COMSEC Support Systems Administrator II

CDITHill Afb, UT
16dOnsite

About The Position

COMSEC Support position will support COMSEC Management for all cryptographic activities including managing the Cryptographic Access Program (CAP); train, manage, audit and inventory base and tenant units’ COMSEC user material holdings at required intervals. The candidate requires experience in and will be required for: Developing and implementing COMSEC criteria and requirements for inclusion in mobility, contingency, and exercise plans for the warfighter. Conducting in depth analysis and oversight of the accountability of sensitive cryptographic materials and related COMSEC information. Overseeing issuance of COMSEC materials. Developing and implementing processes to maintain COMSEC inventories within the KMl program Analyzing and supporting the preparation of written plans for emergency actions and responsibilities to ensure personnel and supported organizations are fully qualified in the execution of plans Investigating, researching, and providing analytical analysis of COMSEC security incidents to determine the possibility of compromise to COMSEC materials and ensures documentation and reporting to appropriate channels is completed Overseeing and verifying the destruction, receiving, issuing, transferring, and inspecting COMSEC material within stated timelines Conducting inbound/outbound and install/storage inventories of all KOV assets. Conducting simple, full, and annual re -keys of all F -22 aircraft cryptographic systems. Ensuring proper handling and security of all cryptographic keying material used during the re -key process Performing TEKDF process and KOV inventories for the F -35 aircraft General Requirements The Security Manager II plans, implements, upgrades, or monitors security measures for the protection of computer networks and information. Maintains access control, processes security information and personnel requirements, processes visit requests. Assesses system vulnerabilities for security risks and propose and implement risk mitigation strategies. May ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure. May respond to computer security breaches and viruses. Applies fundamental concepts, processes, practices, and procedures on assignments. Performs work that requires practical experience and training. Work is performed under supervision.

Requirements

  • Top Secret/Sensitive Compartmented Information (TS/SCI) clearance
  • Security Plus (Sec +) Certificate
  • Key Management Infrastructure (KMI) Operating Account Manager (KOAM) Certified

Responsibilities

  • Developing and implementing COMSEC criteria and requirements for inclusion in mobility, contingency, and exercise plans for the warfighter.
  • Conducting in depth analysis and oversight of the accountability of sensitive cryptographic materials and related COMSEC information.
  • Overseeing issuance of COMSEC materials.
  • Developing and implementing processes to maintain COMSEC inventories within the KMl program
  • Analyzing and supporting the preparation of written plans for emergency actions and responsibilities to ensure personnel and supported organizations are fully qualified in the execution of plans
  • Investigating, researching, and providing analytical analysis of COMSEC security incidents to determine the possibility of compromise to COMSEC materials and ensures documentation and reporting to appropriate channels is completed
  • Overseeing and verifying the destruction, receiving, issuing, transferring, and inspecting COMSEC material within stated timelines
  • Conducting inbound/outbound and install/storage inventories of all KOV assets.
  • Conducting simple, full, and annual re -keys of all F -22 aircraft cryptographic systems.
  • Ensuring proper handling and security of all cryptographic keying material used during the re -key process
  • Performing TEKDF process and KOV inventories for the F -35 aircraft
  • Plans, implements, upgrades, or monitors security measures for the protection of computer networks and information.
  • Maintains access control, processes security information and personnel requirements, processes visit requests.
  • Assesses system vulnerabilities for security risks and propose and implement risk mitigation strategies.
  • Ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure.
  • Respond to computer security breaches and viruses.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service