More jobs:
IT Specialist; Infosec Security Clearance
Job in
Reno, Washoe County, Nevada, 89501, USA
Listed on 2026-03-07
Listing for:
Department of the Air Force
Full Time
position Listed on 2026-03-07
Job specializations:
-
IT/Tech
Cybersecurity, Information Security
Job Description & How to Apply Below
Duties
* serves as the wing information assurance manager. Applies information technology (it) security principles, methods, and security products to protect and maintain the availability, integrity, confidentiality, and accountability of information system resources and information processed throughout the system's life cycle. Establishes and publishes base-wide policy to manage the infosec (also known as compusec) program and provides advice and guidance in its implementation and in procedures used in the development and operation of systems.
Assists all base organizations in the development of their individual infosec program. Disseminates information and ensures computer security practices are adhered to by all functional areas. Reviews, analyzes, and validates certification and accreditation (c&a) packages. Continuously identifies and analyzes threats and vulnerabilities to the information systems to maintain an appropriate level of protection. Ensures computer software designs address information system security requirements.
Accomplishes risk analysis, security testing, and certification due to modifications or changes to computer systems.
* manages the network security program. Maintains required information assurance certification iaw dod 8570.01-m, federal information security management act of 2002, clinger cohen act of 1996. Implements and advises on it security policies and procedures to ensure protection of information transmitted to the installation, among organizations on the installation, and from the installation using local area networks (lan), wide area networks (wan), the world wide web, or other communications modes.
Utilizes current and future multi-level security products collectively to provide data integrity, confidentiality, authentication, non-repudiation, and access control of the lan. Reports to majcom, air force communications agency, national security agency, and air force computer emergency response team all incidents involving viruses, tampering, or unauthorized system entry. Controls access to prevent unauthorized persons from using network facilities. Limits access to privileged programs (i.e., operating system, system parameter and configuration files, and databases), utilities, and security-relevant programs/data files to authorized personnel.
Implements methods to prevent or minimize direct access, electronic or other forms of eavesdropping, interpreting electro-mechanical emanations, electronicintercept, telemetry interpretation, and other techniques designed to gain unauthorized access to it information, equipment, or processes.
* serves as the communications security (comsec) manager for all cryptographic activities including managing the cryptographic access program (cap). Formulates and develops communications security criteria and requirements for inclusion in mobility, contingency, and exercise plans. Maintains accountability for sensitive cryptographic materials and related comsec information. Oversees issuance of comsec materials. Maintains comsec inventory. Prepares and evaluates written plans for emergency actions and ensures personnel are fully qualified in the execution of plans.
Investigates comsec security incidents to determine the possibility of compromise to comsec materials and ensures documentation and reporting to appropriate channels. Performs destruction, receiving, issuing transferring and inspecting comsec material within the most stringent timelines. Furnishes written guidance to user accounts concurring effective dates, accounting procedures, destruction requirements, and physical security of comsec materials including key. Performs semi-annual functional reviews of all comsec user accounts, physically inspecting the user's comsec facilities, reviewing procedures, and audit of all cryptographic holdings.
Manages the certification authority workstation. Manages the cap by conducting briefings prior to granting access to cryptographic information.
* implements and manages the electronic key management system (ekms) program. This includes system configuration and operation of the local management device, data transfer device,…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
Search for further Jobs Here:
×