Skip Navigation

Systems Administrator/Cybersecurity Secret Clearance Required
Oak Harbor, WA

Back To Job Board

Direct Hire

Position Overview

Our client is seeking experienced System Administrators to join their team of qualified, diverse individuals. There are multiple positions open with locations in Lemoore and Miramar, California, Beaufort, South Carolina, and Oak Harbor, Washington. All positions locations will be located on a military base and require an active Secret clearance. 


  • Maintain trainer cybersecurity programs identified through cybersecurity architecture requirements, objectives, and policies; Cybersecurity Workforce (CSWF) personnel; and cybersecurity processes and procedures.
  • Support the respective Contracting Officer’s Representative (COR)/NAWCTSD In-Service Engineering Office (ISEO) in vulnerability management updates.
  • Ensure site Cybersecurity and general security procedures are followed in accordance with (IAW) Configuration Management (CM) policies and practices.
  • Support Assessment and Validation events (Part of Assessment and Authorization).
  • Support trainer Validation events after patching and updates by the NAWCTSD ISEO, and during Cybersecurity Annual Reviews.
  • Implement NAWCTSD ISEO directed technical vulnerability corrections.
  • Implement and enforce upon Contractor Operations and Maintenance Services (COMS) workforce Department of the Navy (DoN) systems account access and password policy IAW Secretary of the Navy (SECNAV) Manual M-5239.1 series.
  • Ensure the administration of privileged user accounts IAW system role-based access schemes as per site operating procedures. For logical access and where Public Key Infrastructure (PKI) token is utilized, ensure PKI certificate validation are maintained and updated IAW Cybersecurity System Administrator Guidebook (CSAG).
  • Maintain account currency to ensure that individual accounts designated as inactive, suspended, or terminated are promptly deactivated and associated passwords are disabled and removed. All Smart Cards and access tokens need to be controlled as per site operating procedures. Smart Card and access token pins need to be protected at the same classification level as the training system.
  • Ensure system audit logs are reviewed IAW applicable MRC(s), Information Assurance System Administrator Guidebook (IASAG) or the CSAG and any security violations are reported to the COR and ISSM.
  • Ensure audit log records are backed up and maintained IAW DoDI 8500.1 and the NIST 800-53 series controls.
  • Perform data backup as required by the MRC, IASAG or the CSAG.
  • Perform NAWCTSD ISEO directed antivirus software updates and virus scanning IAW DoDI 8500.1, CNSSI 1253 the RMF package, the Authorization to Operate (ATO) package as required by the MRC, IASAG or CSAG.
  • Ensure network device program activities are carried out for the network control devices (e.g., firewalls, routers, switches), IAW DOD policy and organization specific guidelines, including maintaining configuration of network control devices IAW Defense Information Systems Agency (DISA), STIGs and National Security Agency (NSA) security guidelines to protect the network control devices from unauthorized access.
  • Conduct monthly tests on network(s) for changes and updates made to the network control devices to ensure integrity IAW the systems Configuration Management Plan (may be specified via a MRC, IASAG or CSAG.).
  • Conduct weekly, monthly, quarterly, semiannual, and annual audits on network(s) as prescribed by the Information System Continuous Monitoring Plan (ISCMP); audits include software (SW), SW licenses, hardware (HW), HW spares, ports, protocols and services (PPS), privileged accounts, account privileges, audited events. All audits shall include completion of ISEO provided report templates and are made available for ISSO review at any time.
  • Ensure COMS contract personnel receive initial and annual Cybersecurity awareness training. All Cybersecurity training shall be documented and available for ISSO review at any time.
  • In addition to meeting requirements for Authorized Users per DoDI 8500.01 Cybersecurity, COMS personnel performing privileged activities as defined in DoDD 8140.01 and IAW DoD 8570.01M shall be appointed in writing by the ISSO and shall complete Privilege Access Authorization (PAA) or Statement of Acceptance of Responsibilities form, System Access Authorization Request (SAAR) (Navy form). The PAA shall be updated annually.


  • Must have a current, active Secret (or higher) clearance
  • Possess a minimum of seven (7) years’ experience or equivalent in a Cyber IT/Cybersecurity Workforce position; experience should include Customer Service and Technical Support, Data Administration, Knowledge Management, Network Services, System Administration, and Systems Security Analysis.
  • Meet the Minimum Credential requirements and maintain the minimum training requirements as identified in DoD 8570.01M.
  • Expert in all functions of both IAT Level I and IAT Level II positions.
  • Applies extensive knowledge of a variety of the IA field’s concepts, practices, and procedures to ensure the secure integration and operation of all enclave systems.
  • Possess current certification in CISSP or equivalent and maintains necessary certifications and required forty (40) hours of annual continuing education (reference the DoD Approved 8570 Baseline IAT-III Certifications).
  • Possess applicable CE/OS Certifications.
  • Possess a working knowledge and familiarity with applicable Cybersecurity instructions and practices (e.g., DoDI 8570.01-M series– Information Assurance Workforce Improvement Program; CJCSM 6510.01 series- Defense-In-Depth:
    • Information Assurance (IA) and Computer Network Defense (CND); DoD 8570.01M; and DoDI 8500.1 Cybersecurity).
  • Demonstrated knowledge and experience with Security Technical Implementation Guides (STIGs).
  • Be able to lead teams and/or support actions to quickly resolve or mitigate IA problems.
  • Support the installation of new or modified hardware, operating systems, and software applications ensuring integration with IA security requirements for the enclave.
  • Demonstrated knowledge and experience using and installing networking equipment such as switches, routers and firewalls.
  • Demonstrated knowledge and experience with system patching and IA vulnerability alerts (IAVA), IA vulnerability bulletins (IAVB), and technical advisories (TA).
  • Be able to support, monitor, test and troubleshoot hardware and software IA problems.
  • Be able to provide end user support for all IA related applications.
  • Be able to perform routine maintenance, to include diagnostic testing and optimization.
  • Within six (6) months of assignment, complete Government sponsored training on the DoD Host Based Security System (HBSS) and the DoD Assured Compliance Assessment Solution (ACAS) and be able to assist Government IA personnel in the configuration and sustainment of HBSS, and able to execute and analyze vulnerability scans upon request by Government IA personnel.
  • Be able to coordinate and implement software backup and antivirus requirements.
  • Be able to perform scheduled IA specific preventive maintenance of computer systems and network components.
  • Be able to coordinate Cybersecurity/ATO requirements with Government Cybersecurity/IA personnel, including the ISSM, ISSO, ISEO, and COR.

Back To Job Board

Submit Your Resume

"*" indicates required fields

First Name*
Last Name*
Max. file size: 20 MB.
Drop your resume and other files here or upload here
This field is for validation purposes and should be left unchanged.