Zel Technologies
  • 01-Dec-2017 to 30-Jan-2018 (EST)
  • Hurlburt Field, FL, USA
  • Salary
  • Full Time

Must have an active TS/SCI clearance to be considered for this position

Contingent     / Noncontingent  X 

Job Summary:  ZelTech has a requirement for an Information Systems Cybersecurity Specialist to support SSO AFSOC on the A2 Staff.

Essential Job Functions:  Function as a Cybersecurity Specialist whose primary duties are to assist with the management of the Command's Sensitive Compartmented Information (SCI) Authorization and Accreditation (A&A) program and the monitoring of the command's Joint Worldwide Intelligence Communications Systems (JWICS) network security posture. The individual will be responsible for assisting the Command's Chief Information Security Officer with ensuring the site's Automated Information Systems (AIS) operations and administration are conducted in accordance with Public Laws, Executive Orders and policies of various national-level agencies. Additionally, the member will assist with the oversight and management of all AIS/network security A&A actions for all SCI facilities owned, serviced or managed by the AFSOC Special Security Office. Member will be required to participate in MAJCOM level coordination processes (meetings, conferences, VTCs, etc....) which require extensive cybersecurity knowledge and expertise. Member may be required to take meeting minutes capturing issues, milestones, action items and/or due-outs.      


The member must be able to interpret and apply Director National Intelligence, National Security Agency, Central Intelligence Agency, Department of Defense (DoD), Defense Intelligence Agency (DIA), and Air Force (AF) security policies, regulations, practices, architecture, and directives to develop the command's cybersecurity policies and establish computer methods that support the intelligence information system users. Must be able to apply standard security policy and procedures as directed by the Federal Information Security Management Act (FISMA) legislation, to include Federal Information Processing Standards (FIPS) Publication 199 - Standards for Security Categorization of Federal Information and Information Systems, FIPS Publication 200 - Minimum Security Requirements for Federal Information and Information Systems, National Institute of Standards and Technology (NIST) Special Publication (SP) 800-30, Guide for Conducting Risk Assessments, NIST SP 800-39, Managing Information Security Risk: Organization, Mission, and Information System View, NIST SP 800-37, Guide for Applying the Risk Management Framework to Federal Information Systems: A Security Life Cycle Approach, NIST SP 800-53, Recommended Security Controls for Federal Information Systems and Organizations, NIST SP 800-53A, Guide for Assessing the Security Controls in Federal Information Systems and Organizations: Building Effective Security Assessment Plans, NIST SP 800-60, Guide for Mapping Types of Information and Information Systems to Security Categories and the Intelligence Community Directive (ICD) 503, Information Technology Systems Security Risk Management Certification and Accreditation. These policies and procedures adhere to applicable laws, Executive Orders, directives, policies, regulations, standards, and guidance. Member must be able to interpret directives and apply the directives to command and site specific requirements. Ensure the proper testing and certifications are conducted to evaluate the security posture of the command's SCI AIS. The individual must be highly proficient with the use and execution of the Telos Xacta IA Manager Assessment database. The individual is responsible to ensure the development of system accreditation/certification documentation; review and coordinate the endorsement of all A&A documentation; and make appropriate recommendations to the Designated Approval Authority/Service Certifying Organization.

Defines essential automated data processing (ADP) resources required to maintain the site's security baseline and ensure compliance with security policies and directives. Serves as a configuration management assistant and information systems security assistant for all of the Command's SCI IT systems and networks. Manages the AFSOC Site computer security (COMPUSEC), communications security (COMSEC) and Communications/TEMPEST security programs to protect SCI, systems and network integrity throughout the system life cycle. Evaluates system hardware acquisition requirements, changes, upgrades, additional features, and modifications that evolve from user requirements. Performs systems analyses to determine system effectiveness in meeting established security policies while fulfilling user requirements. Efficiently direct information assurance officers to ensure proper decisions are made concerning the levels of concern for confidentiality, integrity, and availability of the data, and the protection levels for confidentiality for the systems. Expertly identifies shortfalls or vulnerabilities to systems; ensure corrective measures are immediately taken and provides expert advice for all command configuration management activities.      


Must be Information Assurance (IA) trained and certified to meet IAM Level II requirements, in accordance with DoD 8570.01-M and DIA Directive (DIAD) 8500.400. Individual must provide a copy of required certifications.

Must possess a current certificate for attesting to completion of the following training:

  • Risk Management Framework
  • Security Control Assessor

Desired: Bachelor's or higher

In Lieu of Degree:  

  • 11 years experience with High School
  • 10 years experience with an Associate's Degree
  • 9 years experience with a Bachelor's Degree
  • 8 years experience with a Master's Degree
  • 4 years experience with a Doctorate Degree

Special Requirements:  

Ability to work shift work hours to include afternoon and nights as required to meet adHOC requirements--traditional work hours are M-F during the day, but adHOC requirements may mandate alternate work schedules to meet immediate needs.  Some travel (less than 25%) and active TS/SCI clearance

Equal Employment Opportunity / Affirmative Action Employer "This contractor and subcontractor shall abide by the requirements of 41 CFR 60741.5(a). This regulation prohibits discrimination against qualified individuals on the basis of disability, and requires affirmative action by covered prime contractors and subcontractors to employ and advance in employment qualified individuals with disabilities."

Zel Technologies
  • Apply Now

    with our quick 3 minute Application!

  • * Fields Are Required

    What is your full name?

    How can we contact you?

    By clicking the button above, I agree to ApplicantPro's Applicant Information Use Policy.

  • Sign Up For Job Alerts!

  • Share this Page
  • Facebook Twitter LinkedIn Email
Logo Contact Us Home About Us Products/Services Contracts News Careers