COMSEC Support position will support COMSEC Management for all cryptographic activities including managing the Cryptographic Access Program (CAP); train, manage, audit and inventory base and tenant units’ COMSEC user material holdings at required intervals. The candidate requires experience in and will be required for: Developing and implementing COMSEC criteria and requirements for inclusion in mobility, contingency, and exercise plans for the warfighter. Conducting in depth analysis and oversight of the accountability of sensitive cryptographic materials and related COMSEC information. Overseeing issuance of COMSEC materials. Developing and implementing processes to maintain COMSEC inventories within the KMl program Analyzing and supporting the preparation of written plans for emergency actions and responsibilities to ensure personnel and supported organizations are fully qualified in the execution of plans Investigating, researching, and providing analytical analysis of COMSEC security incidents to determine the possibility of compromise to COMSEC materials and ensures documentation and reporting to appropriate channels is completed Overseeing and verifying the destruction, receiving, issuing, transferring, and inspecting COMSEC material within stated timelines Conducting inbound/outbound and install/storage inventories of all KOV assets. Conducting simple, full, and annual re -keys of all F -22 aircraft cryptographic systems. Ensuring proper handling and security of all cryptographic keying material used during the re -key process Performing TEKDF process and KOV inventories for the F -35 aircraft General Requirements The Security Manager II plans, implements, upgrades, or monitors security measures for the protection of computer networks and information. Maintains access control, processes security information and personnel requirements, processes visit requests. Assesses system vulnerabilities for security risks and propose and implement risk mitigation strategies. May ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure. May respond to computer security breaches and viruses. Applies fundamental concepts, processes, practices, and procedures on assignments. Performs work that requires practical experience and training. Work is performed under supervision.
Stand Out From the Crowd
Upload your resume and get instant feedback on how well it matches this job.
Job Type
Full-time
Career Level
Mid Level
Education Level
No Education Listed