •Provides expert level consultation and technical services on all aspects of Information Security •Serves as technical expert to the Cybersecurity Assessment Program providing technical direction, interpretation and alternatives to complex problems •Thinks independently and demonstrates exceptional written and oral communications skills. Applies advanced technical principles, theories, and concepts •Contributes to the development of new principles, concepts, and methodologies •Works on unusually complex technical problems and provides highly innovative and ingenious solutions •Lead a team of System Security Engineers and Certification and Accreditation Analysts responsible for ensuring the customers national and international security interests are protected as support equipment are designed and tested •Recommends cybersecurity software tools and assists in the development of software tool requirements and selection criteria to include the development of product specific STIGs from applicable DISA SRGs •Review ISSE related designs and provides security compliance recommendations •Leads technical teams in implementation of predetermined long-range goals and objectives •Supports customer and SAP community IA working groups, participate in SSE IPT reviews •Provides expert level consultation and technical services on all aspects of Information Security •Review ISSE related designs and provides security compliance recommendations •Develop and provide IA risk management recommendations to the customer •Provide ISSE support for Mission and Training systems design and development •Assist with development and maintenance of the Program Protection Plan •Assist with site activation activities and design reviews •Represent the customer in various ISSE related working groups, advisory groups, and advisory council meetings •Chair and or Co-Chair customer and SAP community IA working groups, participate in ISSE IPT reviews •Represent the customer in various SSE related working groups, advisory groups, and advisory council meetings •Strong background in Patch/Configuration management, DevOps, and tier 3 support •Assist team to design, integrate, and implement JSIG/RMF Continuous Monitoring tools and processes •Integrate COTS & GOTS products to collect, display and remediate a variety of automated system security and system operations/performance functions and metrics •Perform security assessments of servers/network devices/security appliances •Develop improvements to security assessments with regard to accuracy and efficiency •Integrate ancillary monitoring tools/capabilities with the enterprise security information and event management (SIEM) and create/tailor complex event alarms/rules and summary reports •Write and execute cybersecurity test procedures for validation of control compliance •Monitor/analyze output of cybersecurity related tools for reportable security incidents and residual risk •Analyze technical risk of emerging cybersecurity tools and processes •Work as part of a security incident response team as needed •Build operational Operations and Maintenance (O&M) checklists to maintain the service (daily, weekly, monthly, yearly O&M checklists); build Tactics, Techniques and Processes (TTPs) and Standard Operating Processes (SOPs) associated with service checklists •Integrate/Develop new techniques to improve Confidentiality, Integrity, and Availability for networks/systems operating at various classification levels •Advanced technical competency in one or more of the following supported platforms: Microsoft Windows Server, Active Directory, Red Hat Enterprise Linux servers, MS Hyper-V/VMWare/ESx/Xen Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems, forensic analysis/vulnerability assessment, Group Policy management and configuration, Scripting, BMC Footprints, WSUS, , Lumension, Bitlocker, SQL Server 2012, TomCat, IIS, Windows Server 2012r2/2016, Win 10, Red Hat 6.5, Microsoft Office •Toolkits, SEIMs, Logrhythm, ACAS/Nessus/SCAP, mandatory/role-based access control concepts (e. g. SE Linux extensions to RHEL, PitBull, AppArmor, and Sentris) , video teleconferencing/VOIP, Oracle/MS SQL database security, and Apache/IIS Web server security Experience: •12 - 15 years related experience •Prior performance in roles such as ISSO, ISSM, SCA or SAP IT Technical Director Education: •Bachelor’s degree in a related discipline or equivalent experience (4 years) Certifications: •Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Architect and Engineer Level I or Information Assurance Architect and Engineer Level II within 6 months of the date of hire Security Clearance: •Current Top Secret Clearance with SCI Eligibility •Eligibility for access to Special Access Program Information •Willingness to submit to a Counterintelligence polygraph Other Requirements: •Must have expert knowledge of DoD, National and applicable service and agency security policy, manuals and standards. Must have the ability to work in a dynamic environment and effectively interact with numerous DOD, military/civilian personnel and industry partners | Arthur |
Network System Administrator 1 ARTH211 | Hill AFB, UT | Closed | 04/01/2022 | Network System Administrator: The primary function will be to organize, install, and support government organization’s computer systems, including local area networks (LANs), wide area networks (WANs), network segments, intranets, and other data communication systems. This will also include helping architect, design and analyze network models. It will require participation in decisions about buying future hardware or software to upgrade organization’s infrastructure. This position might be called upon to provide technical support to computer users to help solve users’ problems. This position will support activities within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. Performance shall include: •Ability to operate under supervision •Execute day to day management and operations of systems and networks •Manage COTS & GOTS products to collect, display and remediate a variety of automated system security and system operations/performance functions and metrics •Follow Operations and Maintenance (O&M) checklists to maintain the service (daily, weekly, monthly, yearly O&M checklists); build Tactics, Techniques and Processes (TTPs) and Standard Operating Processes (SOPs) associated with service checklists •Operate monitoring tools/capabilities with the enterprise security information and event management (SIEM) and create/tailor complex event alarms/rules and summary reports •Assist in analyzing technical risk, upon request, of emerging cybersecurity tools and processes •Work as part of a security incident response team as needed •Working technical competency in one or more of the following supported platforms: Microsoft Windows Server, Red Hat Enterprise Linux servers, MS Hyper-V/VMWare/ESx/Xen Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems, forensic analysis/vulnerability assessment, Group Policy management and configuration, Scripting, BMC Footprints, WSUS, , Lumension, Bitlocker, SQL Server 2012, TomCat, IIS, Windows Server 2012r2/2016, Win 10, Red Hat 6.5, Microsoft Office •Toolkits, SEIMs, Logrhythm, ACAS/Nessus/SCAP, mandatory/role-based access control concepts (e. g. SE Linux extensions to RHEL, PitBull, AppArmor, and Sentris) , video teleconferencing/VOIP, Oracle/MS SQL database security, and Apache/IIS Web server security Experience: •1 - 3 years related experience Education: •Bachelor’s degree in a related area or equivalent experience (4 years) Certifications: •Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level I within 6 months of the date of hire Security Clearance: •Current Top Secret Clearance with SCI Eligibility •Eligibility for access to Special Access Program Information •Willingness to submit to a Counterintelligence polygraph Other Requirements: •Thorough knowledge of Microsoft Windows desktop and server operating systems, Microsoft Exchange Server, and as needed RHEL operating systems administration and associated hardware •Working knowledge of CISCO network and switching and virtualization technologies •Working knowledge of Local Area Network (LAN) and Wide Area Network (WAN) technologies and data backup technologies to include communication security (COMSEC) integration •Working knowledge of Risk Management Framework, Common Criteria, and System Security Policy as they relate to assessments and authorization •Working knowledge and current relevant experience with PL2 network environments/systems •Must be familiar with DoD policy as it applies to implementing and executing system and network administration •Must be able to regularly lift up to 50 lb | Arthur |
Program Security Representative 3 ARTH210 | JBAB, Washington DC | Closed | 04/01/2022 | Program Security Representative 3: Performance shall include: •Ensure strict adherence to the provisions of the NISPOM, its Supplement, the DoD Overprint, DCID, ICD, and SAP policy •Assist in developing and executing approved policies and procedures for safeguarding Special Access Program (SAP), Sensitive Compartmented Information (SCI) and collateral data in support of US military operations •Provide day-to-day security support that includes continuous assessment of procedures to identify shortfalls and provide appropriate recommendations for revising and improving security policies, procedures, and systems •Identify vulnerabilities, threats, and risks to test, training, and operational activities •Assist in developing, implementing, and training the Operations Security program •Assist in providing contractor and subordinate facility assistance and oversight •Brief all levels of personnel, both in the government and senior civilian services, on a variety of security related topics •Conduct and document SAP facility compliance reviews, follow-on facility reviews, and facility close-outs •Monitor, report and track all corrective actions resulting from compliance reviews •Ensure timely notification of pertinent security matters to program technical and management staff •Conduct exploration of any loss, compromise, or suspected compromise of classified and/or sensitive information, including conducting preliminary inquiries and generating damage assessments resulting from the loss of classified information •Coordinate with SAP security personnel to ensure lessons learned are incorporated into the curriculum for the SAP security education & awareness program •Provide leadership, mentoring, and oversight of team members Experience: •10 - 12 years related experience •Security Fundamentals Professional Certification (SFPC) counts towards 3 years of experience •Special Program Security Certification (SPSC) counts towards 5 years of experience •Maximum equivalent experience for SPED Certifications is no more than 5 years Education: •Bachelor’s degree in a related area or equivalent experience (4 years) Security Clearance: •Current Top Secret Clearance with SCI Eligibility •Eligibility for access to Special Access Program Information •Willingness to submit to a Counterintelligence polygraph | Arthur |
Activity Security Representative 3 ARTH209 | Kirtland AFB, NM | Immediate | 04/01/2022 | Activity Security Representative 3: The Activity Security Representative’s primary function is to provide multi-disciplined security support to a customer’s facility and organization. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. Performance shall include: •Classification reviews of inbound and outbound correspondence •Assist in the maintenance of a document accountability database and associated correspondence •Processing inbound and outbound classified mail and receipt records •Perform destruction of classified materials •Process magnetic media for accountability •Reproduction support for classified materials •Maintain various daily logs for a variety of administrative functions associated with document control •Assist in the processing of inbound data and outbound data transfer files •Transfer electronic data files to internal customers •Maintain an extensive customer database point of contact listing •Assist with researching, processing, filing, and maintaining inbound and outbound visit notices •Escort facility visitors and maintains associated logs •Assist in the preparation of facility access control badges •Conduct entry and exit inspections •Assist in the maintenance of facility access control entry systems, to include visitor control •Perform data entry to the Personnel Access Security System database and maintain all customer sponsored billets and quota information •Assist in maintaining personnel security files for all personnel of the supported element •Follow and enforce the customer’s Standard Operating Procedures •Provide support for the security awareness and education programs •Perform miscellaneous administrative support functions as directed by the contractor site lead and/or the Senior Security Representative •Review, track, and monitor security clearance processing activities with appropriate government personnel to achieve appropriate clearance actions •Participate in Air Force SAP security compliance inspections of government organizations and industry •Implement Top Secret Control for accountable material and associated correspondence •Prepare and/or process inbound and outbound classified mail, faxes, courier packages and receipts •Prepare, process, and/or review Program Access Request (PARs) for accuracy and access eligibility •Execute Special Access Program Nomination Process Questionnaires •Conduct Defense Central Index of Investigations (DCII), Joint Personnel Access System (JPAS), and SAPNP reviews of candidates being submitted for SAP access •Perform data entry and record checks in the Air Force Access Data System (AFADS) and maintains all customer sponsored personnel access information current •Perform indoctrinations •Provide leadership, mentoring, and quality assurance for Team Members Experience: •5 - 7 years related experience •Security Fundamentals Professional Certification (SFPC) counts towards 3 years of experience •Special Program Security Certification (SPSC) counts towards 5 years of experience •Maximum equivalent experience for SPED Certifications is no more than 5 years Education: •Bachelor’s degree or equivalent experience (4 years) Certifications: •Must complete the DoD SAPCO approved SAPNP training (if performing personnel security functions) Security Clearance: •Current Top Secret Clearance with SCI Eligibility •Eligibility for access to Special Access Program Information •Willingness to submit to a Counterintelligence polygraph | Arthur |
Information System Security Manager 2 ARTH208 | Schriever AFB, CO | Closed | 04/01/2022 | Information System Security Manager 2: Performance shall include: •Perform oversight of the development, implementation and evaluation of information system security program policy; special emphasis placed upon integration of existing SAP network infrastructures •Develop and oversee operational information systems security implementation policy and guidelines of network security, based upon the Risk Management Framework (RMF) with emphasize on Joint Special Access Program Implementation Guide (JSIG) authorization process •Advise customer on Risk Management Framework (RMF) assessment and authorization issues •Perform risk assessments and make recommendations to DoD agency customers •Advise government program managers on security testing methodologies and processes •Evaluate authorization documentation and provide written recommendations for authorization to government PM’s •Develop and maintain a formal Information Systems Security Program •Ensure that all IAOs, network administrators, and other cyber security personnel receive the necessary technical and security training to carry out their duties •Develop, review, endorse, and recommend action by the AO or DAO of system assessment documentation •Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media •Develop and execute security assessment plans that include verification that the features and assurances required for each protection level functioning •Maintain a and/or applicable repository for all system authorization documentation and modifications •Develop policies and procedures for responding to security incidents, to include investigating and reporting security violations and incidents •Ensure proper protection or corrective measures have been taken when an incident or vulnerability has been discovered within a system •Ensure that data ownership and responsibilities are established for each authorization boundary, to include accountability, access rights, and special handling requirements •Ensure development and implementation of an information security education, training, and awareness program, to include attending, monitoring, and presenting local cyber security training. •Evaluate threats and vulnerabilities to ascertain whether additional safeguards are needed •Assess changes in the system, its environment, and operational needs that could affect the authorization •Ensure that authorization is accomplished a valid Authorization determination has been given for all authorization boundaries under your purview •Review AIS assessment plans •Coordinate with PSO or cognizant security official on approval of external information systems (e.g., guest systems, interconnected system with another organization) •Conduct periodic assessments of the security posture of the authorization boundaries •Institute and implement a Configuration Control Board (CCB) charter •Ensure configuration management (CM) for security-relevant changes to software, hardware, and firmware and that they are properly documented •Ensure periodic testing is conducted to evaluate the security posture of IS by employing various intrusion/attack detection and monitoring tools (shared responsibility with ISSOs) •Ensure that system recovery and reconstitution processes developed and monitored to ensure that the authorization boundary can be recovered based on its availability level determination •Ensure all authorization documentation is current and accessible to properly authorized individuals •Ensure that system security requirements are addressed during all phases of the system life cycle •Participate in self-inspections •Periodically review system security to accommodate changes to policy or technology •Coordinate all technical security issues outside of area of expertise or responsibility with ISSE •Provide expert research and analysis in support of expanding programs and area of responsibility as it pertains to cyber security and information technology activities •Develop Assured File Transfers (AFT) on accordance with the JSIG •Provide leadership, mentoring, and quality assurance for Cyber Security and Information Technology team members Experience: •7 - 9 years related experience •Prior performance in roles such as ISSO or ISSM Education: •Bachelor’s degree or equivalent experience (4 years) Certifications: •Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level 2 or Information Assurance Manager Level 2 within 6 months of the date of hire Security Clearance: •Current Top Secret Clearance with SCI Eligibility •Eligibility for access to Special Access Program Information •Willingness to submit to a Counterintelligence polygraph Other Requirements: •Must be able to regularly lift up to 50 lbs | Arthur |
Program Security Representative 3 ARTH207 | Barksdale AFB, LA | Closed | 04/01/2022 | Program Security Representative 3: The Program Security Representative’s primary function is to provide multi-discipline security support for one or more of the customer’s Special Access Programs (SAPs). The position will provide “day-to-day” multi-discipline analysis for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. Performance shall include: •Ensure strict adherence to the provisions of the NISPOM, its Supplement, the DoD Overprint, DCID, ICD, and SAP policy •Assist in developing and executing approved policies and procedures for safeguarding Special Access Program (SAP), Sensitive Compartmented Information (SCI) and collateral data in support of US military operations •Provide day-to-day security support that includes continuous assessment of procedures to identify shortfalls and provide appropriate recommendations for revising and improving security policies, procedures, and systems •Identify vulnerabilities, threats, and risks to test, training, and operational activities •Assist in developing, implementing, and training the Operations Security program •Assist in providing contractor and subordinate facility assistance and oversight •Brief all levels of personnel, both in the government and senior civilian services, on a variety of security related topics •Conduct and document SAP facility compliance reviews, follow-on facility reviews, and facility close-outs •Monitor, report and track all corrective actions resulting from compliance reviews •Ensure timely notification of pertinent security matters to program technical and management staff •Conduct exploration of any loss, compromise, or suspected compromise of classified and/or sensitive information, including conducting preliminary inquiries and generating damage assessments resulting from the loss of classified information •Coordinate with SAP security personnel to ensure lessons learned are incorporated into the curriculum for the SAP security education & awareness program •Provide leadership, mentoring, and oversight of team members Experience: •10 - 12 years related experience •Security Fundamentals Professional Certification (SFPC) counts towards 3 years of experience •Special Program Security Certification (SPSC) counts towards 5 years of experience •Maximum equivalent experience for SPED Certifications is no more than 5 years Education: •Bachelor’s degree in a related area or equivalent experience (4 years) Security Clearance: •Current Top Secret Clearance with SCI Eligibility •Eligibility for access to Special Access Program Information •Willingness to submit to a Counterintelligence polygraph | Arthur |
Program Security Representative 2 ARTH206 | Langley AFB, VA | Immediate | 04/01/2022 | Program Security Representative 2: The Program Security Representative’s primary function is to provide multi-discipline security support for one or more of the customer’s Special Access Programs (SAPs). The position will provide “day-to-day” multi-discipline analysis for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. Performance shall include: •Ensure strict adherence to the provisions of the NISPOM, its Supplement, the DoD Overprint, DCID, ICD, and SAP policy •Assist in developing and executing approved policies and procedures for safeguarding Special Access Program (SAP), Sensitive Compartmented Information (SCI) and collateral data in support of US military operations •Provide day-to-day security support that includes continuous assessment of procedures to identify shortfalls and provide appropriate recommendations for revising and improving security policies, procedures, and systems •Identify vulnerabilities, threats, and risks to test, training, and operational activities •Assist in developing, implementing, and training the Operations Security program •Assist in providing contractor and subordinate facility assistance and oversight •Brief all levels of personnel, both in the government and senior civilian services, on a variety of security related topics •Conduct and document SAP facility compliance reviews, follow-on facility reviews, and facility close-outs •Monitor, report and track all corrective actions resulting from compliance reviews •Ensure timely notification of pertinent security matters to program technical and management staff •Conduct exploration of any loss, compromise, or suspected compromise of classified and/or sensitive information, including conducting preliminary inquiries and generating damage assessments resulting from the loss of classified information •Coordinate with SAP security personnel to ensure lessons learned are incorporated into the curriculum for the SAP security education & awareness program Experience: •8 – 10 years related experience •Security Fundamentals Professional Certification (SFPC) counts towards 3 years of experience •Special Program Security Certification (SPSC) counts towards 5 years of experience •Maximum equivalent experience for SPED Certifications is no more than 5 years Education: •Bachelor’s degree in a related area or equivalent experience (4 years) Security Clearance: •Current Top Secret Clearance with SCI Eligibility •Eligibility for access to Special Access Program Information •Willingness to submit to a Counterintelligence polygraph | Arthur |
Information System Security Manager 1 ARTH205 | JBAB, Washington DC | Closed | 04/01/2022 | Information System Security Manger 1: The ISSM’s primary function serves as a principal advisor on all matters, technical and otherwise, involving the security of information systems under their purview. Primary support will be working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense, and Military Compartment efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. Performance shall include: •Perform oversight of the development, implementation and evaluation of information system security program policy; special emphasis placed upon integration of existing SAP network infrastructures •Develop and oversee operational information systems security implementation policy and guidelines of network security, based upon the Risk Management Framework (RMF) with emphasize on Joint Special Access Program Implementation Guide (JSIG) authorization process •Advise customer on Risk Management Framework (RMF) assessment and authorization issues •Perform risk assessments and make recommendations to DoD agency customers •Advise government program managers on security testing methodologies and processes •Evaluate authorization documentation and provide written recommendations for authorization to government PMs •Develop and maintain a formal Information Systems Security Program •Ensure that all IAOs, network administrators, and other cyber security personnel receive the necessary technical and security training to carry out their duties •Develop, review, endorse, and recommend action by the AO or DAO of system assessment documentation •Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media •Develop and execute security assessment plans that include verification that the features and assurances required for each protection level functioning •Maintain a and/or applicable repository for all system authorization documentation and modifications •Institute and implement a Configuration Control Board (CCB) charter •Develop policies and procedures for responding to security incidents, to include investigating and reporting security violations and incidents •Ensure proper protection or corrective measures have been taken when an incident or vulnerability has been discovered within a system •Ensure that data ownership and responsibilities are established for each authorization boundary, to include accountability, access rights, and special handling requirements •Ensure development and implementation of an information security education, training, and awareness program, to include attending, monitoring, and presenting local cyber security training. •Evaluate threats and vulnerabilities to ascertain whether additional safeguards are needed •Assess changes in the system, its environment, and operational needs that could affect the authorization •Ensure that authorization is accomplished a valid Authorization determination has been given for all authorization boundaries under your purview •Review AIS assessment plans •Coordinate with PSO or cognizant security official on approval of external information systems (e.g., guest systems, interconnected system with another organization) •Conduct periodic assessments of the security posture of the authorization boundaries •Ensure configuration management (CM) for security-relevant changes to software, hardware, and firmware and that they are properly documented •Ensure periodic testing is conducted to evaluate the security posture of IS by employing various intrusion/attack detection and monitoring tools (shared responsibility with ISSOs) •Ensure that system recovery and reconstitution processes developed and monitored to ensure that the authorization boundary can be recovered based on its availability level determination •Ensure all authorization documentation is current and accessible to properly authorized individuals •Ensure that system security requirements are addressed during all phases of the system life cycle •Develop Assured File Transfers (AFT) on accordance with the JSIG •Participate in self-inspections •Conduct the duties of the Information System Security Officer (ISSO) if one is not present and/or available Experience: •5 - 7 years related experience •Prior performance in roles such as ISSO or ISSM Education: •Bachelor’s degree in a related area or equivalent experience (4 years) Certifications: •Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level II or Information Assurance Manager Level I within 6 months of the date of hire. Security Clearance: •Current Top Secret Clearance with SCI Eligibility •Eligibility for access to Special Access Program Information •Willingness to submit to a Counterintelligence polygraph Other Requirements: •Must having working knowledge of DoD, National and applicable service and agency security policy, manuals and standards. •Must be able to regularly lift up-to 50lbs | Arthur |
Network System Administrator 3 ARTH204 | San Antonio, TX | Immediate | 04/01/2022 | Network System Administrator 3: The primary function will be to organize, install, and support government organization’s computer systems, including local area networks (LANs), wide area networks (WANs), network segments, intranets, and other data communication systems. This will also include helping architect, design and analyze network models. It will require participation in decisions about buying future hardware or software to upgrade organization’s infrastructure. This position might be called upon to provide technical support to computer users to help solve users’ problems. This position will support activities within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. Performance shall include: •Able to perform self-sustaining and work with little to no oversight •Lead IT ops team on day to day management and operations of Networks and implement capabilities vetted through Cybersecurity, ISSE and higher headquarters to maintain JSIG/RMF Authority to Operate and maintain Continuous Monitoring tools and processes •Manage COTS & GOTS products to collect, display and remediate a variety of automated system security and system operations/performance functions and metrics. •Assist during security assessments of servers/network devices/security appliances •Assist during security assessments with regard to accuracy and efficiency •Assist with Creation of operational Operations and Maintenance (O&M) checklists to maintain the service (daily, weekly, monthly, yearly O&M checklists); build Tactics, Techniques and Processes (TTPs) and Standard Operating Processes (SOPs) associated with service checklists •Manage and operate monitoring tools/capabilities with the enterprise security information and event management (SIEM) and create/tailor complex event alarms/rules and summary reports •Execute cybersecurity operations procedures for day to day network management, operations and maintenance •Monitor/analyze output of cybersecurity related tools for reportable security incidents and residual risk •Assist in analyzing technical risk, upon request, of emerging cybersecurity tools and processes •Work as part of a security incident response team as needed •Assist ISSM/ISSO/ISSE with the Integration/Development new techniques to improve Confidentiality, Integrity, and Availability for networks/systems operating at various classification levels •Advanced technical competency in one or more of the following supported platforms: Microsoft Windows Server, Active Directory Red Hat Enterprise Linux servers, MS Hyper-V/VMWare/ESx/Xen Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems, forensic analysis/vulnerability assessment, Group Policy management and configuration, Scripting, BMC Footprints, WSUS, , Lumension, Bitlocker, SQL Server 2012, TomCat, IIS, Windows Server 2012r2/2016, Win 10, Red Hat 6.5, Microsoft Office •Toolkits, SEIMs, Logrhythm, ACAS/Nessus/SCAP, mandatory/role-based access control concepts (e. g. SE Linux extensions to RHEL, PitBull, AppArmor, and Sentris) , video teleconferencing/VOIP, Oracle/MS SQL database security, and Apache/IIS Web server security Experience: •5 - 7 years related experience Education: •Bachelor’s degree in a related area or equivalent experience (4 years) Certifications: •Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level III within 6 months of the date of hire Security Clearance: •Current Top Secret Clearance with SCI Eligibility •Eligibility for access to Special Access Program Information •Willingness to submit to a Counterintelligence polygraph Other Requirements: •Thorough knowledge of Microsoft Windows desktop and server operating systems, Microsoft Exchange Server, and as needed RHEL operating systems administration and associated hardware •Experience in effective communication and collaborating in a high performance team environment. •Group Policy design and configuration •Working knowledge of CISCO network and switching and virtualization technologies •Working knowledge of virtualization as it applies to users environments, operating systems, and network appliances •Working knowledge of Local Area Network (LAN) and Wide Area Network (WAN) technologies and data backup technologies •Working knowledge communication security (COMSEC) policies and integration •Working knowledge of Risk Management Framework, Common Criteria, and System Security Policy as they relate to assessments and authorization •Working knowledge and current relevant experience with PL2, PL3, and PL4 network environments/systems •Working knowledge of WSUS and/or YUM patch deployment methodologies •Must be familiar with DoD policy as it applies to implementing and executing system and network administration •Working knowledge of Risk Management Framework and how to apply it to network/information system environments •Must be able to regularly lift up to 50 lbs | Arthur |
Information System Security Officer 3 ARTH203 | Hanscom AFB, MA | Closed | 04/01/2022 | Information System Security Officer 3: The ISSO is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO. The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is assigned responsibility for the day-to-day security operations of a system. This also will include physical and environmental protection, personnel security, incident handling, and security training and awareness. It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configuration management across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. Performance shall include: •Assist the ISSM in meeting their duties and responsibilities •Prepare, review, and update authorization packages •Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media •Notify ISSM when changes occur that might affect the authorization determination of the information system(s) •Conduct periodic reviews of information systems to ensure compliance with the security authorization package •Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change •Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly •Ensure all IS security-related documentation is current and accessible to properly authorized individuals •Ensure audit records are collected, reviewed, and documented (to include any anomalies) •Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties •Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans •Identify cyber security vulnerabilities and assist with the implementation of the countermeasures for them •Prepare reports on the status of security safeguards applied to computer systems •Perform ISSO duties in support of in-house and external customers •Conduct continuous monitoring activities for authorization boundaries under your preview •Assist Department of Defense, National Agency and Contractor organizations with the development of assessment and authorization (A&A) efforts Experience: •5 - 7 years related experience •Prior performance in roles such as System, Network Administrator or ISSO Education: •Bachelor’s degree or equivalent experience (4 years) Certifications: •Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level II or Information Assurance Manager II within 6 months of the date of hire. Security Clearance: •Current Top Secret Clearance with SCI Eligibility •Eligibility for access to Special Access Program Information •Willingness to submit to a Counterintelligence polygraph Other Requirements: •Must be able to regularly lift up to 50 lbs | Arthur |
Information System Security Manager 1 ARTH202 | Hanscom AFB, MA | Closed | 04/01/2022 | Information System Security Manager 1: The ISSM’s primary function serves as a principal advisor on all matters, technical and otherwise, involving the security of information systems under their purview. Primary support will be working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense, and Military Compartment efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. Performance shall include: •Perform oversight of the development, implementation and evaluation of information system security program policy; special emphasis placed upon integration of existing SAP network infrastructures •Develop and oversee operational information systems security implementation policy and guidelines of network security, based upon the Risk Management Framework (RMF) with emphasize on Joint Special Access Program Implementation Guide (JSIG) authorization process •Advise customer on Risk Management Framework (RMF) assessment and authorization issues •Perform risk assessments and make recommendations to DoD agency customers •Advise government program managers on security testing methodologies and processes •Evaluate authorization documentation and provide written recommendations for authorization to government PMs •Develop and maintain a formal Information Systems Security Program •Ensure that all IAOs, network administrators, and other cyber security personnel receive the necessary technical and security training to carry out their duties •Develop, review, endorse, and recommend action by the AO or DAO of system assessment documentation •Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media •Develop and execute security assessment plans that include verification that the features and assurances required for each protection level functioning •Maintain a and/or applicable repository for all system authorization documentation and modifications •Institute and implement a Configuration Control Board (CCB) charter •Develop policies and procedures for responding to security incidents, to include investigating and reporting security violations and incidents •Ensure proper protection or corrective measures have been taken when an incident or vulnerability has been discovered within a system •Ensure that data ownership and responsibilities are established for each authorization boundary, to include accountability, access rights, and special handling requirements •Ensure development and implementation of an information security education, training, and awareness program, to include attending, monitoring, and presenting local cyber security training. •Evaluate threats and vulnerabilities to ascertain whether additional safeguards are needed •Assess changes in the system, its environment, and operational needs that could affect the authorization •Ensure that authorization is accomplished a valid Authorization determination has been given for all authorization boundaries under your purview •Review AIS assessment plans •Coordinate with PSO or cognizant security official on approval of external information systems (e.g., guest systems, interconnected system with another organization) •Conduct periodic assessments of the security posture of the authorization boundaries •Ensure configuration management (CM) for security-relevant changes to software, hardware, and firmware and that they are properly documented •Ensure periodic testing is conducted to evaluate the security posture of IS by employing various intrusion/attack detection and monitoring tools (shared responsibility with ISSOs) •Ensure that system recovery and reconstitution processes developed and monitored to ensure that the authorization boundary can be recovered based on its availability level determination •Ensure all authorization documentation is current and accessible to properly authorized individuals •Ensure that system security requirements are addressed during all phases of the system life cycle •Develop Assured File Transfers (AFT) on accordance with the JSIG •Participate in self-inspections •Conduct the duties of the Information System Security Officer (ISSO) if one is not present and/or available Experience: •5 - 7 years related experience •Prior performance in roles such as ISSO or ISSM Education: •Bachelor’s degree in a related area or equivalent experience (4 years) Certifications: •Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level II or Information Assurance Manager Level I within 6 months of the date of hire. Security Clearance: •Current Top Secret Clearance with SCI Eligibility •Eligibility for access to Special Access Program Information •Willingness to submit to a Counterintelligence polygraph Other Requirements: •Must having working knowledge of DoD, National and applicable service and agency security policy, manuals and standards. •Must be able to regularly lift up-to 50lbs | Arthur |
Information Technology Information Assurance 1 ARTH201 | Pentagon, VA | Closed | 04/01/2022 | Information Technology Information Assurance 1: The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. Performance shall include: •Establish complex operational software configuration controls and system interfaces for computer system(s) assigned •Maintain file servers, Firewalls, network access, Security Monitoring Systems and system documentation as required •Analyze and troubleshoot system anomalies to ensure optimum equipment performance •Prepare system for operational use and support operational tests •Review, prepare, and update authorization packages •Notify customer when changes occur that might affect authorization accreditation •Conduct cybersecurity portion of the self-inspection’s checklist •Review and provide technical and cyber security coordination on all Bodies of Evidence that make-up the authorization package •Identify any and all vulnerabilities and implement countermeasures •Ensure information systems and network appliances are operated, maintained, and disposed of in accordance with security policies and practices •Perform Video-Teleconferencing VTC System Administration, Scheduling, & Configuration •Provide External Information System(s) Client Support •Perform account creations, changes, & deletions on multiple authorization boundaries •Perform Help Desk & troubleshooting activities •Perform Hardware/Software System Configuration, upgrades and modifications •Perform system and network appliance patching activities •Provide Government-Issued Laptop Support •Assist in Media Control & Accountability activities •Perform COMSEC account/equipment management activities Experience: •2 - 5 years related experience •Prior performance in roles such as System or Network Administrator Education: •Bachelor’s degree or equivalent experience (4 years) Certifications: •Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level I or Information Assurance Manager I within 6 months of the date of hire. Security Clearance: •Current Top Secret Clearance with SCI Eligibility •Eligibility for access to Special Access Program Information •Willingness to submit to a Counterintelligence polygraph Other Requirements: •Thorough knowledge of Microsoft Windows 2012R2 Server, Microsoft Exchange Server 2010/2016, Microsoft Windows 7/10 operating systems (OS) administration and associated hardware •Working knowledge of Local Area Network (LAN) and Wide Area Network (WAN) technologies and data backup technologies to include communication security (COMSEC) integration •Working knowledge of Risk Management Framework, Common Criteria, and System Security Policy as they relate to Assessments and Authorizations •Working knowledge and current relevant experience with PL2 systems •Must be able to regularly lift up to 50 lbs | Arthur |
Activity Security Representative 3 ARTH200 | Pentagon, VA | Immediate | 04/01/2022 | Activity Security Representative: The Activity Security Representative’s primary function is to provide multi-disciplined security support to a customer’s facility and organization. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. Performance shall include: •Classification reviews of inbound and outbound correspondence •Assist in the maintenance of a document accountability database and associated correspondence •Processing inbound and outbound classified mail and receipt records •Perform destruction of classified materials •Process magnetic media for accountability •Reproduction support for classified materials •Maintain various daily logs for a variety of administrative functions associated with document control •Assist in the processing of inbound data and outbound data transfer files •Transfer electronic data files to internal customers •Maintain an extensive customer database point of contact listing •Assist with researching, processing, filing, and maintaining inbound and outbound visit notices •Escort facility visitors and maintains associated logs •Assist in the preparation of facility access control badges •Conduct entry and exit inspections •Assist in the maintenance of facility access control entry systems, to include visitor control •Perform data entry to the Personnel Access Security System database and maintain all customer sponsored billets and quota information •Assist in maintaining personnel security files for all personnel of the supported element •Follow and enforce the customer’s Standard Operating Procedures •Provide support for the security awareness and education programs •Perform miscellaneous administrative support functions as directed by the contractor site lead and/or the Senior Security Representative •Review, track, and monitor security clearance processing activities with appropriate government personnel to achieve appropriate clearance actions •Participate in Air Force SAP security compliance inspections of government organizations and industry •Implement Top Secret Control for accountable material and associated correspondence •Prepare and/or process inbound and outbound classified mail, faxes, courier packages and receipts •Prepare, process, and/or review Program Access Request (PARs) for accuracy and access eligibility •Execute Special Access Program Nomination Process Questionnaires •Conduct Defense Central Index of Investigations (DCII), Joint Personnel Access System (JPAS), and SAPNP reviews of candidates being submitted for SAP access •Perform data entry and record checks in the Air Force Access Data System (AFADS) and maintains all customer sponsored personnel access information current •Perform indoctrinations •Provide leadership, mentoring, and quality assurance for Team Members Experience: •5 - 7 years related experience •Security Fundamentals Professional Certification (SFPC) counts towards 3 years of experience •Special Program Security Certification (SPSC) counts towards 5 years of experience •Maximum equivalent experience for SPED Certifications is no more than 5 years Education: •Bachelor’s degree or equivalent experience (4 years) Certifications: •Must complete the DoD SAPCO approved SAPNP training (if performing personnel security functions) Security Clearance: •Current Top Secret Clearance with SCI Eligibility •Eligibility for access to Special Access Program Information •Willingness to submit to a Counterintelligence polygraph | Arthur |
Information Assurance System Security Engineer ARTH199 | Eglin AFB, FL | Immediate | 04/01/2022 | Information Assurance System Security Engineer: The Information System Security Engineer (ISSE) is primarily responsible for conducting information system security engineering activities with a focus on lifecycle of current systems and future requirement scoping. The position will collect and process the captured information security requirements and ensures that the requirements are effectively integrated into information systems through purposeful security architecting, design, development, and configuration. The position is an integral part of the development team designing and developing organizational information systems or upgrading legacy systems. The ISSE employs best practices when implementing security requirements within an information system including software engineering methodologies, system/security engineering principles, secure design, secure architecture, and secure coding techniques. This position’s main function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. Performance shall include: •Perform oversight of the development, implementation and evaluation of information system security program policy; special emphasis placed upon integration of existing SAP network infrastructures •Perform analysis of network security, based upon the Risk Management Framework (RMF) with emphasize on Joint Special Access Program Implementation Guide (JSIG) authorization process •Provides expert support, research and analysis of exceptionally complex problems, and processes relating to them •Provides expert level consultation and technical services on all aspects of Information Security •Serves as technical expert to the Cybersecurity Assessment Program providing technical direction, interpretation and alternatives to complex problems •Thinks independently and demonstrates exceptional written and oral communications skills. Applies advanced technical principles, theories, and concepts •Contributes to the development of new principles, concepts, and methodologies •Works on unusually complex technical problems and provides highly innovative and ingenious solutions •Lead a team of System Security Engineers and Certification and Accreditation Analysts responsible for ensuring the customers national and international security interests are protected as support equipment are designed and tested •Recommends cybersecurity software tools and assists in the development of software tool requirements and selection criteria to include the development of product specific STIGs from applicable DISA SRGs •Review ISSE related designs and provides security compliance recommendations •Leads technical teams in implementation of predetermined long-range goals and objectives •Supports customer and SAP community IA working groups, participate in SSE IPT reviews •Provides expert level consultation and technical services on all aspects of Information Security •Review ISSE related designs and provides security compliance recommendations •Develop and provide IA risk management recommendations to the customer •Provide ISSE support for Mission and Training systems design and development •Assist with development and maintenance of the Program Protection Plan •Assist with site activation activities and design reviews •Represent the customer in various ISSE related working groups, advisory groups, and advisory council meetings •Chair and or Co-Chair customer and SAP community IA working groups, participate in ISSE IPT reviews •Represent the customer in various SSE related working groups, advisory groups, and advisory council meetings •Strong background in Patch/Configuration management, DevOps, and tier 3 support •Assist team to design, integrate, and implement JSIG/RMF Continuous Monitoring tools and processes •Integrate COTS & GOTS products to collect, display and remediate a variety of automated system security and system operations/performance functions and metrics •Perform security assessments of servers/network devices/security appliances •Develop improvements to security assessments with regard to accuracy and efficiency •Integrate ancillary monitoring tools/capabilities with the enterprise security information and event management (SIEM) and create/tailor complex event alarms/rules and summary reports •Write and execute cybersecurity test procedures for validation of control compliance •Monitor/analyze output of cybersecurity related tools for reportable security incidents and residual risk •Analyze technical risk of emerging cybersecurity tools and processes •Work as part of a security incident response team as needed •Build operational Operations and Maintenance (O&M) checklists to maintain the service (daily, weekly, monthly, yearly O&M checklists); build Tactics, Techniques and Processes (TTPs) and Standard Operating Processes (SOPs) associated with service checklists •Integrate/Develop new techniques to improve Confidentiality, Integrity, and Availability for networks/systems operating at various classification levels •Advanced technical competency in one or more of the following supported platforms: Microsoft Windows Server, Active Directory, Red Hat Enterprise Linux servers, MS Hyper-V/VMWare/ESx/Xen Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems, forensic analysis/vulnerability assessment, Group Policy management and configuration, Scripting, BMC Footprints, WSUS, , Lumension, Bitlocker, SQL Server 2012, TomCat, IIS, Windows Server 2012r2/2016, Win 10, Red Hat 6.5, Microsoft Office •Toolkits, SEIMs, Logrhythm, ACAS/Nessus/SCAP, mandatory/role-based access control concepts (e. g. SE Linux extensions to RHEL, PitBull, AppArmor, and Sentris) , video teleconferencing/VOIP, Oracle/MS SQL database security, and Apache/IIS Web server security Experience: •12 - 15 years related experience •Prior performance in roles such as ISSO, ISSM, SCA or SAP IT Technical Director Education: •Bachelor’s degree in a related discipline or equivalent experience (4 years) Certifications: •Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Architect and Engineer Level I or Information Assurance Architect and Engineer Level II within 6 months of the date of hire Security Clearance: •Current Top Secret Clearance with SCI Eligibility •Eligibility for access to Special Access Program Information •Willingness to submit to a Counterintelligence polygraph Other Requirements: •Must have expert knowledge of DoD, National and applicable service and agency security policy, manuals and standards. Must have the ability to work in a dynamic environment and effectively interact with numerous DOD, military/civilian personnel and industry partners | Arthur |
Information System Security Officer 1 ARTH198 | JBAB, Washington DC | Closed | 04/01/2022 | Information System Security Officer 1: The ISSO is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO. The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is assigned responsibility for the day-to-day security operations of a system. This also will include physical and environmental protection, personnel security, incident handling, and security training and awareness. It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configuration management across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. Performance shall include: •Assist the ISSM in meeting their duties and responsibilities •Prepare, review, and update authorization packages •Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media •Notify ISSM when changes occur that might affect the authorization determination of the information system(s) •Conduct periodic reviews of information systems to ensure compliance with the security authorization package •Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change •Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly •Ensure all IS security-related documentation is current and accessible to properly authorized individuals •Ensure audit records are collected, reviewed, and documented (to include any anomalies) •Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties •Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans •Identify cyber security vulnerabilities and assist with the implementation of the countermeasures for them •Prepare reports on the status of security safeguards applied to computer systems •Perform ISSO duties in support of in-house and external customers Experience: •1 - 2 years related experience •Prior performance in roles such as System or Network Administrator Education: •Bachelor’s degree or equivalent experience (4 years) Certifications: •Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level I or Information Assurance Manager I within 6 months of the date of hire Security Clearance: •Current Top Secret Clearance with SCI Eligibility •Eligibility for access to Special Access Program Information •Willingness to submit to a Counterintelligence polygraph Other Requirements: •Must be able to regularly lift up to 50 lbs | Arthur |
Information Assurance System Security Engineer 1 ARTH197 | JBAB, Washington DC | Closed | 04/01/2022 | Information Assurance Security System Engineer: The Information System Security Engineer (ISSE) is primarily responsible for conducting information system security engineering activities with a focus on lifecycle of current systems and future requirement scoping. The position will collect and process the captured information security requirements and ensures that the requirements are effectively integrated into information systems through purposeful security architecting, design, development, and configuration. The position is an integral part of the development team designing and developing organizational information systems or upgrading legacy systems. The ISSE employs best practices when implementing security requirements within an information system including software engineering methodologies, system/security engineering principles, secure design, secure architecture, and secure coding techniques. This position’s main function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. Performance shall include: •Perform oversight of the development, implementation and evaluation of information system security program policy; special emphasis placed upon integration of existing SAP network infrastructures •Perform analysis of network security, based upon the Risk Management Framework (RMF) with emphasize on Joint Special Access Program Implementation Guide (JSIG) authorization process •Provides expert support, research and analysis of exceptionally complex problems, and processes relating to them •Serves as technical expert to the Cybersecurity Assessment Program providing technical direction, interpretation and alternatives to complex problems •Thinks independently and demonstrates exceptional written and oral communications skills. Applies advanced technical principles, theories, and concepts •Contributes to the development of new principles, concepts, and methodologies. •Works on unusually complex technical problems and provides highly innovative and ingenious solutions •Recommends cybersecurity software tools and assists in the development of software tool requirements and selection criteria to include the development of product specific STIGs from applicable DISA SRGs •Leads technical teams in implementation of predetermined long-range goals and objectives •Support customer and SAP community IA working groups, participate in SSE IPT reviews •Provides expert level consultation and technical services on all aspects of Information Security •Review ISSE related designs and provides security compliance recommendations •Develop and provide IA risk management recommendations to the customer •Provide ISSE support for Mission and Training systems design and development •Assist with development and maintenance of the Program Protection Plan •Assist with site activation activities and design reviews •Represent the customer in various ISSE related working groups, advisory groups, and advisory council meetings •Strong background in Patch/Configuration management, DevOps, and tier 3 support •Assist team to design, integrate, and implement JSIG/RMF Continuous Monitoring tools and processes •Integrate COTS & GOTS products to collect, display and remediate a variety of automated system security and system operations/performance functions and metrics. •Perform security assessments of servers/network devices/security appliances •Develop improvements to security assessments with regard to accuracy and efficiency •Integrate ancillary monitoring tools/capabilities with the enterprise security information and event management (SIEM) and create/tailor complex event alarms/rules and summary reports •Write and execute cybersecurity test procedures for validation of control compliance •Monitor/analyze output of cybersecurity related tools for reportable security incidents and residual risk •Analyze technical risk of emerging cybersecurity tools and processes •Work as part of a security incident response team as needed •Build operational Operations and Maintenance (O&M) checklists to maintain the service (daily, weekly, monthly, yearly O&M checklists); build Tactics, Techniques and Processes (TTPs) and Standard Operating Processes (SOPs) associated with service checklists •Integrate/Develop new techniques to improve Confidentiality, Integrity, and Availability for networks/systems operating at various classification levels •Advanced technical competency in one or more of the following supported platforms: Microsoft Windows Server, Active Directory, Red Hat Enterprise Linux servers, MS Hyper-V/VMWare/ESx/Xen Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems, forensic analysis/vulnerability assessment, Group Policy management and configuration, Scripting, BMC Footprints, WSUS, Lumension, Bitlocker, SQL Server 2012, TomCat, IIS, Windows Server 2012r2/2016, Win 10, Red Hat 6.5, Microsoft Office •Toolkits, SEIMs, Logrhythm, ACAS/Nessus/SCAP, mandatory/role-based access control concepts (e. g. SE Linux extensions to RHEL, PitBull, AppArmor, and Sentris) , video teleconferencing/VOIP, Oracle/MS SQL database security, and Apache/IIS Web server security Experience: •10 - 12 years related experience •Prior performance in roles such as ISSO, ISSM, SCA or SAP IT Technical Director Education: •Bachelor’s degree in a related discipline or equivalent experience (4 years) Certifications: •Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Manager Level III or Information Assurance Architect and Engineer Level I within 6 months of the date of hire Security Clearance: •Current Top Secret Clearance with SCI Eligibility •Eligibility for access to Special Access Program Information •Willingness to submit to a Counterintelligence polygraph Other Requirements: •Must have expert knowledge of DoD, National and applicable service and agency security policy, manuals and standards. Must have the ability to work in a dynamic environment and effectively interact with numerous DOD, military/civilian personnel and industry partners | Arthur |
Program Security Representative 2 ARTH196 | Pentagon, VA | Closed | 04/01/2022 | Program Security Representative 2: The Program Security Representative’s primary function is to provide multi-discipline security support for one or more of the customer’s Special Access Programs (SAPs). The position will provide “day-to-day” multi-discipline analysis for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. Performance shall include: •Ensure strict adherence to the provisions of the NISPOM, its Supplement, the DoD Overprint, DCID, ICD, and SAP policy •Assist in developing and executing approved policies and procedures for safeguarding Special Access Program (SAP), Sensitive Compartmented Information (SCI) and collateral data in support of US military operations •Provide day-to-day security support that includes continuous assessment of procedures to identify shortfalls and provide appropriate recommendations for revising and improving security policies, procedures, and systems •Identify vulnerabilities, threats, and risks to test, training, and operational activities •Assist in developing, implementing, and training the Operations Security program •Assist in providing contractor and subordinate facility assistance and oversight •Brief all levels of personnel, both in the government and senior civilian services, on a variety of security related topics •Conduct and document SAP facility compliance reviews, follow-on facility reviews, and facility close-outs •Monitor, report and track all corrective actions resulting from compliance reviews •Ensure timely notification of pertinent security matters to program technical and management staff •Conduct exploration of any loss, compromise, or suspected compromise of classified and/or sensitive information, including conducting preliminary inquiries and generating damage assessments resulting from the loss of classified information •Coordinate with SAP security personnel to ensure lessons learned are incorporated into the curriculum for the SAP security education & awareness program Experience: •8 – 10 years related experience •Security Fundamentals Professional Certification (SFPC) counts towards 3 years of experience •Special Program Security Certification (SPSC) counts towards 5 years of experience •Maximum equivalent experience for SPED Certifications is no more than 5 years Education: •Bachelor’s degree in a related area or equivalent experience (4 years) Security Clearance: •Current Top Secret Clearance with SCI Eligibility •Eligibility for access to Special Access Program Information •Willingness to submit to a Counterintelligence polygraph | Arthur |
Network System Administrator 3 ARTH195 | JBAB, Washington DC | Closed | 04/01/2022 | Network System Administrator 3: The primary function will be to organize, install, and support government organization’s computer systems, including local area networks (LANs), wide area networks (WANs), network segments, intranets, and other data communication systems. This will also include helping architect, design and analyze network models. It will require participation in decisions about buying future hardware or software to upgrade organization’s infrastructure. This position might be called upon to provide technical support to computer users to help solve users’ problems. This position will support activities within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. Performance shall include: •Able to perform self-sustaining and work with little to no oversight •Lead IT ops team on day to day management and operations of Networks and implement capabilities vetted through Cybersecurity, ISSE and higher headquarters to maintain JSIG/RMF Authority to Operate and maintain Continuous Monitoring tools and processes •Manage COTS & GOTS products to collect, display and remediate a variety of automated system security and system operations/performance functions and metrics. •Assist during security assessments of servers/network devices/security appliances •Assist during security assessments with regard to accuracy and efficiency. •Assist with Creation of operational Operations and Maintenance (O&M) checklists to maintain the service (daily, weekly, monthly, yearly O&M checklists); build Tactics, Techniques and Processes (TTPs) and Standard Operating Processes (SOPs) associated with service checklists •Manage and operate monitoring tools/capabilities with the enterprise security information and event management (SIEM) and create/tailor complex event alarms/rules and summary reports •Execute cybersecurity operations procedures for day to day network management, operations and maintenance •Monitor/analyze output of cybersecurity related tools for reportable security incidents and residual risk •Assist in analyzing technical risk, upon request, of emerging cybersecurity tools and processes •Work as part of a security incident response team as needed •Assist ISSM/ISSO/ISSE with the Integration/Development new techniques to improve Confidentiality, Integrity, and Availability for networks/systems operating at various classification levels •Advanced technical competency in one or more of the following supported platforms: Microsoft Windows Server, Active Directory Red Hat Enterprise Linux servers, MS Hyper-V/VMWare/ESx/Xen Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems, forensic analysis/vulnerability assessment, Group Policy management and configuration, Scripting, BMC Footprints, WSUS, , Lumension, Bitlocker, SQL Server 2012, TomCat, IIS, Windows Server 2012r2/2016, Win 10, Red Hat 6.5, Microsoft Office •Toolkits, SEIMs, Logrhythm, ACAS/Nessus/SCAP, mandatory/role-based access control concepts (e. g. SE Linux extensions to RHEL, PitBull, AppArmor, and Sentris) , video teleconferencing/VOIP, Oracle/MS SQL database security, and Apache/IIS Web server security Experience: •5 - 7 years related experience Education: •Bachelor’s degree in a related area or equivalent experience (4 years) Certifications: •Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level III within 6 months of the date of hire Security Clearance: •Current Top Secret Clearance with SCI Eligibility •Eligibility for access to Special Access Program Information •Willingness to submit to a Counterintelligence polygraph Other Requirements: •Thorough knowledge of Microsoft Windows desktop and server operating systems, Microsoft Exchange Server, and as needed RHEL operating systems administration and associated hardware •Experience in effective communication and collaborating in a high performance team environment. •Group Policy design and configuration •Working knowledge of CISCO network and switching and virtualization technologies •Working knowledge of virtualization as it applies to users environments, operating systems, and network appliances •Working knowledge of Local Area Network (LAN) and Wide Area Network (WAN) technologies and data backup technologies •Working knowledge communication security (COMSEC) policies and integration •Working knowledge of Risk Management Framework, Common Criteria, and System Security Policy as they relate to assessments and authorization •Working knowledge and current relevant experience with PL2, PL3, and PL4 network environments/systems •Working knowledge of WSUS and/or YUM patch deployment methodologies •Must be familiar with DoD policy as it applies to implementing and executing system and network administration •Working knowledge of Risk Management Framework and how to apply it to network/information system environments •Must be able to regularly lift up to 50 lbs | Arthur |
Information System Security Manager 2 ARTH194 | Langley AFB, VA | Immediate | 04/01/2022 | Information System Security Manager 2: The ISSM’s primary function serves as a principal advisor on all matters, technical and otherwise, involving the security of information systems under their purview. Primary support will be working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense, and Military Compartment efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. Performance shall include: •Perform oversight of the development, implementation and evaluation of information system security program policy; special emphasis placed upon integration of existing SAP network infrastructures •Develop and oversee operational information systems security implementation policy and guidelines of network security, based upon the Risk Management Framework (RMF) with emphasize on Joint Special Access Program Implementation Guide (JSIG) authorization process •Advise customer on Risk Management Framework (RMF) assessment and authorization issues •Perform risk assessments and make recommendations to DoD agency customers •Advise government program managers on security testing methodologies and processes •Evaluate authorization documentation and provide written recommendations for authorization to government PM’s. •Develop and maintain a formal Information Systems Security Program •Ensure that all IAOs, network administrators, and other cyber security personnel receive the necessary technical and security training to carry out their duties •Develop, review, endorse, and recommend action by the AO or DAO of system assessment documentation •Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media •Develop and execute security assessment plans that include verification that the features and assurances required for each protection level functioning •Maintain a and/or applicable repository for all system authorization documentation and modifications •Develop policies and procedures for responding to security incidents, to include investigating and reporting security violations and incidents •Ensure proper protection or corrective measures have been taken when an incident or vulnerability has been discovered within a system •Ensure that data ownership and responsibilities are established for each authorization boundary, to include accountability, access rights, and special handling requirements •Ensure development and implementation of an information security education, training, and awareness program, to include attending, monitoring, and presenting local cyber security training. •Evaluate threats and vulnerabilities to ascertain whether additional safeguards are needed •Assess changes in the system, its environment, and operational needs that could affect the authorization •Ensure that authorization is accomplished a valid Authorization determination has been given for all authorization boundaries under your purview •Review AIS assessment plans •Coordinate with PSO or cognizant security official on approval of external information systems (e.g., guest systems, interconnected system with another organization) •Conduct periodic assessments of the security posture of the authorization boundaries •Institute and implement a Configuration Control Board (CCB) charter •Ensure configuration management (CM) for security-relevant changes to software, hardware, and firmware and that they are properly documented •Ensure periodic testing is conducted to evaluate the security posture of IS by employing various intrusion/attack detection and monitoring tools (shared responsibility with ISSOs) •Ensure that system recovery and reconstitution processes developed and monitored to ensure that the authorization boundary can be recovered based on its availability level determination •Ensure all authorization documentation is current and accessible to properly authorized individuals •Ensure that system security requirements are addressed during all phases of the system life cycle •Participate in self-inspections •Periodically review system security to accommodate changes to policy or technology •Coordinate all technical security issues outside of area of expertise or responsibility with ISSE •Provide expert research and analysis in support of expanding programs and area of responsibility as it pertains to cyber security and information technology activities •Develop Assured File Transfers (AFT) on accordance with the JSIG •Provide leadership, mentoring, and quality assurance for Cyber Security and Information Technology team members Experience: •7 - 9 years related experience •Prior performance in roles such as ISSO or ISSM Education: •Bachelor’s degree or equivalent experience (4 years) Certifications: •Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level 2 or Information Assurance Manager Level 2 within 6 months of the date of hire Security Clearance: •Current Top Secret Clearance with SCI Eligibility •Eligibility for access to Special Access Program Information •Willingness to submit to a Counterintelligence polygraph Other Requirements: •Must be able to regularly lift up to 50 lbs | Arthur |
Program Security Representative 1 ARTH193 | Wright Patterson AFB, OH | Immediate | 04/01/2022 | Program Security Representative 1: The Program Security Representative’s primary function is to provide multi-discipline security support for one or more of the customer’s Special Access Programs (SAPs). The position will provide “day-to-day” multi-discipline analysis for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. Performance shall include: •Ensure strict adherence to the provisions of the NISPOM, its Supplement, the DoD Overprint, DCID, ICD, and SAP policy •Assist in developing and executing approved policies and procedures for safeguarding Special Access Program (SAP), Sensitive Compartmented Information (SCI) and collateral data in support of US military operations. •Provide day-to-day security support that includes continuous assessment of procedures to identify shortfalls and provide appropriate recommendations for revising and improving security policies, procedures, and systems •Identify vulnerabilities, threats, and risks to test, training, and operational activities •Assist in developing, implementing, and training the Operations Security program •Assist in providing contractor and subordinate facility assistance and oversight •Brief all levels of personnel, both in the government and senior civilian services, on a variety of security related topics •Conduct and document SAP facility compliance reviews, follow-on facility reviews, and facility close-outs •Monitor, report and track all corrective actions resulting from compliance reviews •Ensure timely notification of pertinent security matters to program technical and management staff •Conduct exploration of any loss, compromise, or suspected compromise of classified and/or sensitive information, including conducting preliminary inquiries and generating damage assessments resulting from the loss of classified information. •Coordinate with SAP security personnel to ensure lessons learned are incorporated into the curriculum for the SAP security education & awareness program Experience: •5 - 7 years related experience •Security Fundamentals Professional Certification (SFPC) counts towards 3 years of experience •Special Program Security Certification (SPSC) counts towards 5 years of experience •Maximum equivalent experience for SPED Certifications is no more than 5 years Education: •Bachelor’s degree in a related area or equivalent experience (4 years) Security Clearance: •Current Top Secret Clearance with SCI Eligibility •Eligibility for access to Special Access Program Information •Willingness to submit to a Counterintelligence polygraph | Arthur |
Security Control Assessor 1 ARTH192 | Eglin AFB, FL | Immediate | 04/01/2022 | Security Control Assessor 1: The SCA is responsible for conducting a comprehensive assessment of the management, operational, and technical security controls employed within or inherited by an IS to determine the overall effectiveness of the controls (i.e., the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting the security requirements for the system). SCAs also provide an assessment of the severity of weaknesses or deficiencies discovered in the IS and its environment of operation and recommend corrective actions to address identified vulnerabilities. Responsibilities will cover Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities within the customer’s area of responsibility. Performance shall include: •Perform oversight of the development, implementation and evaluation of IS security program policy; special emphasis placed upon integration of existing SAP network infrastructure •Perform assessment of ISs, based upon the Risk Management Framework (RMF) methodology in accordance with the Joint Special Access Program (SAP) Implementation Guide (JSIG) •Advise the Information System Owner (ISO), Information Data Owner (IDO), Program Security Officer (PSO), and the Delegated and/or Authorizing Official (DAO/AO) on any assessment and authorization issues. •Evaluate Authorization packages and make recommendation to the AO and/or DAO for authorization •Evaluate IS threats and vulnerabilities to determine whether additional safeguards are required •Advise the Government concerning the impact levels for Confidentiality, Integrity, and Availability for the information on a system •Ensure security assessments are completed and results documented and prepare the Security Assessment Report (SAR) for the Authorization boundary •Initiate a Plan of Action and Milestones (POA&M) with identified weaknesses for each Authorization Boundaries assessed, based on findings and recommendations from the SAR •Evaluate security assessment documentation and provide written recommendations for security authorization to the Government •Discuss recommendation for authorization and submit the security authorization package to the AO/DAO •Assess proposed changes to Authorization boundaries operating environment and mission needs to determine the continuation to operate. •Review and concur with all sanitization and clearing procedures in accordance with Government guidance and/or policy •Assist the Government compliance inspections •Assist the Government with security incidents that relate to cybersecurity and ensure that the proper and corrective measures have been taken •Ensure organization are addressing and conducting all phases of the system development life cycle (SDLC) •Evaluate Hardware and Software to determine security impact that it might have on Authorization boundaries •Evaluate the effectiveness and implementation of Continuous Monitoring Plans •Represent the customer on inspection teams Experience: •5 - 7 years related experience •Minimum of three (3) years’ experience in SAP, SCI or Collateral Information Systems (IS) Security and the implementation of regulations identified in the description of duties •Prior performance in the role of ISSO and ISSM Education: •Bachelor’s degree in a related discipline or equivalent experience (4 years) Certifications: •Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level III or Information Assurance Manager Level I within 6 months of the date of hire Security Clearance: •Current Top Secret Clearance with SCI Eligibility •Eligibility for access to Special Access Program Information •Willingness to submit to a Counterintelligence polygraph Other Requirements: •Must be able to regularly lift 50lbs | Arthur |
Security Control Assessor 1 ARTH191 | Palmdale, CA | Immediate | 04/01/2022 | Security Control Assessor 1: The SCA is responsible for conducting a comprehensive assessment of the management, operational, and technical security controls employed within or inherited by an IS to determine the overall effectiveness of the controls (i.e., the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting the security requirements for the system). SCAs also provide an assessment of the severity of weaknesses or deficiencies discovered in the IS and its environment of operation and recommend corrective actions to address identified vulnerabilities. Responsibilities will cover Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities within the customer’s area of responsibility. Performance shall include: •Perform oversight of the development, implementation and evaluation of IS security program policy; special emphasis placed upon integration of existing SAP network infrastructure •Perform assessment of ISs, based upon the Risk Management Framework (RMF) methodology in accordance with the Joint Special Access Program (SAP) Implementation Guide (JSIG) •Advise the Information System Owner (ISO), Information Data Owner (IDO), Program Security Officer (PSO), and the Delegated and/or Authorizing Official (DAO/AO) on any assessment and authorization issues •Evaluate Authorization packages and make recommendation to the AO and/or DAO for authorization •Evaluate IS threats and vulnerabilities to determine whether additional safeguards are required •Advise the Government concerning the impact levels for Confidentiality, Integrity, and Availability for the information on a system •Ensure security assessments are completed and results documented and prepare the Security Assessment Report (SAR) for the Authorization boundary •Initiate a Plan of Action and Milestones (POA&M) with identified weaknesses for each Authorization Boundaries assessed, based on findings and recommendations from the SAR •Evaluate security assessment documentation and provide written recommendations for security authorization to the Government •Discuss recommendation for authorization and submit the security authorization package to the AO/DAO •Assess proposed changes to Authorization boundaries operating environment and mission needs to determine the continuation to operate. •Review and concur with all sanitization and clearing procedures in accordance with Government guidance and/or policy •Assist the Government compliance inspections •Assist the Government with security incidents that relate to cybersecurity and ensure that the proper and corrective measures have been taken •Ensure organization are addressing and conducting all phases of the system development life cycle (SDLC) •Evaluate Hardware and Software to determine security impact that it might have on Authorization boundaries •Evaluate the effectiveness and implementation of Continuous Monitoring Plans •Represent the customer on inspection teams. Experience: •5 - 7 years related experience •Minimum of three (3) years’ experience in SAP, SCI or Collateral Information Systems (IS) Security and the implementation of regulations identified in the description of duties •Prior performance in the role of ISSO and ISSM Education: •Bachelor’s degree in a related discipline or equivalent experience (4 years) Certifications: •Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level III or Information Assurance Manager Level I within 6 months of the date of hire Security Clearance: •Current Top Secret Clearance with SCI Eligibility •Eligibility for access to Special Access Program Information •Willingness to submit to a Counterintelligence polygraph Other Requirements: •Must be able to regularly lift 50lbs | Arthur |
Network System Administrator 3 ARTH190 | JBAB, Washington DC | Closed | 04/01/2022 | Network System Administrator 3: The primary function will be to organize, install, and support government organization’s computer systems, including local area networks (LANs), wide area networks (WANs), network segments, intranets, and other data communication systems. This will also include helping architect, design and analyze network models. It will require participation in decisions about buying future hardware or software to upgrade organization’s infrastructure. This position might be called upon to provide technical support to computer users to help solve users’ problems. This position will support activities within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. Performance shall include: •Able to perform self-sustaining and work with little to no oversight •Lead IT ops team on day to day management and operations of Networks and implement capabilities vetted through Cybersecurity, ISSE and higher headquarters to maintain JSIG/RMF Authority to Operate and maintain Continuous Monitoring tools and processes •Manage COTS & GOTS products to collect, display and remediate a variety of automated system security and system operations/performance functions and metrics. •Assist during security assessments of servers/network devices/security appliances •Assist during security assessments with regard to accuracy and efficiency •Assist with Creation of operational Operations and Maintenance (O&M) checklists to maintain the service (daily, weekly, monthly, yearly O&M checklists); build Tactics, Techniques and Processes (TTPs) and Standard Operating Processes (SOPs) associated with service checklists •Manage and operate monitoring tools/capabilities with the enterprise security information and event management (SIEM) and create/tailor complex event alarms/rules and summary reports •Execute cybersecurity operations procedures for day to day network management, operations and maintenance •Monitor/analyze output of cybersecurity related tools for reportable security incidents and residual risk •Assist in analyzing technical risk, upon request, of emerging cybersecurity tools and processes •Work as part of a security incident response team as needed •Assist ISSM/ISSO/ISSE with the Integration/Development new techniques to improve Confidentiality, Integrity, and Availability for networks/systems operating at various classification levels •Advanced technical competency in one or more of the following supported platforms: Microsoft Windows Server, Active Directory Red Hat Enterprise Linux servers, MS Hyper-V/VMWare/ESx/Xen Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems, forensic analysis/vulnerability assessment, Group Policy management and configuration, Scripting, BMC Footprints, WSUS, , Lumension, Bitlocker, SQL Server 2012, TomCat, IIS, Windows Server 2012r2/2016, Win 10, Red Hat 6.5, Microsoft Office •Toolkits, SEIMs, Logrhythm, ACAS/Nessus/SCAP, mandatory/role-based access control concepts (e. g. SE Linux extensions to RHEL, PitBull, AppArmor, and Sentris) , video teleconferencing/VOIP, Oracle/MS SQL database security, and Apache/IIS Web server security Experience: •5 - 7 years related experience Education: •Bachelor’s degree in a related area or equivalent experience (4 years) Certifications: •Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level III within 6 months of the date of hire Security Clearance: •Current Top Secret Clearance with SCI Eligibility •Eligibility for access to Special Access Program Information •Willingness to submit to a Counterintelligence polygraph Other Requirements: •Thorough knowledge of Microsoft Windows desktop and server operating systems, Microsoft Exchange Server, and as needed RHEL operating systems administration and associated hardware •Experience in effective communication and collaborating in a high performance team environment. •Group Policy design and configuration •Working knowledge of CISCO network and switching and virtualization technologies •Working knowledge of virtualization as it applies to users environments, operating systems, and network appliances •Working knowledge of Local Area Network (LAN) and Wide Area Network (WAN) technologies and data backup technologies •Working knowledge communication security (COMSEC) policies and integration •Working knowledge of Risk Management Framework, Common Criteria, and System Security Policy as they relate to assessments and authorization •Working knowledge and current relevant experience with PL2, PL3, and PL4 network environments/systems •Working knowledge of WSUS and/or YUM patch deployment methodologies •Must be familiar with DoD policy as it applies to implementing and executing system and network administration •Working knowledge of Risk Management Framework and how to apply it to network/information system environments •Must be able to regularly lift up to 50 lbs. | Arthur |
Security Control Assessor 2 ARTH189 | Crystal City, VA | Immediate | 04/01/2022 | Security Control Assessor 2: The SCA is responsible for conducting a comprehensive assessment of the management, operational, and technical security controls employed within or inherited by an IS to determine the overall effectiveness of the controls (i.e., the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting the security requirements for the system). SCAs also provide an assessment of the severity of weaknesses or deficiencies discovered in the IS and its environment of operation and recommend corrective actions to address identified vulnerabilities. Responsibilities will cover Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities within the customer’s area of responsibility. Performance shall include: •Perform oversight of the development, implementation and evaluation of IS security program policy; special emphasis placed upon integration of existing SAP network infrastructure •Perform assessment of ISs, based upon the Risk Management Framework (RMF) methodology in accordance with the Joint Special Access Program (SAP) Implementation Guide (JSIG) •Advise the Information System Owner (ISO), Information Data Owner (IDO), Program Security Officer (PSO), and the Delegated and/or Authorizing Official (DAO/AO) on any assessment and authorization issues •Evaluate Authorization packages and make recommendation to the AO and/or DAO for authorization •Evaluate IS threats and vulnerabilities to determine whether additional safeguards are required •Advise the Government concerning the impact levels for Confidentiality, Integrity, and Availability for the information on a system •Ensure security assessments are completed and results documented and prepare the Security Assessment Report (SAR) for the Authorization boundary •Initiate a Plan of Action and Milestones (POA&M) with identified weaknesses for each Authorization Boundaries assessed, based on findings and recommendations from the SAR •Evaluate security assessment documentation and provide written recommendations for security authorization to the Government •Discuss recommendation for authorization and submit the security authorization package to the AO/DAO •Assess proposed changes to Authorization boundaries operating environment and mission needs to determine the continuation to operate. •Review and concur with all sanitization and clearing procedures in accordance with Government guidance and/or policy •Assist the Government compliance inspections •Assist the Government with security incidents that relate to cybersecurity and ensure that the proper and corrective measures have been taken •Ensure organization are addressing and conducting all phases of the system development life cycle (SDLC) •Evaluate Hardware and Software to determine security impact that it might have on Authorization boundaries •Evaluate the effectiveness and implementation of Continuous Monitoring Plans •Represent the customer on inspection teams Experience: •7 - 9 years related experience •Minimum of four (4) years’ experience in SAP, SCI or Collateral Information Systems (IS) Security and the implementation of regulations identified in the description of duties. •Prior performance in the role of ISSO and ISSM or SCA Education: •Bachelor’s degree in a related discipline or equivalent experience (4 years) Certifications: •Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level III or Information Assurance Manager Level II within 6 months of the date of hire. Security Clearance: •Current Top Secret Clearance with SCI Eligibility •Eligibility for access to Special Access Program Information •Willingness to submit to a Counterintelligence polygraph Other Requirements: •Must be able to regularly lift 50lbs | Arthur |
Security Control Assessor 1 ARTH188 | Hill AFB, UT | Closed | 04/01/2022 | Security Control Assessor 1: The SCA is responsible for conducting a comprehensive assessment of the management, operational, and technical security controls employed within or inherited by an IS to determine the overall effectiveness of the controls (i.e., the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting the security requirements for the system). SCAs also provide an assessment of the severity of weaknesses or deficiencies discovered in the IS and its environment of operation and recommend corrective actions to address identified vulnerabilities. Responsibilities will cover Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities within the customer’s area of responsibility. Performance shall include: •Perform oversight of the development, implementation and evaluation of IS security program policy; special emphasis placed upon integration of existing SAP network infrastructure •Perform assessment of ISs, based upon the Risk Management Framework (RMF) methodology in accordance with the Joint Special Access Program (SAP) Implementation Guide (JSIG) •Advise the Information System Owner (ISO), Information Data Owner (IDO), Program Security Officer (PSO), and the Delegated and/or Authorizing Official (DAO/AO) on any assessment and authorization issues •Evaluate Authorization packages and make recommendation to the AO and/or DAO for authorization •Evaluate IS threats and vulnerabilities to determine whether additional safeguards are required •Advise the Government concerning the impact levels for Confidentiality, Integrity, and Availability for the information on a system •Ensure security assessments are completed and results documented and prepare the Security Assessment Report (SAR) for the Authorization boundary •Initiate a Plan of Action and Milestones (POA&M) with identified weaknesses for each Authorization Boundaries assessed, based on findings and recommendations from the SAR •Evaluate security assessment documentation and provide written recommendations for security authorization to the Government •Discuss recommendation for authorization and submit the security authorization package to the AO/DAO •Assess proposed changes to Authorization boundaries operating environment and mission needs to determine the continuation to operate. •Review and concur with all sanitization and clearing procedures in accordance with Government guidance and/or policy •Assist the Government compliance inspections •Assist the Government with security incidents that relate to cybersecurity and ensure that the proper and corrective measures have been taken •Ensure organization are addressing and conducting all phases of the system development life cycle (SDLC) •Evaluate Hardware and Software to determine security impact that it might have on Authorization boundaries •Evaluate the effectiveness and implementation of Continuous Monitoring Plans •Represent the customer on inspection teams Experience: •5 - 7 years related experience •Minimum of three (3) years’ experience in SAP, SCI or Collateral Information Systems (IS) Security and the implementation of regulations identified in the description of duties •Prior performance in the role of ISSO and ISSM Education: •Bachelor’s degree in a related discipline or equivalent experience (4 years) Certifications: •Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level III or Information Assurance Manager Level I within 6 months of the date of hire Security Clearance: •Current Top Secret Clearance with SCI Eligibility •Eligibility for access to Special Access Program Information •Willingness to submit to a Counterintelligence polygraph Other Requirements: •Must be able to regularly lift 50lbs | Arthur |
Information System Security Officer 2 ARTH187 | Dahlgren, VA | Immediate | 04/01/2022 | Information System Security Officer 2: The ISSO is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO. The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is assigned responsibility for the day-to-day security operations of a system. This also will include physical and environmental protection, personnel security, incident handling, and security training and awareness. It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configuration management across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. Performance shall include: •Assist the ISSM in meeting their duties and responsibilities •Prepare, review, and update authorization packages •Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media •Notify ISSM when changes occur that might affect the authorization determination of the information system(s) •Conduct periodic reviews of information systems to ensure compliance with the security authorization package •Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change •Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly •Ensure all IS security-related documentation is current and accessible to properly authorized individuals •Ensure audit records are collected, reviewed, and documented (to include any anomalies) •Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties •Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans •Identify cyber security vulnerabilities and assist with the implementation of the countermeasures for them •Prepare reports on the status of security safeguards applied to computer systems •Perform ISSO duties in support of in-house and external customers •Conduct security impact analysis activities and provide to the ISSM on all configuration management changes to the authorization boundaries Experience: •2 - 5 years related experience •Prior performance in roles such as System, Network Administrator or ISSO Education: •Bachelor’s degree or equivalent experience (4 years) Certifications: •Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level II or Information Assurance Manager II within 6 months of the date of hire Security Clearance: •Current Top Secret Clearance with SCI Eligibility •Eligibility for access to Special Access Program Information •Willingness to submit to a Counterintelligence polygraph Other Requirements: •Must be able to regularly lift up to 50 lbs | Arthur |
Information Assurance System Security Engineer Level 1 ARTH186 | Robins AFB, GA | Immediate | 04/01/2022 | Information Assurance System Security Engineer Level 1: The Information System Security Engineer (ISSE) is primarily responsible for conducting information system security engineering activities with a focus on lifecycle of current systems and future requirement scoping. The position will collect and process the captured information security requirements and ensures that the requirements are effectively integrated into information systems through purposeful security architecting, design, development, and configuration. The position is an integral part of the development team designing and developing organizational information systems or upgrading legacy systems. The ISSE employs best practices when implementing security requirements within an information system including software engineering methodologies, system/security engineering principles, secure design, secure architecture, and secure coding techniques. This position’s main function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. Performance shall include: •Perform oversight of the development, implementation and evaluation of information system security program policy; special emphasis placed upon integration of existing SAP network infrastructures •Perform analysis of network security, based upon the Risk Management Framework (RMF) with emphasize on Joint Special Access Program Implementation Guide (JSIG) authorization process •Provides expert support, research and analysis of exceptionally complex problems, and processes relating to them •Serves as technical expert to the Cybersecurity Assessment Program providing technical direction, interpretation and alternatives to complex problems •Thinks independently and demonstrates exceptional written and oral communications skills. Applies advanced technical principles, theories, and concepts •Contributes to the development of new principles, concepts, and methodologies. •Works on unusually complex technical problems and provides highly innovative and ingenious solutions •Recommends cybersecurity software tools and assists in the development of software tool requirements and selection criteria to include the development of product specific STIGs from applicable DISA SRGs •Leads technical teams in implementation of predetermined long-range goals and objectives •Support customer and SAP community IA working groups, participate in SSE IPT reviews •Provides expert level consultation and technical services on all aspects of Information Security •Review ISSE related designs and provides security compliance recommendations •Develop and provide IA risk management recommendations to the customer •Provide ISSE support for Mission and Training systems design and development •Assist with development and maintenance of the Program Protection Plan •Assist with site activation activities and design reviews •Represent the customer in various ISSE related working groups, advisory groups, and advisory council meetings •Strong background in Patch/Configuration management, DevOps, and tier 3 support •Assist team to design, integrate, and implement JSIG/RMF Continuous Monitoring tools and processes •Integrate COTS & GOTS products to collect, display and remediate a variety of automated system security and system operations/performance functions and metrics. •Perform security assessments of servers/network devices/security appliances •Develop improvements to security assessments with regard to accuracy and efficiency •Integrate ancillary monitoring tools/capabilities with the enterprise security information and event management (SIEM) and create/tailor complex event alarms/rules and summary reports •Write and execute cybersecurity test procedures for validation of control compliance •Monitor/analyze output of cybersecurity related tools for reportable security incidents and residual risk •Analyze technical risk of emerging cybersecurity tools and processes •Work as part of a security incident response team as needed •Build operational Operations and Maintenance (O&M) checklists to maintain the service (daily, weekly, monthly, yearly O&M checklists); build Tactics, Techniques and Processes (TTPs) and Standard Operating Processes (SOPs) associated with service checklists •Integrate/Develop new techniques to improve Confidentiality, Integrity, and Availability for networks/systems operating at various classification levels •Advanced technical competency in one or more of the following supported platforms: Microsoft Windows Server, Active Directory, Red Hat Enterprise Linux servers, MS Hyper-V/VMWare/ESx/Xen Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems, forensic analysis/vulnerability assessment, Group Policy management and configuration, Scripting, BMC Footprints, WSUS, Lumension, Bitlocker, SQL Server 2012, TomCat, IIS, Windows Server 2012r2/2016, Win 10, Red Hat 6.5, Microsoft Office •Toolkits, SEIMs, Logrhythm, ACAS/Nessus/SCAP, mandatory/role-based access control concepts (e. g. SE Linux extensions to RHEL, PitBull, AppArmor, and Sentris) , video teleconferencing/VOIP, Oracle/MS SQL database security, and Apache/IIS Web server security Experience: •10 - 12 years related experience •Prior performance in roles such as ISSO, ISSM, SCA or SAP IT Technical Director Education: •Bachelor’s degree in a related discipline or equivalent experience (4 years) Certifications: •Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Manager Level III or Information Assurance Architect and Engineer Level I within 6 months of the date of hire Security Clearance: •Current Top Secret Clearance with SCI Eligibility •Eligibility for access to Special Access Program Information •Willingness to submit to a Counterintelligence polygraph Other Requirements: •Must have expert knowledge of DoD, National and applicable service and agency security policy, manuals and standards. Must have the ability to work in a dynamic environment and effectively interact with numerous DOD, military/civilian personnel and industry partners | Arthur |
Activity Security Representative 3 ARTH185 | JBAB, Washington DC | Closed | 04/01/2022 | Activity Security Representative 3: Performance shall include: •Classification reviews of inbound and outbound correspondence •Assist in the maintenance of a document accountability database and associated correspondence •Processing inbound and outbound classified mail and receipt records •Perform destruction of classified materials •Process magnetic media for accountability •Reproduction support for classified materials •Maintain various daily logs for a variety of administrative functions associated with document control •Assist in the processing of inbound data and outbound data transfer files •Transfer electronic data files to internal customers •Maintain an extensive customer database point of contact listing •Assist with researching, processing, filing, and maintaining inbound and outbound visit notices •Escort facility visitors and maintains associated logs •Assist in the preparation of facility access control badges •Conduct entry and exit inspections •Assist in the maintenance of facility access control entry systems, to include visitor control •Perform data entry to the Personnel Access Security System database and maintain all customer sponsored billets and quota information •Assist in maintaining personnel security files for all personnel of the supported element •Follow and enforce the customer’s Standard Operating Procedures •Provide support for the security awareness and education programs •Perform miscellaneous administrative support functions as directed by the contractor site lead and/or the Senior Security Representative •Review, track, and monitor security clearance processing activities with appropriate government personnel to achieve appropriate clearance actions •Participate in Air Force SAP security compliance inspections of government organizations and industry •Implement Top-Secret Control for accountable material and associated correspondence •Prepare and/or process inbound and outbound classified mail, faxes, courier packages and receipts •Prepare, process, and/or review Program Access Request (PARs) for accuracy and access eligibility •Execute Special Access Program Nomination Process Questionnaires •Conduct Defense Central Index of Investigations (DCII), Joint Personnel Access System (JPAS), and SAPNP reviews of candidates being submitted for SAP access •Perform data entry and record checks in the Air Force Access Data System (AFADS) and maintains all customer sponsored personnel access information current •Perform indoctrinations •Provide leadership, mentoring, and quality assurance for Team Members Experience: •5 - 7 years related experience •Security Fundamentals Professional Certification (SFPC) counts towards 3 years of experience •Special Program Security Certification (SPSC) counts towards 5 years of experience •Maximum equivalent experience for SPED Certifications is no more than 5 years Education: •Bachelor’s degree or equivalent experience (4 years) Certifications: •Must complete the DoD SAPCO approved SAPNP training (if performing personnel security functions) Security Clearance: •Current Top Secret Clearance with SCI Eligibility •Eligibility for access to Special Access Program Information •Willingness to submit to a Counterintelligence polygraph | Arthur |
Information Technology Information Assurance Level 3 ARTH184 | Kirtland AFB, NM | Immediate | 04/01/2022 | Information Technology Information Assurance Level 3: The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. Performance shall include: •Establish complex operational software configuration controls and system interfaces for computer system(s) assigned •Maintain file servers, Firewalls, network access, Security Monitoring Systems and system documentation as required •Analyze and troubleshoot system anomalies to ensure optimum equipment performance •Prepare system for operational use and support operational tests •Review, prepare, and update authorization packages •Notify customer when changes occur that might affect authorization accreditation •Conduct cybersecurity portion of the self-inspection’s checklist •Review and provide technical and cyber security coordination on all Bodies of Evidence that make-up the authorization package •Identify any and all vulnerabilities and implement countermeasures •Ensure information systems and network appliances are operated, maintained, and disposed of in accordance with security policies and practices •Perform Video-Teleconferencing VTC System Administration, Scheduling, & Configuration •Provide External Information System(s) Client Support •Perform account creations, changes, & deletions on multiple authorization boundaries •Perform Help Desk & troubleshooting activities •Perform Hardware/Software System Configuration, upgrades and modifications •Perform system and network appliance patching activities •Provide Government-Issued Laptop Support •Assist in Media Control & Accountability activities •Perform COMSEC account/equipment management activities Experience: •8-10 years related experience •Prior performance in roles such as System, Network Administrator or Information Technology/Assurance Specialists Education: •Bachelor’s degree or equivalent experience (4 years) Certifications: •Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level II or Information Assurance Manager II within 6 months of the date of hire. Security Clearance: •Current Top Secret Clearance with SCI Eligibility •Eligibility for access to Special Access Program Information •Willingness to submit to a Counterintelligence polygraph Other Requirements: •Thorough knowledge of Microsoft Windows 2012R2 Server, Microsoft Exchange Server 2010/2016, Microsoft Windows 7/10 operating systems (OS) administration and associated hardware. •Working knowledge of Local Area Network (LAN) and Wide Area Network (WAN) technologies and data backup technologies to include communication security (COMSEC) integration •Working knowledge of Risk Management Framework, and Joint DODIIS/Cryptologic SCI Information Systems Security Standards, Common Criteria, and System Security Policy as they relate to C&A •Working knowledge and current relevant experience with PL2 systems; experience with PL3 & PL4 cross domain solutions •Must be able to regularly lift up to 50 lbs | Arthur |
Senior Principal Computer Systems Security Analyst TALO057 | Herndon, VA | Closed | 03/24/2022 | Senior Principal Computer Systems Security Analyst: In this position, candidates will be expected to:
Basic Qualifications:
Preferred Qualifications:
Security Clearance:
| TALOS |
Supply Technician ESOC107 | Washington, DC | Closed | 03/24/2022 | Supply Technician: Performs clerical and manual tasks to maintain an inventory of materials, parts, supplies, and equipment. Shift Time : 6:00 am - 2:00 pm OR 10:00 am - 06:00 pm. Job Description:
Education and Experience:
Security Clearance:
| CCC |
On-site Support Technician ESOC106 | Washington, DC | Closed | 03/24/2022 | On-site Support Technician: Responsible for providing installation, maintenance and troubleshooting support of information systems applications and related peripheral hardware. Assesses user needs and is able to solve a range of problems. Provides installation of new equipment and performs equipment modifications or enhancements. Prepares and maintains documentation for processes for policies and procedures related to computer systems and operations. Job Description:
Qualifications:
Education and Experience:
Security Clearance:
| CCC |
Instructional Designer Lead LMSS009 | Springfield, VA | Future | 03/23/2022 | This is a future position that may come open but is not open at the present moment. We are willing to prescreen personnel for these positions if you are interested. Instructional Designer Lead: Provides subject matter expertise throughout the curriculum creation process, including content review and feedback to development staff. Relevant experience includes, but is not limited to, experience developing and delivering technical training and educational courses in academic, commercial, government, or industrial organizations. Relevant subject matter expertise experience includes, but is not limited to, experience in subject areas such as GEOINT Analysis, Imagery Analysis, Imagery Science, Remote Sensing, Data Science and Analysis, Human Geography, Geographic Science, Applied Science, Emerging Technologies, Workforce Professional Development, and NGA Mandatory Training Requirements. Required Education:
Desired Education:
Required Experience:
Desired Experience:
Security Clearance:
| LMSS |
Instructional Designer Senior LMSS008 | Springfield, VA | Future | 03/23/2022 | This is a future position that may come open but is not open at the present moment. We are willing to prescreen personnel for these positions if you are interested. Instructional Designer Senior: Provides subject matter expertise throughout the curriculum creation process, including content review and feedback to development staff. Relevant experience includes, but is not limited to, experience developing and delivering technical training and educational courses in academic, commercial, government, or industrial organizations. Relevant subject matter expertise experience includes, but is not limited to, experience in subject areas such as GEOINT Analysis, Imagery Analysis, Imagery Science, Remote Sensing, Data Science and Analysis, Human Geography, Geographic Science, Applied Science, Emerging Technologies, Workforce Professional Development, and NGA Mandatory Training Requirements. Required Education:
Desired Education:
Required Experience:
Desired Experience:
Security Clearance:
| LMSS |
Instructional Designer Mid-level LMSS007 | Springfield, VA | Future | 03/23/2022 | This is a future position that may come open but is not open at the present moment. We are willing to prescreen personnel for these positions if you are interested. Instructional Designer Mid-level: Provides subject matter expertise throughout the curriculum creation process, including content review and feedback to development staff. Relevant experience includes, but is not limited to, experience developing and delivering technical training and educational courses in academic, commercial, government, or industrial organizations. Relevant subject matter expertise experience includes, but is not limited to, experience in subject areas such as GEOINT Analysis, Imagery Analysis, Imagery Science, Remote Sensing, Data Science and Analysis, Human Geography, Geographic Science, Applied Science, Emerging Technologies, Workforce Professional Development, and NGA Mandatory Training Requirements. Required Education:
Desired Education:
Required Education:
Desired Education:
Security Clearance:
| LMSS |
Program Manager Lead LMSS006 | Springfield, VA | Closed | 03/23/2022 | This is a future position that may come open but is not open at the present moment. We are willing to prescreen personnel for these positions if you are interested. Program Manger Lead: Responsible for planning, executing, oversight, and day-to-day management of business activities within assigned program. Develops plans and procedures for area of responsibility within government-approved scope, to include Program Management, Contract Transition, Subcontractor, and Quality Control plans. Experience overseeing subcontractor performance, reviewing subcontractor invoices, and projecting forecasts. Reviews resumes, interviews job candidates, makes candidate selections, and holds staff to high performance standards. Required Education:
Desired Education:
Required Experience:
Desired Experience:
Desired Certification:
Security Clearance:
| LMSS |
Program Manager Senior LMSS005 | Springfield, VA | Closed | 03/23/2022 | This is a future position that may come open but is not open at the present moment. We are willing to prescreen personnel for these positions if you are interested. Program Manager Senior: Responsible for planning, executing, oversight, and day-to-day management of business activities within assigned program. Develops plans and procedures for area of responsibility within government-approved scope, to include Program Management, Contract Transition, Subcontractor, and Quality Control plans. Experience overseeing subcontractor performance, reviewing subcontractor invoices, and projecting forecasts. Reviews resumes, interviews job candidates, makes candidate selections, and holds staff to high performance standards. Required Experience:
Desired Education:
Required:
Desired Experience:
Desired Certification:
Security Clearance:
| LMSS |
Program Manager Mid-level LMSS004 | Springfield, VA | Closed | 03/23/2022 | This is a future position that may come open but is not open at the present moment. We are willing to prescreen personnel for these positions if you are interested. Program Manger Junior: Responsible for planning, executing, oversight, and day-to-day management of business activities within assigned program. Develops plans and procedures for area of responsibility within government-approved scope, to include Program Management, Contract Transition, Subcontractor, and Quality Control plans. Experience overseeing subcontractor performance, reviewing subcontractor invoices, and projecting forecasts. Reviews resumes, interviews job candidates, makes candidate selections, and holds staff to high performance standards. Required Education:
Desired Education:
Required Experience:
Desired Experience:
Security Clearance:
| LMSS |
Technical Editor Senior LMSS003 | Springfield, VA | Future | 03/23/2022 | This is a future position that may come open but is not open at the present moment. We are willing to prescreen personnel for these positions if you are interested. Technical Editor Senior: Superior English written language skills and knowledge of technical editing conventions. Perform final edits of document drafts, as re- quested, to ensure that documents are accurate, complete, and con- form to editorial, institutional, and branch standards for quality and style. Highly skilled in identifying content problems and communicating fixes; providing feedback, guidance, and advice. Understanding of options for using various types of graphics and layout alternatives and integrate graphics with text documents; prepare professional-quality tables and graphic elements such as various types of charts, graphs, figures, photographs, and drawings to illustrate narrative content. Required Education:
Desired Education:
Required Experience:
Desired Experience:
Security Clearance:
| LMSS |
Technical Editor Mid-level LMSS002 | Springfield, VA | Future | 03/23/2022 | This is a future position that may come open but is not open at the present moment. We are willing to prescreen personnel for these positions if you are interested. Technical Editor Mid-level: Superior English written language skills and knowledge of technical editing conventions. Perform final edits of document drafts, as re- quested, to ensure that documents are accurate, complete, and con- form to editorial, institutional, and branch standards for quality and style. Highly skilled in identifying content problems and communicating fixes; providing feedback, guidance, and advice. Understanding of options for using various types of graphics and layout alternatives and integrate graphics with text documents; prepare professional-quality tables and graphic elements such as various types of charts, graphs, figures, photographs, and drawings to illustrate narrative content. Required Education:
Desired Education:
Required Experience:
Desired Experience:
Security Clearance:
| LMSS |
Technical Editor Junior LMSS001 | Springfield, VA | Future | 03/23/2022 | This is a future position that may come open but is not open at the present moment. We are willing to prescreen personnel for these positions if you are interested. Technical Editor Junior: Superior English written language skills and knowledge of technical editing conventions. Perform final edits of document drafts, as re- quested, to ensure that documents are accurate, complete, and con- form to editorial, institutional, and branch standards for quality and style. Highly skilled in identifying content problems and communicating fixes; providing feedback, guidance, and advice. Understanding of options for using various types of graphics and layout alternatives and integrate graphics with text documents; prepare professional-quality tables and graphic elements such as various types of charts, graphs, figures, photographs, and drawings to illustrate narrative content. Required:
Desired Education:
Required Experience:
Desired Experience:
Security Clearance:
| LMSS |
VDI Engineer ISEE148 | Sterling, VA | Immediate | 03/22/2022 | VDI Lead Engineer: IC-CAP is seeking a VDI SME who specializes in Windows Virtual Desktop (WVD). WVD is a comprehensive desktop and app virtualization service running on Azure and Hybrid that delivers simplified management, multi-session Windows 10, optimizations for Office 365 ProPlus, and support for Remote Desktop Services environment Main Responsibilities: As a VDI Lead, the candidate will deliver quality engagements with your expertise, either as an advisor, workshop, troubleshooting, assessment, reviewer or resource in high profile projects to ensure customer value. The ideal candidate must have the ability to combine their technical skills, creativity and customer focus to deliver great solutions to the customers and ensure they get the best out of our technologies and solutions. Person in this position should be able to focus on deep experience with technologies. Skill Level 4:
Experience in leading, designing and implementing Microsoft infrastructure solutions including:
Education and Experience:
Training and Certifications:
Security Clearance:
| ISEE |
Senior Principal DevOps System Engineer TALO056 | Herndon, VA | Closed | 03/17/2022 | Senior Principal DevOps System Engineer: Candidate will develop CI/CD build and deploy pipelines; integrate tools into the pipeline and manage debugging integration issues. In addition, candidate will help integrate with various tools for the DevOps process. Job Duties include:
Required:
Desired:
| TALOS |
Staff DevOps System Engineer TALO055 | Herndon, VA | Closed | 03/17/2022 | Staff DevOps System Engineer: Candidate will develop CI/CD build and deploy pipelines; integrate tools into the pipeline and manage debugging integration issues. In addition, candidate will help integrate with various tools for the DevOps process. Job Duties include:
Required:
Desired:
| TALOS |
Senior Biometrics Exploitation Examiner (Senior Identity Intelligence Analyst) SIA3007 | Bethesda, MD | Immediate | 03/16/2022 | Senior Biometrics Exploitation Examiner (Senior Identity Intelligence Analyst): The Candidate conducts analytic production on modalities to include, but not limited to, facial recognition features and behaviors for the purposes of identifying persons and networks. Fuses identity attributes to include, but not limited to, biographical, biological, behavioral, contextual, and reputational information related to individuals and intelligence associated with those attributes to identify and assess threat individuals and networks, their capabilities and capacity, centers of gravity, objectives, intent, and potential courses of action. The Biometrics / I2 analysts shall perform biometric examination services and produce reporting in accordance with agency guidance. Additionally, the Biometrics / I2 analysts shall conduct thorough identity exploitation of media devices and routinely interact with interagency partners on exploitation findings. Senior-level:
Minimum Qualifications:
Highly Desired Qualifications:
Education and Experience:
Security Clearance:
| SIA3CybercomJ2TO |
Insider Threat Auditor ECND036 | Washington, DC | Closed | 03/14/2022 | Insider Threat Auditor: Performs all procedures necessary to ensure the safety of information systems assets and to protect systems from intentional or inadvertent access or destruction. Job Description: Join a team that leads in cyber with the top technical cyber talent, range of customer experience, and emerging technology to address tomorrow’s cyber threats. Our service model approach to secure, operate, and defend is predicated on ensuring the skill-set of our staff remains on the cutting edge of technology through our virtual training platform and Cyber Range. Skill Level 4:
Functional duties consist of:
Education and Experience:
Training and Certifications:
Security Clearance:
| ECND |
Full Stack Developer ASC007 | Springfield, VA | Immediate | 03/05/2022 | Full Stack Developer: Researches, designs, develops, and/or modifies enterprise-wide systems and/or applications software. Involved in planning of system and development deployment as well as responsible for meeting software compliance standards. Evaluates interface between hardware and software, operational requirements, and characteristics of overall system. Documents testing and maintenance of system corrections. Basic Qualifications:
Additional Qualifications:
Security Clearance:
| ASC |
All-Source Analyst Information Network Mgt Analysis and Production Senior SIA3006 | Fort Meade, MD | Immediate | 03/01/2022 | All-Source Analyst Information Network Mgt Analysis and Production Senior: Conducts analysis using intelligence and information from multiple sources to assess, interpret, forecast, and explain a range of national security issues and developments that are regional or functional in nature. Provides all-source analytic support to collections, operations, investigations, and other defense intelligence analytic requirements. Provides all-source analysis to include: research, evaluation and deconfliction of single-source classified reporting, technical intrusion information, other agency all-source finished intelligence, open-source information and other relevant data. Adheres to Office of the Director of National Intelligence (ODNI) and Defense Intelligence Agency (DIA) all-source analytic tradecraft and standards. Establishes and maintains communications with counterparts in the Intelligence Community, the USCYBERCOM service components, other combatant commands, Cyber National Mission Force, Department of Homeland Security/NCSD, CERTS and Information Assurance Centers to collaborate on analysis and identify changes in the environment (at the direction of USCYBERCOM leadership and in accordance with the guidance of government sponsors within assigned division). Maintains cognizance of events occurring both within the U.S. government systems and internationally as directed to identify possible relationships to established knowledge base.
Possesses a minimum 2 years education of computer science/engineering, software design/engineering from an accredited college or university would substitute for the certificate completion/work experience requirement.
Uses intelligence production tools and databases, to include: Tripwire Analytic Capability, Intellipedia, Palantir, MIDB, Cyber Common Operating Picture (CyberCOP), Target Knowledge Base, Cyber Threat Matrix, Automated Message Handling System, WISE Information Management System, Network Knowledge Base, FoxTrail, CENTAUR, ispace, Pathfinder, and Microsoft OneNote.
Provides intelligence support, including the following:
Intelligence Support to Planning and Operations: Provide all-source JIPOE support to offensive cyber operations / defensive cyber operations (OCO/DCO) planning and execution to include production of cyber related Intelligence estimates and associated products. This analysis shall include direct support to the Intelligence Planning Teams (IPTs), as required.
Threat Trends and Indicators: Produce bulletins and briefs related to assigned area of responsibility. These shall include specific changes in tactics, techniques and procedures (TTP) and technical trends in cyber threats directed at the DoDIN and U.S. critical infrastructure/key resources (CI/KR), as required. Monitors threat activities to develop specific cyber indicators to support the USCYBERCOM role in the Defense Warning Program.
Cyber-related Exercise Support: Provides scenario development, white cell or role playing support to cyber related exercises, as required.
USCYBERCOM Staff Support: Responds expeditiously to J2 or other USCYBERCOM staff requests for information, as required.
Product Development: Assists in the production, editing, publishing and dissemination of clear, concise, timely and relevant cyber analytic products, as required. Briefing: Develops and presents intelligence slides and in-depth briefings and presentations related to assigned area of responsibility to USCYBERCOM staff up to GO/FO level. Meeting Support: Provides support to meetings related to assigned area of responsibility. This shall include meetings within the Command or held at other government or cleared defense contractor facilities. Travel may be required for long distance meetings, but virtual participation is preferred. Desired Experience:
Desired Education:
Security Clearance:
| SIA3CybercomJ2TO |
Intelligence Technician Operations Mission Team Support Senior SIA3005 | Fort Meade, MD | Immediate | 03/01/2022 | Intelligence Technician Operations Mission Team Support Senior: Provides a full range of intelligence and administrative support to assist analysts, engineers, and scientists involved in a variety of intelligence disciplines and activities. Activities include, but are not limited to, building and maintaining databases; monitor intelligence; assists with administration and management of RFIs; produces metrics; provides cross-domain data transfer and intelligence dissemination support, system-high to -low transfers between JWICS, SIPRNet, NIPRNet, and other U.S. and Allied / Partner systems. Produces metrics, graphics, and briefings as required to support production management and mission management functions. Job Duties:
Desired Experience:
Desired Education:
Security Clearance:
| SIA3CybercomJ2TO |
Staff Engineer Database TALO054 | Herndon, VA | Closed | 02/26/2022 | Staff Engineer Database: The selected Database Engineer will work within a cross-functional Scrum team with experience supporting data management processes, database engineering and management; designing, developing, maintaining, and enhancing database systems Job Duties:
Basic Qualifications:
Preferred:
Security Clearance:
| TALOS |
Software Engineer Level 4 TALO053 | Herndon, VA | Immediate | 02/26/2022 | Software Engineer Level 4: Software Engineer 4: The selected Software Engineer should have experience with Agile software methodology, and software engineering design best practices. The candidate will work within a cross-functional Scrum team, and will be responsible for developing software, participating in acceptance criteria development, creating scripts and utilizing Open Source and COTS tools to automate testing, documenting instructions, and participating in integration activities. Job Duties:
Required Qualifications:
Desired Qualifications:
Security Clearance:
| TALOS |
Journeyman Source Strategies Analyst GEOINT Collections Manager MACS013 | Fort Belvoir, VA | Closed | 02/25/2022 | Journeyman Source Strategies Analyst GEOINT Collections Manager: Candidates must possess the following:
Candidates meeting ALL these requirements and possessing one or more of the following will rank higher for consideration:
Security Clearance:
| MACSS |
FSA RIM Training Tools Manager Level 4 MOJA100 | Springfield, VA | Closed | 02/22/2022 | Functional Specialist Advisor/Records |