More jobs:
Telecommunications Specialist Security Clearance
Job in
Fort Huachuca, Cochise County, Arizona, 85670, USA
Listed on 2026-01-05
Listing for:
Agile Defense, Inc.
Full Time
position Listed on 2026-01-05
Job specializations:
-
IT/Tech
Cybersecurity, IT Consultant
Job Description & How to Apply Below
Location: Fort Huachuca
At Agile Defense we know that action defines the outcome and new challenges require new solutions. That's why we always look to the future and embrace change with an unmovable spirit and the courage to build for what comes next. Our vision is to bring adaptive innovation to support our nation's most important missions through the seamless integration of advanced technologies, elite minds, and unparalleled agility-leveraging a foundation of speed, flexibility, and ingenuity to strengthen and protect our nation's vital interests.
Requisition #: 1354
Job Title:
Telecommunications Specialist
Location:
Fort Huachuca
Clearance Level: Secret
Required Certification(s):
Sec+ SUMMARY Performs cybersecurity related tasks designed to safeguard the security of systems and information assets by protecting against unauthorized access, modification, or destruction. Manages information systems security, including disaster recovery, database protection and software development. Performs technical support focused on the development, operation, management, and enforcement of security capabilities for systems and networks.
Analyzes information security systems and applications then recommends and develops effective security measures. Identifies, reports, and resolves security violations. Evaluates IT infrastructure in terms of risk to the organization and establishes controls to mitigate loss. Determines and recommends improvements in current risk management controls and implementation of systems changes or upgrades Works with end users to determine needs, implements policies and procedures, and tracks compliance through the organization.
Establishes, plans, and administers the overall policies, goals and procedures for the information security function. Implements network security policies and procedures, ensures network (LAN/WAN, telecommunications, and voice) security access, and protects against unauthorized access, modification, or destruction. JOB DUTIES AND RESPONSIBILITIES Support the JITC's Authorization to Operate (ATO) by providing focused input into the systems that document JITC authorization efforts.
Collect, investigate, monitor, update, review and catalog documentation. Documentation includes but is not limited to drawings, written artifacts, procedures POA&Ms, and similar documents needed for JITC to meet requirements for JITC IA Controls of the Risk Management Framework (RMF) as well as any Operational Orders or Directives when presented to the Command for response (data calls). The contractor will ensure the collected artifacts meet the standards established by the Government for accuracy, format, timeliness and integrity.
Provide weekly status updates on all tasks within requirement. Provide monthly status updates on all tasks within requirement. Provide monthly funding updates for requirements. Ensure all deliverables are in the correct format and contain proper capitalization, use of typefaces, numerals, compound words, spacing before and after dashes and symbols, and correct spelling and grammar. Ensure the document has no incomprehensible statements, broken links, missing material, or other issues.
Responsible for the semi-annual review and update of documents used as compelling evidence required by Risk Management Framework process and then imported into the eMASS database to be submitted to the Authorizing Official in requests for Authorization. Use standard applications such as MS Word, PowerPoint, Excel, MS Visio, and Adobe Pro. Must meet expectations to obtain a recommendation for authorization from the Security Compliance Assessor (SCA) from DISA Risk Executive Office.
Maintain a repository, accessible via DoDNET for tracking draft and signed copies of documents such as:
Plans of Action and Milestones (POAM), Change Requests (CR), Standing Operating Procedures (SOP),
Cybersecurity Architecture Descriptions (CAD), Risk Assessments, topology/diagrams, hardware/software lists, ports, protocols and service tables and other authorization information as required for compliance.
Update DoD, DISA, and JITC repositories and databases. This includes Enterprise Mission Assurance Support Service (eMASS), Assured Compliance Assessment Solution (ACAS), Ports, Protocols, Services, Management (PPSM), for oversight of the JITC cyber posture.
Coordinate with the Government in the collection of drawings, standard operating procedures, STIG checklists, ACAS reports, POA&M updates, PPSM updates, briefings, and other artifacts. The contractor shall ensure artifacts are obtained using in-person methods, when required.
Conduct physical location and system reviews utilizing SCAP, ACAS/Nessus, and other such tools as applicable, on physical workstations, servers, switches, routers, firewalls
physical and virtual to include other security devices as required, including those requesting permission to operate or connect to the JITC infrastructure.
Conduct continual review of assets with tools such as STIG checklists, and ACAS data for…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
Search for further Jobs Here:
×