We use cookies. Find out more about it here. By continuing to browse this site you are agreeing to our use of cookies.
#alert
Back to search results

Senior System Administrator

Cape Fox Shared Services
United States, Nevada, Indian Springs
Creech AFB (Show on map)
Nov 16, 2024

Cape Fox is seeking an experienced Senior System Administrator (SSA) to join our team in support of a government customer. The SSA is responsible for management oversight and completion of the task. SSA support will follow guidance documented in the Protecting Sensitive Compartmented Information within Information Systems (IS) (DCID 6/3).



  • Ensure systems are operated, maintained, and disposed of in accordance with internal security policies and practices outlined in the security plan.
  • Ensure all users have the requisite security clearances, authorization, need-to-know, and are aware of their security responsibilities before granting access to the IS.
  • Collect, reduce and review audit trails and report all security-related incidents to the Information Assurance Manager (IAM).
  • Initiate, with the approval of the IAM, protective or corrective measures when a security incident or vulnerability is discovered.
  • Develop and maintain a System Security Plan (SSP) as described in Appendix C of DCID 6/3.
  • Conduct periodic reviews to ensure compliance with the SSP.
  • Ensure configuration management (CM) for security-relevant IS software, hardware and firmware is maintained and documented.
  • Conduct trusted recovery of PL/4 devices and ensure that system recovery processes are monitored to ensure that security features and procedures are properly restored.
  • Ensure all IS security-related documentation is current and accessible to authorized individuals.
  • Formally notify the IAM and the Designated Accreditation Authority (DAA) when a system no longer processes intelligence.
  • Formally notify the IAM and the DAA when changes occur that might affect accreditation.
  • Ensure that system security requirements are addressed during all phases of the system life cycle.
  • Follow procedures developed by the IAM to ensure only authorized software, hardware, scripts, firmware, and AFCERTS are installed on the system.
  • Protect the root or super-user authenticator at the highest level of data it secures.
  • Report all suspected security-related IS problems to the CL or IAM.
  • Use special access or privileges granted only to perform authorized tasks and functions.
  • Enroll authorized users in an IS, perform account unlocking.
  • Perform network administration (adding new equipment) and notify the CL of any system configuration changes that might adversely impact system security.
  • Perform mission data backup and restore, verify data archiving, and check data integrity as required.
  • Perform database maintenance to include user account creation and maintenance.
  • Configure communication ports.
  • Report security incidents.
  • Ensure field level TCTO instruction compliance (include software baseline upgrade support

Applied = 0

(web-69c66cf95d-nlr4c)