System Administrator III
Resource Management Concepts, Inc.
San Diego, california
The selected candidate shall perform analysis of applicable Cybersecurity directives, policies and instructions. The contractor shall also maintain cognizance of, and comply with Communications Task Orders (CTOs), Information Assurance Vulnerability Management (IAVM), Fragmentary/Task/Operation Orders (FRAG/TASK/OPORDs), Public Key Infrastructure (PKI) guidance, and STIG requirements. The candidate shall make recommendations to the government regarding strategies to meet the established compliance objectives, and determine the impact compliance with these directives will have on the security and operability of the SRDT&E network. Shall track and report compliance status in the Vulnerability Remediation Asset Manager (VRAM), Continuous Monitoring Risk Scoring (CMRS), and similar reporting tools as applicable.
The selected candidate shall perform testing and analysis of Information Assurance (IA) controls and secure configuration using tools to include, but not limited to...