Successful candidate will provide EPASS Advisory and Assistance Services to the Command, Control, Communications, Intelligence, and Networks (C3I&N) Directorate (AFLCMC/HN) at the AF Life-Cycle Management Center (previously the Electronic Systems Center). The C3I&N Directorate’s primary mission is: Connecting Warfighters with Affordable, Secure, and War-Winning Cyber, C3I and Network Systems. The Directorate provides C3I connectivity, network, and infrastructure between Joint, Coalition, AF, and Allied countries space, air, terrestrial, and cyber domains. The Directorate in headquartered at Hanscom AFB, MA with 11 other operating locations. This position will have to interface with a team of military, Government civilian, contractor project managers and FFRDC/A&AS support personnel in the day-to-day activities associated with management of HN’s projects, programs and initiatives.
Ranges from, Level I: BA/BS, 4 years of experience; or 8 years of directly relatable experience; to Level III: Advanced Degree (MA/MS) and 12 years of experience (5 years DoD), or BA/BS degree, and 15 years of experience (5 years DoD), or 20 years of directly related experience with proper certifications (8 DoD).
Note: Oasis has some flexibility to swap experience for degree requirements and vice-versa.
IT Certifications are a plus.
Position Location(s): Hanscom AFB, Lackland AFB, Offutt AFB, Maxwell AFB Gunter Annex.
Travel: Occasional CONUS/OCONUS travel may be required.
Secret, Top Secret clearance (depending on location); or as a minimum, the ability to obtain a clearance
The successful candidate will ensure that all system and application deliverables meet the requirements of all DoD and Air Force Cybersecurity policies.
The successful candidate will posess certifications in accordance with DoD 8570.01-M standards. The successful candidate will ensure that all application deliverables comply with Public Law 111-383, for software assurance.
The successful candidate will ensure that all application deliverables comply with DISA Application Security Development Security Technical Implementation Guide (STIG), which includes the need for source code scanning to mitigate vulnerabilities associated with SQL injections, cross-site scripting, and buffer overflows.
The successful candidate will also support activities and meet the requirements of DoDI 8520.02, Public Key Infrastructure (PKI) and Public Key (PK) Enabling, in order to achieve standardized, PKI- supported capabilities for biometrics, digital signatures, encryption, identification and authentication.
[In compliance with DoD Instruction 8500.01,Para 1(d), which adapts the term “cybersecurity” as it is defined in National Security Presidential Directive-54/Homeland Security Presidential Directive-23 to be used throughout the DoD instead of the term "information assurance (IA).”]