- Ensure development and implementation of procedures in accordance with Configuration Management policies and procedures for evaluation of information systems security program.
- Perform analysis of network security, based upon the Risk Management Framework (RMF), JSIG, National Industrial Security Program Operating Manual (NISPOM) Chapter 8, and other sources as added or updated, advise customers on IT certification and accreditation issues.
- Perform risk assessments and make recommendations to customers.
- Participation in Configuration Control Board.
- Advise government Program Managers (PM) on security testing methodologies and processes.
- Evaluate certification documentation and provide written recommendations for accreditation to PM.
- Reviews systems security to accommodate changes to policy or technology.
- Evaluate IT threats and vulnerabilities to determine whether additional safeguards are needed and report these threats or vulnerabilities to HQ ACC/A8Z, Command Information Assurance Manager.
- Develop and maintain a formal Information Systems Security Program.
- Provide input to the government ISSM for local cyber security Standard Operating Procedures.
- Review and evaluate all certification/accreditation support documentation for proof of acceptable information systems and network security procedures and, based upon review, provide written documentation for accreditation to the Designated Authorization Authority (DAA). Accreditation and certification for program systems are on a cycle determined by the Security Control Assessor (SCA), with recommendations being made to the Authorizing Official/Designated Authorizing Official (AO/DAO).
- Ensure all Information Assurance Officers (IAO), ISSOs, network administrators, and other AIS personnel under the 57 WG/AP security cognizance have the requisite security clearances, authorization, need-to- know, and are aware of their security responsibilities before granting access to systems processing special access programs.
- Ensure approved procedures are in place for clearing, purging, declassifying, and releasing system memory, media, and output.
- Maintain a repository for all system certification/accreditation, documentation, and modification.
- Coordinate AIS security inspections, tests, and reviews.
- Ensure proper protection or corrective measures have been taken when an incident or vulnerability has been discovered within the applicable computer or network system.
- Ensure that data ownership and responsibilities are established for each AIS, to include accountability, access rights, and special handling requirements.
- Ensure development and implementation of an information security education, training, and awareness program, to include attending, monitoring, and presenting AIS security training.
- Evaluate threats and vulnerabilities to ascertain whether additional safeguards are needed.
- Assess configuration changes in the system, environment, and operational needs that could affect the accreditation.
- Review existing security documentation to verify documents still accurately represent the system; a reevaluation of the system vulnerabilities, threat and risk; and complete security test, or subset of the original test that will be conducted.
- Conduct periodic testing of the security posture of the information systems as required by the DAA. Verify the compliance of the system with the security requirements by demonstrating, inspecting, and analyzing the system’s capabilities and base-line configuration.
- Ensure configuration management for security-relevant AIS software, hardware, and firmware is maintained and documented.
- Ensure that system recovery processes are monitored to ensure security features and procedures are properly restored.
- Ensure all AIS security-related documentation is current and accessible to properly authorized individuals.
- Ensure system security requirements are addressed during all phases of the system life cycle
- Perform weekly system audits as required by the DAA on multiple systems; work closely with system administrators and ensure current security measures are sufficient and in compliance with approved policies and processes.
- Perform account management for all systems and access; task i nc l u de verifying requirements for access and adding/modifying/deleting accounts as required.
- Write Request for Approvals (RFA) for equipment and electronic data being used in off-site locations.
- Participate in self-inspections and Command Compliance Inspections; identify discrepancies and report security incidents as required by the DAA and/or Program Security Officer (PSO).
- Maintain a working knowledge of system functions, security safeguards, and operational security measures.
- Provide research and analysis in support of expanding programs and areas of responsibility.
- Control/maintain accountability of magnetic and optical media of all types.
- Perform virus and malicious code scanning on all computer media entering the facility.
- Perform file transfers between local systems to storage devices.
- Document and perform destruction on all types of media including but not limited to floppies, optical/CD/DVD, tapes and hard drives.
- Inspect incoming equipment to ensure what was ordered; inspect outgoing equipment for classified markings and for any non-volatile storage devices.
- Must possess an active (within 6 years of last investigation close-out date) TOP SECRET clearance. Contractor must also be SCI eligible.
- Current CompTIA Security+ CE certification
- Minimum of one year experience configuring local area network and computers
- Knowledge of installing, maintaining, and upgrading all the following or similar hardware: PC desktop systems, TACLANE, Motorola Network Encryption System, HP LaserJet printers, LCD projection systems, enterprise servers, network switches, and network patch racks.
- Knowledge of Microsoft Windows Server 2012R2, Microsoft Active Directory Services, Domain Name System (DNS), BitLocker, Microsoft Windows 10 Pro,Microsoft Office, Linux Sensage 5.0.1 audit review tool, Jetico BCWipe, DSX Access WinDSX 3.6.7, McAfee 8.8 Enterprise non HBSS, and other software/versions as determined by 57 WG/AP in response to version and technology updates.
The 57 WG AP (advanced Programs) Office at Nellis Air Force Base, NV is responsible for managing all program security requirements for the 57 Wing. 57 WG/AP has Personnel Security oversight for over 800 permanent party personnel and over 3000 transient personnel yearly. 57 WG/AP manages physical security for over 35 existing facilities and is responsible for the construction and accreditation of several new facilities over the next 5 years. Computer Security for the 57 Wing function requires tracking multiple computer systems located over 35 different facilities located at Nellis Air Force Base. Higher Headquarters (HHQ) can levy this requirement and weekly results are reported to HHQ when required. Other 57 WG/AP responsibilities include program security support for Red/Green Flag exercises and Weapons School Integration phases, providing program security support for all units visiting Nellis AFB for training and traveling to support program activities for six geographically separated units.
We are an equal opportunity employer. We evaluate qualified applicants without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, veteran status, or any other protected characteristic. The EEO is the Law poster is available here