Security Specialist II
Listed on 2026-01-24
-
IT/Tech
Cybersecurity
Description
Vickers and Nolan Enterprises (VNE) is an engineering company that provides Government projects and programs with experienced and dedicated system architects, engineers, subject matter experts (in tactical intelligence), and program managers. VNE also develops training courses and tools to prepare warfighters to effectively employ tactical intelligence systems and provide management guidance to the Government organizations that develop these systems.
VNE has earned a reputation for exceptional performance, innovation, agility, and responsiveness in the Intelligence Community (IC). We attack our mission with a comprehensive understanding of the data available and required; skilled research, design, development, integration, and testing of systems and software solutions; expertise in cybersecurity/information assurance and technology; programmatic, acquisition, and logistics support know‑how; and our own unique training curricula that enables students to excel at intelligence operations across all levels of the community.
VNE is devoted to improving tactical operations at home and abroad by enabling the seamless transition of data across the intelligence community and developing/integrating solutions to unify operations and intelligence.
VNE is a Service Disabled Veteran Owned Small Business (SDVOSB) founded in 2004 in Stafford, VA.
QualificationsVNE, LLC is looking for a TS/SCI Cleared Security Specialist II
Minimum Qualifications:
- Education: Bachelors degree preferred.
- Experience: TS/SCI level Clearance required.
- Managing daily operations within the SCIF and ensuring personnel working in or entering the SCIF are in full compliance with security standards as set forth in this SOP.
- Posting the SCIF Access List on the interior of the SCIF entry door and coordinating any security container combination changes with the SSO Physical Security Lead.
- Managing SCIF Access and ensuring all personnel with swipe access to the lab have submitted a SCIF Card Reader Access Application.
- Validating External Visitor SCIF Access to verify proper clearance eligibility and adherence to visit access request procedures for all‑non‑NIWC Atlantic visitors before granting access to NIWC Atlantic SCIFs.
- Ensuring all visitors are documented in the NIWC Atlantic SCIF Visitor Log.
- Verifying the SCIF is sanitized before visits by individuals without SCI access.
- Ensuring SF 701s, 702s and Visitor Logs are properly filled out and maintained as directed by the SSO.
- Ensuring SF 700 envelopes are changed accordingly and properly stored within the Special Security Office security container.
- Training SCIF Personnel on Open/Close procedures and actions required during alarm activations.
- Conducting daily walkthroughs of the SCIF, looking for, reporting on, or correcting the following:
- Ensuring good housekeeping standards throughout the SCIF to avoid inadvertent disclosure or loss of classified information, materials, and equipment.
- Building maintenance issues or problems (water leaks, furniture, lights, floor or ceiling tiles, insects, rodents, restrooms/breakrooms, etc.).
- Ensuring personnel using KVMs, headsets, headphones, speakerphones, co‑location of non‑SCI systems, and medical devices have approved requests or permit cards on file.
- Reporting issues with printers, DVTCs, or VTC suites to the HTS team, NMCI, or RDT&E help desk.
- Reporting issues with unattended IS Media, systems/media not properly marked, and systems with compromised anti‑tamper security tape, to the IS Media Security Team.
- Ensuring network cables in non‑standard colors are marked at both ends with the appropriate classification levels.
- Ensuring Red and Black cable separation is always maintained in accordance with SCI ISSM & SSO TEMPEST Separation Guidelines.
- Reporting the discovery of mismarked or unattended classified/CUI documents to the SSO Information Security Officer.
- Ensuring information on "White Boards" is marked appropriately.
- Ensuring classification signs and labels are posted on information systems and system racks, including system name, project name, ATO expiration date, and system POCs.
- Reviewing Monthly After‑Hours Access Reports, and…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).