Job was saved successfully.
Job was removed from Saved Jobs.

Job Details

Joint Training Information Systems Technician (eMASS) - Active Top Secret Clearance with SCI Eligibility

Education and Training

Training and Education Technician


Hurlburt Field, Florida, United States


Work Where it Matters

Cloud Lake Technology, an Akima company, is not just another federal IT contractor. As an Alaska Native Corporation (ANC), our mission and purpose extend beyond our exciting federal projects as we support our shareholder communities in Alaska.

At Cloud Lake, the work you do every day makes a difference in the lives of our 15,000 Iñupiat shareholders, a group of Alaska natives from one of the most remote and harshest environments in the United States.

For our shareholders , Cloud Lake provides support and employment opportunities and contributes to the survival of a culture that has thrived above the Arctic Circle for more than 10,000 years.

For our government customers , Cloud Lake delivers highly specialized, data-centric services and technology solutions that break down organizational boundaries and transform mission delivery.

As a Cloud Lake employee , you will be surrounded by a challenging, yet supportive work environment that is committed to innovation and diversity, two of our most important values. You will also have access to our comprehensive benefits and competitive pay in addition to growth opportunities and excellent retirement options.

Job Summary:

Candidate will be responsible for the direction of multiple, large or complex Cybersecurity projects in support of DoD clients. Responsibilities include managing relationships with clients and frequent / direct contact with the most managers and executives to provide cybersecurity technical expertise and project direction.


Job Responsibilities:

  • Serves as the Information System Security Officer (ISSO) and cybersecurity liaison. As the organizations primary action officer in such matters, develops, promulgates, and monitors compliance with policies, methods and procedures pertaining to the Cybersecurity Program for Automated Information Systems (AIS). Assignments are performed based primarily on knowledge of information processing methodology/technology, computer capabilities, and processing techniques, and, secondarily, on knowledge of agency and command policies and procedures associated with the protection of classified and sensitive but unclassified information. Work is complicated by such factors as the scope of SOF Training Support Network (STEN) coverage; on-going technological and policy changes; the extensive scope of computer networks; the diversity and complexity of the HQUSSOCOM, Components, and Sub Unified Commands; vague and sometimes non-existent higher HQ guidelines; and unusual organizational structures and lines of authority.
  • As the ISSO, establishes and maintains automation security, including Network security for assigned organizations. Prepares, distributes, and maintains policy, plans, instructions, guidance and standard operating procedures (SOPs) on the security of automated systems operations, and for security procedures and protocols governing network operations. Ensures procedures fully support the security integrity of automation and network operations and comply with Public Law (Computer Security Act), HQ, USSOCOM, Department of Defense (DOD), GSA, National Security Agency (NSA), National Institute of Standards and Technology (NIST), and Federal Information Resources Management Regulations (FIRMR) security directives. Conducts surveys to determine compliance with regulations. Reviews threats and vulnerabilities to assess risks, and determines effective measures to minimize such risks. Identifies resources to be protected. Analyzes the risk of espionage, sabotage, damage, fraud, and theft to determine the level of protection needed. Identifies measures and controls situations to minimize losses. Develops procedures using risk assessment methods concerning local environments, processing procedures, personnel, and other system components.
  • Acts as the resource to the organization on cybersecurity matters. Maintains an inventory of information system accreditation, including sensitivity level, accreditation status, and corrective actions required, if any. Report’s automation security incidents and technical vulnerabilities to the Cybersecurity Program Manager according to 380-3. Enforces an employee awareness program that includes password management, physical access controls, information distribution, information disposal, authorization, errors, nondisclosure of methods of control, disaster recovery and AIS hardware and software disposal: Responsible for the Certification and Accreditation Program. Maintains computer accreditation files. Conducts security risk management studies on new computer systems before installation. Determines which microcomputers must have accreditation documentation by judging whether or not a system is/or will be processing sensitive defense information. Ensures that security surveys and reaccreditation are performed on the schedule prescribed by regulations and any other regulatory requirement. Performs periodic inspections of all activities to ensure compliance with accreditation and automation security requirements. (30%).
  • Evaluates network security configuration and performs on-site network security assessment. Reviews current and planned network architecture and topology. Identifies areas of non-compliance or deficiencies. Makes recommendations and establishes timelines for corrective action. Prepares, distributes and maintains plans, instructions, guidance and standing operating procedures (SOPs) concerning the security of system operations. Reviews and evaluates the security impact of system changes, including interfaces with other AIS. Ensures that all interconnected systems comply with the security requirements levied within the infrastructure and do not have a negative security impact on any other systems with which they must interact and support. Periodically reviews the status of all AIS and networks to ascertain that changes have not occurred that affect security and negate the accreditation. (20%).
  • Draft standard operating procedures (SOP) such as procedures for the analysis of computer network incidents to include: response actions, secure information transfer, media destruction, secure fax, account management, and information technology equipment movement within the SCI, etc.
  • Review audit logs to include firewall, intrusion detection systems (IDS), and router. Through these reviews, the assigned engineer will determine if there is any unauthorized or suspicious traffic and report findings.
  • Evaluate new security technologies and assist in the integration of new security tools into the USSOCOM network defense-in-depth. This task will include solution testing and drafting of documents required for deployment of the solution. This documentation includes: implementation plans, build documents, and concept of operations (CONOPS).
  • Evaluate network security by running scans using SOCOM cybersecurity standard scanning tools. Results should be compared against DISA Standard Technical Implementation Guides (STIGS) to determine severity of the findings. Also perform penetration testing using command provided tool(s). Make recommendations to fix or mitigate risk to the network.
  • Assist in the preparation of certification and accreditation documentation using the DOD Intelligence Information System (DODIIS) procedures, DOD Risk Management Framework (RMF), and DAA selected format.
  • Acts as STSC’s cybersecurity liaison between Hurlburt Field STEN ISSO/Information Technology Team and HQ SOCOM decision makers on cybersecurity issues relate to the STSC and STEN.
  • Draft Cybersecurity polices as they may relate to STEN systems.
  • Work closely with the Global Network Security Center (GNSC), Cybersecurity Protection Center (IAPC), Joint Staff, USSOCOM Global Network Control Center (GNCC), J62, ISSMs, Special Security Office (SSO) and USSOCOM SAPCO (SAP Control Officer) to resolve detected computer network incidents.


Minimum Qualification:

  • 5+ years cybersecurity experience.
  • 2+ years ISSO.
  • Security+.
  • CASP+, CISSP or CISM preferred.
  • 3 years Enterprise Mission Assurance Support Service (eMASS).
  • 2 years Endpoint Security Solutions experience preferred.
  • 2 years Splunk experience preferred.
  • 2 years SolarWinds SEM experience preferred.
  • Must have Bachelor's degree of Science in Cybersecurity or related field.
  • Active Top Secret with SCI Eligibility.
  • Excellent writing and oral communication skills.
  • Excellent proposal writing skills.
  • Prior experience managing several projects at one time.
  • Self motivated and able to work in an independent manner.
  • Able to work in a fast pace deadline driven environment.
  • Must be able to travel up to 25 percent of the time between USSOCOM and STSC.

We are an equal opportunity employer and comply with all applicable federal, state, and local fair employment practices laws. All applicants will receive consideration for employment, without regard to race, color, religion, creed, national origin, gender or gender-identity, age, marital status, sexual orientation, veteran status, disability, pregnancy or parental status, or any other basis prohibited by law. If you are an individual with a disability, or have known limitations related to pregnancy, childbirth, or related medical conditions, and would like to request a reasonable accommodation for any part of the employment process, please contact us at or [Register to View] (information about job applications status is not available at this contact information).

Job: Information Technology

Travel: Yes, 25% of the time

Organization: Cloud Lake

Clearance: TS/SCI

Work Type: On-Site

Remote: No

ReqID: 2024-8334