About The Position

F3EA, Inc. is seeking an experienced Information Technology Specialist to provide onsite IT operations support at Naval Base Ventura County (Point Mugu Sea Range) for the Blue Water Instrumentation (BWI) RDT&E program. This position carries dual responsibilities: serving as the program’s primary interface with Department of the Navy (DoN) IT infrastructure, networks, and administrative processes at NBVC, while simultaneously maintaining F3EA’s internal IT operations, cybersecurity posture, and CMMC Level 2 compliance for all program personnel and equipment at the Point Mugu site. The IT Specialist operates alongside — but distinct from — the specialized R&D engineering team conducting prototype development. Where the engineering team manages developmental test environment cybersecurity under RMF, this position ensures that all operational IT infrastructure, user access, endpoint compliance, and corporate information systems are functioning, secured, and compliant at a Navy installation operating under both DoN policies and F3EA’s own CMMC-governed security framework. The ideal candidate is a broadly capable IT professional who can independently manage the full range of operational IT functions in a DoN environment — from NMCI/NGEN-Next account provisioning and trouble resolution to DISA STIG compliance and coordination with base ISSM/ISSO and Navy Network Operations Centers — while also administering F3EA’s Microsoft 365 GCC-High environment, Intune-managed endpoints, NinjaOne RMM platform, and CUI handling controls for the onsite team. This is a hands-on, self-directed role with minimal local supervision in a fast-paced R&D environment.

Requirements

  • Bachelor’s degree in Information Technology, Computer Science, or related field (or equivalent experience)
  • Active SECRET security clearance (minimum); ability to obtain TS/SCI if required.
  • U.S. Citizenship required (for security clearance eligibility and access to CUI and DoN systems).
  • 5+ years of IT administration experience in a Department of Defense (DoD) environment, with at least 2 years directly supporting Department of the Navy (DoN) networks and installations.
  • Direct, hands-on experience with NMCI and/or NGEN-Next network environments, including account management, service requests, and trouble resolution through Navy IT service portals.
  • Working knowledge of DoN and DoD cybersecurity policies: DoDI 8510.01 (RMF), DISA STIGs, SECNAV M-5239.2, Navy cybersecurity directives (NAVADMIN series), and NIST SP 800-53/800-171.
  • Familiarity with CMMC Level 2 requirements and NIST SP 800-171 Rev 2 control implementation in a defense contractor environment.
  • Experience with Microsoft 365 GCC-High administration, Microsoft Intune/Endpoint Manager, and Microsoft Entra ID (Azure AD) in a DoD/CUI environment.
  • Experience configuring and maintaining Windows 10/11 enterprise workstations using DISA STIG baselines.
  • Familiarity with TWMS, ACAS/Nessus vulnerability scanning, VRAM, eMASS, and DADMS.
  • Qualified in an applicable DCWF work role under DoD 8140 with a supporting foundational certification — CompTIA Security+ CE (or equivalent) required at time of hire.
  • Strong customer service orientation and ability to communicate technical concepts to non-technical users and Government stakeholders.
  • Ability to lift and move IT equipment (up to 50 lbs), work in server room environments, and access pier-side and waterfront areas as needed.
  • Ability to work onsite full-time at Naval Base Ventura County, Point Mugu, CA. This position is not eligible for remote or hybrid work.
  • The selected candidate must hold an active SECRET clearance at time of hire. Employment is contingent upon maintenance of favorable adjudication.
  • Within 30 days of hire, the individual shall complete CUI awareness training and acknowledge all applicable F3EA IT and cybersecurity policies per Awareness & Training Policy (AT-POL).
  • The individual shall read, understand, and sign the IT Acceptable Use & Device Policy (AUP-POL) acknowledgment before receiving access to any F3EA information systems.
  • Within 30 days of hire, the individual shall complete insider threat awareness training per Insider Threat Program Policy (ITP-POL).
  • Within 30 calendar days of commencing performance, the individual shall complete all Navy-required training including Cyber Awareness Challenge, AT Level I, and iWATCH, with completion registered in TWMS.
  • The individual shall complete annual security awareness refresher training, policy re-acknowledgment, and any additional role-based training as required by both F3EA and DoN.
  • This position is subject to the personnel screening and separation procedures defined in Personnel Security Policy (PS-POL).
  • All IT activities are subject to monitoring and audit per AUP-POL. Personnel have no expectation of privacy when using F3EA information systems.

Nice To Haves

  • Experience supporting R&D or test range environments at Navy installations (PMSR, NAWCWD Point Mugu/China Lake, or similar).
  • Familiarity with Navy range network architectures, IRIG timing distribution systems, and classified network (SIPRNet/JWICS) access procedures and accreditation.
  • Hands-on experience with NinjaOne (or comparable FedRAMP RMM platform), Microsoft Defender for Endpoint (Plan 2), and SCAP/STIG scanning tools.
  • Experience with Keeper FedRAMP Enterprise or comparable enterprise password management in a CUI environment.
  • CCNA, Microsoft Certified: Azure Administrator, or equivalent networking/cloud certification.
  • Experience with Linux system administration (RHEL/CentOS) in addition to Windows environments.
  • DCWF work role qualification at a supervisory or managerial level, supported by CASP+, CISM, or CISSP certification.
  • Experience with audio/video conference room technology (Microsoft Teams Rooms, Crestron, Poly, Logitech, or similar).
  • Prior U.S. Navy or U.S. Marine Corps service, or prior DoN civilian IT/cybersecurity experience.
  • Familiarity with NBVC base access procedures, DBIDS visitor control, and physical security requirements for Navy IT spaces.
  • Experience supporting C3PAO CMMC assessments or DIBCAC audits.

Responsibilities

  • Serve as the program’s onsite IT liaison for all NMCI/NGEN-Next network services at NBVC, including account creation, modification, and deactivation for F3EA personnel and subcontractors.
  • Coordinate with Navy Network Warfare Command (NNWC), Regional Network Enterprise Centers (RNECs), Naval Information Warfare Center (NIWC), and NBVC base communications for connectivity, port activations, VPN access, and trouble ticket resolution.
  • Manage CAC-enabled workstation configuration, shared drive permissions, and Microsoft 365/Teams/SharePoint access on DoN networks in accordance with SECNAV M-5239.2 and DoN enterprise standards.
  • Provide Tier 1/Tier 2 helpdesk support for DoN network issues affecting program personnel, escalating to NMCI/NGEN-Next service providers or Navy Cyber Defense Operations Command (NCDOC) as appropriate.
  • Track and manage IT service requests and trouble tickets through Navy and NMCI service portals (e.g., NMCI Homeport, myNMCI). Maintain current knowledge of DoN IT service request processes, approval chains, and lead times to proactively resolve access and connectivity requirements before they impact program milestones.
  • Coordinate visitor IT access, temporary network accounts, and conference/event IT support for Government-directed meetings, technical reviews, and RDT&E events at PMSR.
  • Image, configure, and deploy Windows 10/11 workstations and laptops using established DISA STIG baselines and Microsoft Intune enrollment procedures per F3EA Configuration Management Policy (CM-POL).
  • Perform user account management in Microsoft Entra ID (Azure AD), including account creation, password resets, group membership modifications, and multi-factor authentication support, under ISSO supervision.
  • Administer and support F3EA’s Microsoft 365 GCC-High environment for all onsite personnel, ensuring CUI workflows operate within the GCC-High boundary and standard productivity tools (Outlook, Teams, SharePoint, OneDrive) function correctly.
  • Deploy approved software packages through NinjaOne managed deployment and Microsoft Intune Company Portal. No software shall be installed outside of approved channels per CM-POL.
  • Manage NinjaOne RMM agent deployment, monitoring, and patch management operations across the Point Mugu endpoint fleet. Document all support activities, resolutions, and escalations in the NinjaOne FedRAMP ticketing system with sufficient detail for audit and compliance purposes.
  • Support Keeper FedRAMP Enterprise password management for onsite personnel, assisting with vault setup and secure credential practices.
  • Install, configure, and troubleshoot peripheral devices including monitors, docking stations, printers, scanners, and mobile devices. Perform hardware inventory management, asset tracking, and lifecycle documentation. Coordinate equipment issuance and return per IT Acceptable Use & Device Policy (AUP-POL).
  • Execute IT onboarding for new program personnel (equipment provisioning, Intune enrollment, Entra ID account setup, policy acknowledgment) and offboarding for departing personnel (equipment collection, account disablement coordination with ISSO) per Personnel Security Policy (PS-POL).
  • Coordinate warranty repair and replacement with Dell and HP vendors, ensuring disk retention clauses are honored for equipment containing CUI per Supply Chain Risk Management Policy (SCRM-POL).
  • Support the program’s RMF compliance activities by coordinating with the NBVC ISSM/ISSO and Navy Authorizing Official (NAO) for system registration in the Enterprise Mission Assurance Support Service (eMASS), security plan updates, and POA&M item resolution on unclassified operational IT systems.
  • Conduct periodic vulnerability scanning (ACAS/Nessus) on F3EA program-managed assets and remediate findings per Navy Vulnerability Remediation Asset Manager (VRAM) timelines and NCDOC directives.
  • Maintain IT asset inventories and ensure compliance with the DoN Application and Database Management System (DADMS), Navy software approval processes, and authorized software lists.
  • Support OPSEC, Antiterrorism/Force Protection (AT/FP), and iWATCH training completion tracking for all IT-related access requirements per PWS direction.
  • Serve as the IT point of contact for NBVC base communications, NMCI/NGEN-Next service delivery managers, and NCDOC interactions.
  • Brief the Program Manager on IT readiness status, emerging issues, TWMS compliance status, and resource requirements at weekly program meetings.
  • Document network and configuration changes in NinjaOne ticketing with completed change request forms per CM-POL.
  • Support logistics and property management for IT hardware as Government property per FAR 52.245-1.
  • Install, configure, maintain, and troubleshoot program workstations, network switches, wireless access points, printers, and VTC/collaboration systems in compliance with both DoN configuration standards and F3EA CM-POL.
  • Monitor and troubleshoot local network connectivity at the Point Mugu program space, including Ethernet, Wi-Fi, and VPN connections. Support IPSec tunnel connectivity between Point Mugu and F3EA Savannah HQ, escalating issues to the ISSO for resolution.
  • Manage local backup operations using NinjaOne backup utilities and verify backup integrity through scheduled spot-check restoration tests per Backup, Disaster Recovery & Continuity Policy (BDR-POL).
  • Support the F3EA Managed Azure Instance and Azure Gov Instance (GCC-High) under ISSO direction, including basic tenant administration tasks for the Point Mugu site.
  • Install, configure, and maintain audio/video conference room equipment. Support Microsoft Teams Rooms integration with the F3EA Microsoft 365 environment. Provide real-time technical support for high-priority meetings, client presentations, and VTC sessions. Ensure conference room configurations comply with CUI handling requirements and collaborative device controls per System & Communications Protection Policy (SC-POL).
  • Support C2 testbed IT infrastructure (non-R&D operational systems) including networking, domain services, and administrative access management in coordination with the engineering team.
  • Coordinate with NBVC facilities and base communications for cabling, rack space, power, and HVAC requirements supporting IT equipment installations.
  • Maintain documentation of all IT configurations, network diagrams, and standard operating procedures for program IT systems.
© 2026 Teal Labs, Inc
Privacy PolicyTerms of Service