Alternate CRO Cyber Systems Administrator

  • KIRTLAND AFB, NM
  • Posted 4 days ago | Updated 5 hours ago

Overview

On Site
Full Time

Skills

eMASS
XACTA
Reporting
Regulatory Compliance
Cyber Security
Network Security
Software Security
Access Control
Security Clearance
Computer Science
System Administration
Policies and Procedures
User Experience
Communications Security
Auditing
Linux
Red Hat Linux
Bash
Windows PowerShell
DoD
Security+
Risk Management Framework
RMF
HBSS
Management
STIG
Security Controls
Military
Firewall
Routers
PKI
OWASP
Scripting
Identity Management
Virtualization
Disaster Recovery
Network
Authorization
Information Technology
Systems Engineering
FOCUS

Job Details

Job ID: 2508647

Location: KIRTLAND AFB, NM, US

Date Posted: 2025-08-14

Category: Cyber

Subcategory: Cybersecurity Spec

Schedule: Full-time

Shift: Day Job

Travel: No

Minimum Clearance Required: Top Secret

Clearance Level Must Be Able to Obtain: TS/SCI

Potential for Remote Work: No

Description
SAIC is looking for an experienced Alternate CRO Cyber Systems Administrator with a systems administration background to be an alternate COMSEC responsible officer (CRO) and perform systems administration work with the cybersecurity team supporting the US Space Force (USSF) Space Systems Command, Prototype Ground Development and Sustainment Directorate. You will be the alternate CRO for a non-collateral account and a cybersecurity systems administrator implementing and maintaining cyber tools such as eMASS, Xacta, STIG Viewer, and others. This work is located at Kirtland AFB in Albuquerque, NM.

Key CRO responsibilities include:
  • Support primary CRO for all COMSEC duties.
  • Manage COMSEC material and automated equipment, including maintaining security, from receipt through usage and eventual consumption/destruction.
  • Conduct inventories of all equipment handled by hand receipt holders and supporting periodic rekey and installation of new devices.
  • Work with program managers to bridge the gap between high-level security policies and requirements. This includes the technical and operational implementation of those requirements.
  • Procure and maintain requisite COMSEC materials.
  • Answer questions on process, timeline, status of assets, and reporting.
  • Ensure compliance with government requirements and regulations.
Key security administrator responsibilities include:
  • Install, configure and maintain cybersecurity tools.
  • Scan and assess network for vulnerabilities.
  • Monitor network traffic for unusual activity.
  • Implement network security policies, application security, access control, and data safeguards.

Qualifications
This is you:
  • Active Top Secret Clearance with SCI eligibility, and able to obtain and maintain TS/SCI.
  • Bachelor's degree in Computer Science or related technical field and 5 or more years of relevant experience. Will accept 4 years of relevant experience in lieu of degree.
  • 3 years of COMSEC custodian experience in a DoD environment AND 3 years of hands-on systems administration experience.
  • Comprehensive knowledge of COMSEC policies and procedures.
  • User experience with the maintenance and operation of common COMSEC devices.
  • Experience with key management infrastructure.
  • Experience preparing for and participating in audits and assessments.
  • Minimum 1 year of proven work experience as a Linux systems administrator, Red Hat-based distributions preferred.
  • Practical experience in Bash and/or PowerShell.
  • Must be compliant with DoD 8140.03 Foundational and Residential Qualifications (Security+ to start).
  • Familiar with the RMF process.
Desired Experience:
  • HBSS and ACAS installation and management experience.
  • Experience with patching and applying STIGs and other cyber technologies that implement security controls in military cyberspace operational environments such as firewalls, router ACLs, PKI, OWASP, scripting, identity management, virtualization, etc.
  • Experience perform vulnerability and penetration tests, identifying and defending against threats, and developing disaster recovery plans.
  • Creating network policies and authorization roles and defending against unauthorized access, modifications, and destruction.



Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.

About SAIC