top of page
Blue luminous rays on a dark background.
arrow&v
Position
Location
Timeline
Date Validated
Description
Contract
Systems Administrator 3 TALO093
Herndon, VA
Closed
02/01/2023

Systems Administrator 3:




Position Description:



Maintains smooth operation of multi-user computer systems, including coordination with network engineers. Monitors and manages system resources, including CPU usage, disk usage, and response times to maintain operating efficiency. Performs systems security administration functions, including creating user profiles and accounts. Provides Tier 3 problem identification, diagnosis and resolution of problems. Configure operating systems. Other duties may include setting up administrator accounts, maintaining system documentation, tuning system performance, installing system wide software, applications/operating systems hardening, and allocating mass storage space. Interacts with users and evaluates vendor products. Makes recommendations to purchase hardware and software, coordinates installation and provides backup recovery. Develops and monitors policies and standards for allocation related to the use of computing resources.




Required Qualifications:


  • Requires applicable Bachelor's degree with 5 or more years of relevant experience. Additional experience may be considered in lieu of degree.

  • A minimum 2 year of experience with systems administration, including Linux or CentOS

  • Must be a US Citizen;

  • Ability to work in a team environment

  • Ability to anticipate problems & take decisive action

  • Experience maintaining applications built on a PostgreSQL or Oracle database.

  • Experience writing scripts to monitor system services, resources, data mine logs, etc.

  • Writing SQL and PL/SQL to generate system data reports, modify data as necessary, etc.

  • Experience with Keytool and OpenSSL

  • Familiarity w/troubleshooting Java & Oracle applications

  • XML Proficiency

  • DoD 8570 Compliant holding current IAT level II baseline certification (Security+ CE, GICSP, SSCP, etc.)

  • Experience maintaining systems in cloud environments

  • Experience working with Firewalls and AWS Security Groups




Desired Qualifications:


  • Linux+ certification

  • Current RHCSA/RHCE certification

  • Current CI polygraph

  • Microsoft MCSA

  • VMware Certified Professional

  • Knowledge of SQL Servers




Security Clearance:


  • TS/SCI with ability to pass a CI Poly required

  • CI Poly preferred

TALOS
DevOps Systems Engineer TALO092
Herndon, VA
Immediate
02/01/2023

DevOps Systems Engineer (All LCATs considered):



Candidate will develop CI/CD build and deploy pipelines; integrate tools into the pipeline and manage debugging integration issues. In addition, candidate will help integrate with various tools for the DevOps process.




Job Duties include:


  • Development of CI/CD Build and Deployment Pipelines: Write/modify Jenkins-based groovy scripts. Write/update CloudFormation scripts. Troubleshoot pipeline issues across Jenkins and AWS Environments (Linux EC2, RDS, CloudFormation, Elasticsearch, etc…). Document key features for developer use. Help write and maintain scripts for process improvements (ex: stage/unstage builds, branch tag automation, automating variance corrections across networks).

  • Integrate tools into the pipeline: Work with the development teams to bring in new microservices into the pipeline. Helping troubleshoot as necessary. Work through steps to automate installations of COTS products into the architecture.

  • Debugging integration issues: Help identify issues in the deployment (i.e. potentially intermittent connectivity issues from an API Server to the Database). Monitor (and help develop scripts to monitor) the AWS services to ensure everything is functioning as necessary.

  • DevOps Tool Integration: Help integrate with various tools for the DevOps process (SonarQube, Fortify, Jenkins, Robot Framework/Selenium, Artifactory, etc…)




Required:


  • A Bachelor’s degree and 9+ years of relevant experience OR a Master’s degree with 7 years of relevant experience OR a PhD with 4 years of relevant experience; an additional 4 years of experience may be considered in lieu of the degree requirement.

  • Experience with Linux Environments.

  • Experience with scripting languages, such as Bash and Python.

  • Strong problem solving, analytical, and technical troubleshooting skills.

  • Experience with Git for Source Control.

  • Understanding and willingness to work in a DevSecOps oriented environment with an Infrastructure as Code mindset.

  • Active CompTIA Security+ CE Certification (or equivalent DoD IAT Level 2 cert).

  • Position is 100% onsite. NO EXCEPTIONS.

  • TS/ SCI CI Poly




Desired:


  • Experience with CloudFormation, Elasticsearch.

  • Basic understanding of an Object-Oriented Programming Language, preferably Java or Python.

  • Experience integrating Jenkins and Docker for automated CI/CD pipelines.

  • Basic understanding of Kubernetes or OpenShift Container Platform

TALOS
Functional Specialist/Advisor Training Level 1 111-001
Springfield, VA
Immediate
01/28/2023

Functional Specialist/Advisor Training Level 1:




Overall Assignment Description:



Certification Exam Administrator – Serve as a member of a team managing the delivery of high-stakes exams to candidates seeking to earn professional credentials. Apply excellent attention to detail and customer service skills in a high operational tempo environment using standard operating procedures.




Duties include:


  • Assessment Delivery – Develop, document, and administer processes to deliver certification exams, manage relevant exam data, and communicate with test-takers and proctors.

  • Ensure testing is delivered in an approved, proctored environment, using standardized procedures and in compliance with applicable laws, and external accreditation standards




Work location/Schedule:


  • Primarily onsite, Springfield VA.

  • Monday-Friday, 40 hours/week average, generally flexible to accommodate those with preference for earlier or later schedules between 6am and 5pm.

  • Telework: currently supported 10-25% of time, subject to change at any time




Travel:


  • Occasional local travel possible (less than 10%)

  • CONUS travel possible (less than 5%)




Security Clearance:


  • TS SCI

Mojave
Cloud Solutions Architect-Engineer Senior Level NEE123
Chantilly, VA
Closed
02/02/2023

Cloud Solutions Architect/Engineer (Senior-Level):




Overall Assignment Description:


  • The Cloud Solutions Architect/Engineer will work across Cloud Ops, Security, Development, Auditing teams at NGA to design resilient, flexible, and scalable cloud solutions to support GEOINT Enterprise operations.

  • Formulate, document, and communicate methodologies for building and operating highly available, scalable services.

  • Provide assistance in reducing and resolving production incidents (e.g. Site Reliability

  • Look for opportunities to improve all operations processes.

  • Evaluate, build and modify automation for deploying and operating production services. •

  • Create, assess, update and maintain documentation pertaining to Product Lines.

  • Develop and design elastic, resilient and self-healing Cloud native applications and

  • Crafting excellent documentation for respective projects and carrying ownership for the code and the instructional tutorials of how to use it.

  • Work with team members to design, architect and implement solutions across geographic




Skills and Experience:


  • Five or more years of experience with cloud-based services or technologies.

  • Understanding of object-oriented software with languages like Java, C++, Python or Ruby ideally in SOA applications.

  • Understanding of networking and core Internet protocols (e.g. TCP/IP, DNS, SMTP, HTTP, and distributed networks). 

  • Understanding of industry standards for designing and implementing IaaS/PaaS/SaaS in Cloud environments.

  • Experience with modern container orchestration systems, such as: Kubernetes, Mesos,



Desired:


  • Master’s degree in Computer Science, Information Technology, Engineering, EngineeringManagement, Management Information Systems, or related STEM degree program.

  • Certified AWS Solutions Architect

  • Two or more years of demonstrated experience in Site Reliability Engineering functions.

  • Experience with Linux/UNIX systems and the best practices for deploying applications to those stacks.

  • Experience designing, implementing, and operating in a DevSecOps.

  • Experience using APIs and RESTful services.

  • Experience with infrastructure configuration and automations processes and tools: Terraform,Puppet, Ansible, Chef, Fabric.

  • Experience with security in the cloud, such as: Intrusion, penetration, and vulnerabilityscanning.

  • Experience with monitoring solutions, such as: ELK, Splunk, SUMO, Nagios, Prometheus.

  • Experience with build automation and continuous integration/delivery ecosystemcapabilities, such as: Git, Gerrit, Maven/Gradle, Jenkins, Docker, Nexus.




Education and Experience:


  • 12+ to 18 years' experience

  • Bachelor's degree or higher in Computer Science, Information Technology, Engineering,

  • Engineering Management, Management Information Systems, or related STEM degree

  • program, or related equivalent additional experience.




Security Clearance:


  • TS SCI

NEE
Information Systems Security Officer (ISSO) III 118-075
Wright Patterson AFB, OH
Immediate
01/17/2023

Information Systems Security Officer (ISSO) III:



The ISSO is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO.  The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is assigned responsibility for the day-to-day security operations of a system.  This also will include physical and environmental protection, personnel security, incident handling, and security training and awareness.  It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configuration management across authorization boundaries.  This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.




Performance shall include:


  • Assist the ISSM in meeting their duties and responsibilities

  • Prepare, review, and update authorization packages

  • Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media

  • Notify ISSM when changes occur that might affect the authorization determination of the information system(s)

  • Conduct periodic reviews of information systems to ensure compliance with the security authorization package

  • Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change

  • Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly

  • Ensure all IS security-related documentation is current and accessible to properly      authorized individuals

  • Ensure audit records are collected, reviewed, and documented (to include any anomalies)

  • Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties

  • Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans

  • Identify cyber security vulnerabilities and assist with the implementation of the countermeasures for them

  • Prepare reports on the status of security safeguards applied to computer systems

  • Perform ISSO duties in support of in-house and external customers

  • Conduct continuous monitoring activities for authorization boundaries under your preview

  • Assist Department of Defense, National Agency and Contractor organizations with the development of assessment and authorization (A&A) efforts




Experience:


  • 5 - 7 years related experience

  • Prior performance in roles such as System, Network Administrator or ISSO




Education:


  • Bachelor’s degree or equivalent experience (4 years)




Certifications:


  • Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level II or Information Assurance Manager II within 6 months of the date of hire.




Security Clearance:


  • Current Top Secret Clearance with SCI Eligibility

  • Eligibility for access to Special Access Program Information

  • Willingness to submit to a Counterintelligence polygraph




Other Requirements:


  • Must be able to regularly lift up to 50 lbs

Arthur 2
Information Systems Security Officer (ISSO) III 118-074
Wright Patterson AFB, OH
Immediate
01/17/2023

Information Systems Security Officer (ISSO) III:



The ISSO is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO.  The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is assigned responsibility for the day-to-day security operations of a system.  This also will include physical and environmental protection, personnel security, incident handling, and security training and awareness.  It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configuration management across authorization boundaries.  This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.




Performance shall include:


  • Assist the ISSM in meeting their duties and responsibilities

  • Prepare, review, and update authorization packages

  • Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media

  • Notify ISSM when changes occur that might affect the authorization determination of the information system(s)

  • Conduct periodic reviews of information systems to ensure compliance with the security authorization package

  • Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change

  • Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly

  • Ensure all IS security-related documentation is current and accessible to properly      authorized individuals

  • Ensure audit records are collected, reviewed, and documented (to include any anomalies)

  • Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties

  • Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans

  • Identify cyber security vulnerabilities and assist with the implementation of the countermeasures for them

  • Prepare reports on the status of security safeguards applied to computer systems

  • Perform ISSO duties in support of in-house and external customers

  • Conduct continuous monitoring activities for authorization boundaries under your preview

  • Assist Department of Defense, National Agency and Contractor organizations with the development of assessment and authorization (A&A) efforts




Experience:


  • 5 - 7 years related experience

  • Prior performance in roles such as System, Network Administrator or ISSO




Education:


  • Bachelor’s degree or equivalent experience (4 years)




Certifications:


  • Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level II or Information Assurance Manager II within 6 months of the date of hire.




Security Clearance:


  • Current Top Secret Clearance with SCI Eligibility

  • Eligibility for access to Special Access Program Information

  • Willingness to submit to a Counterintelligence polygraph




Other Requirements:


  • Must be able to regularly lift up to 50 lbs

Arthur 2
Information Systems Security Officer (ISSO) III 118-073
Wright Patterson AFB, OH
Immediate
01/17/2023

Information Systems Security Officer (ISSO) III:



The ISSO is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO.  The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is assigned responsibility for the day-to-day security operations of a system.  This also will include physical and environmental protection, personnel security, incident handling, and security training and awareness.  It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configuration management across authorization boundaries.  This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.




Performance shall include:


  • Assist the ISSM in meeting their duties and responsibilities

  • Prepare, review, and update authorization packages

  • Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media

  • Notify ISSM when changes occur that might affect the authorization determination of the information system(s)

  • Conduct periodic reviews of information systems to ensure compliance with the security authorization package

  • Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change

  • Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly

  • Ensure all IS security-related documentation is current and accessible to properly      authorized individuals

  • Ensure audit records are collected, reviewed, and documented (to include any anomalies)

  • Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties

  • Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans

  • Identify cyber security vulnerabilities and assist with the implementation of the countermeasures for them

  • Prepare reports on the status of security safeguards applied to computer systems

  • Perform ISSO duties in support of in-house and external customers

  • Conduct continuous monitoring activities for authorization boundaries under your preview

  • Assist Department of Defense, National Agency and Contractor organizations with the development of assessment and authorization (A&A) efforts




Experience:


  • 5 - 7 years related experience

  • Prior performance in roles such as System, Network Administrator or ISSO




Education:


  • Bachelor’s degree or equivalent experience (4 years)




Certifications:


  • Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level II or Information Assurance Manager II within 6 months of the date of hire.




Security Clearance:


  • Current Top Secret Clearance with SCI Eligibility

  • Eligibility for access to Special Access Program Information

  • Willingness to submit to a Counterintelligence polygraph




Other Requirements:


  • Must be able to regularly lift up to 50 lbs

Arthur 2
Information Systems Security Officer (ISSO) II 118-072
Tinker AFB, OK
Immediate
01/17/2023

Information Systems Security Officer (ISSO) II:



The ISSO is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO.  The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is assigned responsibility for the day-to-day security operations of a system. This also will include physical and environmental protection, personnel security, incident handling, and security training and awareness.  It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configuration management across authorization boundaries.  This will include assessing the security impact of those changes and making recommendation to the ISSM.  The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts.  The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.




Performance shall include:


  • Assist the ISSM in meeting their duties and responsibilities

  • Prepare, review, and update authorization packages

  • Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media

  • Notify ISSM when changes occur that might affect the authorization determination of the information system(s)

  • Conduct periodic reviews of information systems to ensure compliance with the security authorization package

  • Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change

  • Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly

  • Ensure all IS security-related documentation is current and accessible to properly authorized individuals

  • Ensure audit records are collected, reviewed, and documented (to include any anomalies)

  • Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties

  • Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans

  • Identify cyber security vulnerabilities and assist with the implementation of the countermeasures for them

  • Prepare reports on the status of security safeguards applied to computer systems

  • Perform ISSO duties in support of in-house and external customers

  • Conduct security impact analysis activities and provide to the ISSM on all configuration management changes to the authorization boundaries




Experience:


  • 2 - 5 years related experience

  • Prior performance in roles such as System, Network Administrator or ISSO




Education:


  • Bachelor’s degree or equivalent experience (4 years)




Certifications:


  • Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level II or Information Assurance Manager II within 6 months of the date of hire




Security Clearance:


  • Current Top Secret Clearance with SCI Eligibility

  • Eligibility for access to Special Access Program Information

  • Willingness to submit to a Counterintelligence polygraph




Other Requirements:


  • Must be able to regularly lift up to 50 lbs

Arthur 2
Program Security Representative I 118-071
Pentagon, VA
Immediate
01/17/2023

Program Security Representative I:



The Program Security Representative’s primary function is to provide multi-discipline security support for one or more of the customer’s Special Access Programs (SAPs).  The position will provide “day-to-day” multi-discipline analysis for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.




Performance shall include:


  • Ensure strict adherence to the provisions of the NISPOM, its Supplement, the DoD Overprint, DCID, ICD, and SAP policy

  • Assist in developing and executing approved policies and procedures for safeguarding Special Access Program (SAP), Sensitive Compartmented Information (SCI) and collateral data in support of US military operations

  • Provide day-to-day security support that includes continuous assessment of procedures to identify shortfalls and provide appropriate recommendations for revising and improving security policies, procedures, and systems

  • Identify vulnerabilities, threats, and risks to test, training, and operational activities

  • Assist in developing, implementing, and training the Operations Security program

  • Assist in providing contractor and subordinate facility assistance and oversight

  • Brief all levels of personnel, both in the government and senior civilian services, on a variety of security related topics

  • Conduct and document SAP facility compliance reviews, follow-on facility reviews, and facility close-outs

  • Monitor, report and track all corrective actions resulting from compliance reviews

  • Ensure timely notification of pertinent security matters to program technical and management staff

  • Conduct exploration of any loss, compromise, or suspected compromise of classified and/or sensitive information, including conducting preliminary inquiries and generating damage assessments resulting from the loss of classified information.

  • Coordinate with SAP security personnel to ensure lessons learned are incorporated into the curriculum for the SAP security education & awareness program




Experience:


  • 5 - 7 years related experience

  • Security Fundamentals Professional Certification (SFPC) counts towards 3 years of experience

  • Special Program Security Certification (SPSC) counts towards 5 years of experience

  • Maximum equivalent experience for SPED Certifications is no more than 5 years




Education:


  • Bachelor’s degree in a related area or equivalent experience (4 years)




Security Clearance:


  • Current Top Secret Clearance with SCI Eligibility

  • Eligibility for access to Special Access Program Information

  • Willingness to submit to a Counterintelligence polygraph

Arthur 2
Network-System Administrator II 118-070
Bolling AFB, Washington DC
Immediate
01/17/2023

Network-System Administrator II:



The primary function will be to organize, install, and support government organization’s computer systems, including local area networks (LANs), wide area networks (WANs), network segments, intranets, and other data communication systems. This will also include helping architect, design and analyze network models. It will require participation in decisions about buying future hardware or software to upgrade organization’s infrastructure. This position might be called upon to provide technical support to computer users to help solve users’ problems. This position will support activities within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.




Performance shall include:


  • Ability to operate under minimal supervision

  • Execute day to day management and operations of systems and networks

  • Manage COTS & GOTS products to collect, display and remediate a variety of automated system security and system operations/performance functions and metrics

  • Follow Operations and Maintenance (O&M) checklists to maintain the service (daily, weekly, monthly, yearly O&M checklists); build Tactics, Techniques and Processes (TTPs) and Standard Operating Processes (SOPs) associated with service checklists

  • Operate monitoring tools/capabilities with the enterprise security information and event management (SIEM) and create/tailor complex event alarms/rules and summary reports

  • Assist in analyzing technical risk, upon request, of emerging cybersecurity tools and processes

  • Work as part of a security incident response team as needed

  • Working technical competency in one or more of the following supported platforms: Microsoft Windows Server, Red Hat Enterprise Linux servers, MS Hyper-V/VMWare/ESx/Xen Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems, forensic analysis/vulnerability assessment, Group Policy management and configuration, Scripting, BMC Footprints, WSUS, , Lumension, Bitlocker, SQL Server 2012, TomCat, IIS, Windows Server 2012r2/2016, Win 10, Red Hat 6.5, Microsoft Office

  • Toolkits, SEIMs, Logrhythm, ACAS/Nessus/SCAP, mandatory/role-based access control concepts (e. g. SE Linux extensions to RHEL, PitBull, AppArmor, and Sentris) , video teleconferencing/VOIP, Oracle/MS SQL database security, and Apache/IIS Web server security




Experience:


  • 3 - 5 years related experience




Education:


  • Bachelor’s degree in a related area or equivalent experience (4 years)




Certifications:


  • Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level II within 6 months of the date of hire




Security Clearance


  • Current Top Secret Clearance with SCI Eligibility

  • Eligibility for access to Special Access Program Information

  • Willingness to submit to a Counterintelligence polygraph




Other Requirements:


  • Thorough knowledge of Microsoft Windows desktop and server operating systems, Microsoft Exchange Server, and as needed RHEL operating systems administration and associated hardware

  • Working knowledge of CISCO network and switching and virtualization technologies

  • Working knowledge of Local Area Network (LAN) and Wide Area Network (WAN) technologies and data backup technologies

  • Working knowledge communication security (COMSEC) policies and integration

  • Working knowledge of Risk Management Framework, Common Criteria, and System Security Policy as they relate to assessments and authorization

  • Working knowledge and current relevant experience with PL2 and PL3 network environments/systems

  • Experience providing technical support in a customer service role

  • Experience applying industry standards and best practices in an enterprise-level Windows system environment. 

  • Experience solving technical problems quickly and identifying opportunities to automate repetitive processes. 

  • Working knowledge of WSUS and/or YUM patch deployment methodologies

  • Must be familiar with DoD policy as it applies to implementing and executing system and network administration

  • Must be able to regularly lift up to 50 lbs


Arthur 2
Information Technology-Assurance Specialist III 118-069
Bolling AFB, Washington DC
Immediate
01/17/2023

Information Technology-Assurance Specialist III:



The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts.  The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. 




Performance shall include:


  • Establish complex operational software configuration controls and system interfaces for computer system(s) assigned

  • Maintain file servers, Firewalls, network access, Security Monitoring Systems and system documentation as required

  • Analyze and troubleshoot system anomalies to ensure optimum equipment performance

  • Prepare system for operational use and support operational tests

  • Review, prepare, and update authorization packages

  • Notify customer when changes occur that might affect authorization accreditation

  • Conduct cybersecurity portion of the self-inspection’s checklist

  • Review and provide technical and cyber security coordination on all Bodies of Evidence that make-up the authorization package

  • Identify any and all vulnerabilities and implement countermeasures

  • Ensure information systems and network appliances are operated, maintained, and disposed of in accordance with security policies and practices

  • Perform Video-Teleconferencing VTC System Administration, Scheduling, & Configuration

  • Provide External Information System(s) Client Support

  • Perform account creations, changes, & deletions on multiple authorization boundaries

  • Perform Help Desk & troubleshooting activities

  • Perform Hardware/Software System Configuration, upgrades and modifications

  • Perform system and network appliance patching activities

  • Provide Government-Issued Laptop Support

  • Assist in Media Control & Accountability activities

  • Perform COMSEC account/equipment management activities 




Experience:


  • 8-10 years related experience

  • Prior performance in roles such as System, Network Administrator or Information Technology/Assurance Specialists




Education:


  • Bachelor’s degree or equivalent experience (4 years)




Certifications:


  • Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level II or Information Assurance Manager II within 6 months of the date of hire.




Security Clearance


  • Current Top Secret Clearance with SCI Eligibility

  • Eligibility for access to Special Access Program Information


Arthur 2
Network-System Administrator III 118-068
Kirtland AFB, NM
Immediate
01/17/2023

Network-System Administrator III:



The primary function will be to organize, install, and support government organization’s computer systems, including local area networks (LANs), wide area networks (WANs), network segments, intranets, and other data communication systems. This will also include helping architect, design and analyze network models. It will require participation in decisions about buying future hardware or software to upgrade organization’s infrastructure. This position might be called upon to provide technical support to computer users to help solve users’ problems. This position will support activities within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.




Performance shall include:


  • Able to perform self-sustaining and work with little to no oversight

  • Lead IT ops team on day to day management and operations of Networks and implement capabilities vetted through Cybersecurity, ISSE and higher headquarters to maintain JSIG/RMF Authority to Operate and maintain Continuous Monitoring tools and processes

  • Manage COTS & GOTS products to collect, display and remediate a variety of automated system security and system operations/performance functions and metrics.

  • Assist during security assessments of servers/network devices/security appliances

  • Assist during security assessments with regard to accuracy and efficiency

  • Assist with Creation of operational Operations and Maintenance (O&M) checklists to maintain the service (daily, weekly, monthly, yearly O&M checklists); build Tactics, Techniques and Processes (TTPs) and Standard Operating Processes (SOPs) associated with service checklists

  • Manage and operate monitoring tools/capabilities with the enterprise security information and event management (SIEM) and create/tailor complex event alarms/rules and summary reports

  • Execute cybersecurity operations procedures for day to day network management, operations and maintenance

  • Monitor/analyze output of cybersecurity related tools for reportable security incidents and residual risk

  • Assist in analyzing technical risk, upon request, of emerging cybersecurity tools and processes

  • Work as part of a security incident response team as needed

  • Assist ISSM/ISSO/ISSE  with the Integration/Development new techniques to improve Confidentiality, Integrity, and Availability for networks/systems operating at various classification levels

  • Advanced technical competency in one or more of the following supported platforms: Microsoft Windows Server, Active Directory Red Hat Enterprise Linux servers, MS Hyper-V/VMWare/ESx/Xen Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems, forensic analysis/vulnerability assessment, Group Policy management and configuration, Scripting, BMC Footprints, WSUS, , Lumension, Bitlocker, SQL Server 2012, TomCat, IIS, Windows Server 2012r2/2016, Win 10, Red Hat 6.5, Microsoft Office

  • Toolkits, SEIMs, Logrhythm, ACAS/Nessus/SCAP, mandatory/role-based access control concepts (e. g. SE Linux extensions to RHEL, PitBull, AppArmor, and Sentris) , video teleconferencing/VOIP, Oracle/MS SQL database security, and Apache/IIS Web server security




Experience:


  • 5 - 7 years related experience




Education:


  • Bachelor’s degree in a related area or equivalent experience (4 years)




Certifications:


  • Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level III within 6 months of the date of hire




Security Clearance


  • Current Top Secret Clearance with SCI Eligibility

  • Eligibility for access to Special Access Program Information

  • Willingness to submit to a Counterintelligence polygraph




Other Requirements:


  • Thorough knowledge of Microsoft Windows desktop and server operating systems, Microsoft Exchange Server, and as needed RHEL operating systems administration and associated hardware

  • Experience in effective communication and collaborating in a high performance team environment.

  • Group Policy design and configuration

  • Working knowledge of CISCO network and switching and virtualization technologies

  • Working knowledge of virtualization as it applies to users environments, operating systems, and network appliances

  • Working knowledge of Local Area Network (LAN) and Wide Area Network (WAN) technologies and data backup technologies

  • Working knowledge communication security (COMSEC) policies and integration

  • Working knowledge of Risk Management Framework, Common Criteria, and System Security Policy as they relate to assessments and authorization

  • Working knowledge and current relevant experience with PL2, PL3, and PL4 network environments/systems

  • Working knowledge of WSUS and/or YUM patch deployment methodologies

  • Must be familiar with DoD policy as it applies to implementing and executing system and network administration

  • Working knowledge of Risk Management Framework and how to apply it to network/information system environments

  • Must be able to regularly lift up to 50 lbs


Arthur 2
Client-Server Database Manager – Senior 118-067
Kirtland AFB, NM
Immediate
01/17/2023

Client-Server Database Manager – Senior:



Projects long-range requirements for client/server database administration in conjunction with other managers in the information systems function as well as business function managers.  Prepares activity and progress reports regarding the client/server database management section.




Performance shall include:


  • Audit database access and requests

  • Ensure proposed object definitions are clear, concise, technically correct, and that they represent singular concepts

  • Install and configure database environments and associated storage systems

  • Install and perform minor repairs to hardware, software, and peripheral equipment, following design or installation specifications

  • Oversee the daily performance of database systems

  • Perform backups/restores, and archive data

  • Perform optimization and tuning of data loads and extractions

  • Perform server and storage capacity management and planning for the most complex and critical systems

  • Provide technical support in the evaluation of prime object names, data elements, and other objects

  • Recommend appropriate procedure, query or package changes and optimizations to ensure and improve system performance and reliability

  • Study system requirements to determine proper server installation methods

  • Utilize system software to monitor the performance of system files; manages system data to maintain performance efficiencies




Experience:


  • 7 - 9 years related experience




Education:


  • Bachelor’s degree in a related area or equivalent experience (4 years)




Certifications:


  • Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level 2 within 6 months of the date of hire




Security Clearance:


  • Current Top Secret Clearance with SCI Eligibility

  • Eligibility for access to Special Access Program Information

  • Willingness to submit to a Counterintelligence polygraph

Arthur 2
Physical Security-Information Assurance Specialist 118-066
Kirtland AFB, NM
Immediate
01/17/2023

Physical Security-Information Assurance Specialist:



This position provides physical security (PS) and information assurance (IA) support for collateral, SCI and SAP systems in accordance with JSIG and other DoD and national guidance for facilities with internal networks and guest systems.




Performance may include:


  • Responsible to the Chief of Security for ensuring compliance with DCID and JSIG physical security and IA requirements and maintaining accreditation documentation

  • Conduct or manage physical and technical security (TEMPEST/TSCM) actions and procedures

  • Conduct preconstruction reviews and makes recommendations for compliance with guidance for construction, expansion and modifications of facilities

  • Assist the Information Assurance Manager  with implementation of the information assurance program

  • Author, review and maintain Certification and Accreditation documentation

  • Assist with enforcement of personnel security controls for visitors and un-cleared personnel requiring entry to the facility

  • Enforce physical security controls of electronic devices and prohibited items; conduct entry/exit inspections

  • Identify IA and physical security vulnerabilities and ensure JAFAN 6/9 compliance

  • Conduct periodic IA & PS self-inspections and implement corrective actions

  • Review, track and conduct IA new user and refresher training

  • Implement local media control policies and procedures




Experience:


  • 5 - 7 years related experience




Education:


  • Bachelor’s degree in a related area or equivalent experience (4 years)




Certifications:


  • Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level 1 within 6 months of the date of hire




Security Clearance:


  • Current Top Secret Clearance with SCI Eligibility

  • Eligibility for access to Special Access Program Information

  • Willingness to submit to a Counterintelligence polygraph

Arthur 2
Physical Security-Information Assurance Specialist 118-065
Kirtland AFB, NM
Immediate
01/17/2023

Physical Security-Information Assurance Specialist:



This position provides physical security (PS) and information assurance (IA) support for collateral, SCI and SAP systems in accordance with JSIG and other DoD and national guidance for facilities with internal networks and guest systems.




Performance may include:


  • Responsible to the Chief of Security for ensuring compliance with DCID and JSIG physical security and IA requirements and maintaining accreditation documentation

  • Conduct or manage physical and technical security (TEMPEST/TSCM) actions and procedures

  • Conduct preconstruction reviews and makes recommendations for compliance with guidance for construction, expansion and modifications of facilities

  • Assist the Information Assurance Manager  with implementation of the information assurance program

  • Author, review and maintain Certification and Accreditation documentation

  • Assist with enforcement of personnel security controls for visitors and un-cleared personnel requiring entry to the facility

  • Enforce physical security controls of electronic devices and prohibited items; conduct entry/exit inspections

  • Identify IA and physical security vulnerabilities and ensure JAFAN 6/9 compliance

  • Conduct periodic IA & PS self-inspections and implement corrective actions

  • Review, track and conduct IA new user and refresher training

  • Implement local media control policies and procedures




Experience:


  • 5 - 7 years related experience




Education:


  • Bachelor’s degree in a related area or equivalent experience (4 years)




Certifications:


  • Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level 1 within 6 months of the date of hire




Security Clearance:


  • Current Top Secret Clearance with SCI Eligibility

  • Eligibility for access to Special Access Program Information

  • Willingness to submit to a Counterintelligence polygraph


Arthur 2
Information Technology-Assurance Specialist I 118-064
Kirtland AFB, NM
Immediate
01/17/2023

Information Technology-Assurance Specialist I:



The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts.  The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.




Performance shall include:


  • Establish complex operational software configuration controls and system interfaces for computer system(s) assigned

  • Maintain file servers, Firewalls, network access, Security Monitoring Systems and system documentation as required

  • Analyze and troubleshoot system anomalies to ensure optimum equipment performance

  • Prepare system for operational use and support operational tests

  • Review, prepare, and update authorization packages

  • Notify customer when changes occur that might affect authorization accreditation

  • Conduct cybersecurity portion of the self-inspection’s checklist

  • Review and provide technical and cyber security coordination on all Bodies of Evidence that make-up the authorization package

  • Identify any and all vulnerabilities and implement countermeasures

  • Ensure information systems and network appliances are operated, maintained, and disposed of in accordance with security policies and practices

  • Perform Video-Teleconferencing VTC System Administration, Scheduling, & Configuration

  • Provide External Information System(s) Client Support

  • Perform account creations, changes, & deletions on multiple authorization boundaries

  • Perform Help Desk & troubleshooting activities

  • Perform Hardware/Software System Configuration, upgrades and modifications

  • Perform system and network appliance patching activities

  • Provide Government-Issued Laptop Support

  • Assist in Media Control & Accountability activities

  • Perform COMSEC account/equipment management activities




Experience:


  • 2 - 5 years related experience

  • Prior performance in roles such as System or Network Administrator




Education:


  • Bachelor’s degree or equivalent experience (4 years)




Certifications:


  • Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level I or Information Assurance Manager I within 6 months of the date of hire.




Security Clearance:


  • Current Top Secret Clearance with SCI Eligibility

  • Eligibility for access to Special Access Program Information

  • Willingness to submit to a Counterintelligence polygraph




Other Requirements:


  • Thorough knowledge of Microsoft Windows 2012R2 Server, Microsoft Exchange Server 2010/2016, Microsoft Windows 7/10 operating systems (OS) administration and associated hardware

  • Working knowledge of Local Area Network (LAN) and Wide Area Network (WAN) technologies and data backup technologies to include communication security (COMSEC) integration

  • Working knowledge of Risk Management Framework, Common Criteria, and System Security Policy as they relate to Assessments and Authorizations

  • Working knowledge and current relevant experience with PL2 systems

  • Must be able to regularly lift up to 50 lbs

Arthur 2
Information Technology-Assurance Specialist I 118-063
Kirtland AFB, NM
Immediate
01/17/2023

Information Technology-Assurance Specialist I:



The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts.  The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.




Performance shall include:


  • Establish complex operational software configuration controls and system interfaces for computer system(s) assigned

  • Maintain file servers, Firewalls, network access, Security Monitoring Systems and system documentation as required

  • Analyze and troubleshoot system anomalies to ensure optimum equipment performance

  • Prepare system for operational use and support operational tests

  • Review, prepare, and update authorization packages

  • Notify customer when changes occur that might affect authorization accreditation

  • Conduct cybersecurity portion of the self-inspection’s checklist

  • Review and provide technical and cyber security coordination on all Bodies of Evidence that make-up the authorization package

  • Identify any and all vulnerabilities and implement countermeasures

  • Ensure information systems and network appliances are operated, maintained, and disposed of in accordance with security policies and practices

  • Perform Video-Teleconferencing VTC System Administration, Scheduling, & Configuration

  • Provide External Information System(s) Client Support

  • Perform account creations, changes, & deletions on multiple authorization boundaries

  • Perform Help Desk & troubleshooting activities

  • Perform Hardware/Software System Configuration, upgrades and modifications

  • Perform system and network appliance patching activities

  • Provide Government-Issued Laptop Support

  • Assist in Media Control & Accountability activities

  • Perform COMSEC account/equipment management activities




Experience:


  • 2 - 5 years related experience

  • Prior performance in roles such as System or Network Administrator




Education:


  • Bachelor’s degree or equivalent experience (4 years)




Certifications:


  • Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level I or Information Assurance Manager I within 6 months of the date of hire.




Security Clearance


  • Current Top Secret Clearance with SCI Eligibility

  • Eligibility for access to Special Access Program Information

  • Willingness to submit to a Counterintelligence polygraph




Other Requirements:


  • Thorough knowledge of Microsoft Windows 2012R2 Server, Microsoft Exchange Server 2010/2016, Microsoft Windows 7/10 operating systems (OS) administration and associated hardware

  • Working knowledge of Local Area Network (LAN) and Wide Area Network (WAN) technologies and data backup technologies to include communication security (COMSEC) integration

  • Working knowledge of Risk Management Framework, Common Criteria, and System Security Policy as they relate to Assessments and Authorizations

  • Working knowledge and current relevant experience with PL2 systems

  • Must be able to regularly lift up to 50 lbs


Arthur 2
Information Systems Security Manager (ISSM) II 118-062
Kirtland AFB, NM
Immediate
01/17/2023

Information Systems Security Manager (ISSM) II:



The ISSM’s primary function serves as a principal advisor on all matters, technical and otherwise, involving the security of information systems under their purview.  Primary support will be working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense, and Military Compartment efforts.  The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.




Performance shall include:


  • Perform oversight of the development, implementation and evaluation of information system security program policy; special emphasis placed upon integration of existing SAP network infrastructures

  • Develop and oversee operational information systems security implementation policy and guidelines of network security, based upon the Risk Management Framework (RMF) with emphasize on Joint Special Access Program Implementation Guide (JSIG) authorization process

  • Advise customer on Risk Management Framework (RMF) assessment and authorization issues

  • Perform risk assessments and make recommendations to DoD agency customers

  • Advise government program managers on security testing methodologies and processes

  • Evaluate authorization documentation and provide written recommendations for authorization to government PM’s

  • Develop and maintain a formal Information Systems Security Program

  • Ensure that all IAOs, network administrators, and other cyber security personnel receive the necessary technical and security training to carry out their duties

  • Develop, review, endorse, and recommend action by the AO or DAO of system assessment documentation

  • Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media

  • Develop and execute security assessment plans that include verification that the features and assurances required for each protection level functioning

  • Maintain a and/or applicable repository for all system authorization documentation and modifications

  • Develop policies and procedures for responding to security incidents, to include investigating and reporting security violations and incidents

  • Ensure proper protection or corrective measures have been taken when an incident or vulnerability has been discovered within a system

  • Ensure that data ownership and responsibilities are established for each authorization boundary, to include accountability, access rights, and special handling requirements

  • Ensure development and implementation of an information security education, training, and awareness program, to include attending, monitoring, and presenting local cyber security training.

  • Evaluate threats and vulnerabilities to ascertain whether additional safeguards are needed

  • Assess changes in the system, its environment, and operational needs that could affect the authorization

  • Ensure that authorization is accomplished a valid Authorization determination has been given for all authorization boundaries under your purview

  • Review AIS assessment plans

  • Coordinate with PSO or cognizant security official on approval of external information systems (e.g., guest systems, interconnected system with another organization)

  • Conduct periodic assessments of the security posture of the authorization boundaries

  • Institute and implement a Configuration Control Board (CCB) charter

  • Ensure configuration management (CM) for security-relevant changes to software, hardware, and firmware and that they are properly documented

  • Ensure periodic testing is conducted to evaluate the security posture of IS by employing various intrusion/attack detection and monitoring tools (shared responsibility with ISSOs)

  • Ensure that system recovery and reconstitution processes developed and monitored to ensure that the authorization boundary can be recovered based on its availability level determination

  • Ensure all authorization documentation is current and accessible to properly authorized individuals

  • Ensure that system security requirements are addressed during all phases of the system life cycle

  • Participate in self-inspections

  • Periodically review system security to accommodate changes to policy or technology

  • Coordinate all technical security issues outside of area of expertise or responsibility with ISSE

  • Provide expert research and analysis in support of expanding programs and area of responsibility as it pertains to cyber security and information technology activities

  • Develop Assured File Transfers (AFT) on accordance with the JSIG

  • Provide leadership, mentoring, and quality assurance for Cyber Security and Information Technology team members




Experience:


  • 7 - 9 years related experience

  • Prior performance in roles such as ISSO or ISSM




Education:


  • Bachelor’s degree or equivalent experience (4 years)




Certifications:


  • Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level 2 or Information Assurance Manager Level 2 within 6 months of the date of hire




Security Clearance:


  • Current Top Secret Clearance with SCI Eligibility

  • Eligibility for access to Special Access Program Information

  • Willingness to submit to a Counterintelligence polygraph




Other Requirements:


  • Must be able to regularly lift up to 50 lbs

Arthur 2
Program Security Representative I 118-061
Bolling AFB, Washington DC
Immediate
01/17/2023

Program Security Representative I:



The Program Security Representative’s primary function is to provide multi-discipline security support for one or more of the customer’s Special Access Programs (SAPs).  The position will provide “day-to-day” multi-discipline analysis for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.




Performance shall include:


  • Ensure strict adherence to the provisions of the NISPOM, its Supplement, the DoD Overprint, DCID, ICD, and SAP policy

  • Assist in developing and executing approved policies and procedures for safeguarding Special Access Program (SAP), Sensitive Compartmented Information (SCI) and collateral data in support of US military operations

  • Provide day-to-day security support that includes continuous assessment of procedures to identify shortfalls and provide appropriate recommendations for revising and improving security policies, procedures, and systems

  • Identify vulnerabilities, threats, and risks to test, training, and operational activities

  • Assist in developing, implementing, and training the Operations Security program

  • Assist in providing contractor and subordinate facility assistance and oversight

  • Brief all levels of personnel, both in the government and senior civilian services, on a variety of security related topics

  • Conduct and document SAP facility compliance reviews, follow-on facility reviews, and facility close-outs

  • Monitor, report and track all corrective actions resulting from compliance reviews

  • Ensure timely notification of pertinent security matters to program technical and management staff

  • Conduct exploration of any loss, compromise, or suspected compromise of classified and/or sensitive information, including conducting preliminary inquiries and generating damage assessments resulting from the loss of classified information.

  • Coordinate with SAP security personnel to ensure lessons learned are incorporated into the curriculum for the SAP security education & awareness program




Experience:


  • 5 - 7 years related experience

  • Security Fundamentals Professional Certification (SFPC) counts towards 3 years of experience

  • Special Program Security Certification (SPSC) counts towards 5 years of experience

  • Maximum equivalent experience for SPED Certifications is no more than 5 years




Education:


  • Bachelor’s degree in a related area or equivalent experience (4 years)




Security Clearance:


  • Current Top Secret Clearance with SCI Eligibility

  • Eligibility for access to Special Access Program Information

  • Willingness to submit to a Counterintelligence polygraph

Arthur 2
Information Technology-Assurance Specialist II 118-060
Hurlburt Field, FL
Immediate
01/17/2023

Information Technology-Assurance Specialist II:



The IT/IA primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts.  The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. 




Performance shall include:


  • Establish complex operational software configuration controls and system interfaces for computer system(s) assigned

  • Maintain file servers, Firewalls, network access, Security Monitoring Systems and system documentation as required

  • Analyze and troubleshoot system anomalies to ensure optimum equipment performance

  • Prepare system for operational use and support operational tests

  • Review, prepare, and update authorization packages

  • Notify customer when changes occur that might affect authorization accreditation

  • Conduct cybersecurity portion of the self-inspection’s checklist

  • Review and provide technical and cyber security coordination on all Bodies of Evidence that make-up the authorization package

  • Identify any and all vulnerabilities and implement countermeasures

  • Ensure information systems and network appliances are operated, maintained, and disposed of in accordance with security policies and practices

  • Perform Video-Teleconferencing VTC System Administration, Scheduling, & Configuration

  • Provide External Information System(s) Client Support

  • Perform account creations, changes, & deletions on multiple authorization boundaries

  • Perform Help Desk & troubleshooting activities

  • Perform Hardware/Software System Configuration, upgrades and modifications

  • Perform system and network appliance patching activities

  • Provide Government-Issued Laptop Support

  • Assist in Media Control & Accountability activities

  • Perform COMSEC account/equipment management activities




Experience:


  • 5-7  years related experience

  • Prior performance in roles such as System, Network Administrator or Information Technology/Assurance Specialists




Education:


  • Bachelor’s degree or equivalent experience (4 years)




Certifications:


  • Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level II or Information Assurance Manager II within 6 months of the date of hire




Security Clearance


  • Current Top Secret Clearance with SCI Eligibility

  • Eligibility for access to Special Access Program Information

  • Willingness to submit to a Counterintelligence polygraph




Other Requirements:


  • Thorough knowledge of Microsoft Windows 2012R2 Server, Microsoft Exchange Server 2010/2016, Microsoft Windows 7/10 operating systems (OS) administration and associated hardware.

  • Working knowledge of Local Area Network (LAN) and Wide Area Network (WAN) technologies and data backup technologies to include communication security (COMSEC) integration

  • Working knowledge of Risk Management Framework, SCI Information Systems Security Standards, Common Criteria, and System Security Policy as they relate to Assessment and Authorizations

  • Working knowledge and current relevant experience with PL2 systems; experience with PL3 & PL4 cross domain solutions is desired

  • Must be able to regularly lift up to 50 lbs


Arthur 2
Network-System Administrator II 118-059
Hanscom AFB, MA
Immediate
01/17/2023

Network-System Administrator II:



The primary function will be to organize, install, and support government organization’s computer systems, including local area networks (LANs), wide area networks (WANs), network segments, intranets, and other data communication systems. This will also include helping architect, design and analyze network models. It will require participation in decisions about buying future hardware or software to upgrade organization’s infrastructure. This position might be called upon to provide technical support to computer users to help solve users’ problems. This position will support activities within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.




Performance shall include:


  • Ability to operate under minimal supervision

  • Execute day to day management and operations of systems and networks

  • Manage COTS & GOTS products to collect, display and remediate a variety of automated system security and system operations/performance functions and metrics

  • Follow Operations and Maintenance (O&M) checklists to maintain the service (daily, weekly, monthly, yearly O&M checklists); build Tactics, Techniques and Processes (TTPs) and Standard Operating Processes (SOPs) associated with service checklists

  • Operate monitoring tools/capabilities with the enterprise security information and event management (SIEM) and create/tailor complex event alarms/rules and summary reports

  • Assist in analyzing technical risk, upon request, of emerging cybersecurity tools and processes

  • Work as part of a security incident response team as needed

  • Working technical competency in one or more of the following supported platforms: Microsoft Windows Server, Red Hat Enterprise Linux servers, MS Hyper-V/VMWare/ESx/Xen Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems, forensic analysis/vulnerability assessment, Group Policy management and configuration, Scripting, BMC Footprints, WSUS, , Lumension, Bitlocker, SQL Server 2012, TomCat, IIS, Windows Server 2012r2/2016, Win 10, Red Hat 6.5, Microsoft Office

  • Toolkits, SEIMs, Logrhythm, ACAS/Nessus/SCAP, mandatory/role-based access control concepts (e. g. SE Linux extensions to RHEL, PitBull, AppArmor, and Sentris) , video teleconferencing/VOIP, Oracle/MS SQL database security, and Apache/IIS Web server security




Experience:


  • 3 - 5 years related experience




Education:


  • Bachelor’s degree in a related area or equivalent experience (4 years)




Certifications:


  • Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level II within 6 months of the date of hire




Security Clearance


  • Current Top Secret Clearance with SCI Eligibility

  • Eligibility for access to Special Access Program Information

  • Willingness to submit to a Counterintelligence polygraph




Other Requirements:


  • Thorough knowledge of Microsoft Windows desktop and server operating systems, Microsoft Exchange Server, and as needed RHEL operating systems administration and associated hardware

  • Working knowledge of CISCO network and switching and virtualization technologies

  • Working knowledge of Local Area Network (LAN) and Wide Area Network (WAN) technologies and data backup technologies

  • Working knowledge communication security (COMSEC) policies and integration

  • Working knowledge of Risk Management Framework, Common Criteria, and System Security Policy as they relate to assessments and authorization

  • Working knowledge and current relevant experience with PL2 and PL3 network environments/systems

  • Experience providing technical support in a customer service role

  • Experience applying industry standards and best practices in an enterprise-level Windows system environment. 

  • Experience solving technical problems quickly and identifying opportunities to automate repetitive processes. 

  • Working knowledge of WSUS and/or YUM patch deployment methodologies

  • Must be familiar with DoD policy as it applies to implementing and executing system and network administration

  • Must be able to regularly lift up to 50 lbs

Arthur 2
Activity Security Representative III 118-058
Hanscom AFB, MA
Immediate
01/17/2023

Activity Security Representative III:



The Activity Security Representative’s primary function is to provide multi-disciplined security support to a customer’s facility and organization.  The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.




Performance shall include:


  • Classification reviews of inbound and outbound correspondence

  • Assist in the maintenance of a document accountability database and associated correspondence

  • Processing inbound and outbound classified mail and receipt records

  • Perform destruction of classified materials

  • Process magnetic media for accountability

  • Reproduction support for classified materials

  • Maintain various daily logs for a variety of administrative functions associated with document control

  • Assist in the processing of inbound data and outbound data transfer files

  • Transfer electronic data files to internal customers

  • Maintain an extensive customer database point of contact listing

  • Assist with researching, processing, filing, and maintaining inbound and outbound visit notices

  • Escort facility visitors and maintains associated logs

  • Assist in the preparation of facility access control badges

  • Conduct entry and exit inspections

  • Assist in the maintenance of facility access control entry systems, to include visitor control

  • Perform data entry to the Personnel Access Security System database and maintain all customer sponsored billets and quota information

  • Assist in maintaining personnel security files for all personnel of the supported element

  • Follow and enforce the customer’s Standard Operating Procedures

  • Provide support for the security awareness and education programs

  • Perform miscellaneous administrative support functions as directed by the contractor site lead and/or the Senior Security Representative

  • Review, track, and monitor security clearance processing activities with appropriate government personnel to achieve appropriate clearance actions

  • Participate in Air Force SAP security compliance inspections of government organizations and industry

  • Implement Top Secret Control for accountable material and associated correspondence

  • Prepare and/or process inbound and outbound classified mail, faxes, courier packages and receipts

  • Prepare, process, and/or review Program Access Request (PARs) for accuracy and access eligibility

  • Execute Special Access Program Nomination Process Questionnaires

  • Conduct Defense Central Index of Investigations (DCII), Joint Personnel Access System (JPAS), and SAPNP reviews of candidates being submitted for SAP access

  • Perform data entry and record checks in the Air Force Access Data System (AFADS) and maintains all customer sponsored personnel access information current

  • Perform indoctrinations

  • Provide leadership, mentoring, and quality assurance for Team Members




Experience:


  • 5 - 7  years related experience

  • Security Fundamentals Professional Certification (SFPC) counts towards 3 years of experience

  • Special Program Security Certification (SPSC) counts towards 5 years of experience

  • Maximum equivalent experience for SPED Certifications is no more than 5 years




Education:


  • Bachelor’s degree or equivalent experience (4 years)




Certifications:


  • Must complete the DoD SAPCO approved SAPNP training (if performing personnel security functions)




Security Clearance:


  • Current Top Secret Clearance with SCI Eligibility

  • Eligibility for access to Special Access Program Information

  • Willingness to submit to a Counterintelligence polygraph

Arthur 2
Program Security Representative I 118-057
Hanscom AFB, MA
Immediate
01/17/2023

Program Security Representative I:



The Program Security Representative’s primary function is to provide multi-discipline security support for one or more of the customer’s Special Access Programs (SAPs).  The position will provide “day-to-day” multi-discipline analysis for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.




Performance shall include:


  • Ensure strict adherence to the provisions of the NISPOM, its Supplement, the DoD Overprint, DCID, ICD, and SAP policy

  • Assist in developing and executing approved policies and procedures for safeguarding Special Access Program (SAP), Sensitive Compartmented Information (SCI) and collateral data in support of US military operations

  • Provide day-to-day security support that includes continuous assessment of procedures to identify shortfalls and provide appropriate recommendations for revising and improving security policies, procedures, and systems

  • Identify vulnerabilities, threats, and risks to test, training, and operational activities

  • Assist in developing, implementing, and training the Operations Security program

  • Assist in providing contractor and subordinate facility assistance and oversight

  • Brief all levels of personnel, both in the government and senior civilian services, on a variety of security related topics

  • Conduct and document SAP facility compliance reviews, follow-on facility reviews, and facility close-outs

  • Monitor, report and track all corrective actions resulting from compliance reviews

  • Ensure timely notification of pertinent security matters to program technical and management staff

  • Conduct exploration of any loss, compromise, or suspected compromise of classified and/or sensitive information, including conducting preliminary inquiries and generating damage assessments resulting from the loss of classified information.

  • Coordinate with SAP security personnel to ensure lessons learned are incorporated into the curriculum for the SAP security education & awareness program




Experience:


  • 5 - 7 years related experience

  • Security Fundamentals Professional Certification (SFPC) counts towards 3 years of experience

  • Special Program Security Certification (SPSC) counts towards 5 years of experience

  • Maximum equivalent experience for SPED Certifications is no more than 5 years




Education:


  • Bachelor’s degree in a related area or equivalent experience (4 years)




Security Clearance:


  • Current Top Secret Clearance with SCI Eligibility

  • Eligibility for access to Special Access Program Information

  • Willingness to submit to a Counterintelligence polygraph

Arthur 2
Network-System Administrator III 118-056
Hanscom AFB, MA
Immediate
01/17/2023

Network-System Administrator III:



The primary function will be to organize, install, and support government organization’s computer systems, including local area networks (LANs), wide area networks (WANs), network segments, intranets, and other data communication systems. This will also include helping architect, design and analyze network models. It will require participation in decisions about buying future hardware or software to upgrade organization’s infrastructure. This position might be called upon to provide technical support to computer users to help solve users’ problems. This position will support activities within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.




Performance shall include:


  • Able to perform self-sustaining and work with little to no oversight

  • Lead IT ops team on day to day management and operations of Networks and implement capabilities vetted through Cybersecurity, ISSE and higher headquarters to maintain JSIG/RMF Authority to Operate and maintain Continuous Monitoring tools and processes

  • Manage COTS & GOTS products to collect, display and remediate a variety of automated system security and system operations/performance functions and metrics.

  • Assist during security assessments of servers/network devices/security appliances

  • Assist during security assessments with regard to accuracy and efficiency

  • Assist with Creation of operational Operations and Maintenance (O&M) checklists to maintain the service (daily, weekly, monthly, yearly O&M checklists); build Tactics, Techniques and Processes (TTPs) and Standard Operating Processes (SOPs) associated with service checklists

  • Manage and operate monitoring tools/capabilities with the enterprise security information and event management (SIEM) and create/tailor complex event alarms/rules and summary reports

  • Execute cybersecurity operations procedures for day to day network management, operations and maintenance

  • Monitor/analyze output of cybersecurity related tools for reportable security incidents and residual risk

  • Assist in analyzing technical risk, upon request, of emerging cybersecurity tools and processes

  • Work as part of a security incident response team as needed

  • Assist ISSM/ISSO/ISSE  with the Integration/Development new techniques to improve Confidentiality, Integrity, and Availability for networks/systems operating at various classification levels.

  • Advanced technical competency in one or more of the following supported platforms: Microsoft Windows Server, Active Directory Red Hat Enterprise Linux servers, MS Hyper-V/VMWare/ESx/Xen Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems, forensic analysis/vulnerability assessment, Group Policy management and configuration, Scripting, BMC Footprints, WSUS, , Lumension, Bitlocker, SQL Server 2012, TomCat, IIS, Windows Server 2012r2/2016, Win 10, Red Hat 6.5, Microsoft Office.

  • Toolkits, SEIMs, Logrhythm, ACAS/Nessus/SCAP, mandatory/role-based access control concepts (e. g. SE Linux extensions to RHEL, PitBull, AppArmor, and Sentris) , video teleconferencing/VOIP, Oracle/MS SQL database security, and Apache/IIS Web server security




Experience:


  • 5 - 7 years related experience




Education:


  • Bachelor’s degree in a related area or equivalent experience (4 years)




Certifications:


  • Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level III within 6 months of the date of hire




Security Clearance:


  • Current Top Secret Clearance with SCI Eligibility

  • Eligibility for access to Special Access Program Information

  • Willingness to submit to a Counterintelligence polygraph




Other Requirements:


  • Thorough knowledge of Microsoft Windows desktop and server operating systems, Microsoft Exchange Server, and as needed RHEL operating systems administration and associated hardware

  • Experience in effective communication and collaborating in a high performance team environment.

  • Group Policy design and configuration

  • Working knowledge of CISCO network and switching and virtualization technologies

  • Working knowledge of virtualization as it applies to users environments, operating systems, and network appliances

  • Working knowledge of Local Area Network (LAN) and Wide Area Network (WAN) technologies and data backup technologies

  • Working knowledge communication security (COMSEC) policies and integration

  • Working knowledge of Risk Management Framework, Common Criteria, and System Security Policy as they relate to assessments and authorization

  • Working knowledge and current relevant experience with PL2, PL3, and PL4 network environments/systems

  • Working knowledge of WSUS and/or YUM patch deployment methodologies

  • Must be familiar with DoD policy as it applies to implementing and executing system and network administration

  • Working knowledge of Risk Management Framework and how to apply it to network/information system environments

  • Must be able to regularly lift up to 50 lbs

Arthur 2
Information Systems Security Manager (ISSM) II 118-055
Hanscom AFB, MA
Immediate
01/17/2023

Information Systems Security Manager (ISSM) II:



The ISSM’s primary function serves as a principal advisor on all matters, technical and otherwise, involving the security of information systems under their purview.  Primary support will be working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense, and Military Compartment efforts.  The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.




Performance shall include:


  • Perform oversight of the development, implementation and evaluation of information system security program policy; special emphasis placed upon integration of existing SAP network infrastructures

  • Develop and oversee operational information systems security implementation policy and guidelines of network security, based upon the Risk Management Framework (RMF) with emphasize on Joint Special Access Program Implementation Guide (JSIG) authorization process

  • Advise customer on Risk Management Framework (RMF) assessment and authorization issues

  • Perform risk assessments and make recommendations to DoD agency customers

  • Advise government program managers on security testing methodologies and processes

  • Evaluate authorization documentation and provide written recommendations for authorization to government PM’s

  • Develop and maintain a formal Information Systems Security Program

  • Ensure that all IAOs, network administrators, and other cyber security personnel receive the necessary technical and security training to carry out their duties

  • Develop, review, endorse, and recommend action by the AO or DAO of system assessment documentation

  • Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media

  • Develop and execute security assessment plans that include verification that the features and assurances required for each protection level functioning

  • Maintain a and/or applicable repository for all system authorization documentation and modifications

  • Develop policies and procedures for responding to security incidents, to include investigating and reporting security violations and incidents

  • Ensure proper protection or corrective measures have been taken when an incident or vulnerability has been discovered within a system

  • Ensure that data ownership and responsibilities are established for each authorization boundary, to include accountability, access rights, and special handling requirements

  • Ensure development and implementation of an information security education, training, and awareness program, to include attending, monitoring, and presenting local cyber security training.

  • Evaluate threats and vulnerabilities to ascertain whether additional safeguards are needed

  • Assess changes in the system, its environment, and operational needs that could affect the authorization

  • Ensure that authorization is accomplished a valid Authorization determination has been given for all authorization boundaries under your purview

  • Review AIS assessment plans

  • Coordinate with PSO or cognizant security official on approval of external information systems (e.g., guest systems, interconnected system with another organization)

  • Conduct periodic assessments of the security posture of the authorization boundaries

  • Institute and implement a Configuration Control Board (CCB) charter

  • Ensure configuration management (CM) for security-relevant changes to software, hardware, and firmware and that they are properly documented

  • Ensure periodic testing is conducted to evaluate the security posture of IS by employing various intrusion/attack detection and monitoring tools (shared responsibility with ISSOs)

  • Ensure that system recovery and reconstitution processes developed and monitored to ensure that the authorization boundary can be recovered based on its availability level determination

  • Ensure all authorization documentation is current and accessible to properly authorized individuals

  • Ensure that system security requirements are addressed during all phases of the system life cycle

  • Participate in self-inspections

  • Periodically review system security to accommodate changes to policy or technology

  • Coordinate all technical security issues outside of area of expertise or responsibility with ISSE

  • Provide expert research and analysis in support of expanding programs and area of responsibility as it pertains to cyber security and information technology activities

  • Develop Assured File Transfers (AFT) on accordance with the JSIG

  • Provide leadership, mentoring, and quality assurance for Cyber Security and Information Technology team members




Experience:


  • 7 - 9 years related experience

  • Prior performance in roles such as ISSO or ISSM




Education:


  • Bachelor’s degree or equivalent experience (4 years)




Certifications:


  • Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level 2 or Information Assurance Manager Level 2 within 6 months of the date of hire




Security Clearance:


  • Current Top Secret Clearance with SCI Eligibility

  • Eligibility for access to Special Access Program Information

  • Willingness to submit to a Counterintelligence polygraph




Other Requirements:


  • Must be able to regularly lift up to 50 lbs

Arthur 2
Network-System Administrator III 118-054
Hanscom AFB, MA
Immediate
01/17/2023

Network/System Administrator III:



The primary function will be to organize, install, and support government organization’s computer systems, including local area networks (LANs), wide area networks (WANs), network segments, intranets, and other data communication systems. This will also include helping architect, design and analyze network models. It will require participation in decisions about buying future hardware or software to upgrade organization’s infrastructure. This position might be called upon to provide technical support to computer users to help solve users’ problems. This position will support activities within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.




Performance shall include:


  • Able to perform self-sustaining and work with little to no oversight

  • Lead IT ops team on day to day management and operations of Networks and implement capabilities vetted through Cybersecurity, ISSE and higher headquarters to maintain JSIG/RMF Authority to Operate and maintain Continuous Monitoring tools and processes

  • Manage COTS & GOTS products to collect, display and remediate a variety of automated system security and system operations/performance functions and metrics.

  • Assist during security assessments of servers/network devices/security appliances

  • Assist during security assessments with regard to accuracy and efficiency

  • Assist with Creation of operational Operations and Maintenance (O&M) checklists to maintain the service (daily, weekly, monthly, yearly O&M checklists); build Tactics, Techniques and Processes (TTPs) and Standard Operating Processes (SOPs) associated with service checklists

  • Manage and operate monitoring tools/capabilities with the enterprise security information and event management (SIEM) and create/tailor complex event alarms/rules and summary reports

  • Execute cybersecurity operations procedures for day to day network management, operations and maintenance

  • Monitor/analyze output of cybersecurity related tools for reportable security incidents and residual risk

  • Assist in analyzing technical risk, upon request, of emerging cybersecurity tools and processes

  • Work as part of a security incident response team as needed

  • Assist ISSM/ISSO/ISSE  with the Integration/Development new techniques to improve Confidentiality, Integrity, and Availability for networks/systems operating at various classification levels.

  • Advanced technical competency in one or more of the following supported platforms: Microsoft Windows Server, Active Directory Red Hat Enterprise Linux servers, MS Hyper-V/VMWare/ESx/Xen Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems, forensic analysis/vulnerability assessment, Group Policy management and configuration, Scripting, BMC Footprints, WSUS, , Lumension, Bitlocker, SQL Server 2012, TomCat, IIS, Windows Server 2012r2/2016, Win 10, Red Hat 6.5, Microsoft Office.

  • Toolkits, SEIMs, Logrhythm, ACAS/Nessus/SCAP, mandatory/role-based access control concepts (e. g. SE Linux extensions to RHEL, PitBull, AppArmor, and Sentris) , video teleconferencing/VOIP, Oracle/MS SQL database security, and Apache/IIS Web server security




Experience:


  • 5 - 7 years related experience




Education:


  • Bachelor’s degree in a related area or equivalent experience (4 years)




Certifications:


  • Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level III within 6 months of the date of hire




Security Clearance


  • Current Top Secret Clearance with SCI Eligibility

  • Eligibility for access to Special Access Program Information

  • Willingness to submit to a Counterintelligence polygraph




Other Requirements:


  • Thorough knowledge of Microsoft Windows desktop and server operating systems, Microsoft Exchange Server, and as needed RHEL operating systems administration and associated hardware

  • Experience in effective communication and collaborating in a high performance team environment.

  • Group Policy design and configuration

  • Working knowledge of CISCO network and switching and virtualization technologies

  • Working knowledge of virtualization as it applies to users environments, operating systems, and network appliances

  • Working knowledge of Local Area Network (LAN) and Wide Area Network (WAN) technologies and data backup technologies

  • Working knowledge communication security (COMSEC) policies and integration

  • Working knowledge of Risk Management Framework, Common Criteria, and System Security Policy as they relate to assessments and authorization

  • Working knowledge and current relevant experience with PL2, PL3, and PL4 network environments/systems

  • Working knowledge of WSUS and/or YUM patch deployment methodologies

  • Must be familiar with DoD policy as it applies to implementing and executing system and network administration

  • Working knowledge of Risk Management Framework and how to apply it to network/information system environments

  • Must be able to regularly lift up to 50 lbs


Arthur 2
Information Systems Security Officer (ISSO) III 118-053
Hanscom AFB, MA
Immediate
01/17/2023

Information Systems Security Officer (ISSO) III:



The ISSO is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO.  The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is assigned responsibility for the day-to-day security operations of a system.  This also will include physical and environmental protection, personnel security, incident handling, and security training and awareness.  It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configuration management across authorization boundaries.  This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.




Performance shall include:


  • Assist the ISSM in meeting their duties and responsibilities

  • Prepare, review, and update authorization packages

  • Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media

  • Notify ISSM when changes occur that might affect the authorization determination of the information system(s)

  • Conduct periodic reviews of information systems to ensure compliance with the security authorization package

  • Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change

  • Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly

  • Ensure all IS security-related documentation is current and accessible to properly      authorized individuals

  • Ensure audit records are collected, reviewed, and documented (to include any anomalies)

  • Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties

  • Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans

  • Identify cyber security vulnerabilities and assist with the implementation of the countermeasures for them

  • Prepare reports on the status of security safeguards applied to computer systems

  • Perform ISSO duties in support of in-house and external customers

  • Conduct continuous monitoring activities for authorization boundaries under your preview

  • Assist Department of Defense, National Agency and Contractor organizations with the development of assessment and authorization (A&A) efforts




Experience:


  • 5 - 7 years related experience

  • Prior performance in roles such as System, Network Administrator or ISSO




Education:


  • Bachelor’s degree or equivalent experience (4 years)




Certifications:


  • Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level II or Information Assurance Manager II within 6 months of the date of hire.




Security Clearance:


  • Current Top Secret Clearance with SCI Eligibility

  • Eligibility for access to Special Access Program Information

  • Willingness to submit to a Counterintelligence polygraph




Other Requirements:


  • Must be able to regularly lift up to 50 lbs

Arthur 2
Information Systems Security Officer (ISSO) III 118-052
Hanscom AFB, MA
Immediate
01/17/2023

Information Systems Security Officer (ISSO) III:



The ISSO is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO.  The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is assigned responsibility for the day-to-day security operations of a system.  This also will include physical and environmental protection, personnel security, incident handling, and security training and awareness.  It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configuration management across authorization boundaries.  This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.




Performance shall include:


  • Assist the ISSM in meeting their duties and responsibilities

  • Prepare, review, and update authorization packages

  • Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media

  • Notify ISSM when changes occur that might affect the authorization determination of the information system(s)

  • Conduct periodic reviews of information systems to ensure compliance with the security authorization package

  • Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change

  • Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly

  • Ensure all IS security-related documentation is current and accessible to properly      authorized individuals

  • Ensure audit records are collected, reviewed, and documented (to include any anomalies)

  • Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties

  • Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans

  • Identify cyber security vulnerabilities and assist with the implementation of the countermeasures for them

  • Prepare reports on the status of security safeguards applied to computer systems

  • Perform ISSO duties in support of in-house and external customers

  • Conduct continuous monitoring activities for authorization boundaries under your preview

  • Assist Department of Defense, National Agency and Contractor organizations with the development of assessment and authorization (A&A) efforts




Experience:


  • 5 - 7 years related experience

  • Prior performance in roles such as System, Network Administrator or ISSO




Education:


  • Bachelor’s degree or equivalent experience (4 years)




Certifications:


  • Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level II or Information Assurance Manager II within 6 months of the date of hire.




Security Clearance:


  • Current Top Secret Clearance with SCI Eligibility

  • Eligibility for access to Special Access Program Information

  • Willingness to submit to a Counterintelligence polygraph




Other Requirements:


  • Must be able to regularly lift up to 50 lbs

Arthur 2
Information Systems Security Manager (ISSM) I 118-051
Hanscom AFB, MA
Immediate
01/17/2023

Information Systems Security Manager (ISSM) I:



The ISSM’s primary function serves as a principal advisor on all matters, technical and otherwise, involving the security of information systems under their purview.  Primary support will be working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense, and Military Compartment efforts.  The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.




Performance shall include:


  • Perform oversight of the development, implementation and evaluation of information system security program policy; special emphasis placed upon integration of existing SAP network infrastructures

  • Develop and oversee operational information systems security implementation policy and guidelines of network security, based upon the Risk Management Framework (RMF) with emphasize on Joint Special Access Program Implementation Guide (JSIG) authorization process

  • Advise customer on Risk Management Framework (RMF) assessment and authorization issues

  • Perform risk assessments and make recommendations to DoD agency customers

  • Advise government program managers on security testing methodologies and processes

  • Evaluate authorization documentation and provide written recommendations for authorization to government PMs

  • Develop and maintain a formal Information Systems Security Program

  • Ensure that all IAOs, network administrators, and other cyber security personnel receive the necessary technical and security training to carry out their duties

  • Develop, review, endorse, and recommend action by the AO or DAO of system assessment documentation

  • Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media

  • Develop and execute security assessment plans that include verification that the features and assurances required for each protection level functioning

  • Maintain a and/or applicable repository for all system authorization documentation and modifications

  • Institute and implement a Configuration Control Board (CCB) charter

  • Develop policies and procedures for responding to security incidents, to include investigating and reporting security violations and incidents

  • Ensure proper protection or corrective measures have been taken when an incident or vulnerability has been discovered within a system

  • Ensure that data ownership and responsibilities are established for each authorization boundary, to include accountability, access rights, and special handling requirements

  • Ensure development and implementation of an information security education, training, and awareness program, to include attending, monitoring, and presenting local cyber security training.

  • Evaluate threats and vulnerabilities to ascertain whether additional safeguards are needed

  • Assess changes in the system, its environment, and operational needs that could affect the authorization

  • Ensure that authorization is accomplished a valid Authorization determination has been given for all authorization boundaries under your purview

  • Review AIS assessment plans

  • Coordinate with PSO or cognizant security official on approval of external information systems (e.g., guest systems, interconnected system with another organization)

  • Conduct periodic assessments of the security posture of the authorization boundaries

  • Ensure configuration management (CM) for security-relevant changes to software, hardware, and firmware and that they are properly documented

  • Ensure periodic testing is conducted to evaluate the security posture of IS by employing various intrusion/attack detection and monitoring tools (shared responsibility with ISSOs)

  • Ensure that system recovery and reconstitution processes developed and monitored to ensure that the authorization boundary can be recovered based on its availability level determination

  • Ensure all authorization documentation is current and accessible to properly authorized individuals

  • Ensure that system security requirements are addressed during all phases of the system life cycle

  • Develop Assured File Transfers (AFT) on accordance with the JSIG

  • Participate in self-inspections

  • Conduct the duties of the Information System Security Officer (ISSO) if one is not present and/or available




Experience:


  • 5 - 7 years related experience

  • Prior performance in roles such as ISSO or ISSM




Education:


  • Bachelor’s degree in a related area or equivalent experience (4 years)




Certifications:


  • Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level II or Information Assurance Manager Level I within 6 months of the date of hire.




Security Clearance


  • Current Top Secret Clearance with SCI Eligibility

  • Eligibility for access to Special Access Program Information

  • Willingness to submit to a Counterintelligence polygraph




Other Requirements


  • Must having working knowledge of DoD, National and applicable service and agency security policy, manuals and standards.

  • Must be able to regularly lift up-to 50lbs


Arthur 2
Activity Security Representative III 118-050
Hanscom AFB, MA
Immediate
01/17/2023

Activity Security Representative III:



The Activity Security Representative’s primary function is to provide multi-disciplined security support to a customer’s facility and organization.  The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.




Performance shall include:


  • Classification reviews of inbound and outbound correspondence

  • Assist in the maintenance of a document accountability database and associated correspondence

  • Processing inbound and outbound classified mail and receipt records

  • Perform destruction of classified materials

  • Process magnetic media for accountability

  • Reproduction support for classified materials

  • Maintain various daily logs for a variety of administrative functions associated with document control

  • Assist in the processing of inbound data and outbound data transfer files

  • Transfer electronic data files to internal customers

  • Maintain an extensive customer database point of contact listing

  • Assist with researching, processing, filing, and maintaining inbound and outbound visit notices

  • Escort facility visitors and maintains associated logs

  • Assist in the preparation of facility access control badges

  • Conduct entry and exit inspections

  • Assist in the maintenance of facility access control entry systems, to include visitor control

  • Perform data entry to the Personnel Access Security System database and maintain all customer sponsored billets and quota information

  • Assist in maintaining personnel security files for all personnel of the supported element

  • Follow and enforce the customer’s Standard Operating Procedures

  • Provide support for the security awareness and education programs

  • Perform miscellaneous administrative support functions as directed by the contractor site lead and/or the Senior Security Representative

  • Review, track, and monitor security clearance processing activities with appropriate government personnel to achieve appropriate clearance actions

  • Participate in Air Force SAP security compliance inspections of government organizations and industry

  • Implement Top Secret Control for accountable material and associated correspondence

  • Prepare and/or process inbound and outbound classified mail, faxes, courier packages and receipts

  • Prepare, process, and/or review Program Access Request (PARs) for accuracy and access eligibility

  • Execute Special Access Program Nomination Process Questionnaires

  • Conduct Defense Central Index of Investigations (DCII), Joint Personnel Access System (JPAS), and SAPNP reviews of candidates being submitted for SAP access

  • Perform data entry and record checks in the Air Force Access Data System (AFADS) and maintains all customer sponsored personnel access information current

  • Perform indoctrinations

  • Provide leadership, mentoring, and quality assurance for Team Members




Experience:


  • 5 - 7  years related experience

  • Security Fundamentals Professional Certification (SFPC) counts towards 3 years of experience

  • Special Program Security Certification (SPSC) counts towards 5 years of experience

  • Maximum equivalent experience for SPED Certifications is no more than 5 years




Education:


  • Bachelor’s degree or equivalent experience (4 years)




Certifications:


  • Must complete the DoD SAPCO approved SAPNP training (if performing personnel security functions)




Security Clearance:


  • Current Top Secret Clearance with SCI Eligibility

  • Eligibility for access to Special Access Program Information

  • Willingness to submit to a Counterintelligence polygraph

Arthur 2
Activity Security Representative III 118-049
Hanscom AFB, MA
Immediate
01/17/2023

Activity Security Representative III:



The Activity Security Representative’s primary function is to provide multi-disciplined security support to a customer’s facility and organization.  The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.




Performance shall include:


  • Classification reviews of inbound and outbound correspondence

  • Assist in the maintenance of a document accountability database and associated correspondence

  • Processing inbound and outbound classified mail and receipt records

  • Perform destruction of classified materials

  • Process magnetic media for accountability

  • Reproduction support for classified materials

  • Maintain various daily logs for a variety of administrative functions associated with document control

  • Assist in the processing of inbound data and outbound data transfer files

  • Transfer electronic data files to internal customers

  • Maintain an extensive customer database point of contact listing

  • Assist with researching, processing, filing, and maintaining inbound and outbound visit notices

  • Escort facility visitors and maintains associated logs

  • Assist in the preparation of facility access control badges

  • Conduct entry and exit inspections

  • Assist in the maintenance of facility access control entry systems, to include visitor control

  • Perform data entry to the Personnel Access Security System database and maintain all customer sponsored billets and quota information

  • Assist in maintaining personnel security files for all personnel of the supported element

  • Follow and enforce the customer’s Standard Operating Procedures

  • Provide support for the security awareness and education programs

  • Perform miscellaneous administrative support functions as directed by the contractor site lead and/or the Senior Security Representative

  • Review, track, and monitor security clearance processing activities with appropriate government personnel to achieve appropriate clearance actions

  • Participate in Air Force SAP security compliance inspections of government organizations and industry

  • Implement Top Secret Control for accountable material and associated correspondence

  • Prepare and/or process inbound and outbound classified mail, faxes, courier packages and receipts

  • Prepare, process, and/or review Program Access Request (PARs) for accuracy and access eligibility

  • Execute Special Access Program Nomination Process Questionnaires

  • Conduct Defense Central Index of Investigations (DCII), Joint Personnel Access System (JPAS), and SAPNP reviews of candidates being submitted for SAP access

  • Perform data entry and record checks in the Air Force Access Data System (AFADS) and maintains all customer sponsored personnel access information current

  • Perform indoctrinations

  • Provide leadership, mentoring, and quality assurance for Team Members




Experience:


  • 5 - 7  years related experience

  • Security Fundamentals Professional Certification (SFPC) counts towards 3 years of experience

  • Special Program Security Certification (SPSC) counts towards 5 years of experience

  • Maximum equivalent experience for SPED Certifications is no more than 5 years




Education:


  • Bachelor’s degree or equivalent experience (4 years)




Certifications:


  • Must complete the DoD SAPCO approved SAPNP training (if performing personnel security functions)




Security Clearance:


  • Current Top Secret Clearance with SCI Eligibility

  • Eligibility for access to Special Access Program Information

  • Willingness to submit to a Counterintelligence polygraph

Arthur 2
Activity Security Representative III 118-048
Hanscom AFB, MA
Immediate
01/17/2023

Activity Security Representative III:



The Activity Security Representative’s primary function is to provide multi-disciplined security support to a customer’s facility and organization.  The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.




Performance shall include:


  • Classification reviews of inbound and outbound correspondence

  • Assist in the maintenance of a document accountability database and associated correspondence

  • Processing inbound and outbound classified mail and receipt records

  • Perform destruction of classified materials

  • Process magnetic media for accountability

  • Reproduction support for classified materials

  • Maintain various daily logs for a variety of administrative functions associated with document control

  • Assist in the processing of inbound data and outbound data transfer files

  • Transfer electronic data files to internal customers

  • Maintain an extensive customer database point of contact listing

  • Assist with researching, processing, filing, and maintaining inbound and outbound visit notices

  • Escort facility visitors and maintains associated logs

  • Assist in the preparation of facility access control badges

  • Conduct entry and exit inspections

  • Assist in the maintenance of facility access control entry systems, to include visitor control

  • Perform data entry to the Personnel Access Security System database and maintain all customer sponsored billets and quota information

  • Assist in maintaining personnel security files for all personnel of the supported element

  • Follow and enforce the customer’s Standard Operating Procedures

  • Provide support for the security awareness and education programs

  • Perform miscellaneous administrative support functions as directed by the contractor site lead and/or the Senior Security Representative

  • Review, track, and monitor security clearance processing activities with appropriate government personnel to achieve appropriate clearance actions

  • Participate in Air Force SAP security compliance inspections of government organizations and industry

  • Implement Top Secret Control for accountable material and associated correspondence

  • Prepare and/or process inbound and outbound classified mail, faxes, courier packages and receipts

  • Prepare, process, and/or review Program Access Request (PARs) for accuracy and access eligibility

  • Execute Special Access Program Nomination Process Questionnaires

  • Conduct Defense Central Index of Investigations (DCII), Joint Personnel Access System (JPAS), and SAPNP reviews of candidates being submitted for SAP access

  • Perform data entry and record checks in the Air Force Access Data System (AFADS) and maintains all customer sponsored personnel access information current

  • Perform indoctrinations

  • Provide leadership, mentoring, and quality assurance for Team Members




Experience:


  • 5 - 7  years related experience

  • Security Fundamentals Professional Certification (SFPC) counts towards 3 years of experience

  • Special Program Security Certification (SPSC) counts towards 5 years of experience

  • Maximum equivalent experience for SPED Certifications is no more than 5 years




Education:


  • Bachelor’s degree or equivalent experience (4 years)




Certifications:


  • Must complete the DoD SAPCO approved SAPNP training (if performing personnel security functions)




Security Clearance:


  • Current Top Secret Clearance with SCI Eligibility

  • Eligibility for access to Special Access Program Information

  • Willingness to submit to a Counterintelligence polygraph


Arthur 2
Program Security Representative I 118-047
Hanscom AFB, MA
Immediate
01/17/2023

Program Security Representative I:



The Program Security Representative’s primary function is to provide multi-discipline security support for one or more of the customer’s Special Access Programs (SAPs).  The position will provide “day-to-day” multi-discipline analysis for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.




Performance shall include:


  • Ensure strict adherence to the provisions of the NISPOM, its Supplement, the DoD Overprint, DCID, ICD, and SAP policy

  • Assist in developing and executing approved policies and procedures for safeguarding Special Access Program (SAP), Sensitive Compartmented Information (SCI) and collateral data in support of US military operations

  • Provide day-to-day security support that includes continuous assessment of procedures to identify shortfalls and provide appropriate recommendations for revising and improving security policies, procedures, and systems

  • Identify vulnerabilities, threats, and risks to test, training, and operational activities 

  • Assist in developing, implementing, and training the Operations Security program

  • Assist in providing contractor and subordinate facility assistance and oversight

  • Brief all levels of personnel, both in the government and senior civilian services, on a variety of security related topics

  • Conduct and document SAP facility compliance reviews, follow-on facility reviews, and facility close-outs

  • Monitor, report and track all corrective actions resulting from compliance reviews

  • Ensure timely notification of pertinent security matters to program technical and management staff

  • Conduct exploration of any loss, compromise, or suspected compromise of classified and/or sensitive information, including conducting preliminary inquiries and generating damage assessments resulting from the loss of classified information.

  • Coordinate with SAP security personnel to ensure lessons learned are incorporated into the curriculum for the SAP security education & awareness program



Experience:


  • 5 - 7 years related experience

  • Security Fundamentals Professional Certification (SFPC) counts towards 3 years of experience

  • Special Program Security Certification (SPSC) counts towards 5 years of experience

  • Maximum equivalent experience for SPED Certifications is no more than 5 years




Education:


  • Bachelor’s degree in a related area or equivalent experience (4 years)




Security Clearance:


  • Current Top Secret Clearance with SCI Eligibility

  • Eligibility for access to Special Access Program Information

  • Willingness to submit to a Counterintelligence polygraph


Arthur 2
Information Systems Security Officer (ISSO) II 118-046
Wright Patterson AFB, OH
Immediate
01/17/2023

Information Systems Security Officer (ISSO) II:



The ISSO is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO.  The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is assigned responsibility for the day-to-day security operations of a system. This also will include physical and environmental protection, personnel security, incident handling, and security training and awareness.  It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configuration management across authorization boundaries.  This will include assessing the security impact of those changes and making recommendation to the ISSM.  The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts.  The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.




Performance shall include:


  • Assist the ISSM in meeting their duties and responsibilities

  • Prepare, review, and update authorization packages

  • Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media

  • Notify ISSM when changes occur that might affect the authorization determination of the information system(s)

  • Conduct periodic reviews of information systems to ensure compliance with the security authorization package

  • Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change

  • Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly

  • Ensure all IS security-related documentation is current and accessible to properly authorized individuals

  • Ensure audit records are collected, reviewed, and documented (to include any anomalies)

  • Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties

  • Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans

  • Identify cyber security vulnerabilities and assist with the implementation of the countermeasures for them

  • Prepare reports on the status of security safeguards applied to computer systems

  • Perform ISSO duties in support of in-house and external customers

  • Conduct security impact analysis activities and provide to the ISSM on all configuration management changes to the authorization boundaries




Experience:


  • 2 - 5 years related experience

  • Prior performance in roles such as System, Network Administrator or ISSO




Education:


  • Bachelor’s degree or equivalent experience (4 years)




Certifications:


  • Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level II or Information Assurance Manager II within 6 months of the date of hire




Security Clearance:


  • Current Top Secret Clearance with SCI Eligibility

  • Eligibility for access to Special Access Program Information

  • Willingness to submit to a Counterintelligence polygraph




Other Requirements


  • Must be able to regularly lift up to 50 lbs


Arthur 2
Activity Security Representative III 118-045
Wright Patterson AFB, OH
Immediate
01/17/2023

Activity Security Representative III:



The Activity Security Representative’s primary function is to provide multi-disciplined security support to a customer’s facility and organization.  The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.




Performance shall include:


  • Classification reviews of inbound and outbound correspondence

  • Assist in the maintenance of a document accountability database and associated correspondence

  • Processing inbound and outbound classified mail and receipt records

  • Perform destruction of classified materials

  • Process magnetic media for accountability

  • Reproduction support for classified materials

  • Maintain various daily logs for a variety of administrative functions associated with document control

  • Assist in the processing of inbound data and outbound data transfer files

  • Transfer electronic data files to internal customers

  • Maintain an extensive customer database point of contact listing

  • Assist with researching, processing, filing, and maintaining inbound and outbound visit notices

  • Escort facility visitors and maintains associated logs

  • Assist in the preparation of facility access control badges

  • Conduct entry and exit inspections

  • Assist in the maintenance of facility access control entry systems, to include visitor control

  • Perform data entry to the Personnel Access Security System database and maintain all customer sponsored billets and quota information

  • Assist in maintaining personnel security files for all personnel of the supported element

  • Follow and enforce the customer’s Standard Operating Procedures

  • Provide support for the security awareness and education programs

  • Perform miscellaneous administrative support functions as directed by the contractor site lead and/or the Senior Security Representative

  • Review, track, and monitor security clearance processing activities with appropriate government personnel to achieve appropriate clearance actions

  • Participate in Air Force SAP security compliance inspections of government organizations and industry

  • Implement Top Secret Control for accountable material and associated correspondence

  • Prepare and/or process inbound and outbound classified mail, faxes, courier packages and receipts

  • Prepare, process, and/or review Program Access Request (PARs) for accuracy and access eligibility

  • Execute Special Access Program Nomination Process Questionnaires

  • Conduct Defense Central Index of Investigations (DCII), Joint Personnel Access System (JPAS), and SAPNP reviews of candidates being submitted for SAP access

  • Perform data entry and record checks in the Air Force Access Data System (AFADS) and maintains all customer sponsored personnel access information current

  • Perform indoctrinations

  • Provide leadership, mentoring, and quality assurance for Team Members




Experience:


  • 5 - 7  years related experience

  • Security Fundamentals Professional Certification (SFPC) counts towards 3 years of experience

  • Special Program Security Certification (SPSC) counts towards 5 years of experience

  • Maximum equivalent experience for SPED Certifications is no more than 5 years




Education:


  • Bachelor’s degree or equivalent experience (4 years)




Certifications:


  • Must complete the DoD SAPCO approved SAPNP training (if performing personnel security functions)




Security Clearance:


  • Current Top Secret Clearance with SCI Eligibility

  • Eligibility for access to Special Access Program Information

  • Willingness to submit to a Counterintelligence polygraph


Arthur 2
Activity Security Representative II 118-044
Wright Patterson AFB, OH
Immediate
01/17/2023

Activity Security Representative II:



The Activity Security Representative’s primary function is to provide multi-disciplined security support to a customer’s facility and organization.  The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.




Performance shall include:


  • Classification reviews of inbound and outbound correspondence

  • Assist in the maintenance of a document accountability database and associated correspondence

  • Processing inbound and outbound classified mail and receipt records

  • Perform destruction of classified materials

  • Process magnetic media for accountability

  • Reproduction support for classified materials

  • Maintain various daily logs for a variety of administrative functions associated with document control

  • Assist in the processing of inbound data and outbound data transfer files

  • Transfer electronic data files to internal customers

  • Maintain an extensive customer database point of contact listing

  • Assist with researching, processing, filing, and maintaining inbound and outbound visit notices

  • Escort facility visitors and maintains associated logs

  • Assist in the preparation of facility access control badges

  • Conduct entry and exit inspections

  • Assist in the maintenance of facility access control entry systems, to include visitor control

  • Perform data entry to the Personnel Access Security System database and maintain all customer sponsored billets and quota information

  • Assist in maintaining personnel security files for all personnel of the supported element

  • Follow and enforce the customer’s Standard Operating Procedures

  • Provide support for the security awareness and education programs

  • Perform miscellaneous administrative support functions as directed by the contractor site lead and/or the Senior Security Representative

  • Review, track, and monitor security clearance processing activities with appropriate government personnel to achieve appropriate clearance actions

  • Participate in Air Force SAP security compliance inspections of government organizations and industry

  • Implement Top Secret Control for accountable material and associated correspondence

  • Prepare and/or process inbound and outbound classified mail, faxes, courier packages and receipts

  • Prepare, process, and/or review Program Access Request (PARs) for accuracy and access eligibility

  • Execute Special Access Program Nomination Process Questionnaires

  • Conduct Defense Central Index of Investigations (DCII), Joint Personnel Access System (JPAS), and SAPNP reviews of candidates being submitted for SAP access

  • Perform data entry and record checks in the Air Force Access Data System (AFADS) and maintains all customer sponsored personnel access information current

  • Perform indoctrinations




Experience:


  • 3-5  years related experience

  • Security Fundamentals Professional Certification (SFPC) counts towards 3 years of experience

  • Special Program Security Certification (SPSC) counts towards 5 years of experience

  • Maximum equivalent experience for SPED Certifications is no more than 5 years




Education:


  • Bachelor’s degree or equivalent experience (4 years)




Certifications:


  • Must complete the DoD SAPCO approved SAPNP training (if performing personnel security functions)




Security Clearance:


  • Current Top Secret Clearance with SCI Eligibility

  • Eligibility for access to Special Access Program Information

  • Willingness to submit to a Counterintelligence polygraph




Physical Requirements:


  • Be able to lift 50 lbs

Arthur2
Information Systems Security Officer (ISSO) II 118-043
Buckley, CO
Immediate
01/17/2023

Information Systems Security Officer (ISSO) II:



The ISSO is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO.  The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is assigned responsibility for the day-to-day security operations of a system. This also will include physical and environmental protection, personnel security, incident handling, and security training and awareness.  It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configuration management across authorization boundaries.  This will include assessing the security impact of those changes and making recommendation to the ISSM.  The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts.  The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.




Performance shall include:


  • Assist the ISSM in meeting their duties and responsibilities

  • Prepare, review, and update authorization packages

  • Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media

  • Notify ISSM when changes occur that might affect the authorization determination of the information system(s)

  • Conduct periodic reviews of information systems to ensure compliance with the security authorization package

  • Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change

  • Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly

  • Ensure all IS security-related documentation is current and accessible to properly authorized individuals

  • Ensure audit records are collected, reviewed, and documented (to include any anomalies)

  • Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties

  • Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans

  • Identify cyber security vulnerabilities and assist with the implementation of the countermeasures for them

  • Prepare reports on the status of security safeguards applied to computer systems

  • Perform ISSO duties in support of in-house and external customers

  • Conduct security impact analysis activities and provide to the ISSM on all configuration management changes to the authorization boundaries




Experience:


  • 2 - 5 years related experience

  • Prior performance in roles such as System, Network Administrator or ISSO




Education:


  • Bachelor’s degree or equivalent experience (4 years)




Certifications:


  • Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level II or Information Assurance Manager II within 6 months of the date of hire




Security Clearance:


  • Current Top Secret Clearance with SCI Eligibility

  • Eligibility for access to Special Access Program Information

  • Willingness to submit to a Counterintelligence polygraph




Other Requirements


  • Must be able to regularly lift up to 50 lbs


Arthur 2
Program Security Representative II 118-042
Minot AFB, ND
Immediate
01/17/2023

Program Security Representative II:



The Program Security Representative’s primary function is to provide multi-discipline security support for one or more of the customer’s Special Access Programs (SAPs).  The position will provide “day-to-day” multi-discipline analysis for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.




Performance shall include:


  • Ensure strict adherence to the provisions of the NISPOM, its Supplement, the DoD Overprint, DCID, ICD, and SAP policy

  • Assist in developing and executing approved policies and procedures for safeguarding Special Access Program (SAP), Sensitive Compartmented Information (SCI) and collateral data in support of US military operations

  • Provide day-to-day security support that includes continuous assessment of procedures to identify shortfalls and provide appropriate recommendations for revising and improving security policies, procedures, and systems

  • Identify vulnerabilities, threats, and risks to test, training, and operational activities

  • Assist in developing, implementing, and training the Operations Security program

  • Assist in providing contractor and subordinate facility assistance and oversight

  • Brief all levels of personnel, both in the government and senior civilian services, on a variety of security related topics

  • Conduct and document SAP facility compliance reviews, follow-on facility reviews, and facility close-outs

  • Monitor, report and track all corrective actions resulting from compliance reviews

  • Ensure timely notification of pertinent security matters to program technical and management staff

  • Conduct exploration of any loss, compromise, or suspected compromise of classified and/or sensitive information, including conducting preliminary inquiries and generating damage assessments resulting from the loss of classified information

  • Coordinate with SAP security personnel to ensure lessons learned are incorporated into the curriculum for the SAP security education & awareness program




Experience:


  • 8 – 10 years related experience

  • Security Fundamentals Professional Certification (SFPC) counts towards 3 years of experience

  • Special Program Security Certification (SPSC) counts towards 5 years of experience

  • Maximum equivalent experience for SPED Certifications is no more than 5 years




Education:


  • Bachelor’s degree in a related area or equivalent experience (4 years)




Security Clearance:


  • Current Top Secret Clearance with SCI Eligibility

  • Eligibility for access to Special Access Program Information

  • Willingness to submit to a Counterintelligence polygraph


Arthur 2
Information Systems Security Officer (ISSO) II 118-041
Andrews AFB, MD
Immediate
01/17/2023

Information Systems Security Officer (ISSO) II:



The ISSO is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO.  The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is assigned responsibility for the day-to-day security operations of a system. This also will include physical and environmental protection, personnel security, incident handling, and security training and awareness.  It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configuration management across authorization boundaries.  This will include assessing the security impact of those changes and making recommendation to the ISSM.  The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts.  The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.




Performance shall include:


  • Assist the ISSM in meeting their duties and responsibilities.

  • Prepare, review, and update authorization packages

  • Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media

  • Notify ISSM when changes occur that might affect the authorization determination of the information system(s)

  • Conduct periodic reviews of information systems to ensure compliance with the security authorization package

  • Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change

  • Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly

  • Ensure all IS security-related documentation is current and accessible to properly authorized individuals

  • Ensure audit records are collected, reviewed, and documented (to include any anomalies)

  • Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties

  • Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans

  • Identify cyber security vulnerabilities and assist with the implementation of the countermeasures for them

  • Prepare reports on the status of security safeguards applied to computer systems

  • Perform ISSO duties in support of in-house and external customers

  • Conduct security impact analysis activities and provide to the ISSM on all configuration management changes to the authorization boundaries




Experience:


  • 2 - 5 years related experience

  • Prior performance in roles such as System, Network Administrator or ISSO




Education:


  • Bachelor’s degree or equivalent experience (4 years)




Certifications:


  • Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level II or Information Assurance Manager II within 6 months of the date of hire




Security Clearance:


  • Current Top Secret Clearance with SCI Eligibility

  • Eligibility for access to Special Access Program Information

  • Willingness to submit to a Counterintelligence polygraph




Other Requirements


  • Must be able to regularly lift up to 50 lbs


Arthur 2
Information Systems Security Officer (ISSO) III 118-040
Colorado Springs, CO
Immediate
01/16/2023

Information Systems Security Officer (ISSO) III:



The ISSO is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO.  The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is assigned responsibility for the day-to-day security operations of a system.  This also will include physical and environmental protection, personnel security, incident handling, and security training and awareness.  It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configuration management across authorization boundaries.  This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.




Performance shall include:


  • Assist the ISSM in meeting their duties and responsibilities

  • Prepare, review, and update authorization packages

  • Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media

  • Notify ISSM when changes occur that might affect the authorization determination of the information system(s)

  • Conduct periodic reviews of information systems to ensure compliance with the security authorization package

  • Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change

  • Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly

  • Ensure all IS security-related documentation is current and accessible to properly      authorized individuals

  • Ensure audit records are collected, reviewed, and documented (to include any anomalies)

  • Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties

  • Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans

  • Identify cyber security vulnerabilities and assist with the implementation of the countermeasures for them

  • Prepare reports on the status of security safeguards applied to computer systems

  • Perform ISSO duties in support of in-house and external customers

  • Conduct continuous monitoring activities for authorization boundaries under your preview

  • Assist Department of Defense, National Agency and Contractor organizations with the development of assessment and authorization (A&A) efforts




Experience:


  • 5 - 7 years related experience

  • Prior performance in roles such as System, Network Administrator or ISSO




Education:


  • Bachelor’s degree or equivalent experience (4 years)




Certifications:


  • Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level II or Information Assurance Manager II within 6 months of the date of hire.




Security Clearance:


  • Current Top Secret Clearance with SCI Eligibility

  • Eligibility for access to Special Access Program Information

  • Willingness to submit to a Counterintelligence polygraph




Other Requirements:


  • Must be able to regularly lift up to 50 lbs

Arthur 2
Information Systems Security Officer (ISSO) III 118-039
Colorado Springs, CO
Immediate
01/16/2023

Information Systems Security Officer (ISSO) III:



The ISSO is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO.  The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is assigned responsibility for the day-to-day security operations of a system.  This also will include physical and environmental protection, personnel security, incident handling, and security training and awareness.  It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configuration management across authorization boundaries.  This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.




Performance shall include:


  • Assist the ISSM in meeting their duties and responsibilities

  • Prepare, review, and update authorization packages

  • Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media

  • Notify ISSM when changes occur that might affect the authorization determination of the information system(s)

  • Conduct periodic reviews of information systems to ensure compliance with the security authorization package

  • Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change

  • Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly

  • Ensure all IS security-related documentation is current and accessible to properly      authorized individuals

  • Ensure audit records are collected, reviewed, and documented (to include any anomalies)

  • Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties

  • Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans

  • Identify cyber security vulnerabilities and assist with the implementation of the countermeasures for them

  • Prepare reports on the status of security safeguards applied to computer systems

  • Perform ISSO duties in support of in-house and external customers

  • Conduct continuous monitoring activities for authorization boundaries under your preview

  • Assist Department of Defense, National Agency and Contractor organizations with the development of assessment and authorization (A&A) efforts




Experience:


  • 5 - 7 years related experience

  • Prior performance in roles such as System, Network Administrator or ISSO




Education:


  • Bachelor’s degree or equivalent experience (4 years)




Certifications:


  • Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level II or Information Assurance Manager II within 6 months of the date of hire.




Security Clearance:


  • Current Top Secret Clearance with SCI Eligibility

  • Eligibility for access to Special Access Program Information

  • Willingness to submit to a Counterintelligence polygraph




Other Requirements:


  • Must be able to regularly lift up to 50 lbs

Arthur 2
Information Systems Security Officer (ISSO) II 118-038
Colorado Springs, CO
Immediate
01/16/2023

Information Systems Security Officer (ISSO) II:



The ISSO is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO.  The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is assigned responsibility for the day-to-day security operations of a system. This also will include physical and environmental protection, personnel security, incident handling, and security training and awareness.  It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configuration management across authorization boundaries.  This will include assessing the security impact of those changes and making recommendation to the ISSM.  The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts.  The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.




Performance shall include:


  • Assist the ISSM in meeting their duties and responsibilities

  • Prepare, review, and update authorization packages

  • Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media

  • Notify ISSM when changes occur that might affect the authorization determination of the information system(s)

  • Conduct periodic reviews of information systems to ensure compliance with the security authorization package

  • Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change

  • Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly

  • Ensure all IS security-related documentation is current and accessible to properly authorized individuals

  • Ensure audit records are collected, reviewed, and documented (to include any anomalies)

  • Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties

  • Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans

  • Identify cyber security vulnerabilities and assist with the implementation of the countermeasures for them

  • Prepare reports on the status of security safeguards applied to computer systems

  • Perform ISSO duties in support of in-house and external customers

  • Conduct security impact analysis activities and provide to the ISSM on all configuration management changes to the authorization boundaries




Experience:


  • 2 - 5 years related experience

  • Prior performance in roles such as System, Network Administrator or ISSO




Education:


  • Bachelor’s degree or equivalent experience (4 years)




Certifications:


  • Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level II or Information Assurance Manager II within 6 months of the date of hire




Security Clearance:


  • Current Top Secret Clearance with SCI Eligibility

  • Eligibility for access to Special Access Program Information

  • Willingness to submit to a Counterintelligence polygraph




Other Requirements


  • Must be able to regularly lift up to 50 lbs


Arthur 2
Network/System Administrator III 118-037
Colorado Springs, CO
Immediate
01/16/2023

Network/System Administrator III:



The primary function will be to organize, install, and support government organization’s computer systems, including local area networks (LANs), wide area networks (WANs), network segments, intranets, and other data communication systems. This will also include helping architect, design and analyze network models. It will require participation in decisions about buying future hardware or software to upgrade organization’s infrastructure. This position might be called upon to provide technical support to computer users to help solve users’ problems. This position will support activities within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.




Performance shall include:


  • Able to perform self-sustaining and work with little to no oversight

  • Lead IT ops team on day to day management and operations of Networks and implement capabilities vetted through Cybersecurity, ISSE and higher headquarters to maintain JSIG/RMF Authority to Operate and maintain Continuous Monitoring tools and processes

  • Manage COTS & GOTS products to collect, display and remediate a variety of automated system security and system operations/performance functions and metrics.

  • Assist during security assessments of servers/network devices/security appliances

  • Assist during security assessments with regard to accuracy and efficiency

  • Assist with Creation of operational Operations and Maintenance (O&M) checklists to maintain the service (daily, weekly, monthly, yearly O&M checklists); build Tactics, Techniques and Processes (TTPs) and Standard Operating Processes (SOPs) associated with service checklists

  • Manage and operate monitoring tools/capabilities with the enterprise security information and event management (SIEM) and create/tailor complex event alarms/rules and summary reports

  • Execute cybersecurity operations procedures for day to day network management, operations and maintenance

  • Monitor/analyze output of cybersecurity related tools for reportable security incidents and residual risk

  • Assist in analyzing technical risk, upon request, of emerging cybersecurity tools and processes

  • Work as part of a security incident response team as needed

  • Assist ISSM/ISSO/ISSE  with the Integration/Development new techniques to improve Confidentiality, Integrity, and Availability for networks/systems operating at various classification levels.

  • Advanced technical competency in one or more of the following supported platforms: Microsoft Windows Server, Active Directory Red Hat Enterprise Linux servers, MS Hyper-V/VMWare/ESx/Xen Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems, forensic analysis/vulnerability assessment, Group Policy management and configuration, Scripting, BMC Footprints, WSUS, , Lumension, Bitlocker, SQL Server 2012, TomCat, IIS, Windows Server 2012r2/2016, Win 10, Red Hat 6.5, Microsoft Office.

  • Toolkits, SEIMs, Logrhythm, ACAS/Nessus/SCAP, mandatory/role-based access control concepts (e. g. SE Linux extensions to RHEL, PitBull, AppArmor, and Sentris) , video teleconferencing/VOIP, Oracle/MS SQL database security, and Apache/IIS Web server security




Experience:


  • 5 - 7 years related experience




Education:


  • Bachelor’s degree in a related area or equivalent experience (4 years)




Certifications:


  • Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level III within 6 months of the date of hire




Security Clearance:


  • Current Top Secret Clearance with SCI Eligibility

  • Eligibility for access to Special Access Program Information

  • Willingness to submit to a Counterintelligence polygraph




Other Requirements:


  • Thorough knowledge of Microsoft Windows desktop and server operating systems, Microsoft Exchange Server, and as needed RHEL operating systems administration and associated hardware.

  • Experience in effective communication and collaborating in a high performance team environment.

  • Group Policy design and configuration.

  • Working knowledge of CISCO network and switching and virtualization technologies.

  • Working knowledge of virtualization as it applies to users environments, operating systems, and network appliances.

  • Working knowledge of Local Area Network (LAN) and Wide Area Network (WAN) technologies and data backup technologies.

  • Working knowledge communication security (COMSEC) policies and integration.

  • Working knowledge of Risk Management Framework, Common Criteria, and System Security Policy as they relate to assessments and authorization.

  • Working knowledge and current relevant experience with PL2, PL3, and PL4 network environments/systems.

  • Working knowledge of WSUS and/or YUM patch deployment methodologies.

  • Must be familiar with DoD policy as it applies to implementing and executing system and network administration.

  • Working knowledge of Risk Management Framework and how to apply it to network/information system environments.

  • Must be able to regularly lift up to 50 lbs.

Arthur 2
Information Technology/Assurance Specialist II 118-036
Colorado Springs, CO
Immediate
01/16/2023

Information Technology/Assurance Specialist II:



The IT/IA primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts.  The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. 




Performance shall include:


  • Establish complex operational software configuration controls and system interfaces for computer system(s) assigned

  • Maintain file servers, Firewalls, network access, Security Monitoring Systems and system documentation as required

  • Analyze and troubleshoot system anomalies to ensure optimum equipment performance

  • Prepare system for operational use and support operational tests

  • Review, prepare, and update authorization packages

  • Notify customer when changes occur that might affect authorization accreditation

  • Conduct cybersecurity portion of the self-inspection’s checklist

  • Review and provide technical and cyber security coordination on all Bodies of Evidence that make-up the authorization package

  • Identify any and all vulnerabilities and implement countermeasures

  • Ensure information systems and network appliances are operated, maintained, and disposed of in accordance with security policies and practices

  • Perform Video-Teleconferencing VTC System Administration, Scheduling, & Configuration

  • Provide External Information System(s) Client Support

  • Perform account creations, changes, & deletions on multiple authorization boundaries

  • Perform Help Desk & troubleshooting activities

  • Perform Hardware/Software System Configuration, upgrades and modifications

  • Perform system and network appliance patching activities

  • Provide Government-Issued Laptop Support

  • Assist in Media Control & Accountability activities

  • Perform COMSEC account/equipment management activities




Experience:


  • 5-7  years related experience

  • Prior performance in roles such as System, Network Administrator or Information Technology/Assurance Specialists




Education:


  • Bachelor’s degree or equivalent experience (4 years)




Certifications:


  • Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level II or Information Assurance Manager II within 6 months of the date of hire




Security Clearance


  • Current Top Secret Clearance with SCI Eligibility


Arthur 2
Information Systems Security Officer (ISSO) III 118-035
Kirtland AFB, NM
Immediate
01/16/2023

Information Systems Security Officer (ISSO) III:



The ISSO is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO.  The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is assigned responsibility for the day-to-day security operations of a system.  This also will include physical and environmental protection, personnel security, incident handling, and security training and awareness.  It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configuration management across authorization boundaries.  This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.




Performance shall include:


  • Assist the ISSM in meeting their duties and responsibilities

  • Prepare, review, and update authorization packages

  • Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media

  • Notify ISSM when changes occur that might affect the authorization determination of the information system(s)

  • Conduct periodic reviews of information systems to ensure compliance with the security authorization package

  • Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change

  • Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly

  • Ensure all IS security-related documentation is current and accessible to properly      authorized individuals

  • Ensure audit records are collected, reviewed, and documented (to include any anomalies)

  • Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties

  • Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans

  • Identify cyber security vulnerabilities and assist with the implementation of the countermeasures for them

  • Prepare reports on the status of security safeguards applied to computer systems

  • Perform ISSO duties in support of in-house and external customers

  • Conduct continuous monitoring activities for authorization boundaries under your preview

  • Assist Department of Defense, National Agency and Contractor organizations with the development of assessment and authorization (A&A) efforts




Experience:


  • 5 - 7 years related experience

  • Prior performance in roles such as System, Network Administrator or ISSO




Education:


  • Bachelor’s degree or equivalent experience (4 years)




Certifications:


  • Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level II or Information Assurance Manager II within 6 months of the date of hire.




Security Clearance:


  • Current Top Secret Clearance with SCI Eligibility

  • Eligibility for access to Special Access Program Information

  • Willingness to submit to a Counterintelligence polygraph




Other Requirements:


  • Must be able to regularly lift up to 50 lbs

Arthur 2
Activity Security Representative I 118-034
Kirtland AFB, NM
Immediate
01/16/2023

Activity Security Representative I:



The Activity Security Representative’s primary function is to provide multi-disciplined security support to a customer’s facility and organization. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.




Performance shall include:


  • Classification reviews of inbound and outbound correspondence

  • Assist in the maintenance of a document accountability database and associated correspondence

  • Processing inbound and outbound classified mail and receipt records

  • Perform destruction of classified materials

  • Process magnetic media for accountability

  • Reproduction support for classified materials

  • Maintain various daily logs for a variety of  administrative functions associated with document control

  • Assist in the processing of inbound data and outbound data transfer files

  • Transfer electronic data files to internal customers

  • Maintain an extensive customer database point of contact listing

  • Assist with researching, processing, filing, and maintaining inbound and outbound visit notices

  • Escort facility visitors and maintains associated logs

  • Assist in the preparation of facility access control badges

  • Conduct entry and exit inspections

  • Assist in the maintenance of facility access control entry systems, to include visitor control

  • Perform data entry to the Personnel Access Security System database and maintain all customer sponsored billets and quota information

  • Assist in maintaining personnel security files for all personnel of the supported element

  • Follow and enforce the customer’s Standard Operating Procedures

  • Provide support for the security awareness and education programs

  • Perform miscellaneous administrative support functions as directed by the contractor site lead and/or the Senior Security Representative




Experience:


  • 1 – 2 years related experience

  • Security Fundamentals Professional Certification (SFPC) counts towards 3 years of experience

  • Special Program Security Certification (SPSC) counts towards 5 years of experience

  • Maximum equivalent experience for SPED Certifications is no more than 5 years




Education:


  • Bachelor’s degree or equivalent experience (4 years)




Security Clearance:


  • Current Top Secret Clearance with SCI Eligibility

  • Eligibility for access to Special Access Program Information

  • Willingness to submit to a Counterintelligence polygraph

Arthur 2
Activity Security Representative I 118-033
Kirtland AFB, NM
Immediate
01/16/2023

Activity Security Representative I:



The Activity Security Representative’s primary function is to provide multi-disciplined security support to a customer’s facility and organization. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.




Performance shall include:


  • Classification reviews of inbound and outbound correspondence

  • Assist in the maintenance of a document accountability database and associated correspondence

  • Processing inbound and outbound classified mail and receipt records

  • Perform destruction of classified materials

  • Process magnetic media for accountability

  • Reproduction support for classified materials

  • Maintain various daily logs for a variety of  administrative functions associated with document control

  • Assist in the processing of inbound data and outbound data transfer files

  • Transfer electronic data files to internal customers

  • Maintain an extensive customer database point of contact listing

  • Assist with researching, processing, filing, and maintaining inbound and outbound visit notices

  • Escort facility visitors and maintains associated logs

  • Assist in the preparation of facility access control badges

  • Conduct entry and exit inspections

  • Assist in the maintenance of facility access control entry systems, to include visitor control

  • Perform data entry to the Personnel Access Security System database and maintain all customer sponsored billets and quota information

  • Assist in maintaining personnel security files for all personnel of the supported element

  • Follow and enforce the customer’s Standard Operating Procedures

  • Provide support for the security awareness and education programs

  • Perform miscellaneous administrative support functions as directed by the contractor site lead and/or the Senior Security Representative




Experience:


  • 1 – 2 years related experience

  • Security Fundamentals Professional Certification (SFPC) counts towards 3 years of experience

  • Special Program Security Certification (SPSC) counts towards 5 years of experience

  • Maximum equivalent experience for SPED Certifications is no more than 5 years




Education:


  • Bachelor’s degree or equivalent experience (4 years)




Security Clearance:


  • Current Top Secret Clearance with SCI Eligibility

  • Eligibility for access to Special Access Program Information

  • Willingness to submit to a Counterintelligence polygraph

Arthur 2
Security Control Assessor (SCA) II 118-032
Arlington, VA
Immediate
01/16/2023

Security Control Assessor (SCA) II:



The SCA is responsible for conducting a comprehensive assessment of the management, operational, and technical security controls employed within or inherited by an IS to determine the overall effectiveness of the controls (i.e., the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting the security requirements for the system).  SCAs also provide an assessment of the severity of weaknesses or deficiencies discovered in the IS and its environment of operation and recommend corrective actions to address identified vulnerabilities. Responsibilities will cover Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities within the customer’s area of responsibility.




Performance shall include:


  • Perform oversight of the development, implementation and evaluation of IS security program policy; special emphasis placed upon integration of existing SAP network infrastructure

  • Perform assessment of ISs, based upon the Risk Management Framework (RMF) methodology in accordance with the Joint Special Access Program (SAP) Implementation Guide (JSIG)

  • Advise the Information System Owner (ISO), Information Data Owner (IDO), Program Security Officer (PSO), and the Delegated and/or Authorizing Official (DAO/AO) on any assessment and authorization issues

  • Evaluate Authorization packages and make recommendation to the AO and/or DAO for authorization

  • Evaluate IS threats and vulnerabilities to determine whether additional safeguards are required

  • Advise the Government concerning the impact levels for Confidentiality, Integrity, and Availability for the information on a system

  • Ensure security assessments are completed and results documented and prepare the Security Assessment Report (SAR) for the Authorization boundary

  • Initiate a Plan of Action and Milestones (POA&M) with identified weaknesses for each Authorization Boundaries assessed, based on findings and recommendations from the SAR

  • Evaluate security assessment documentation and provide written recommendations for security authorization to the Government

  • Discuss recommendation for authorization and submit the security authorization package to the AO/DAO

  • Assess proposed changes to Authorization boundaries operating environment and mission needs to determine the continuation to operate.

  • Review and concur with all sanitization and clearing procedures in accordance with Government guidance and/or policy

  • Assist the Government compliance inspections

  • Assist the Government with security incidents that relate to cybersecurity and ensure that the proper and corrective measures have been taken

  • Ensure organization are addressing and conducting all phases of the system development life cycle (SDLC)

  • Evaluate Hardware and Software to determine security impact that it might have on Authorization boundaries

  • Evaluate the effectiveness and implementation of Continuous Monitoring Plans

  • Represent the customer on inspection teams




Experience:


  • 7 - 9 years related experience

  • Minimum of four (4) years’ experience in SAP, SCI or Collateral Information Systems (IS) Security and the implementation of regulations identified in the description of duties. 

  • Prior performance in the role of ISSO and ISSM or SCA




Education:


  • Bachelor’s degree in a related discipline or equivalent experience (4 years)




Certifications:


  • Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level III or Information Assurance Manager Level II within 6 months of the date of hire




Security Clearance:


  • Current Top Secret Clearance with SCI Eligibility

  • Eligibility for access to Special Access Program Information

  • Willingness to submit to a Counterintelligence polygraph




Other Requirements


  • Must be able to regularly lift 50lbs


Arthur 2
Information Technology-Assurance Specialist II 118-031
Kirtland AFB, NM
Immediate
01/16/2023

Information Technology/Assurance Specialist II:



The IT/IA primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts.  The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. 




Performance shall include:


  • Establish complex operational software configuration controls and system interfaces for computer system(s) assigned

  • Maintain file servers, Firewalls, network access, Security Monitoring Systems and system documentation as required

  • Analyze and troubleshoot system anomalies to ensure optimum equipment performance

  • Prepare system for operational use and support operational tests

  • Review, prepare, and update authorization packages

  • Notify customer when changes occur that might affect authorization accreditation

  • Conduct cybersecurity portion of the self-inspection’s checklist

  • Review and provide technical and cyber security coordination on all Bodies of Evidence that make-up the authorization package

  • Identify any and all vulnerabilities and implement countermeasures

  • Ensure information systems and network appliances are operated, maintained, and disposed of in accordance with security policies and practices

  • Perform Video-Teleconferencing VTC System Administration, Scheduling, & Configuration

  • Provide External Information System(s) Client Support

  • Perform account creations, changes, & deletions on multiple authorization boundaries

  • Perform Help Desk & troubleshooting activities

  • Perform Hardware/Software System Configuration, upgrades and modifications

  • Perform system and network appliance patching activities

  • Provide Government-Issued Laptop Support

  • Assist in Media Control & Accountability activities

  • Perform COMSEC account/equipment management activities




Experience:


  • 5-7  years related experience

  • Prior performance in roles such as System, Network Administrator or Information Technology/Assurance Specialists




Education:


  • Bachelor’s degree or equivalent experience (4 years)




Certifications:


  • Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level II or Information Assurance Manager II within 6 months of the date of hire




Security Clearance


  • Current Top Secret Clearance with SCI Eligibility

  • Eligibility for access to Special Access Program Information

  • Willingness to submit to a Counterintelligence polygraph




Other Requirements:


  • Thorough knowledge of Microsoft Windows 2012R2 Server, Microsoft Exchange Server 2010/2016, Microsoft Windows 7/10 operating systems (OS) administration and associated hardware.

  • Working knowledge of Local Area Network (LAN) and Wide Area Network (WAN) technologies and data backup technologies to include communication security (COMSEC) integration.

  • Working knowledge of Risk Management Framework, SCI Information Systems Security Standards, Common Criteria, and System Security Policy as they relate to Assessment and Authorizations.

  • Working knowledge and current relevant experience with PL2 systems; experience with PL3 & PL4 cross domain solutions is desired.

  • Must be able to regularly lift up to 50 lbs


Arthur 2
Activity Security Representative II 118-030
Kirtland AFB, NM
Immediate
01/16/2023

Activity Security Representative II:



The Activity Security Representative’s primary function is to provide multi-disciplined security support to a customer’s facility and organization.  The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.




Performance shall include:


  • Classification reviews of inbound and outbound correspondence

  • Assist in the maintenance of a document accountability database and associated correspondence

  • Processing inbound and outbound classified mail and receipt records

  • Perform destruction of classified materials

  • Process magnetic media for accountability

  • Reproduction support for classified materials

  • Maintain various daily logs for a variety of administrative functions associated with document control

  • Assist in the processing of inbound data and outbound data transfer files

  • Transfer electronic data files to internal customers

  • Maintain an extensive customer database point of contact listing

  • Assist with researching, processing, filing, and maintaining inbound and outbound visit notices

  • Escort facility visitors and maintains associated logs

  • Assist in the preparation of facility access control badges

  • Conduct entry and exit inspections

  • Assist in the maintenance of facility access control entry systems, to include visitor control

  • Perform data entry to the Personnel Access Security System database and maintain all customer sponsored billets and quota information

  • Assist in maintaining personnel security files for all personnel of the supported element

  • Follow and enforce the customer’s Standard Operating Procedures

  • Provide support for the security awareness and education programs

  • Perform miscellaneous administrative support functions as directed by the contractor site lead and/or the Senior Security Representative

  • Review, track, and monitor security clearance processing activities with appropriate government personnel to achieve appropriate clearance actions

  • Participate in Air Force SAP security compliance inspections of government organizations and industry

  • Implement Top Secret Control for accountable material and associated correspondence

  • Prepare and/or process inbound and outbound classified mail, faxes, courier packages and receipts

  • Prepare, process, and/or review Program Access Request (PARs) for accuracy and access eligibility

  • Execute Special Access Program Nomination Process Questionnaires

  • Conduct Defense Central Index of Investigations (DCII), Joint Personnel Access System (JPAS), and SAPNP reviews of candidates being submitted for SAP access

  • Perform data entry and record checks in the Air Force Access Data System (AFADS) and maintains all customer sponsored personnel access information current

  • Perform indoctrinations




Experience:


  • 3-5  years related experience

  • Security Fundamentals Professional Certification (SFPC) counts towards 3 years of experience

  • Special Program Security Certification (SPSC) counts towards 5 years of experience

  • Maximum equivalent experience for SPED Certifications is no more than 5 years




Education:


  • Bachelor’s degree or equivalent experience (4 years)




Certifications:


  • Must complete the DoD SAPCO approved SAPNP training (if performing personnel security functions)




Security Clearance:


  • Current Top Secret Clearance with SCI Eligibility

  • Eligibility for access to Special Access Program Information

  • Willingness to submit to a Counterintelligence polygraph




Physical Requirements:


  • Be able to lift 50 lbs

Arthur 2
Activity Security Representative II 118-029
Kirtland AFB, NM
Immediate
01/16/2023

Activity Security Representative II:



The Activity Security Representative’s primary function is to provide multi-disciplined security support to a customer’s facility and organization.  The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.




Performance shall include:


  • Classification reviews of inbound and outbound correspondence

  • Assist in the maintenance of a document accountability database and associated correspondence

  • Processing inbound and outbound classified mail and receipt records

  • Perform destruction of classified materials

  • Process magnetic media for accountability

  • Reproduction support for classified materials

  • Maintain various daily logs for a variety of administrative functions associated with document control

  • Assist in the processing of inbound data and outbound data transfer files

  • Transfer electronic data files to internal customers

  • Maintain an extensive customer database point of contact listing

  • Assist with researching, processing, filing, and maintaining inbound and outbound visit notices

  • Escort facility visitors and maintains associated logs

  • Assist in the preparation of facility access control badges

  • Conduct entry and exit inspections

  • Assist in the maintenance of facility access control entry systems, to include visitor control

  • Perform data entry to the Personnel Access Security System database and maintain all customer sponsored billets and quota information

  • Assist in maintaining personnel security files for all personnel of the supported element

  • Follow and enforce the customer’s Standard Operating Procedures

  • Provide support for the security awareness and education programs

  • Perform miscellaneous administrative support functions as directed by the contractor site lead and/or the Senior Security Representative

  • Review, track, and monitor security clearance processing activities with appropriate government personnel to achieve appropriate clearance actions

  • Participate in Air Force SAP security compliance inspections of government organizations and industry

  • Implement Top Secret Control for accountable material and associated correspondence

  • Prepare and/or process inbound and outbound classified mail, faxes, courier packages and receipts

  • Prepare, process, and/or review Program Access Request (PARs) for accuracy and access eligibility

  • Execute Special Access Program Nomination Process Questionnaires

  • Conduct Defense Central Index of Investigations (DCII), Joint Personnel Access System (JPAS), and SAPNP reviews of candidates being submitted for SAP access

  • Perform data entry and record checks in the Air Force Access Data System (AFADS) and maintains all customer sponsored personnel access information current

  • Perform indoctrinations




Experience:


  • 3-5  years related experience

  • Security Fundamentals Professional Certification (SFPC) counts towards 3 years of experience

  • Special Program Security Certification (SPSC) counts towards 5 years of experience

  • Maximum equivalent experience for SPED Certifications is no more than 5 years




Education:


  • Bachelor’s degree or equivalent experience (4 years)




Certifications:


  • Must complete the DoD SAPCO approved SAPNP training (if performing personnel security functions)




Security Clearance:


  • Current Top Secret Clearance with SCI Eligibility

  • Eligibility for access to Special Access Program Information

  • Willingness to submit to a Counterintelligence polygraph




Physical Requirements:


  • Be able to lift 50 lbs


Arthur 2
Information Systems Security Manager (ISSM) II 118-028
Hill AFB, UT
Immediate
01/16/2023

Information Systems Security Manager (ISSM) II:



The ISSM’s primary function serves as a principal advisor on all matters, technical and otherwise, involving the security of information systems under their purview.  Primary support will be working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense, and Military Compartment efforts.  The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.




Performance shall include:


  • Perform oversight of the development, implementation and evaluation of information system security program policy; special emphasis placed upon integration of existing SAP network infrastructures

  • Develop and oversee operational information systems security implementation policy and guidelines of network security, based upon the Risk Management Framework (RMF) with emphasize on Joint Special Access Program Implementation Guide (JSIG) authorization process

  • Advise customer on Risk Management Framework (RMF) assessment and authorization issues

  • Perform risk assessments and make recommendations to DoD agency customers

  • Advise government program managers on security testing methodologies and processes

  • Evaluate authorization documentation and provide written recommendations for authorization to government PM’s

  • Develop and maintain a formal Information Systems Security Program

  • Ensure that all IAOs, network administrators, and other cyber security personnel receive the necessary technical and security training to carry out their duties

  • Develop, review, endorse, and recommend action by the AO or DAO of system assessment documentation

  • Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media

  • Develop and execute security assessment plans that include verification that the features and assurances required for each protection level functioning

  • Maintain a and/or applicable repository for all system authorization documentation and modifications

  • Develop policies and procedures for responding to security incidents, to include investigating and reporting security violations and incidents

  • Ensure proper protection or corrective measures have been taken when an incident or vulnerability has been discovered within a system

  • Ensure that data ownership and responsibilities are established for each authorization boundary, to include accountability, access rights, and special handling requirements

  • Ensure development and implementation of an information security education, training, and awareness program, to include attending, monitoring, and presenting local cyber security training.

  • Evaluate threats and vulnerabilities to ascertain whether additional safeguards are needed

  • Assess changes in the system, its environment, and operational needs that could affect the authorization

  • Ensure that authorization is accomplished a valid Authorization determination has been given for all authorization boundaries under your purview

  • Review AIS assessment plans

  • Coordinate with PSO or cognizant security official on approval of external information systems (e.g., guest systems, interconnected system with another organization)

  • Conduct periodic assessments of the security posture of the authorization boundaries

  • Institute and implement a Configuration Control Board (CCB) charter

  • Ensure configuration management (CM) for security-relevant changes to software, hardware, and firmware and that they are properly documented

  • Ensure periodic testing is conducted to evaluate the security posture of IS by employing various intrusion/attack detection and monitoring tools (shared responsibility with ISSOs)

  • Ensure that system recovery and reconstitution processes developed and monitored to ensure that the authorization boundary can be recovered based on its availability level determination

  • Ensure all authorization documentation is current and accessible to properly authorized individuals

  • Ensure that system security requirements are addressed during all phases of the system life cycle

  • Participate in self-inspections

  • Periodically review system security to accommodate changes to policy or technology

  • Coordinate all technical security issues outside of area of expertise or responsibility with ISSE

  • Provide expert research and analysis in support of expanding programs and area of responsibility as it pertains to cyber security and information technology activities

  • Develop Assured File Transfers (AFT) on accordance with the JSIG

  • Provide leadership, mentoring, and quality assurance for Cyber Security and Information Technology team members




Experience:


  • 7 - 9 years related experience

  • Prior performance in roles such as ISSO or ISSM




Education:


  • Bachelor’s degree or equivalent experience (4 years)





Certifications:


  • Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level 2 or Information Assurance Manager Level 2 within 6 months of the date of hire




Security Clearance:


  • Current Top Secret Clearance with SCI Eligibility

  • Eligibility for access to Special Access Program Information

  • Willingness to submit to a Counterintelligence polygraph




Other Requirements:


  • Must be able to regularly lift up to 50 lbs


Arthur 2
Information Technology-Assurance Specialist II 118-027
Hill AFB, UT
Immediate
01/16/2023

Information Technology/Assurance Specialist II:



The IT/IA primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts.  The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. 




Performance shall include:


  • Establish complex operational software configuration controls and system interfaces for computer system(s) assigned

  • Maintain file servers, Firewalls, network access, Security Monitoring Systems and system documentation as required

  • Analyze and troubleshoot system anomalies to ensure optimum equipment performance

  • Prepare system for operational use and support operational tests

  • Review, prepare, and update authorization packages

  • Notify customer when changes occur that might affect authorization accreditation

  • Conduct cybersecurity portion of the self-inspection’s checklist

  • Review and provide technical and cyber security coordination on all Bodies of Evidence that make-up the authorization package

  • Identify any and all vulnerabilities and implement countermeasures

  • Ensure information systems and network appliances are operated, maintained, and disposed of in accordance with security policies and practices

  • Perform Video-Teleconferencing VTC System Administration, Scheduling, & Configuration

  • Provide External Information System(s) Client Support

  • Perform account creations, changes, & deletions on multiple authorization boundaries

  • Perform Help Desk & troubleshooting activities

  • Perform Hardware/Software System Configuration, upgrades and modifications

  • Perform system and network appliance patching activities

  • Provide Government-Issued Laptop Support

  • Assist in Media Control & Accountability activities

  • Perform COMSEC account/equipment management activities




Experience:


  • 5-7  years related experience.

  • Prior performance in roles such as System, Network Administrator or Information Technology/Assurance Specialists




Education:


  • Bachelor’s degree or equivalent experience (4 years)




Certifications:


  • Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level II or Information Assurance Manager II within 6 months of the date of hire




Security Clearance


  • Current Top Secret Clearance with SCI Eligibility.

  • Eligibility for access to Special Access Program Information.

  • Willingness to submit to a Counterintelligence polygraph.




Other Requirements:


  • Thorough knowledge of Microsoft Windows 2012R2 Server, Microsoft Exchange Server 2010/2016, Microsoft Windows 7/10 operating systems (OS) administration and associated hardware.

  • Working knowledge of Local Area Network (LAN) and Wide Area Network (WAN) technologies and data backup technologies to include communication security (COMSEC) integration.

  • Working knowledge of Risk Management Framework, SCI Information Systems Security Standards, Common Criteria, and System Security Policy as they relate to Assessment and Authorizations.

  • Working knowledge and current relevant experience with PL2 systems; experience with PL3 & PL4 cross domain solutions is desired.

  • Must be able to regularly lift up to 50 lbs.



Arthur 2
Activity Security Representative I 118-026
Hill AFB, UT
Immediate
01/16/2023

Activity Security Representative I:



The Activity Security Representative’s primary function is to provide multi-disciplined security support to a customer’s facility and organization. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.




Performance shall include:


  • Classification reviews of inbound and outbound correspondence

  • Assist in the maintenance of a document accountability database and associated correspondence

  • Processing inbound and outbound classified mail and receipt records

  • Perform destruction of classified materials

  • Process magnetic media for accountability

  • Reproduction support for classified materials

  • Maintain various daily logs for a variety of  administrative functions associated with document control

  • Assist in the processing of inbound data and outbound data transfer files

  • Transfer electronic data files to internal customers

  • Maintain an extensive customer database point of contact listing

  • Assist with researching, processing, filing, and maintaining inbound and outbound visit notices

  • Escort facility visitors and maintains associated logs

  • Assist in the preparation of facility access control badges

  • Conduct entry and exit inspections

  • Assist in the maintenance of facility access control entry systems, to include visitor control

  • Perform data entry to the Personnel Access Security System database and maintain all customer sponsored billets and quota information

  • Assist in maintaining personnel security files for all personnel of the supported element

  • Follow and enforce the customer’s Standard Operating Procedures

  • Provide support for the security awareness and education programs

  • Perform miscellaneous administrative support functions as directed by the contractor site lead and/or the Senior Security Representative




Experience:


  • 1 – 2 years related experience

  • Security Fundamentals Professional Certification (SFPC) counts towards 3 years of experience

  • Special Program Security Certification (SPSC) counts towards 5 years of experience

  • Maximum equivalent experience for SPED Certifications is no more than 5 years




Education:


  • Bachelor’s degree or equivalent experience (4 years)




Security Clearance:


  • Current Top Secret Clearance with SCI Eligibility

  • Eligibility for access to Special Access Program Information

  • Willingness to submit to a Counterintelligence polygraph

Arthur 2
Information Assurance (IA) System Security Engineer I 118-025
Dahlgren, VA
Immediate
01/16/2023

Information Assurance (IA) System Security Engineer I:



The Information System Security Engineer (ISSE) is primarily responsible for conducting information system security engineering activities with a focus on lifecycle of current systems and future requirement scoping.  The position will collect and process the captured information security requirements and ensures that the requirements are effectively integrated into information systems through purposeful security architecting, design, development, and configuration.  The position is an integral part of the development team designing and developing organizational information systems or upgrading legacy systems.  The ISSE employs best practices when implementing security requirements within an information system including software engineering methodologies, system/security engineering principles, secure design, secure architecture, and secure coding techniques.  This position’s main function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts.  The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.




Performance shall include:


  • Perform oversight of the development, implementation and evaluation of information system security program policy; special emphasis placed upon integration of existing SAP network infrastructures.

  • Perform analysis of network security, based upon the Risk Management Framework (RMF) with emphasize on Joint Special Access Program Implementation Guide (JSIG) authorization process.

  • Provides expert support, research and analysis of exceptionally complex problems, and processes relating to them.

  • Serves as technical expert to the Cybersecurity Assessment Program providing technical direction, interpretation and alternatives to complex problems.

  • Thinks independently and demonstrates exceptional written and oral communications skills. Applies advanced technical principles, theories, and concepts.

  • Contributes to the development of new principles, concepts, and methodologies..

  • Works on unusually complex technical problems and provides highly innovative and ingenious solutions.

  • Recommends cybersecurity software tools and assists in the development of software tool requirements and selection criteria to include the development of product specific STIGs from applicable DISA SRGs.

  • Leads technical teams in implementation of predetermined long-range goals and objectives.

  • Support customer and SAP community IA working groups, participate in SSE IPT reviews.

  • Provides expert level consultation and technical services on all aspects of Information Security.

  • Review ISSE related designs and provides security compliance recommendations.

  • Develop and provide IA risk management recommendations to the customer.

  • Provide ISSE support for Mission and Training systems design and development .

  • Assist with development and maintenance of the Program Protection Plan.

  • Assist with site activation activities and design reviews.

  • Represent the customer in various ISSE related working groups, advisory groups, and advisory council meetings.

  • Strong background in Patch/Configuration management, DevOps, and tier 3 support.

  • Assist team to design, integrate, and implement JSIG/RMF Continuous Monitoring tools and processes.

  • Integrate COTS & GOTS products to collect, display and remediate a variety of automated system security and system operations/performance functions and metrics..

  • Perform security assessments of servers/network devices/security appliances.

  • Develop improvements to security assessments with regard to accuracy and efficiency.

  • Integrate ancillary monitoring tools/capabilities with the enterprise security information and event management (SIEM) and create/tailor complex event alarms/rules and summary reports.

  • Write and execute cybersecurity test procedures for validation of control compliance.

  • Monitor/analyze output of cybersecurity related tools for reportable security incidents and residual risk.

  • Analyze technical risk of emerging cybersecurity tools and processes.

  • Work as part of a security incident response team as needed.

  • Build operational Operations and Maintenance (O&M) checklists to maintain the service (daily, weekly, monthly, yearly O&M checklists); build Tactics, Techniques and Processes (TTPs) and Standard Operating Processes (SOPs) associated with service checklists.

  • Integrate/Develop new techniques to improve Confidentiality, Integrity, and Availability for networks/systems operating at various classification levels.

  • Advanced technical competency in one or more of the following supported platforms: Microsoft Windows Server, Active Directory, Red Hat Enterprise Linux servers, MS Hyper-V/VMWare/ESx/Xen Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems, forensic analysis/vulnerability assessment, Group Policy management and configuration, Scripting, BMC Footprints, WSUS, Lumension, Bitlocker, SQL Server 2012, TomCat, IIS, Windows Server 2012r2/2016, Win 10, Red Hat 6.5, Microsoft Office.

  • Toolkits, SEIMs, Logrhythm, ACAS/Nessus/SCAP, mandatory/role-based access control concepts (e. g. SE Linux extensions to RHEL, PitBull, AppArmor, and Sentris) , video teleconferencing/VOIP, Oracle/MS SQL database security, and Apache/IIS Web server security




Experience:


  • 10 - 12 years related experience.

  • Prior performance in roles such as ISSO, ISSM, SCA or SAP IT Technical Director.




Education:


  • Bachelor’s degree in a related discipline or equivalent experience (4 years)




Certifications:


  • Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Manager Level III or Information Assurance Architect and Engineer Level I within 6 months of the date of hire.




Security Clearance


  • Current Top Secret Clearance with SCI Eligibility.

  • Eligibility for access to Special Access Program Information.

  • Willingness to submit to a Counterintelligence polygraph.




Other Requirements


  • Must have expert knowledge of DoD, National and applicable service and agency security policy, manuals and standards.  Must have the ability to work in a dynamic environment and effectively interact with numerous DOD, military/civilian personnel and industry partners.


Arthur 2
Network-System Administrator II 118-024
Dahlgren, VA
Immediate
01/16/2023

Network/System Administrator II:



The primary function will be to organize, install, and support government organization’s computer systems, including local area networks (LANs), wide area networks (WANs), network segments, intranets, and other data communication systems. This will also include helping architect, design and analyze network models. It will require participation in decisions about buying future hardware or software to upgrade organization’s infrastructure. This position might be called upon to provide technical support to computer users to help solve users’ problems. This position will support activities within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.




Performance shall include:


  • Ability to operate under minimal supervision.

  • Execute day to day management and operations of systems and networks.

  • Manage COTS & GOTS products to collect, display and remediate a variety of automated system security and system operations/performance functions and metrics.

  • Follow Operations and Maintenance (O&M) checklists to maintain the service (daily, weekly, monthly, yearly O&M checklists); build Tactics, Techniques and Processes (TTPs) and Standard Operating Processes (SOPs) associated with service checklists.

  • Operate monitoring tools/capabilities with the enterprise security information and event management (SIEM) and create/tailor complex event alarms/rules and summary reports

  • Assist in analyzing technical risk, upon request, of emerging cybersecurity tools and processes

  • Work as part of a security incident response team as needed.

  • Working technical competency in one or more of the following supported platforms: Microsoft Windows Server, Red Hat Enterprise Linux servers, MS Hyper-V/VMWare/ESx/Xen Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems, forensic analysis/vulnerability assessment, Group Policy management and configuration, Scripting, BMC Footprints, WSUS, , Lumension, Bitlocker, SQL Server 2012, TomCat, IIS, Windows Server 2012r2/2016, Win 10, Red Hat 6.5, Microsoft Office.

  • Toolkits, SEIMs, Logrhythm, ACAS/Nessus/SCAP, mandatory/role-based access control concepts (e. g. SE Linux extensions to RHEL, PitBull, AppArmor, and Sentris) , video teleconferencing/VOIP, Oracle/MS SQL database security, and Apache/IIS Web server security




Experience:


  • 3 - 5 years related experience




Education:


  • Bachelor’s degree in a related area or equivalent experience (4 years)




Certifications:


  • Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level II within 6 months of the date of hire




Security Clearance


  • Current Top Secret Clearance with SCI Eligibility

  • Eligibility for access to Special Access Program Information

  • Willingness to submit to a Counterintelligence polygraph




Other Requirements:


  • Thorough knowledge of Microsoft Windows desktop and server operating systems, Microsoft Exchange Server, and as needed RHEL operating systems administration and associated hardware

  • Working knowledge of CISCO network and switching and virtualization technologies.

  • Working knowledge of Local Area Network (LAN) and Wide Area Network (WAN) technologies and data backup technologies.

  • Working knowledge communication security (COMSEC) policies and integration.

  • Working knowledge of Risk Management Framework, Common Criteria, and System Security

  • Policy as they relate to assessments and authorization.

  • Working knowledge and current relevant experience with PL2 and PL3 network environments/systems.

  • Experience providing technical support in a customer service role

  • Experience applying industry standards and best practices in an enterprise-level Windows system environment. 

  • Experience solving technical problems quickly and identifying opportunities to automate repetitive processes. 

  • Working knowledge of WSUS and/or YUM patch deployment methodologies.

  • Must be familiar with DoD policy as it applies to implementing and executing system and network administration.

  • Must be able to regularly lift up to 50 lbs.


Arthur 2
Information Systems Security Manager (ISSM) I 118-023
Eglin AFB, FL
Immediate
01/16/2023

Information Systems Security Manager (ISSM) I:



The ISSM’s primary function serves as a principal advisor on all matters, technical and otherwise, involving the security of information systems under their purview.  Primary support will be working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense, and Military Compartment efforts.  The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.




Performance shall include:


  • Perform oversight of the development, implementation and evaluation of information system      security program policy; special emphasis placed upon integration of existing SAP network infrastructures

  • Develop and oversee operational information systems security implementation policy and      guidelines of network security, based upon the Risk Management Framework (RMF) with emphasize on Joint Special Access Program Implementation Guide (JSIG) authorization process

  • Advise customer on Risk Management Framework (RMF) assessment and authorization issues

  • Perform risk assessments and make recommendations to DoD agency customers

  • Advise government program managers on security testing methodologies and processes

  • Evaluate authorization documentation and provide written recommendations for authorization to government PMs

  • Develop and maintain a formal Information Systems Security Program

  • Ensure that all IAOs, network administrators, and other cyber security personnel receive the      necessary technical and security training to carry out their duties

  • Develop, review, endorse, and recommend action by the AO or DAO of system assessment      documentation

  • Ensure approved procedures are in place for clearing, sanitizing, and destroying various      types of hardware and media

  • Develop and execute security assessment plans that include verification that the features and      assurances required for each protection level functioning

  • Maintain a and/or applicable repository for all system authorization documentation and      modifications

  • Institute and implement a Configuration Control Board (CCB) charter

  • Develop policies and procedures for responding to security incidents, to include investigating and reporting security violations and incidents

  • Ensure proper protection or corrective measures have been taken when an incident or      vulnerability has been discovered within a system

  • Ensure that data ownership and responsibilities are established for each authorization      boundary, to include accountability, access rights, and special handling requirements

  • Ensure development and implementation of an information security education, training, and      awareness program, to include attending, monitoring, and presenting local cyber security training.

  • Evaluate threats and vulnerabilities to ascertain whether additional safeguards are needed

  • Assess changes in the system, its environment, and operational needs that could affect the      authorization

  • Ensure that  authorization is accomplished a valid Authorization determination has been      given for all authorization boundaries under your purview

  • Review AIS assessment plans

  • Coordinate with PSO or cognizant security official on approval of external information systems (e.g., guest systems, interconnected system with another organization)

  • Conduct periodic assessments of the security posture of the authorization boundaries

  • Ensure configuration management (CM) for security-relevant changes to software, hardware, and firmware and that they are properly documented

  • Ensure periodic testing is conducted to evaluate the security posture of IS by employing various intrusion/attack detection and monitoring tools (shared responsibility with ISSOs)

  • Ensure that system recovery and reconstitution processes developed and monitored to ensure that the authorization boundary can be recovered based on its availability level determination

  • Ensure all authorization documentation is current and accessible to properly authorized individuals

  • Ensure that system security requirements are addressed during all phases of the system life      cycle

  • Develop Assured File Transfers (AFT) on accordance with the JSIG

  • Participate in self-inspections

  • Conduct the duties of the Information System Security Officer (ISSO) if one is not present      and/or available




Experience:


  • 5 - 7 years related experience

  • Prior performance in roles such as ISSO or ISSM




Education:


  • Bachelor’s degree in a related area or equivalent experience (4 years)




Certifications:


  • Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level II or Information Assurance Manager Level I within 6 months of the date of hire.




Security Clearance:


  • Current Top Secret Clearance with SCI Eligibility

  • Eligibility for access to Special Access Program Information

  • Willingness to submit to a Counterintelligence polygraph




Other Requirements:


  • Must having working knowledge of DoD, National and applicable service and agency security policy, manuals and standards.

  • Must be able to regularly lift up-to 50lbs

Arthur 2
Information Systems Security Officer (ISSO) II 118-022
Eglin AFB, FL
Immediate
01/16/2023

Information Systems Security Officer (ISSO) II:



The ISSO is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO.  The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is assigned responsibility for the day-to-day security operations of a system. This also will include physical and environmental protection, personnel security, incident handling, and security training and awareness.  It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configuration management across authorization boundaries.  This will include assessing the security impact of those changes and making recommendation to the ISSM.  The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.




Performance shall include:


  • Assist the ISSM in meeting their duties and responsibilities

  • Prepare, review, and update authorization packages

  • Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media

  • Notify ISSM when changes occur that might affect the authorization determination of the information system(s)

  • Conduct periodic reviews of information systems to ensure compliance with the security authorization package

  • Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change

  • Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly

  • Ensure all IS security-related documentation is current and accessible to properly authorized individuals

  • Ensure audit records are collected, reviewed, and documented (to include any anomalies)

  • Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties

  • Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans

  • Identify cyber security vulnerabilities and assist with the implementation of the countermeasures for them

  • Prepare reports on the status of security safeguards applied to computer systems

  • Perform ISSO duties in support of in-house and external customers

  • Conduct security impact analysis activities and provide to the ISSM on all configuration management changes to the authorization boundaries




Experience:


  • 2 - 5 years related experience

  • Prior performance in roles such as System, Network Administrator or ISSO




Education:


  • Bachelor’s degree or equivalent experience (4 years)




Certifications:


  • Must meet position and certification requirements outlined in DoD Directive 8570.01-M for      Information Assurance Technician Level II or Information Assurance Manager II within 6 months of the date of hire




Security Clearance:


  • Current Top Secret Clearance with SCI Eligibility

  • Eligibility for access to Special Access Program Information

  • Willingness to submit to a Counterintelligence polygraph




Other Requirements:


  • Must be able to regularly lift up to 50 lbs

Arthur 2
Information System Security Officer I 118-021
Eglin AFB, FL
Immediate
01/16/2023

Information System Security Officer I:



The ISSO is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO.  The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is assigned responsibility for the day-to-day security operations of a system.  This also will include physical and environmental protection, personnel security, incident handling, and security training and awareness. It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configuration management across authorization boundaries.  This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.




Performance shall include:


  • Assist the ISSM in meeting their duties and responsibilities.

  • Prepare, review, and update authorization packages

  • Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media.

  • Notify ISSM when changes occur that might affect the authorization determination of the information system(s).

  • Conduct periodic reviews of information systems to ensure compliance with the security authorization package.

  • Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change.

  • Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly.

  • Ensure all IS security-related documentation is current and accessible to properly authorized individuals.

  • Ensure audit records are collected, reviewed, and documented (to include any anomalies).

  • Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties.

  • Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans.

  • Identify cyber security vulnerabilities and assist with the implementation of the countermeasures for them.

  • Prepare reports on the status of security safeguards applied to computer systems.

  • Perform ISSO duties in support of in-house and external customers.




Experience:


  • 1 - 2 years related experience

  • Prior performance in roles such as System or Network Administrator




Education:


  • Bachelor’s degree or equivalent experience (4 years)




Certifications:


  • Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level I or Information Assurance Manager I within 6 months of the date of hire




Security Clearance:


  • Current Top-Secret Clearance with SCI Eligibility.

  • Eligibility for access to Special Access Program Information.

  • Willingness to submit to a Counterintelligence polygraph.

Arthur 2
Program Security Representative I 118-020
Pentagon, VA
Immediate
01/16/2023

Program Security Representative I:



The Program Security Representative’s primary function is to provide multi-discipline security support for one or more of the customer’s Special Access Programs (SAPs).  The position will provide “day-to-day” multi-discipline analysis for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.




Performance shall include:


  • Ensure strict adherence to the provisions of the NISPOM, its Supplement, the DoD Overprint, DCID, ICD, and SAP policy.

  • Assist in developing and executing approved policies and procedures for safeguarding Special Access Program (SAP), Sensitive Compartmented Information (SCI) and collateral data in support of US military operations.

  • Provide day-to-day security support that includes continuous assessment of procedures to identify shortfalls and provide appropriate recommendations for revising and improving security policies, procedures, and systems.

  • Identify vulnerabilities, threats, and risks to test, training, and operational activities .

  • Assist in developing, implementing, and training the Operations Security program.

  • Assist in providing contractor and subordinate facility assistance and oversight.

  • Brief all levels of personnel, both in the government and senior civilian services, on a variety of security related topics.

  • Conduct and document SAP facility compliance reviews, follow-on facility reviews, and facility close-outs.

  • Monitor, report and track all corrective actions resulting from compliance reviews.

  • Ensure timely notification of pertinent security matters to program technical and management staff.

  • Conduct exploration of any loss, compromise, or suspected compromise of classified and/or sensitive information, including conducting preliminary inquiries and generating damage assessments resulting from the loss of classified information.

  • Coordinate with SAP security personnel to ensure lessons learned are incorporated into the curriculum for the SAP security education & awareness program




Experience:


  • 5 - 7 years related experience

  • Security Fundamentals Professional Certification (SFPC) counts towards 3 years of experience

  • Special Program Security Certification (SPSC) counts towards 5 years of experience

  • Maximum equivalent experience for SPED Certifications is no more than 5 years




Education:


  • Bachelor’s degree in a related area or equivalent experience (4 years)




Security Clearance:


  • Current Top Secret Clearance with SCI Eligibility

  • Eligibility for access to Special Access Program Information

  • Willingness to submit to a Counterintelligence polygraph


Arthur 2
Counterintelligence (CI) Analyst 118-019
Bolling AFB, Washington DC
Immediate
01/16/2023

Counterintelligence (CI) Analyst:



Position will provide “day-to-day” multi-discipline analysis, CI Analyst responsibilities will cover Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.




Performance shall include: (may be modified with concurrence of the Contracting Officer and contractor Program Manager):


  • Plan, organize, and evaluate Air Force (AF) security and viability/effectiveness of highly      sensitive and often highly classified programs and plans supporting sensitive activities and special access programs (SAPs) within the AF and DoD

  • Provide prompt review and coordination of unique and highly classified proposals requiring a      vast knowledge of AF, DoD, Federal and non-federal organizations, tactics, policies, and processes. This includes, but is not limited to, dealing with sensitive intelligence      collection programs and other sensitive activities primarily supporting the AF, but also DoD in general

  • Research, analyze, review, and provide meaningful recommendation, including written products, when appropriate, to senior leadership regarding security, counterintelligence, and signature reduction issues.

  • Identify, assess, and provide recommendations for potential security vulnerabilities; review all pertinent security directives, regulations and instructions to ensure compliance; prepare future threat analysis assessments.

  • Provide prompt and responsive customer support and subject matter expertise as required to      ensure the accomplishment of the mission/task

  • Ensure that detailed coordination for sensitive activities and SAPs does not disclose National      Security intent, capabilities, or vulnerabilities, and be prepared to brief selected portions to Senior AF and DoD officials, both verbally or in writing




Experience:


  • 4 years intelligence/CI experience in any DoD component



Education:


  • Bachelor’s degree or equivalent experience (4 years)




Security Clearance:


  • Current Top Secret Clearance with SCI Eligibility

  • Eligibility for access to Special Access Program Information

  • Willingness to submit to a Counterintelligence polygraph

Arthur 2
Network-System Administrator III 118-018
Bolling AFB, Washington DC
Immediate
01/16/2023

Network/System Administrator III:



The primary function will be to organize, install, and support government organization’s computer systems, including local area networks (LANs), wide area networks (WANs), network segments, intranets, and other data communication systems. This will also include helping architect, design and analyze network models. It will require participation in decisions about buying future hardware or software to upgrade organization’s infrastructure. This position might be called upon to provide technical support to computer users to help solve users’ problems. This position will support activities within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.




Performance shall include:


  • Able to perform self-sustaining and work with little to no oversight

  • Lead IT ops team on day to day management and operations of Networks and implement capabilities vetted through Cybersecurity, ISSE and higher headquarters to maintain JSIG/RMF Authority to Operate and maintain Continuous Monitoring tools and processes

  • Manage COTS & GOTS products to collect, display and remediate a variety of automated system security and system operations/performance functions and metrics.

  • Assist during security assessments of servers/network devices/security appliances

  • Assist during security assessments with regard to accuracy and efficiency

  • Assist with Creation of operational Operations and Maintenance (O&M) checklists to maintain the service (daily, weekly, monthly, yearly O&M checklists); build Tactics, Techniques and Processes (TTPs) and Standard Operating Processes (SOPs) associated with service checklists

  • Manage and operate monitoring tools/capabilities with the enterprise security information and event management (SIEM) and create/tailor complex event alarms/rules and summary reports

  • Execute cybersecurity operations procedures for day to day network management, operations and maintenance

  • Monitor/analyze output of cybersecurity related tools for reportable security incidents and residual risk

  • Assist in analyzing technical risk, upon request, of emerging cybersecurity tools and processes

  • Work as part of a security incident response team as needed

  • Assist ISSM/ISSO/ISSE  with the Integration/Development new techniques to improve Confidentiality, Integrity, and Availability for networks/systems operating at various classification levels.

  • Advanced technical competency in one or more of the following supported platforms: Microsoft Windows Server, Active Directory Red Hat Enterprise Linux servers, MS Hyper-V/VMWare/ESx/Xen Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems, forensic analysis/vulnerability assessment, Group Policy management and configuration, Scripting, BMC Footprints, WSUS, , Lumension, Bitlocker, SQL Server 2012, TomCat, IIS, Windows Server 2012r2/2016, Win 10, Red Hat 6.5, Microsoft Office.

  • Toolkits, SEIMs, Logrhythm, ACAS/Nessus/SCAP, mandatory/role-based access control concepts (e. g. SE Linux extensions to RHEL, PitBull, AppArmor, and Sentris) , video teleconferencing/VOIP, Oracle/MS SQL database security, and Apache/IIS Web server security




Experience:


  • 5 - 7 years related experience




Education:


  • Bachelor’s degree in a related area or equivalent experience (4 years)




Certifications:


  • Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level III within 6 months of the date of hire




Security Clearance


  • Current Top Secret Clearance with SCI Eligibility

  • Eligibility for access to Special Access Program Information

  • Willingness to submit to a Counterintelligence polygraph




Other Requirements:


  • Thorough knowledge of Microsoft Windows desktop and server operating systems, Microsoft Exchange Server, and as needed RHEL operating systems administration and associated hardware.

  • Experience in effective communication and collaborating in a high performance team environment.

  • Group Policy design and configuration.

  • Working knowledge of CISCO network and switching and virtualization technologies.

  • Working knowledge of virtualization as it applies to users environments, operating systems, and network appliances.

  • Working knowledge of Local Area Network (LAN) and Wide Area Network (WAN) technologies and data backup technologies.

  • Working knowledge communication security (COMSEC) policies and integration.

  • Working knowledge of Risk Management Framework, Common Criteria, and System Security Policy as they relate to assessments and authorization.

  • Working knowledge and current relevant experience with PL2, PL3, and PL4 network environments/systems.

  • Working knowledge of WSUS and/or YUM patch deployment methodologies.

  • Must be familiar with DoD policy as it applies to implementing and executing system and network administration.

  • Working knowledge of Risk Management Framework and how to apply it to network/information system environments.

  • Must be able to regularly lift up to 50 lbs.


Arthur 2
Information Assurance (IA) System Security Engineer II 118-017
Hill AFB, UT
Immediate
01/16/2023

Information Assurance (IA) System Security Engineer II:



The Information System Security Engineer (ISSE) is primarily responsible for conducting information system security engineering activities with a focus on lifecycle of current systems and future requirement scoping.  The position will collect and process the captured information security requirements and ensures that the requirements are effectively integrated into information systems through purposeful security architecting, design, development, and configuration.  The position is an integral part of the development team designing and developing organizational information systems or upgrading legacy systems. The ISSE employs best practices when implementing security requirements within an information system including software engineering methodologies, system/security engineering principles, secure design, secure architecture, and secure coding techniques.  This position’s main function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.




Performance shall include:


  • Perform oversight of the development, implementation and evaluation of information system security program policy; special emphasis placed upon integration of existing SAP network      infrastructures

  • Perform analysis of network security, based upon the Risk Management Framework (RMF) with      emphasize on Joint Special Access Program Implementation Guide (JSIG) authorization process

  • Provides expert support, research and analysis of exceptionally complex problems, and processes relating to them

  • Provides expert level consultation and technical services on all aspects of Information Security

  • Serves as technical expert to the Cybersecurity Assessment Program providing technical direction, interpretation and alternatives to complex problems

  • Thinks independently and demonstrates exceptional written and oral communications skills. Applies advanced technical principles, theories, and concepts

  • Contributes to the development of new principles, concepts, and methodologies

  • Works on unusually complex technical problems and provides highly innovative and ingenious solutions

  • Lead a team of System Security Engineers and Certification and Accreditation Analysts      responsible for ensuring the customers national and international security interests are protected as support equipment are designed and tested

  • Recommends cybersecurity software tools and assists in the development of software tool requirements and selection criteria to include the development of product specific STIGs from applicable DISA SRGs

  • Review ISSE related designs and provides security compliance recommendations

  • Leads technical teams in implementation of predetermined long-range goals and objectives

  • Supports customer and SAP community IA working groups, participate in SSE IPT reviews

  • Provides expert level consultation and technical services on all aspects of Information Security

  • Review ISSE related designs and provides security compliance recommendations

  • Develop and provide IA risk management recommendations to the customer

  • Provide ISSE support for Mission and Training systems design and development

  • Assist with development and maintenance of the Program Protection Plan

  • Assist with site activation activities and design reviews

  • Represent the customer in various ISSE related working groups, advisory groups, and advisory council meetings

  • Chair and or Co-Chair customer and SAP community IA working groups, participate in ISSE IPT      reviews

  • Represent the customer in various SSE related working groups, advisory groups, and advisory      council meetings

  • Strong background in Patch/Configuration management, DevOps, and tier 3 support

  • Assist team to design, integrate, and implement JSIG/RMF Continuous Monitoring tools and processes.

  • Integrate COTS & GOTS products to collect, display and remediate a variety of automated system security and system operations/performance functions and metrics.

  • Perform security assessments of servers/network devices/security appliances.

  • Develop improvements to security assessments with regard to accuracy and efficiency.

  • Integrate ancillary monitoring tools/capabilities with the enterprise security information and event management (SIEM) and create/tailor complex event alarms/rules and summary reports.

  • Write and execute cybersecurity test procedures for validation of control compliance.

  • Monitor/analyze output of cybersecurity related tools for reportable security incidents and residual risk.

  • Analyze technical risk of emerging cybersecurity tools and processes.

  • Work as part of a security incident response team as needed.

  • Build operational Operations and Maintenance (O&M) checklists to maintain the service (daily, weekly, monthly, yearly O&M checklists); build Tactics, Techniques and Processes (TTPs) and Standard Operating Processes (SOPs) associated with service checklists.

  • Integrate/Develop new techniques to improve Confidentiality, Integrity, and Availability for networks/systems operating at various classification levels.

  • Advanced technical competency in one or more of the following supported platforms: Microsoft Windows Server, Active Directory, Red Hat Enterprise Linux servers, MS Hyper-V/VMWare/ESx/Xen Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems, forensic analysis/vulnerability assessment, Group Policy management and configuration, Scripting, BMC Footprints, WSUS, , Lumension, Bitlocker, SQL Server 2012, TomCat, IIS, Windows Server 2012r2/2016, Win 10, Red Hat 6.5, Microsoft Office

  • Toolkits, SEIMs, Logrhythm, ACAS/Nessus/SCAP, mandatory/role-based access control concepts (e. g. SE Linux extensions to RHEL, PitBull, AppArmor, and Sentris) , video teleconferencing/VOIP, Oracle/MS SQL database security, and Apache/IIS Web server security




Experience:


  • 12 - 15 years related experience

  • Prior performance in roles such as ISSO, ISSM, SCA or SAP IT Technical Director




Education:


  • Bachelor’s degree in a related discipline or equivalent experience (4 years)




Certifications:


  • Must meet position and certification requirements outlined in DoD Directive 8570.01-M for      Information Assurance Architect and Engineer Level I or Information Assurance Architect and Engineer Level II within 6 months of the date of hire




Security Clearance:


  • Current Top Secret Clearance with SCI Eligibility

  • Eligibility for access to Special Access Program Information

  • Willingness to submit to a Counterintelligence polygraph




Other Requirements:


  • Must have expert knowledge of DoD, National and applicable service and agency security policy, manuals and standards. Must have the ability to work in a dynamic environment and effectively interact with numerous DOD, military/civilian personnel and industry partners

Arthur 2
Information Systems Security Officer (ISSO) III 118-016
Hanscom AFB, MA
Immediate
01/16/2023

Information Systems Security Officer (ISSO) III:



The ISSO is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO.  The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is assigned responsibility for the day-to-day security operations of a system.  This also will include physical and environmental protection, personnel security, incident handling, and security training and awareness.  It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configuration management across authorization boundaries.  This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.




Performance shall include:


  • Assist the ISSM in meeting their duties and responsibilities

  • Prepare, review, and update authorization packages

  • Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media

  • Notify ISSM when changes occur that might affect the authorization determination of the      information system(s)

  • Conduct periodic reviews of information systems to ensure compliance with the security      authorization package

  • Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change

  • Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly

  • Ensure all IS security-related documentation is current and accessible to properly      authorized individuals

  • Ensure audit records are collected, reviewed, and documented (to include any anomalies)

  • Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties

  • Execute the cyber security portion of the self-inspection, to include provide security      coordination and review of all system assessment plans

  • Identify cyber security vulnerabilities and assist with the implementation of the countermeasures for them

  • Prepare reports on the status of security safeguards applied to computer systems

  • Perform ISSO duties in support of in-house and external customers

  • Conduct continuous monitoring activities for authorization boundaries under your preview

  • Assist Department of Defense, National Agency and Contractor organizations with the development of assessment and authorization (A&A) efforts




Experience:


  • 5 - 7 years related experience

  • Prior performance in roles such as System, Network Administrator or ISSO




Education:


  • Bachelor’s degree or equivalent experience (4 years)




Certifications:


  • Must meet position and certification requirements outlined in DoD Directive 8570.01-M for      Information Assurance Technician Level II or Information Assurance Manager II within 6 months of the date of hire.




Security Clearance:


  • Current Top Secret Clearance with SCI Eligibility

  • Eligibility for access to Special Access Program Information

  • Willingness to submit to a Counterintelligence polygraph




Other Requirements:


  • Must be able to regularly lift up to 50 lbs

Arthur 2
Information Systems Security Manager (ISSM) I 118-015
Hanscom AFB, MA
Immediate
01/16/2023

Information Systems Security Manager (ISSM) I:



The ISSM’s primary function serves as a principal advisor on all matters, technical and otherwise, involving the security of information systems under their purview.  Primary support will be working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense, and Military Compartment efforts.  The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.




Performance shall include:


  • Perform oversight of the development, implementation and evaluation of information system security program policy; special emphasis placed upon integration of existing SAP network infrastructures.

  • Develop and oversee operational information systems security implementation policy and guidelines of network security, based upon the Risk Management Framework (RMF) with emphasize on Joint Special Access Program Implementation Guide (JSIG) authorization process.

  • Advise customer on Risk Management Framework (RMF) assessment and authorization issues.

  • Perform risk assessments and make recommendations to DoD agency customers.

  • Advise government program managers on security testing methodologies and processes.

  • Evaluate authorization documentation and provide written recommendations for authorization to government PMs.

  • Develop and maintain a formal Information Systems Security Program.

  • Ensure that all IAOs, network administrators, and other cyber security personnel receive the necessary technical and security training to carry out their duties.

  • Develop, review, endorse, and recommend action by the AO or DAO of system assessment documentation.

  • Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media.

  • Develop and execute security assessment plans that include verification that the features and assurances required for each protection level functioning.

  • Maintain a and/or applicable repository for all system authorization documentation and modifications.

  • Institute and implement a Configuration Control Board (CCB) charter.

  • Develop policies and procedures for responding to security incidents, to include investigating and reporting security violations and incidents.

  • Ensure proper protection or corrective measures have been taken when an incident or vulnerability has been discovered within a system.

  • Ensure that data ownership and responsibilities are established for each authorization boundary, to include accountability, access rights, and special handling requirements.

  • Ensure development and implementation of an information security education, training, and awareness program, to include attending, monitoring, and presenting local cyber security training.

  • Evaluate threats and vulnerabilities to ascertain whether additional safeguards are needed.

  • Assess changes in the system, its environment, and operational needs that could affect the authorization.

  • Ensure that authorization is accomplished a valid Authorization determination has been given for all authorization boundaries under your purview.

  • Review AIS assessment plans.

  • Coordinate with PSO or cognizant security official on approval of external information systems (e.g., guest systems, interconnected system with another organization).

  • Conduct periodic assessments of the security posture of the authorization boundaries.

  • Ensure configuration management (CM) for security-relevant changes to software, hardware, and firmware and that they are properly documented.

  • Ensure periodic testing is conducted to evaluate the security posture of IS by employing various intrusion/attack detection and monitoring tools (shared responsibility with ISSOs)

  • Ensure that system recovery and reconstitution processes developed and monitored to ensure that the authorization boundary can be recovered based on its availability level determination.

  • Ensure all authorization documentation is current and accessible to properly authorized individuals.

  • Ensure that system security requirements are addressed during all phases of the system life cycle.

  • Develop Assured File Transfers (AFT) on accordance with the JSIG.

  • Participate in self-inspections.

  • Conduct the duties of the Information System Security Officer (ISSO) if one is not present and/or available




Experience:


  • 5 - 7 years related experience

  • Prior performance in roles such as ISSO or ISSM




Education:


  • Bachelor’s degree in a related area or equivalent experience (4 years)




Certifications:


  • Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level II or Information Assurance Manager Level I within 6 months of the date of hire.




Security Clearance


  • Current Top Secret Clearance with SCI Eligibility

  • Eligibility for access to Special Access Program Information

  • Willingness to submit to a Counterintelligence polygraph




Other Requirements


  • Must having working knowledge of DoD, National and applicable service and agency security policy, manuals and standards.

  • Must be able to regularly lift up-to 50lbs


Arthur 2
Activity Security Representative II 118-014
Hanscom AFB, MA
Immediate
01/16/2023

Activity Security Representative II:



The Activity Security Representative’s primary function is to provide multi-disciplined security support to a customer’s facility and organization.  The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.




Performance shall include:


  • Classification reviews of inbound and outbound correspondence

  • Assist in the maintenance of a document accountability database and associated correspondence

  • Processing inbound and outbound classified mail and receipt records

  • Perform destruction of classified materials

  • Process magnetic media for accountability

  • Reproduction support for classified materials

  • Maintain various daily logs for a variety of administrative functions associated with document control

  • Assist in the processing of inbound data and outbound data transfer files

  • Transfer electronic data files to internal customers

  • Maintain an extensive customer database point of contact listing

  • Assist with researching, processing, filing, and maintaining inbound and outbound visit notices

  • Escort facility visitors and maintains associated logs

  • Assist in the preparation of facility access control badges

  • Conduct entry and exit inspections

  • Assist in the maintenance of facility access control entry systems, to include visitor control

  • Perform data entry to the Personnel Access Security System database and maintain all customer sponsored billets and quota information

  • Assist in maintaining personnel security files for all personnel of the supported element

  • Follow and enforce the customer’s Standard Operating Procedures

  • Provide support for the security awareness and education programs

  • Perform miscellaneous administrative support functions as directed by the contractor site lead and/or the Senior Security Representative

  • Review, track, and monitor security clearance processing activities with appropriate government personnel to achieve appropriate clearance actions

  • Participate in Air Force SAP security compliance inspections of government organizations and industry

  • Implement Top Secret Control for accountable material and associated correspondence

  • Prepare and/or process inbound and outbound classified mail, faxes, courier packages and receipts

  • Prepare, process, and/or review Program Access Request (PARs) for accuracy and access eligibility

  • Execute Special Access Program Nomination Process Questionnaires

  • Conduct Defense Central Index of Investigations (DCII), Joint Personnel Access System (JPAS), and SAPNP reviews of candidates being submitted for SAP access

  • Perform data entry and record checks in the Air Force Access Data System (AFADS) and maintains all customer sponsored personnel access information current

  • Perform indoctrinations




Experience:


  • 3-5 years related experience

  • Security Fundamentals Professional Certification (SFPC) counts towards 3 years of experience

  • Special Program Security Certification (SPSC) counts towards 5 years of experience

  • Maximum equivalent experience for SPED Certifications is no more than 5 years




Education:


  • Bachelor’s degree or equivalent experience (4 years)




Certifications:


  • Must complete the DoD SAPCO approved SAPNP training (if performing personnel security functions)




Security Clearance:


  • Current Top Secret Clearance with SCI Eligibility

  • Eligibility for access to Special Access Program Information

  • Willingness to submit to a Counterintelligence polygraph


Arthur 2
Information Assurance (IA) System Security Engineer I 118-013
Bolling AFB, Washington DC
Immediate
01/16/2023

Information Assurance (IA) System Security Engineer I:



The Information System Security Engineer (ISSE) is primarily responsible for conducting information system security engineering activities with a focus on lifecycle of current systems and future requirement scoping.  The position will collect and process the captured information security requirements and ensures that the requirements are effectively integrated into information systems through purposeful security architecting, design, development, and configuration.  The position is an integral part of the development team designing and developing organizational information systems or upgrading legacy systems.  The ISSE employs best practices when implementing security requirements within an information system including software engineering methodologies, system/security engineering principles, secure design, secure architecture, and secure coding techniques.  This position’s main function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.




Performance shall include:


  • Perform oversight of the development, implementation and evaluation of information system security program policy; special emphasis placed upon integration of existing SAP network      infrastructures

  • Perform analysis of network security, based upon the Risk Management Framework (RMF) with      emphasize on Joint Special Access Program Implementation Guide (JSIG) authorization process

  • Provides expert support, research and analysis of exceptionally complex problems, and processes relating to them

  • Serves as technical expert to the Cybersecurity Assessment Program providing technical direction, interpretation and alternatives to complex problems

  • Thinks independently and demonstrates exceptional written and oral communications skills. Applies advanced technical principles, theories, and concepts

  • Contributes to the development of new principles, concepts, and methodologies.

  • Works on unusually complex technical problems and provides highly innovative and ingenious solutions

  • Recommends cybersecurity software tools and assists in the development of software tool requirements and selection criteria to include the development of product specific STIGs from      applicable DISA SRGs

  • Leads technical teams in implementation of predetermined long-range goals and objectives

  • Support customer and SAP community IA working groups, participate in SSE IPT reviews

  • Provides expert level consultation and technical services on all aspects of Information Security

  • Review ISSE related designs and provides security compliance recommendations

  • Develop and provide IA risk management recommendations to the customer

  • Provide ISSE support for Mission and Training systems design and development

  • Assist with development and maintenance of the Program Protection Plan

  • Assist with site activation activities and design reviews

  • Represent the customer in various ISSE related working groups, advisory groups, and advisory council meetings

  • Strong background in Patch/Configuration management, DevOps, and tier 3 support

  • Assist team to design, integrate, and implement JSIG/RMF Continuous Monitoring tools and processes.

  • Integrate COTS & GOTS products to collect, display and remediate a variety of automated system security and system operations/performance functions and metrics.

  • Perform security assessments of servers/network devices/security appliances

  • Develop improvements to security assessments with regard to accuracy and efficiency

  • Integrate ancillary monitoring tools/capabilities with the enterprise security information and event management (SIEM) and create/tailor complex event alarms/rules and summary reports

  • Write and execute cybersecurity test procedures for validation of control compliance

  • Monitor/analyze output of cybersecurity related tools for reportable security incidents and residual risk

  • Analyze technical risk of emerging cybersecurity tools and processes

  • Work as part of a security incident response team as needed.

  • Build operational Operations and Maintenance (O&M) checklists to maintain the service (daily, weekly, monthly, yearly O&M checklists); build Tactics, Techniques and Processes (TTPs) and Standard Operating Processes (SOPs) associated with service checklists.

  • Integrate/Develop new techniques to improve Confidentiality, Integrity, and Availability for networks/systems operating at various classification levels.

  • Advanced technical competency in one or more of the following supported platforms: Microsoft Windows Server, Active Directory, Red Hat Enterprise Linux servers, MS Hyper-V/VMWare/ESx/Xen Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems, forensic analysis/vulnerability assessment, Group Policy management and configuration, Scripting, BMC Footprints, WSUS, Lumension, Bitlocker, SQL Server 2012, TomCat, IIS, Windows Server 2012r2/2016, Win 10, Red Hat 6.5, Microsoft Office.

  • Toolkits, SEIMs, Logrhythm, ACAS/Nessus/SCAP, mandatory/role-based access control concepts (e. g. SE Linux extensions to RHEL, PitBull, AppArmor, and Sentris) , video teleconferencing/VOIP, Oracle/MS SQL database security, and Apache/IIS Web server security




Experience:


  • 10 - 12 years related experience

  • Prior performance in roles such as ISSO, ISSM, SCA or SAP IT Technical Director




Education:


  • Bachelor’s degree in a related discipline or equivalent experience (4 years)




Certifications:


  • Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Manager Level III or Information Assurance Architect and Engineer Level I within 6 months of the date of hire




Security Clearance:


  • Current Top Secret Clearance with SCI Eligibility

  • Eligibility for access to Special Access Program Information

  • Willingness to submit to a Counterintelligence polygraph




Other Requirements:


  • Must have expert knowledge of DoD, National and applicable service and agency security policy, manuals and standards. Must have the ability to work in a dynamic environment and effectively interact with numerous DOD, military/civilian personnel and industry partners

Arthur 2
Information Systems Security Officer (ISSO) II 118-012
Kirtland AFB, NM
Immediate
01/16/2023

Information Systems Security Officer (ISSO) II:



The ISSO is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO. The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is assigned responsibility for the day-to-day security operations of a system. This also will include physical and environmental protection, personnel security, incident handling, and security training and awareness.  It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configuration management across authorization boundaries.  This will include assessing the security impact of those changes and making recommendation to the ISSM.  The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.




Performance shall include:


  • Assist the ISSM in meeting their duties and responsibilities

  • Prepare, review, and update authorization packages

  • Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media

  • Notify ISSM when changes occur that might affect the authorization determination of the information system(s)

  • Conduct periodic reviews of information systems to ensure compliance with the security authorization package

  • Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change

  • Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly

  • Ensure all IS security-related documentation is current and accessible to properly authorized individuals

  • Ensure audit records are collected, reviewed, and documented (to include any anomalies)

  • Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties

  • Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans

  • Identify cyber security vulnerabilities and assist with the implementation of the countermeasures for them

  • Prepare reports on the status of security safeguards applied to computer systems

  • Perform ISSO duties in support of in-house and external customers

  • Conduct security impact analysis activities and provide to the ISSM on all configuration management changes to the authorization boundaries




Experience:


  • 2 - 5 years related experience

  • Prior performance in roles such as System, Network Administrator or ISSO




Education:


  • Bachelor’s degree or equivalent experience (4 years)




Certifications:


  • Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level II or Information Assurance Manager II within 6 months of the date of hire




Security Clearance:


  • Current Top-Secret Clearance with SCI Eligibility

  • Eligibility for access to Special Access Program Information

  • Willingness to submit to a Counterintelligence polygraph




Other Requirements:


  • Must be able to regularly lift up to 50 lbs.

Arthur 2
Information Systems Security Officer (ISSO) II 118-011
Schriever AFB, CO
Immediate
01/16/2023

Information Systems Security Officer (ISSO) II:



The ISSO is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO. The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is assigned responsibility for the day-to-day security operations of a system. This also will include physical and environmental protection, personnel security, incident handling, and security training and awareness.  It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configuration management across authorization boundaries.  This will include assessing the security impact of those changes and making recommendation to the ISSM.  The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.




Performance shall include:


  • Assist the ISSM in meeting their duties and responsibilities

  • Prepare, review, and update authorization packages

  • Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media

  • Notify ISSM when changes occur that might affect the authorization determination of the information system(s)

  • Conduct periodic reviews of information systems to ensure compliance with the security authorization package

  • Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change

  • Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly

  • Ensure all IS security-related documentation is current and accessible to properly authorized individuals

  • Ensure audit records are collected, reviewed, and documented (to include any anomalies)

  • Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties

  • Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans

  • Identify cyber security vulnerabilities and assist with the implementation of the countermeasures for them

  • Prepare reports on the status of security safeguards applied to computer systems

  • Perform ISSO duties in support of in-house and external customers

  • Conduct security impact analysis activities and provide to the ISSM on all configuration management changes to the authorization boundaries




Experience:


  • 2 - 5 years related experience

  • Prior performance in roles such as System, Network Administrator or ISSO




Education:


  • Bachelor’s degree or equivalent experience (4 years)




Certifications:


  • Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level II or Information Assurance Manager II within 6 months of the date of hire




Security Clearance:


  • Current Top-Secret Clearance with SCI Eligibility

  • Eligibility for access to Special Access Program Information

  • Willingness to submit to a Counterintelligence polygraph




Other Requirements:


  • Must be able to regularly lift up to 50 lbs.

Arthur 2
Information Systems Security Officer (ISSO) II 118-010
Kirtland AFB, NM
Immediate
01/15/2023

Information Systems Security Officer (ISSO) II:



The ISSO is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO. The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is assigned responsibility for the day-to-day security operations of a system. This also will include physical and environmental protection, personnel security, incident handling, and security training and awareness.  It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configuration management across authorization boundaries.  This will include assessing the security impact of those changes and making recommendation to the ISSM.  The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.




Performance shall include:


  • Assist the ISSM in meeting their duties and responsibilities

  • Prepare, review, and update authorization packages

  • Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media

  • Notify ISSM when changes occur that might affect the authorization determination of the information system(s)

  • Conduct periodic reviews of information systems to ensure compliance with the security authorization package

  • Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change

  • Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly

  • Ensure all IS security-related documentation is current and accessible to properly authorized individuals

  • Ensure audit records are collected, reviewed, and documented (to include any anomalies)

  • Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties

  • Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans

  • Identify cyber security vulnerabilities and assist with the implementation of the countermeasures for them

  • Prepare reports on the status of security safeguards applied to computer systems

  • Perform ISSO duties in support of in-house and external customers

  • Conduct security impact analysis activities and provide to the ISSM on all configuration management changes to the authorization boundaries




Experience:


  • 2 - 5 years related experience

  • Prior performance in roles such as System, Network Administrator or ISSO




Education:


  • Bachelor’s degree or equivalent experience (4 years)




Certifications:


  • Must meet position and certification requirements outlined in DoD Directive 8570.01-M for      Information Assurance Technician Level II or Information Assurance Manager II within 6 months of the date of hire




Security Clearance:


  • Current Top-Secret Clearance with SCI Eligibility

  • Eligibility for access to Special Access Program Information

  • Willingness to submit to a Counterintelligence polygraph




Other Requirements:


  • Must be able to regularly lift up to 50 lbs.

Arthur 2
Information Technology-Assurance Specialist III 118-009
Hill AFB, UT
Immediate
01/15/2023

Information Technology/Assurance Specialist III:



The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.




Performance shall include:


  • Establish complex operational software configuration controls and system interfaces for computer system(s) assigned

  • Maintain file servers, Firewalls, network access, Security Monitoring Systems and system documentation as required

  • Analyze and troubleshoot system anomalies to ensure optimum equipment performance

  • Prepare system for operational use and support operational tests

  • Review, prepare, and update authorization packages

  • Notify customer when changes occur that might affect authorization accreditation

  • Conduct cybersecurity portion of the self-inspection’s checklist

  • Review and provide technical and cyber security coordination on all Bodies of Evidence that make-up the authorization package

  • Identify any and all vulnerabilities and implement countermeasures

  • Ensure information systems and network appliances are operated, maintained, and disposed of in accordance with security policies and practices

  • Perform Video-Teleconferencing VTC System Administration, Scheduling, & Configuration

  • Provide External Information System(s) Client Support

  • Perform account creations, changes, & deletions on multiple authorization boundaries

  • Perform Help Desk & troubleshooting activities

  • Perform Hardware/Software System Configuration, upgrades and modifications

  • Perform system and network appliance patching activities

  • Provide Government-Issued Laptop Support

  • Assist in Media Control & Accountability activities

  • Perform COMSEC account/equipment management activities




Experience:


  • 8-10 years related experience

  • Prior performance in roles such as System, Network Administrator or Information Technology/Assurance Specialists




Education:


  • Bachelor’s degree or equivalent experience (4 years)




Certifications:


  • Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level II or Information Assurance Manager II within 6 months of the date of hire.




Security Clearance:


  • Current Top Secret Clearance with SCI Eligibility

  • Eligibility for access to Special Access Program Information

  • Willingness to submit to a Counterintelligence polygraph




Other Requirements:


  • Thorough knowledge of Microsoft Windows 2012R2 Server, Microsoft Exchange Server 2010/2016, Microsoft Windows 7/10 operating systems (OS) administration and associated hardware.

  • Working knowledge of Local Area Network (LAN) and Wide Area Network (WAN) technologies and data backup technologies to include communication security (COMSEC) integration

  • Working knowledge of Risk Management Framework, and Joint DODIIS/Cryptologic SCI Information Systems Security Standards, Common Criteria, and System Security Policy as they relate to C&A

  • Working knowledge and current relevant experience with PL2 systems; experience with PL3 & PL4 cross domain solutions

  • Must be able to regularly lift up to 50 lbs

Arthur 2
Information Technology-Assurance Specialist III 118-008
Hill AFB, UT
Immediate
01/15/2023

Information Technology/Assurance Specialist III:



The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.




Performance shall include:


  • Establish complex operational software configuration controls and system interfaces for      computer system(s) assigned

  • Maintain file servers, Firewalls, network access, Security Monitoring Systems and system      documentation as required

  • Analyze and troubleshoot system anomalies to ensure optimum equipment performance

  • Prepare system for operational use and support operational tests

  • Review, prepare, and update authorization packages

  • Notify customer when changes occur that might affect authorization accreditation

  • Conduct cybersecurity portion of the self-inspection’s checklist

  • Review and provide technical and cyber security coordination on all Bodies of Evidence that      make-up the authorization package

  • Identify any and all vulnerabilities and implement countermeasures

  • Ensure information systems and network appliances are operated, maintained, and disposed of in accordance with security policies and practices

  • Perform Video-Teleconferencing VTC System Administration, Scheduling, & Configuration

  • Provide External Information System(s) Client Support

  • Perform account creations, changes, & deletions on multiple authorization boundaries

  • Perform Help Desk & troubleshooting activities

  • Perform Hardware/Software System Configuration, upgrades and modifications

  • Perform system and network appliance patching activities

  • Provide Government-Issued Laptop Support

  • Assist in Media Control & Accountability activities

  • Perform COMSEC account/equipment management activities




Experience:


  • 8-10 years related experience

  • Prior performance in roles such as System, Network Administrator or Information Technology/Assurance Specialists




Education:


  • Bachelor’s degree or equivalent experience (4 years)




Certifications:


  • Must meet position and certification requirements outlined in DoD Directive 8570.01-M for      Information Assurance Technician Level II or Information Assurance Manager II within 6 months of the date of hire.




Security Clearance:


  • Current Top Secret Clearance with SCI Eligibility

  • Eligibility for access to Special Access Program Information

  • Willingness to submit to a Counterintelligence polygraph




Other Requirements:


  • Thorough knowledge of Microsoft Windows 2012R2 Server, Microsoft Exchange Server 2010/2016, Microsoft Windows 7/10 operating systems (OS) administration and associated hardware.

  • Working knowledge of Local Area Network (LAN) and Wide Area Network (WAN) technologies and data backup technologies to include communication security (COMSEC) integration

  • Working knowledge of Risk Management Framework, and Joint DODIIS/Cryptologic SCI Information Systems Security Standards, Common Criteria, and System Security Policy as      they relate to C&A

  • Working knowledge and current relevant experience with PL2 systems; experience with PL3 &      PL4 cross domain solutions

  • Must be able to regularly lift up to 50 lbs

Arthur 2
Security Control Assessor (SCA) I 118-007
Wright Patterson AFB, OH
Immediate
01/15/2023

Security Control Assessor (SCA) I:



The SCA is responsible for conducting a comprehensive assessment of the management, operational, and technical security controls employed within or inherited by an IS to determine the overall effectiveness of the controls (i.e., the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting the security requirements for the system). SCAs also provide an assessment of the severity of weaknesses or deficiencies discovered in the IS and its environment of operation and recommend corrective actions to address identified vulnerabilities. Responsibilities will cover Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities within the customer’s area of responsibility.




Performance shall include:


  • Perform oversight of the development, implementation and evaluation of IS security program policy; special emphasis placed upon integration of existing SAP network infrastructure

  • Perform assessment of ISs, based upon the Risk Management Framework (RMF) methodology in accordance with the Joint Special Access Program (SAP) Implementation Guide (JSIG)

  • Advise the Information System Owner (ISO), Information Data Owner (IDO), Program Security Officer (PSO), and the Delegated and/or Authorizing Official (DAO/AO) on any assessment and authorization issues

  • Evaluate Authorization packages and make recommendation to the AO and/or DAO for authorization

  • Evaluate IS threats and vulnerabilities to determine whether additional safeguards are required

  • Advise the Government concerning the impact levels for Confidentiality, Integrity, and Availability for the information on a system

  • Ensure security assessments are completed and results documented and prepare the Security Assessment Report (SAR) for the Authorization boundary

  • Initiate a Plan of Action and Milestones (POA&M) with identified weaknesses for each Authorization Boundaries assessed, based on findings and recommendations from the SAR

  • Evaluate security assessment documentation and provide written recommendations      for security authorization to the Government

  • Discuss recommendation for authorization and submit the security authorization package to the AO/DAO

  • Assess proposed changes to Authorization boundaries operating environment and mission needs to determine the continuation to operate.

  • Review and concur with all sanitization and clearing procedures in accordance with Government guidance and/or policy

  • Assist the Government compliance inspections

  • Assist the Government with security incidents that relate to cybersecurity and ensure that the proper and corrective measures have been taken

  • Ensure organization are addressing and conducting all phases of the system development life cycle (SDLC)

  • Evaluate Hardware and Software to determine security impact that it might have on Authorization boundaries

  • Evaluate the effectiveness and implementation of Continuous Monitoring Plans

  • Represent the customer on inspection teams




Experience:


  • 5 - 7 years related experience

  • Minimum of three (3) years’ experience in SAP, SCI or Collateral Information Systems (IS) Security and the implementation of regulations identified in the description of duties

  • Prior performance in the role of ISSO and ISSM




Education:


  • Bachelor’s degree in a related discipline or equivalent experience (4 years)




Certifications:


  • Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level III or Information Assurance Manager Level I within 6 months of the date of hire




Security Clearance:


  • Current Top Secret Clearance with SCI Eligibility

  • Eligibility for access to Special Access Program Information

  • Willingness to submit to a Counterintelligence polygraph




Other Requirements:


  • Must be able to regularly lift 50lbs

Arthur 2
Information Systems Security Manager (ISSM) II 118-006
Hill AFB, UT
Immediate
01/15/2023

Information Systems Security Manager (ISSM) II:



The ISSM’s primary function serves as a principal advisor on all matters, technical and otherwise, involving the security of information systems under their purview.  Primary support will be working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense, and Military Compartment efforts.  The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.




Performance shall include:


  • Perform oversight of the development, implementation and evaluation of information system security program policy; special emphasis placed upon integration of existing SAP network infrastructures

  • Develop and oversee operational information systems security implementation policy and guidelines of network security, based upon the Risk Management Framework (RMF) with emphasize on Joint Special Access Program Implementation Guide (JSIG) authorization process

  • Advise customer on Risk Management Framework (RMF) assessment and authorization issues

  • Perform risk assessments and make recommendations to DoD agency customers

  • Advise government program managers on security testing methodologies and processes

  • Evaluate authorization documentation and provide written recommendations for authorization to government PM’s

  • Develop and maintain a formal Information Systems Security Program

  • Ensure that all IAOs, network administrators, and other cyber security personnel receive the necessary technical and security training to carry out their duties

  • Develop, review, endorse, and recommend action by the AO or DAO of system assessment documentation

  • Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media

  • Develop and execute security assessment plans that include verification that the features and assurances required for each protection level functioning

  • Maintain a and/or applicable repository for all system authorization documentation and modifications

  • Develop policies and procedures for responding to security incidents, to include investigating and reporting security violations and incidents

  • Ensure proper protection or corrective measures have been taken when an incident or vulnerability has been discovered within a system

  • Ensure that data ownership and responsibilities are established for each authorization boundary, to include accountability, access rights, and special handling requirements

  • Ensure development and implementation of an information security education, training, and awareness program, to include attending, monitoring, and presenting local cyber security training.

  • Evaluate threats and vulnerabilities to ascertain whether additional safeguards are needed

  • Assess changes in the system, its environment, and operational needs that could affect the authorization

  • Ensure that authorization is accomplished a valid Authorization determination has been given for all authorization boundaries under your purview

  • Review AIS assessment plans

  • Coordinate with PSO or cognizant security official on approval of external information systems (e.g., guest systems, interconnected system with another organization)

  • Conduct periodic assessments of the security posture of the authorization boundaries

  • Institute and implement a Configuration Control Board (CCB) charter

  • Ensure configuration management (CM) for security-relevant changes to software, hardware, and firmware and that they are properly documented

  • Ensure periodic testing is conducted to evaluate the security posture of IS by employing various intrusion/attack detection and monitoring tools (shared responsibility with ISSOs)

  • Ensure that system recovery and reconstitution processes developed and monitored to ensure that the authorization boundary can be recovered based on its availability level determination

  • Ensure all authorization documentation is current and accessible to properly authorized individuals

  • Ensure that system security requirements are addressed during all phases of the system life cycle

  • Participate in self-inspections

  • Periodically review system security to accommodate changes to policy or technology

  • Coordinate all technical security issues outside of area of expertise or responsibility with ISSE

  • Provide expert research and analysis in support of expanding programs and area of responsibility as it pertains to cyber security and information technology activities

  • Develop Assured File Transfers (AFT) on accordance with the JSIG

  • Provide leadership, mentoring, and quality assurance for Cyber Security and Information Technology team members




Experience:


  • 7 - 9 years related experience

  • Prior performance in roles such as ISSO or ISSM




Education:


  • Bachelor’s degree or equivalent experience (4 years)




Certifications:


  • Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level 2 or Information Assurance Manager Level 2 within 6 months of the date of hire




Security Clearance:


  • Current Top Secret Clearance with SCI Eligibility

  • Eligibility for access to Special Access Program Information

  • Willingness to submit to a Counterintelligence polygraph




Other Requirements:


  • Must be able to regularly lift up to 50 lbs

Arthur 2
Information Systems Security Manager (ISSM) II 118-005
Hanscom AFB, MA
Immediate
01/15/2023

Information Systems Security Manager (ISSM) II:



The ISSM’s primary function serves as a principal advisor on all matters, technical and otherwise, involving the security of information systems under their purview.  Primary support will be working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense, and Military Compartment efforts.  The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.




Performance shall include:


  • Perform oversight of the development, implementation and evaluation of information system security program policy; special emphasis placed upon integration of existing SAP network infrastructures

  • Develop and oversee operational information systems security implementation policy and guidelines of network security, based upon the Risk Management Framework (RMF) with emphasize on Joint Special Access Program Implementation Guide (JSIG) authorization process

  • Advise customer on Risk Management Framework (RMF) assessment and authorization issues

  • Perform risk assessments and make recommendations to DoD agency customers

  • Advise government program managers on security testing methodologies and processes

  • Evaluate authorization documentation and provide written recommendations for authorization to government PM’s

  • Develop and maintain a formal Information Systems Security Program

  • Ensure that all IAOs, network administrators, and other cyber security personnel receive the necessary technical and security training to carry out their duties

  • Develop, review, endorse, and recommend action by the AO or DAO of system assessment documentation

  • Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media

  • Develop and execute security assessment plans that include verification that the features and assurances required for each protection level functioning

  • Maintain a and/or applicable repository for all system authorization documentation and modifications

  • Develop policies and procedures for responding to security incidents, to include investigating and reporting security violations and incidents

  • Ensure proper protection or corrective measures have been taken when an incident or vulnerability has been discovered within a system

  • Ensure that data ownership and responsibilities are established for each authorization boundary, to include accountability, access rights, and special handling requirements

  • Ensure development and implementation of an information security education, training, and awareness program, to include attending, monitoring, and presenting local cyber security training.

  • Evaluate threats and vulnerabilities to ascertain whether additional safeguards are needed

  • Assess changes in the system, its environment, and operational needs that could affect the authorization

  • Ensure that authorization is accomplished a valid Authorization determination has been given for all authorization boundaries under your purview

  • Review AIS assessment plans

  • Coordinate with PSO or cognizant security official on approval of external information systems (e.g., guest systems, interconnected system with another organization)

  • Conduct periodic assessments of the security posture of the authorization boundaries

  • Institute and implement a Configuration Control Board (CCB) charter

  • Ensure configuration management (CM) for security-relevant changes to software, hardware, and firmware and that they are properly documented

  • Ensure periodic testing is conducted to evaluate the security posture of IS by employing various intrusion/attack detection and monitoring tools (shared responsibility with ISSOs)

  • Ensure that system recovery and reconstitution processes developed and monitored to ensure that the authorization boundary can be recovered based on its availability level determination

  • Ensure all authorization documentation is current and accessible to properly authorized individuals

  • Ensure that system security requirements are addressed during all phases of the system life cycle

  • Participate in self-inspections

  • Periodically review system security to accommodate changes to policy or technology

  • Coordinate all technical security issues outside of area of expertise or responsibility with ISSE

  • Provide expert research and analysis in support of expanding programs and area of responsibility as it pertains to cyber security and information technology activities

  • Develop Assured File Transfers (AFT) on accordance with the JSIG

  • Provide leadership, mentoring, and quality assurance for Cyber Security and Information Technology team members




Experience:


  • 7 - 9 years related experience

  • Prior performance in roles such as ISSO or ISSM




Education:


  • Bachelor’s degree or equivalent experience (4 years)




Certifications:


  • Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level 2 or Information Assurance Manager Level 2 within 6 months of the date of hire




Security Clearance:


  • Current Top Secret Clearance with SCI Eligibility

  • Eligibility for access to Special Access Program Information

  • Willingness to submit to a Counterintelligence polygraph




Other Requirements:


  • Must be able to regularly lift up to 50 lbs

Arthur 2
Information Systems Security Manager (ISSM) II 118-004
Wright Patterson AFB, OH
Immediate
01/15/2023

Information Systems Security Manager (ISSM) II:



The ISSM’s primary function serves as a principal advisor on all matters, technical and otherwise, involving the security of information systems under their purview.  Primary support will be working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense, and Military Compartment efforts.  The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.




Performance shall include:


  • Perform oversight of the development, implementation and evaluation of information system security program policy; special emphasis placed upon integration of existing SAP network infrastructures

  • Develop and oversee operational information systems security implementation policy and guidelines of network security, based upon the Risk Management Framework (RMF) with emphasize on Joint Special Access Program Implementation Guide (JSIG) authorization process

  • Advise customer on Risk Management Framework (RMF) assessment and authorization issues

  • Perform risk assessments and make recommendations to DoD agency customers

  • Advise government program managers on security testing methodologies and processes

  • Evaluate authorization documentation and provide written recommendations for authorization to government PM’s

  • Develop and maintain a formal Information Systems Security Program

  • Ensure that all IAOs, network administrators, and other cyber security personnel receive the necessary technical and security training to carry out their duties

  • Develop, review, endorse, and recommend action by the AO or DAO of system assessment documentation

  • Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media

  • Develop and execute security assessment plans that include verification that the features and assurances required for each protection level functioning

  • Maintain a and/or applicable repository for all system authorization documentation and modifications

  • Develop policies and procedures for responding to security incidents, to include investigating and reporting security violations and incidents

  • Ensure proper protection or corrective measures have been taken when an incident or vulnerability has been discovered within a system

  • Ensure that data ownership and responsibilities are established for each authorization boundary, to include accountability, access rights, and special handling requirements

  • Ensure development and implementation of an information security education, training, and awareness program, to include attending, monitoring, and presenting local cyber security training.

  • Evaluate threats and vulnerabilities to ascertain whether additional safeguards are needed

  • Assess changes in the system, its environment, and operational needs that could affect the authorization

  • Ensure that authorization is accomplished a valid Authorization determination has been given for all authorization boundaries under your purview

  • Review AIS assessment plans

  • Coordinate with PSO or cognizant security official on approval of external information systems (e.g., guest systems, interconnected system with another organization)

  • Conduct periodic assessments of the security posture of the authorization boundaries

  • Institute and implement a Configuration Control Board (CCB) charter

  • Ensure configuration management (CM) for security-relevant changes to software, hardware, and firmware and that they are properly documented

  • Ensure periodic testing is conducted to evaluate the security posture of IS by employing various intrusion/attack detection and monitoring tools (shared responsibility with ISSOs)

  • Ensure that system recovery and reconstitution processes developed and monitored to ensure that the authorization boundary can be recovered based on its availability level determination

  • Ensure all authorization documentation is current and accessible to properly authorized individuals

  • Ensure that system security requirements are addressed during all phases of the system life cycle

  • Participate in self-inspections

  • Periodically review system security to accommodate changes to policy or technology

  • Coordinate all technical security issues outside of area of expertise or responsibility with ISSE

  • Provide expert research and analysis in support of expanding programs and area of responsibility as it pertains to cyber security and information technology activities

  • Develop Assured File Transfers (AFT) on accordance with the JSIG

  • Provide leadership, mentoring, and quality assurance for Cyber Security and Information Technology team members




Experience:


  • 7 - 9 years related experience

  • Prior performance in roles such as ISSO or ISSM




Education:


  • Bachelor’s degree or equivalent experience (4 years)




Certifications:


  • Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level 2 or Information Assurance Manager Level 2 within 6 months of the date of hire




Security Clearance:


  • Current Top Secret Clearance with SCI Eligibility

  • Eligibility for access to Special Access Program Information

  • Willingness to submit to a Counterintelligence polygraph




Other Requirements:


  • Must be able to regularly lift up to 50 lbs

Arthur 2
Activity Security Representative II 118-003
Hampton, VA
Immediate
01/15/2023

Activity Security Representative II:



The Activity Security Representative’s primary function is to provide multi-disciplined security support to a customer’s facility and organization.  The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.




Performance shall include:


  • Classification reviews of inbound and outbound correspondence.

  • Assist in the maintenance of a document accountability database and associated correspondence

  • Processing inbound and outbound classified mail and receipt records

  • Perform destruction of classified materials

  • Process magnetic media for accountability

  • Reproduction support for classified materials

  • Maintain various daily logs for a variety of administrative functions associated with document control

  • Assist in the processing of inbound data and outbound data transfer files

  • Transfer electronic data files to internal customers

  • Maintain an extensive customer database point of contact listing

  • Assist with researching, processing, filing, and maintaining inbound and outbound visit notices

  • Escort facility visitors and maintains associated logs

  • Assist in the preparation of facility access control badges

  • Conduct entry and exit inspections

  • Assist in the maintenance of facility access control entry systems, to include visitor control

  • Perform data entry to the Personnel Access Security System database and maintain all customer sponsored billets and quota information

  • Assist in maintaining personnel security files for all personnel of the supported element

  • Follow and enforce the customer’s Standard Operating Procedures

  • Provide support for the security awareness and education programs

  • Perform miscellaneous administrative support functions as directed by the contractor site lead and/or the Senior Security Representative

  • Review, track, and monitor security clearance processing activities with appropriate government personnel to achieve appropriate clearance actions

  • Participate in Air Force SAP security compliance inspections of government organizations and industry

  • Implement Top Secret Control for accountable material and associated correspondence

  • Prepare and/or process inbound and outbound classified mail, faxes, courier packages and receipts

  • Prepare, process, and/or review Program Access Request (PARs) for accuracy and access eligibility

  • Execute Special Access Program Nomination Process Questionnaires

  • Conduct Defense Central Index of Investigations (DCII), Joint Personnel Access System (JPAS), and SAPNP reviews of candidates being submitted for SAP access

  • Perform data entry and record checks in the Air Force Access Data System (AFADS) and maintains all customer sponsored personnel access information current

  • Perform indoctrinations




Experience:


  • 3-5 years related experience

  • Security Fundamentals Professional Certification (SFPC) counts towards 3 years of experience

  • Special Program Security Certification (SPSC) counts towards 5 years of experience

  • Maximum equivalent experience for SPED Certifications is no more than 5 years




Education:


  • Bachelor’s degree or equivalent experience (4 years)




Certifications:


  • Must complete the DoD SAPCO approved SAPNP training (if performing personnel security functions)




Security Clearance:


  • Current Top Secret Clearance with SCI Eligibility

  • Eligibility for access to Special Access Program Information

  • Willingness to submit to a Counterintelligence polygraph

Arthur 2
Activity Security Representative II 118-002
Kirtland AFB, NM
Immediate
01/15/2023

Activity Security Representative 2:



The Activity Security Representative’s primary function is to provide multi-disciplined security support to a customer’s facility and organization.  The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.




Performance shall include:


  • Classification reviews of inbound and outbound correspondence

  • Assist in the maintenance of a document accountability database and associated correspondence

  • Processing inbound and outbound classified mail and receipt records

  • Perform destruction of classified materials

  • Process magnetic media for accountability

  • Reproduction support for classified materials

  • Maintain various daily logs for a variety of administrative functions associated with document control

  • Assist in the processing of inbound data and outbound data transfer files

  • Transfer electronic data files to internal customers

  • Maintain an extensive customer database point of contact listing

  • Assist with researching, processing, filing, and maintaining inbound and outbound visit notices

  • Escort facility visitors and maintains associated logs

  • Assist in the preparation of facility access control badges

  • Conduct entry and exit inspections

  • Assist in the maintenance of facility access control entry systems, to include visitor control

  • Perform data entry to the Personnel Access Security System database and maintain all customer sponsored billets and quota information

  • Assist in maintaining personnel security files for all personnel of the supported element

  • Follow and enforce the customer’s Standard Operating Procedures

  • Provide support for the security awareness and education programs

  • Perform miscellaneous administrative support functions as directed by the contractor site lead and/or the Senior Security Representative

  • Review, track, and monitor security clearance processing activities with appropriate government personnel to achieve appropriate clearance actions

  • Participate in Air Force SAP security compliance inspections of government organizations and industry

  • Implement Top Secret Control for accountable material and associated correspondence

  • Prepare and/or process inbound and outbound classified mail, faxes, courier packages and receipts

  • Prepare, process, and/or review Program Access Request (PARs) for accuracy and access eligibility

  • Execute Special Access Program Nomination Process Questionnaires

  • Conduct Defense Central Index of Investigations (DCII), Joint Personnel Access System (JPAS), and SAPNP reviews of candidates being submitted for SAP access

  • Perform data entry and record checks in the Air Force Access Data System (AFADS) and maintains all customer sponsored personnel access information current

  • Perform indoctrinations




Experience:


  • 3-5 years related experience

  • Security Fundamentals Professional Certification (SFPC) counts towards 3 years of experience

  • Special Program Security Certification (SPSC) counts towards 5 years of experience

  • Maximum equivalent experience for SPED Certifications is no more than 5 years




Education:


  • Bachelor’s degree or equivalent experience (4 years)




Certifications:


  • Must complete the DoD SAPCO approved SAPNP training (if performing personnel security functions)




Security Clearance:


  • Current Top Secret Clearance with SCI Eligibility

  • Eligibility for access to Special Access Program Information

  • Willingness to submit to a Counterintelligence polygraph

Arthur 2
Information Assurance (IA) System Security Engineer 2 118-001
Wright Patterson AFB, OH
Immediate
01/15/2023

Information Assurance (IA) System Security Engineer 2:



The Information System Security Engineer (ISSE) is primarily responsible for conducting information system security engineering activities with a focus on lifecycle of current systems and future requirement scoping.  The position will collect and process the captured information security requirements and ensures that the requirements are effectively integrated into information systems through purposeful security architecting, design, development, and configuration.  The position is an integral part of the development team designing and developing organizational information systems or upgrading legacy systems. The ISSE employs best practices when implementing security requirements within an information system including software engineering methodologies, system/security engineering principles, secure design, secure architecture, and secure coding techniques.  This position’s main function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.




Performance shall include:


  • Perform oversight of the development, implementation and evaluation of information system security program policy; special emphasis placed upon integration of existing SAP network      infrastructures

  • Perform analysis of network security, based upon the Risk Management Framework (RMF) with emphasize on Joint Special Access Program Implementation Guide (JSIG) authorization process

  • Provides expert support, research and analysis of exceptionally complex problems, and processes relating to them

  • Provides expert level consultation and technical services on all aspects of Information Security

  • Serves as technical expert to the Cybersecurity Assessment Program providing technical direction, interpretation and alternatives to complex problems

  • Thinks independently and demonstrates exceptional written and oral communications skills. Applies advanced technical principles, theories, and concepts

  • Contributes to the development of new principles, concepts, and methodologies

  • Works on unusually complex technical problems and provides highly innovative and ingenious solutions

  • Lead a team of System Security Engineers and Certification and Accreditation Analysts      responsible for ensuring the customers national and international security interests are protected as support equipment are designed and tested

  • Recommends cybersecurity software tools and assists in the development of software tool requirements and selection criteria to include the development of product specific STIGs from applicable DISA SRGs

  • Review ISSE related designs and provides security compliance recommendations

  • Leads technical teams in implementation of predetermined long-range goals and objectives

  • Supports customer and SAP community IA working groups, participate in SSE IPT reviews

  • Provides expert level consultation and technical services on all aspects of Information Security

  • Review ISSE related designs and provides security compliance recommendations

  • Develop and provide IA risk management recommendations to the customer

  • Provide ISSE support for Mission and Training systems design and development

  • Assist with development and maintenance of the Program Protection Plan

  • Assist with site activation activities and design reviews

  • Represent the customer in various ISSE related working groups, advisory groups, and advisory council meetings

  • Chair and or Co-Chair customer and SAP community IA working groups, participate in ISSE IPT reviews

  • Represent the customer in various SSE related working groups, advisory groups, and advisory council meetings

  • Strong background in Patch/Configuration management, DevOps, and tier 3 support

  • Assist team to design, integrate, and implement JSIG/RMF Continuous Monitoring tools and processes.

  • Integrate COTS & GOTS products to collect, display and remediate a variety of automated system security and system operations/performance functions and metrics.

  • Perform security assessments of servers/network devices/security appliances.

  • Develop improvements to security assessments with regard to accuracy and efficiency.

  • Integrate ancillary monitoring tools/capabilities with the enterprise security information and event management (SIEM) and create/tailor complex event alarms/rules and summary reports.

  • Write and execute cybersecurity test procedures for validation of control compliance.

  • Monitor/analyze output of cybersecurity related tools for reportable security incidents and residual risk.

  • Analyze technical risk of emerging cybersecurity tools and processes.

  • Work as part of a security incident response team as needed

  • Build operational Operations and Maintenance (O&M) checklists to maintain the service (daily, weekly, monthly, yearly O&M checklists); build Tactics, Techniques and Processes (TTPs) and Standard Operating Processes (SOPs) associated with service checklists.

  • Integrate/Develop new techniques to improve Confidentiality, Integrity, and Availability for networks/systems operating at various classification levels.

  • Advanced technical competency in one or more of the following supported platforms: Microsoft Windows Server, Active Directory, Red Hat Enterprise Linux servers, MS Hyper-V/VMWare/ESx/Xen Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems, forensic analysis/vulnerability assessment, Group Policy management and configuration, Scripting, BMC Footprints, WSUS, , Lumension, Bitlocker, SQL Server 2012, TomCat, IIS, Windows Server 2012r2/2016, Win 10, Red Hat 6.5, Microsoft Office.

  • Toolkits, SEIMs, Logrhythm, ACAS/Nessus/SCAP, mandatory/role-based access control concepts (e. g. SE Linux extensions to RHEL, PitBull, AppArmor, and Sentris) , video teleconferencing/VOIP, Oracle/MS SQL database security, and Apache/IIS Web server security




Experience:


  • 12 - 15 years related experience

  • Prior performance in roles such as ISSO, ISSM, SCA or SAP IT Technical Director




Education:


  • Bachelor’s degree in a related discipline or equivalent experience (4 years)




Certifications:


  • Must meet position and certification requirements outlined in DoD Directive 8570.01-M for      Information Assurance Architect and Engineer Level I or Information Assurance Architect and Engineer Level II within 6 months of the date of hire




Security Clearance:


  • Current Top Secret Clearance with SCI Eligibility

  • Eligibility for access to Special Access Program Information

  • Willingness to submit to a Counterintelligence polygraph




Other Requirements:


  • Must have expert knowledge of DoD, National and applicable service and agency security policy, manuals and standards.  Must have the ability to work in a dynamic environment and effectively interact with numerous DOD, military/civilian personnel and industry partners

Arthur 2
Network Engineer ISEE155
Washington, DC
Closed
02/01/2023

Network Engineer:



As a Network Engineer, supporting the Government, you will be trusted to assist with designs, plans, builds, and execution of configurations in the lab before introduction into the live environment.




In this role, a typical day may include:


  • Managing and configuring network hardware and software, operating systems, and attached devices for custom networks.

  • Designing and building hardware and software components for computer or telecommunications networks.

  • Maintaining current knowledge of relevant technology as assigned.

  • Creating and maintaining as built and other systems drawings (flowcharts, diagrams, etc).

  • Configuring, monitoring, and maintaining servers to ensure network and system integrity.

  • Working closely with network architects towards implementation in the network.




WHAT YOU'LL NEED:


  • Experience in network/systems analysis, design, installation, and maintenance.

  • Windows and Linux operating systems experience.

  • Experience with Cisco and Juniper routers, switches, firewalls experience (installation, configuration, and maintenance).

  • Possess skills to manage exceptionally complex, inter-disciplinary, and inter-organizational tasks.

  • Hands-on coding experience in Python, JavaScript, Ruby, SQL, or other relevant languages.



Education and Experience:


  • High School Diploma + 16 years

  • Associate's Degree + 14 years

  • Bachelor's Degree + 12 years

  • Master's Degree + 10 years

  • PhD + 8 years




Training and Certficiations:


  • IAT Level 2




Security Clearance:


  • TS SCI CI poly

ISEE
DevOps Engineer ISEE154
Washington, DC
Closed
02/01/2023

DevOps Engineer:



As a DevOps Engineer, supporting the Government, you will be trusted to assist with designs, plans, builds, and execution of configurations in the lab before introduction into the live environment.




In this role, a typical day may include:


  • Interacting with the Government regarding Systems Engineering technical considerations and for associated problems, issues, or conflicts; communicate with other program personnel, government overseers, and senior executives.

  • Establishing state-of-the-art techniques for designing, developing, modifying, and troubleshooting highly complex computer operating hardware system in a lab

  • environment.

  • Designing operating/hardware systems, tools, and infrastructure; formulating system concepts and architecture, specific requirements, and developing implementation approaches.

  • Understanding the needs of stakeholders and conveying them to architects.

  • Working on ways to automate and improve development and release processes.

  • Architecting, building, and maintaining on-premise and/or cloud infrastructure to support team and customer initiatives.

  • Guiding system development and implementation planning through assessment or preparation of system engineering management plans and system integration and test plans.

  • Maintaining and improving existing infrastructure (build out autoscaling, support new services, optimize for cost efficiencies/authentication/search, etc).

  • Administering production, staging, and development environments.

  • Collaborating cross-functionally with data scientists, analyst, project managers, and other engineers to build apps and solve complex problems.




WHAT YOU'LL NEED:


  • Good understanding of object-oriented programming, data structures, algorithms, and design patterns.

  • Hands-on experience in: Building REST endpoints / Data modeling, SQL, and/or Python / Redhat and/or Centos/ Server builds using automated mechanism / Ansible or Puppet / Gitlab / Deploying Docker engines in virtualized platforms for containerization for multiple apps / CI/CD automation / Building and deploying data pipelines / Good coding practices.

  • Strong verbal and written communication skills.

  • Proficient attention to detail and problem-solving skills.




Education and Experience:


  • High School Diploma + 10 years

  • Associate's Degree + 8 years

  • Bachelor's Degree + 6 years

  • Master's Degree + 4 years

  • PhD + 2 years




Training and Certifications:


  • IAT Level 2




Security Clearance:


  • TS SCI CI poly

ISEE
Lab Administrator ISEE153
Washington, DC
Immediate
01/12/2023

Lab Administrator:



As a Lab Administrator, supporting the Government, you will be trusted to assist with designs, plans, builds, and execution of configurations in the lab before introduction into the live environment.




In this role, a typical day may include:


  • Developing, installing, maintaining, and supporting the technical infrastructure, hardware, and system software components.

  • Managing an IT lab environment that includes network equipment, servers, builds, and virtualized applications.

  • Configuring, debugging, and supporting multiple infrastructure platforms.

  • Administering Linux and Unix operating systems and provisioning applications and software.

  • Administering Microsoft Windows Server OS environments (including patching) and Active Directory.

  • Administering VMWare hypervisor environment and provisioning software.

  • Administering storage platforms and provisioning within the environment.

  • Evaluating system problems of workflow, organization, and planning and develop appropriate corrective actions.

  • Performing quality control of processes and products produced.

  • Assisting with formulating technical strategies and processes for administered systems.

  • Writing, interpreting, and analyzing technical documentation related to system administration.




WHAT YOU'LL NEED:


  • 2+ years supporting current Windows desktop technologies and LANs.

  • Hands-on experience in Cisco, Arista, Checkpoint, Palo Alto or F5 platform configuration (certification preferred).

  • Understanding of common networking protocols and designs (e.g., BGP4, OSPF, IPSEC, HSRP, QoS, Spine and Leaf Architecture).

  • Knowledge of telecommunications technologies, systems, and circuits (e.g., Ethernet, Sonet, TDM circuits, etc.).

  • Experience with Big Data environments such as Hadoop and Acumulo provisioning software.

  • Strong analytical, written, listening, and oral communication skills.




Education and Experience:


  • High School Diploma + 12 years

  • Associate's Degree + 10 years

  • Bachelor's Degree + 8 years

  • Master's Degree + 6 years

  • PhD + 4 years




Training and Certifications:


  • IAT Level 2






Security Clearance:


  • TS SCI CI poly

ISEE
Data Modeler Mid-Level NEE122
Springfield, VA
Immediate
01/11/2023

Data Modeler (Mid-Level):




Overall Assignment Description:



Mid-level Data Modelers conduct data modeling activities in support of business stakeholders,

analysts, and workforce to define and analyze system and data requirements to support NGA

business operation and related processes to ensure timely and accurate execution of

corporate mission and functions.




Duties include:


  • Assists Government with the development and use of complex models, tools and algorithms to identify trends and patterns in corporate data.

  • Work with the Business Architect to model the business processes for re-engineering,optimization, or integration of technical solutions (i.e. automation, advancedlearning/machine learning, etc.)

  • Supports developing models of NGA’s architectures, requirements, and systems performance and considers NGA strategies and overall vision for the future of corporate mission and

  • Supports creating models to support analysis of alternatives, performance trades, design trades and new capabilities and develops alternatives for deployment based on MS&A results in existing NSG architectures and cloud environments.




Skills and Experience:


  • Bachelor’s degree or higher in Engineering, Computer Science, Information Technology, Management Information Systems, or related STEM degree program, or equivalent Mid level work experience as an Data Modeler.

  • Mid-level working experience in government or industry modeling large complex System of

  • Systems or Service Oriented Architecture/Cloud environments.

  • Demonstrated experience with Model Based Systems Engineering, processes, tools and languages.

  • Mid-level working experience in Operations Research.




Security Clearance:


  • TS SCI

NEE
Systems Integrator Mid-Level NEE121
Springfield, VA
Immediate
01/22/2023

Systems Integrator (Mid-Level)




Overall Assignment Description:



Mid-level Systems Integrators support the Government by coordinating and overseeing the integrity of the NSG/ASG systems-of-systems enterprise. They coordinate with system owners with planning, implementation approaches, testing, documenting, and maintaining solutions for cloud, on premise, and hybrid services, systems or subsystems using defined processes and tools.




Duties may include:


  • Assists with coordinating and performing systems integration activities across the NSG, ASG and Federal Agencies to ensure timely and accurate GEOINT.

  • Assists with coordinating and overseeing a total systems perspective including a technical understanding of relationships, dependencies and requirements of cloud, on premise, and hybrid services, infrastructure and security domains.

  • Assists with the coordination of engineering plans and site installation technical design packages.




Skills and Experience:




Required:


  • Bachelor's degree or higher in Computer Science, Information Technology, Engineering, Engineering Management, Management Information Systems, or related STEM degree program, or related equivalent additional experience.

  • Mid-level or higher systems integration experience working in government or industry integrating large complex System of Systems or Service Oriented Architecture environments residing in cloud, on premise, or hybrid infrastructures.




Desired:


  • Working knowledge of Model-Based Systems Engineering, processes, tools and languages.

  • Previous NGA and/or NSG/ASG program/project work experience.

  • Previous IC or DoD program/project work experience.




Security Clearance:


  • TS SCI.

NEE
Targeting Analyst Senior-Level SPAC022
Colorado Springs, CO
Future
01/08/2023

This is a future position that may come open but is not open at the present moment.  We are willing to prescreen personnel for these positions if you are interested.




Targeting Analyst Senior-Level:



Targeting Analyst – Develops targets and target systems for joint lethal and / or nonlethal engagements. Develops target nominations, creates database records, and databases target intelligence products. Produces all-source analytic damage estimates and battle damage assessments and assists with combat assessment requirements. Conducts collateral damage estimation, performs target list management, target strategy development, and provides joint target intelligence support to deliberate and dynamic target engagements. Provides recommendations for target prioritization to achieve commander objectives for plans and operations. Provides database nominations, creates, and updates database and uploads TMs into databases.




Job Requirements:


  • Experience with databases such as MIDB, and tools like the Joint Targeting Toolkit

  • Knowledge of the joint targeting process

  • Knowledge of DoD and IC research and analysis methods, procedures, and documentation processes

  • Ability to work with engineers to translate research and analysis into top level prototype development and integration plans




Education and Experience:


  • 8 Years’ experience.

  • Bachelor’s Degree.

  • 15 Years’ Qualifying Experience In lieu of Required Degree.




Security Clearance:


  • TS SCI CI poly

SPACECOM
Targeting Analyst Mid-Level SPAC021
Colorado Springs, CO
Future
01/08/2023

This is a future position that may come open but is not open at the present moment.  We are willing to prescreen personnel for these positions if you are interested.




Targeting Analyst Mid-Level:



Targeting Analyst – Develops targets and target systems for joint lethal and / or nonlethal engagements. Develops target nominations, creates database records, and databases target intelligence products. Produces all-source analytic damage estimates and battle damage assessments and assists with combat assessment requirements. Conducts collateral damage estimation, performs target list management, target strategy development, and provides joint target intelligence support to deliberate and dynamic target engagements. Provides recommendations for target prioritization to achieve commander objectives for plans and operations. Provides database nominations, creates and updates database and uploads TMs into databases.




Job Requirements:


  • Knowledge of Defense Department and Intelligence Community research and analysis methods, procedures, and documentation processes

  • Ability to work with engineers to translate research and analysis into top level prototype development and integration plans




Education and Experience:


  • 3 years’ experience

  • Bachelor’s Degree

  • 7 years Qualifying Experience in lieu of Required Degree




Security Clearance:


  • TS SCI CI poly

SPACECOM
Special Security Technician Senior-Level SPAC020
Colorado Springs, CO
Future
01/08/2023

This is a future position that may come open but is not open at the present moment.  We are willing to prescreen personnel for these positions if you are interested.




Special Security Technician Senior-Level:



Special Security Technician – Assists the Special Security Officer (SSO) to ensure control of access to SCI and SCI facilities (SCIFs); certifying and receiving SCI visitor clearances / accesses; conducts SCI security briefings, indoctrinations, debriefings, training on classified material / SSO-related material and topics; obtains signed nondisclosure agreements; and provides guidance and assistance for processing SCI position and eligibility requests for assigned military, Government and contractor personnel. Other duties may include, but not limited to audits of classified material; inspections of classified material storage facilities / SCIFs / containers; and, researching and preparing classified material-related policy and management recommendations, reports and recommendations. Other requirements and skills, consistent with the forgoing description, may be specified in individual TOs.




Education and Experience:


  • 8 Years’ experience.

  • Bachelor’s Degree.

  • 15 Years’ Qualifying Experience In lieu of Required Degree.




Security Clearance:


  • TS SCI CI poly

SPACECOM
Special Security Technician Mid-Level SPAC019
Colorado Springs, CO