SAIC
Alternate CRO Cyber Systems Administrator
Job ID: 2511907 | Date Posted: 2025-11-28 | Location: Kirtland AFB, NM, US | Category: Cyber | Subcategory: Cybersecurity Spec | Schedule: Full-time | Shift: Day Job | Travel: No | Minimum Clearance Required: Top Secret | Clearance Level Must Be Able to Obtain: TS/SCI | Potential for Remote Work: No
SAIC is looking for an experienced Alternate CRO Cyber Systems Administrator with a systems administration background to serve as an alternate COMSEC responsible officer (CRO) and perform systems administration work with the cybersecurity team supporting the US Space Force (USSF) Space Systems Command, Prototype Ground Development and Sustainment Directorate. The role is based at Kirtland AFB in Albuquerque, NM.
Description As the alternate CRO for a non-collateral account, you will be responsible for implementing and maintaining cyber tools such as eMASS, Xacta, STIG Viewer, and others while supporting the COMSEC responsibilities for the account.
Key CRO Responsibilities
Support the primary CRO for all COMSEC duties.
Manage COMSEC material and automated equipment, including maintaining security from receipt through usage and eventual consumption/destruction.
Conduct inventories of all equipment handled by hand receipt holders and support periodic rekey and installation of new devices.
Work with program managers to bridge the gap between high-level security policies and requirements, implementing technical and operational solutions.
Procure and maintain requisite COMSEC materials.
Answer questions on process, timeline, status of assets, and reporting.
Ensure compliance with government requirements and regulations.
Key Security Administrator Responsibilities
Install, configure and maintain cybersecurity tools.
Scan and assess the network for vulnerabilities.
Monitor network traffic for unusual activity.
Implement network security policies, application security, access control, and data safeguards.
Qualifications
Active Top Secret Clearance with SCI eligibility, and able to obtain and maintain TS/SCI.
Bachelor’s degree in Computer Science or related technical field and 5 or more years of relevant experience. Will accept 4 years of relevant experience in lieu of degree.
3 years of COMSEC custodian experience in a DoD environment AND 3 years of hands‑on systems administration experience.
Comprehensive knowledge of COMSEC policies and procedures.
User experience with the maintenance and operation of common COMSEC devices.
Experience with key management infrastructure.
Experience preparing for and participating in audits and assessments.
Minimum 1 year of proven work experience as a Linux systems administrator, Red Hat-based distributions preferred.
Practical experience in Bash and/or PowerShell.
Must be compliant with DoD 8140.03 Foundational and Residential Qualifications (Security+ to start).
Familiar with the RMF process.
Desired Experience
HBSS and ACAS installation and management experience.
Experience with patching and applying STIGs and other cyber technologies that implement security controls in military cyberspace operational environments such as firewalls, router ACLs, PKI, OWASP, scripting, identity management, virtualization, etc.
Experience performing vulnerability and penetration tests, identifying and defending against threats, and developing disaster recovery plans.
Creating network policies and authorization roles and defending against unauthorized access, modifications, and destruction.
Referrals increase your chances of interviewing at SAIC by 2x.
#J-18808-Ljbffr
SAIC is looking for an experienced Alternate CRO Cyber Systems Administrator with a systems administration background to serve as an alternate COMSEC responsible officer (CRO) and perform systems administration work with the cybersecurity team supporting the US Space Force (USSF) Space Systems Command, Prototype Ground Development and Sustainment Directorate. The role is based at Kirtland AFB in Albuquerque, NM.
Description As the alternate CRO for a non-collateral account, you will be responsible for implementing and maintaining cyber tools such as eMASS, Xacta, STIG Viewer, and others while supporting the COMSEC responsibilities for the account.
Key CRO Responsibilities
Support the primary CRO for all COMSEC duties.
Manage COMSEC material and automated equipment, including maintaining security from receipt through usage and eventual consumption/destruction.
Conduct inventories of all equipment handled by hand receipt holders and support periodic rekey and installation of new devices.
Work with program managers to bridge the gap between high-level security policies and requirements, implementing technical and operational solutions.
Procure and maintain requisite COMSEC materials.
Answer questions on process, timeline, status of assets, and reporting.
Ensure compliance with government requirements and regulations.
Key Security Administrator Responsibilities
Install, configure and maintain cybersecurity tools.
Scan and assess the network for vulnerabilities.
Monitor network traffic for unusual activity.
Implement network security policies, application security, access control, and data safeguards.
Qualifications
Active Top Secret Clearance with SCI eligibility, and able to obtain and maintain TS/SCI.
Bachelor’s degree in Computer Science or related technical field and 5 or more years of relevant experience. Will accept 4 years of relevant experience in lieu of degree.
3 years of COMSEC custodian experience in a DoD environment AND 3 years of hands‑on systems administration experience.
Comprehensive knowledge of COMSEC policies and procedures.
User experience with the maintenance and operation of common COMSEC devices.
Experience with key management infrastructure.
Experience preparing for and participating in audits and assessments.
Minimum 1 year of proven work experience as a Linux systems administrator, Red Hat-based distributions preferred.
Practical experience in Bash and/or PowerShell.
Must be compliant with DoD 8140.03 Foundational and Residential Qualifications (Security+ to start).
Familiar with the RMF process.
Desired Experience
HBSS and ACAS installation and management experience.
Experience with patching and applying STIGs and other cyber technologies that implement security controls in military cyberspace operational environments such as firewalls, router ACLs, PKI, OWASP, scripting, identity management, virtualization, etc.
Experience performing vulnerability and penetration tests, identifying and defending against threats, and developing disaster recovery plans.
Creating network policies and authorization roles and defending against unauthorized access, modifications, and destruction.
Referrals increase your chances of interviewing at SAIC by 2x.
#J-18808-Ljbffr