[Close] 

Information Systems Security at Continental United States (CONUS) and Hawaii at Air National Guard (ANG) Installations

Company Name:
BlueForce LLC
Job Progress Status: Accepting Applications
Consists of multiple positions and locations
- Information Systems Security; Field Units
o Perform duties as Client Systems Technician (CST) and Information Systems Security Officer (ISSO) for NIPRNET, SIPRNET, and Joint World Wide Communications System (JWICS) located within assigned unit Special Access Program Facility (SAPFs) in coordination with the assigned unit Communications Flight.
o Ensure all users have the requisite security clearances, authorization, and need-to-know, and are aware of their security responsibilities before granting access to the IS.
o Knowledge Skills & Abilities (KSA):
Bachelor's degree in the Information Technology (IT) or Computer Security (CS) field with 2 years of experience; or Associate's degree in the IT or CS field with 3 years of experience; or 5 years of experience with local area networks, wide area networks, and workstations
Must be certified Information Assurance Technician (IAT) Level 2 and Information Assurance Manager (IAM) Level 1 within last 2 years IAW DoD Directive 8570.01-M.
Must possess TS/SSBI within the past 5 years
Must meet and maintain Special Access Program (SAP) and Sensitive Compartmental Information (SCI) eligibility

- MAJCOM Information System Security
o Provide unit-level support to assigned subordinate units regarding SAP IA and IT policy, procedures, troubleshooting and guidance IAW SAP directives.
o Develop and oversee the implementation of the security policy and provide guidance for securing Information Systems (IS).
o Knowledge Skills & Abilities (KSA):
Bachelor's degree in IT or CS field with 5 years of experience; or Associate's Degree in the IT or CS field with 7 years of experience; or 9 years of experience with local area networks, wide area networks, and workstations.
Must be certified Information Assurance Technician (IAT) Level 2 and Information Assurance Manager (IAM) Level 2 within last 2 years IAW DoD Directive 8570.01-M.
Must possess TS/SSBI within the past 5 years
Must meet and maintain Special Access Program (SAP) and Sensitive Compartmental Information (SCI) eligibility

- Senior Information Systems Security
o Advisor to ACC/A8Z for Information Systems Security, Information Technology Acquisition, and ANG Advanced Programs
o Provide specialized IT support to ARC units for software and hardware configuration
o Perform duties as CST and ISSO for NIPRNET, SIPRNET, and JWICS located within assigned unit SAPFs in coordination with the assigned unit Communications Flight
o Knowledge Skills & Abilities (KSA):
Senior MAJCOM Information Systems Security
Demonstrate 5 years of experience with protecting SAP information within IS
Bachelor's degree in the IT or CS field with 6 years of experience; or Associate's degree in the IT or CS field with 8 years of experience; or 10 years of experience with local area networks, wide area networks, and workstations
Must be certified Information Assurance Technician (IAT) Level 2 and Information Assurance Manager (IAM) Level 2 within the last 2 years IAW DoD Directive 8570.01-M.
Must possess TS/SSBI clearance within the past 5 years
Must meet and maintain Special Access Program (SAP) and SCI eligibility
F-15 and F-16 Information Systems Security
5 years of experience with fighter aircraft avionics
Plus KSAs under Senior MAJCOM Information Systems Security
Simulator Information Systems Security
5 years of experience with networked virtual training systems and fighter aircraft flight simulators
Plus KSAs under Senior MAJCOM Information Systems Security
ANG and Air Force Reserve Forces Test Center (AATC) Test Information Systems Security
3 years of experience with flight test networked IS
Plus KSAs under Senior MAJCOM Information Systems Security

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.