×
Register Here to Apply for Jobs or Post Jobs. X

Information Systems Security Administrator - FLRAA

Job in Fort Worth, Tarrant County, Texas, 76102, USA
Listing for: Textron
Full Time position
Listed on 2026-03-01
Job specializations:
  • IT/Tech
    Cybersecurity, Systems Administrator, Network Security, Information Security
Job Description & How to Apply Below

Information Systems Security Administrator - FLRAA Description

We’re more than aviation experts, we’re pioneers. We challenge what’s possible. From breaking the sound barrier to advanced tiltrotor systems. Today, Bell is shaping the future of aviation through specialized engineering. And we want you.

Information Systems Security Officer (ISSA)

Bring your skills and experience to Bell as an ISSA, a classified systems administrator responsible for maintaining the appropriate operational security configuration for classified information systems and networks in compliance with USG guidelines including 32-CFR-117, DoDI 8510.01, CNSSI 1253, NIST SP 800-37, NIST SP 800-53, JSIG, DAAPM, and others. Bell in Fort Worth, TX is seeking an Information Systems Security Administrator (ISSA) to support our security program.

What you’ll be doing as an ISSA
  • Work in close coordination with the ISSM and other Bell Global Security team members to maintain Risk Management Framework (RMF) and Authority to Operate (ATO) requirements.
  • Responsible for security configuration on DoD cognizant systems in compliance with the System Security Plan (SSP), RMF/JSIG, and other applicable security policies and procedures, and perform necessary corrective actions.
  • Build, harden, maintain, and troubleshoot classified computer systems, devices, and networks including hardware and systems/applications software.
  • Perform the role of Systems Administrator for classified Windows and Linux workstations and servers including domain controller, group policy, single sign-on or multi-factor authentication, updates/patch installation, and vulnerability/flaw remediation.
  • Install, configure, and maintain security software solutions such as SCAP, Splunk, McAfee, Nessus, WSUS, One Identity, etc.
  • Implement classified information system upgrades and configuration changes to meet CCI requirements and Continuous Monitoring schedule.
  • Purchase approved hardware and software as needed and maintain licenses as well as perform configuration management duties and support the Configuration Control Board (CCB) for security impact and risk analysis.
  • Fulfill data backup/restore and contingency/disaster recovery solutions as well as enforce media protection and file transfer procedures.
  • Directly support the ISSM/ISSO on correcting STIG and Nessus findings, performing self-inspections, resolving system and application anomalies, preparing for customer inspections, and Incident Response and Contingency training and testing activities.
  • Travel to other local locations as required.
Qualifications Skills You Bring to This Role
  • Bachelor’s Degree in Computer Science, Information Systems, Information Assurance, Cyber Security, or other related field of study.
  • 5 years overall experience in Information Security and System / Network Administration, Cybersecurity, and/or other relevant IT role.
  • Active USG Secret or higher security clearance is required. Candidate must meet background pre-screening requirements for Special Access Programs.
  • Must meet IAT - Level 2 DoD 8570.1-M compliant Professional Certification (Security , CISSP, etc) or be able to gain certification within 6 months of start of employment.
  • Background working in a USG defense contractor or national security environment is highly preferred.
  • Experience working in collateral closed-area spaces and close familiarity of the NIST SP 800-53 (SAP spaces and JSIG preferred) with deep understanding of cyber security, classified system hardening requirements, tools, and procedures to meet Risk Management Framework (RMF) and Joint Security Implementation Guide (JSIG).
  • Proficient at using the DISA Host Baseline tools, Security Technical Implementation Guides (STIG), and vulnerability scanning to set up and configure secure computing environments that meet customer requirements and expectations.
  • Adept in operating systems security features and settings, account and user interface management, group policy management, ports, protocols, and services management, problem fixes, and other IS tasks to meet RMF and STIG requirements.
  • Experience with Windows, Windows Server;
    Linux administration experience is a plus.
  • Expertise in implementing various…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary