Job Directory COMSEC/KMI Operator

COMSEC/KMI Operator
Vienna, VA

Companies like
are looking for tech talent like you.

On Hired, employers apply to you with up-front salaries.
Sign up to start matching for free.

About

Job Description

Description:

Is it time for a new and exciting job opportunity? Phacil, an employee owned IT consulting company, is seeking a COMSEC/KMI Operator for an important customer in Vienna, VA. Join an amazing group of dedicated professionals and see the possibilities!

We bring service excellence and professional commitment delivering quality service and ferocious execution to our Federal Government customers. We provide solutions in the areas of Information Assurance, Cyber Security, Artificial Intelligence, Software & Systems Engineering, Cloud & Managed Services and Network Engineering. Join us by applying at www.phacil.com/careers/opportunities .

Clearance Level (Required to Start):

* Secret with ability to obtain Top Secret

Daily Job Responsibilities:

* Key generation or acquisition
* Responsible for registering new entities and binding their key(s) to their identifiers and perhaps other selected metadata
* Enter entity information, keys, and metadata into a database used by the CAKMI
* Responsible for the personnel, daily operation, training, systems/servers maintenance, and related management of CAKMI other than its keys
* Responsible for monitoring of system performance
* Revoke suspended or expired keys

Education and Experience:

* BS degree with 6 years of experience, including hands on experience with data security, encryptioin, monitoring, access control and incident management tools or years of experience in lieu of college degree.

Desired Experience/Skills:

* ITIL3 Foundation certification.
* Familiarity with DoS environment (data and voice networks, IT security systems, policies and procedures), Foreign Affairs Handbooks (FAHs), Foreign Affairs Manuals (FAMs) preferred.
* Interpersonal skills including the ability to collaborate effectively, self-awareness, and excellent written and oral communications.
* Working experience with key storage, distribution and administration (user and machine based)
* Supporting cryptographic strategy, policies, standards and compliance procedures
* Implementing security architectures involved with authentication, authorization and cybersecurity

Let your dream job find you.

Sign up to start matching with top companies. It’s fast and free.