Cape Fox Shared Services - Indian Springs, NV

posted 4 months ago

Full-time - Senior
Indian Springs, NV
Professional, Scientific, and Technical Services

About the position

Cape Fox is seeking an experienced Senior System Administrator (SSA) to join our team in support of a government customer. The SSA will be responsible for management oversight and completion of various tasks related to the security and administration of information systems. This role requires adherence to the guidelines documented in the Protecting Sensitive Compartmented Information within Information Systems (IS) (DCID 6/3). The SSA will ensure that systems are operated, maintained, and disposed of in accordance with internal security policies and practices outlined in the security plan. The SSA will be tasked with ensuring that all users possess the requisite security clearances, authorization, and need-to-know before granting access to the information systems. This includes collecting, reducing, and reviewing audit trails, as well as reporting all security-related incidents to the Information Assurance Manager (IAM). In the event of a security incident or vulnerability, the SSA will initiate protective or corrective measures with the IAM's approval. Additionally, the SSA will develop and maintain a System Security Plan (SSP) as described in Appendix C of DCID 6/3, conducting periodic reviews to ensure compliance with the SSP. Configuration management for security-relevant IS software, hardware, and firmware must be maintained and documented. The SSA will also conduct trusted recovery of PL/4 devices and monitor system recovery processes to ensure that security features and procedures are properly restored. The role requires formal notifications to the IAM and the Designated Accreditation Authority (DAA) when a system no longer processes intelligence or when changes occur that might affect accreditation. The SSA will ensure that system security requirements are addressed during all phases of the system life cycle and will follow procedures developed by the IAM to ensure only authorized software, hardware, scripts, firmware, and AFCERTS are installed on the system. Protecting the root or super-user authenticator at the highest level of data it secures is also a critical responsibility. The SSA will report all suspected security-related IS problems to the CL or IAM, use special access or privileges granted only to perform authorized tasks, and enroll authorized users in an IS while performing account unlocking. Network administration tasks will include adding new equipment and notifying the CL of any system configuration changes that might adversely impact system security. The SSA will also perform mission data backup and restore, verify data archiving, check data integrity as required, and conduct database maintenance including user account creation and maintenance. Configuring communication ports and reporting security incidents are also part of the SSA's responsibilities, along with ensuring compliance with field level TCTO instructions, including software baseline upgrade support.

Responsibilities

  • Ensure systems are operated, maintained, and disposed of in accordance with internal security policies and practices outlined in the security plan.
  • Ensure all users have the requisite security clearances, authorization, need-to-know, and are aware of their security responsibilities before granting access to the IS.
  • Collect, reduce and review audit trails and report all security-related incidents to the Information Assurance Manager (IAM).
  • Initiate, with the approval of the IAM, protective or corrective measures when a security incident or vulnerability is discovered.
  • Develop and maintain a System Security Plan (SSP) as described in Appendix C of DCID 6/3.
  • Conduct periodic reviews to ensure compliance with the SSP.
  • Ensure configuration management (CM) for security-relevant IS software, hardware and firmware is maintained and documented.
  • Conduct trusted recovery of PL/4 devices and ensure that system recovery processes are monitored to ensure that security features and procedures are properly restored.
  • Ensure all IS security-related documentation is current and accessible to authorized individuals.
  • Formally notify the IAM and the Designated Accreditation Authority (DAA) when a system no longer processes intelligence.
  • Formally notify the IAM and the DAA when changes occur that might affect accreditation.
  • Ensure that system security requirements are addressed during all phases of the system life cycle.
  • Follow procedures developed by the IAM to ensure only authorized software, hardware, scripts, firmware, and AFCERTS are installed on the system.
  • Protect the root or super-user authenticator at the highest level of data it secures.
  • Report all suspected security-related IS problems to the CL or IAM.
  • Use special access or privileges granted only to perform authorized tasks and functions.
  • Enroll authorized users in an IS, perform account unlocking.
  • Perform network administration (adding new equipment) and notify the CL of any system configuration changes that might adversely impact system security.
  • Perform mission data backup and restore, verify data archiving, and check data integrity as required.
  • Perform database maintenance to include user account creation and maintenance.
  • Configure communication ports.
  • Report security incidents.
  • Ensure field level TCTO instruction compliance (include software baseline upgrade support)

Requirements

  • Proven experience as a System Administrator or similar role in a government or security-focused environment.
  • Strong understanding of security protocols and practices, particularly those outlined in DCID 6/3.
  • Experience with audit trails and incident reporting in information systems.
  • Ability to develop and maintain System Security Plans (SSP).
  • Knowledge of configuration management for IS software, hardware, and firmware.
  • Experience with trusted recovery processes for PL/4 devices.
  • Familiarity with security-related documentation and compliance requirements.
  • Ability to perform network administration tasks and manage system configurations.

Nice-to-haves

  • Certifications in relevant security frameworks (e.g., CISSP, CISM).
  • Experience with database management and maintenance.
  • Familiarity with mission data backup and restore processes.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service