Camber Corporation Air Combat Command Special Technical Operations (STO) Security Manager - 16344 in Langley AFB, Virginia



Huntington Ingalls Industries (Camber Corporation) provides mission-critical engineering and technical service to Information Technology, Federal Civilian, and National Security, Aerospace & Defense and International government and commercial customers at over 100 locations worldwide.

HII-Camber is currently seeking a STO Security Manager to work out of Langley Air Force Base, Virginia. The Manager will work on the Air Combat Flight Operations Support contract.

The following statements of duties and responsibilities are intended to describe the general nature and level of work being performed by individuals assigned to this position. These statements are not intended to be an exhaustive list of all duties and responsibilities required of all personnel within this position. Actual duties and responsibilities may vary depending upon assignments and other factors.

Duties and Responsibilities

The STO provides security support, including physical, personnel, technical, information, and specialized security along with administration support to the STO office and subordinate units’ mission to provide connectivity between the CAF, Joint Staff, HAF and the joint planning and execution community. Both FTEs may be required to perform the following tasks. The contractor shall:

  • Comply with appropriate Joint DoD and AF security guidance and directives.

  • Utilize/access multiple computer and communications systems such as Non-secure internet protocol router network (NIPRNET), Secure internet protocol router network (SIPRNET), and Joint World-wide Intelligence Communication system (JWICS).

  • Attend meetings; prepare/present briefings, graphics, and visual aids for/to leadership using software compatible with current Government software suite.

  • Prepare security paperwork (visit certifications, program access requests, and indoctrination forms) using the Special Access Program Nomination Process.

  • Support physical and administrative security procedures such as: perform entry and visit processing, escort personnel within the facility, verify end-of-day security checks have been conducted and documented.

  • Answer telephones and other modes of administrative communications.

  • Perform self-inspections; identify security deficiencies; and report security violations.

  • Perform or support security inspections; identify security discrepancies; prepare reports.

  • Perform quarterly and incident security audits.

  • Perform courier responsibilities.

  • Control classified media and information, transfers files between local systems to storage devices, and properly dispose of media.

  • Maintain accreditation package repository for all system certification and accreditation documentation as well as modifications.

  • Create, modify, and update databases (suspense tracking, personnel access, facility, etc.).

  • Use the Information Technology (IT) systems for official use only.

  • Attend or complete annual computer security awareness briefings/training.

  • Provide appropriate caveat and safeguard statements on all Information System (IS) files, output products, and storage media.

  • Protect IS and IS peripherals located in his/her respective areas.

  • Secure unattended IS by invoking screen lock or logging off.

  • Safeguard and report any unexpected or unrecognizable output products to the Information System Security Officer (ISSO)/ Government Security Officer (GSO) as appropriate. This includes both display and printed products.

  • Safeguard and report the receipt of any media received through any channel to the appropriate ISSO or GSO for subsequent virus inspection and inclusion into the media control procedures.

  • Report all security incidents to the either the ISSO or GSO.

  • Assist with planning, development and implementation of required security training

  • Travel TDY to support exercises/events.

  • Schedule and maintain STO conference room.

  • Support and process Headquarters Air Force approved events and exercises.

Personal Security: Determine eligibility for access to Special Access Programs (SAP) and secure network; maintain personnel security files for user access to the network and program databases.

  • Process personnel for clearance to allow access to SAP information network.

  • Prepare & process security paperwork, and submit waiver documentation to appropriate security authorities, coordinate with other DoD agencies.

  • Attend or conduct site visits, technical meetings, security management meetings, conferences, and unique program requirements. (Approx. 10 CONUS per year).

  • Create or brief all levels of government and civilian personnel on security related topics.

  • Assist in planning, conducting, evaluating, analyzing, and reporting security issues.

  • Compose, analyze, edit, identify discrepancies, transmit, and track security requests; input data into appropriate personnel database.

  • Provide personnel security guidance to representatives from Personnel Security areas throughout the STO community.

Technical Security: Provide direct support and expertise to the ACC STO office and ACC-subordinate STO offices for facility accreditation, inspections, and equipment accreditation to ensure all aspects of network and information security.

  • Assist with planning, development and implementation of security requirements.

  • Assist in entry control and perform escort duties.

  • Continuously assess policy, procedures, and systems to identify shortfalls, risks and provide recommendations for revising and improving security policies, procedures, and systems.

  • Assist in developing, implementing, and training the Operations Security program.

  • Ensure system certification is accomplished and up to date for information systems.

  • Monitor, implement, provide guidance, and enforce Automated Information System (AIS) security policies and procedures for all information technology systems for which access is granted.

  • Ensure that all Information System security officers (ISSOs), and other AIS personnel receive the necessary technical and security training to carry out their duties.

  • Ensure adherence to approved procedures for transfer, release, or disposal of automated information system equipment or products.

  • Respond, investigate and report security violations and incidents.

  • Ensure proper protection or corrective measures have been taken when an incident or vulnerability has been discovered within a system.

  • Ensure development and implementation of an information security education, training, and awareness program, to include attending, monitoring, and presenting local AIS security training.

  • Ensure that security testing and evaluations are completed and documented.

  • Conduct annual testing of the security posture of the AIS.

  • Ensure all AIS security-related documentation is current and accessible to properly authorized individuals

  • Assist system administrators to ensure current security measures are sufficient and in compliance with approved policies and processes.

  • Perform account management for all system users; verify requirements to add, modify, or delete accounts as required.

  • Conduct security surveys of facilities and gather pertinent security documentation for inclusion in accreditation packages.

Information Security: Provide expertise for implementation and maintenance of DOD, Joint Chiefs of Staff (JCS), and USAF information security directives for the protection of all classified and sensitive information extracted from the STO office’s network.

  • Maintain personnel security folders to ensure only properly cleared personnel have access to the network and STO information.

  • Maintain accreditation package repository for all system certification/accreditation documentation and modifications.

  • Write and update System Security Plans (SSPs).

  • Maintain computer user documentation.

  • Provide guidance and support to AIS users.

  • Ensure Systems are maintained as stated in SSP.

Specialized Administrative Security Support:

  • COMSEC Scope/Responsibilities: The contractor shall manage multiple COMSEC accounts in accordance with COMSEC Responsible Officer (CRO)/Secure Voice Responsible Officer (SVRO) and Cryptographic Access Program (CAP) Administrator requirements outlined in applicable policy directives; and provide guidance and assistance to assigned personnel with COMSEC responsibilities, as necessary.The contractor shall ensure COMSEC is fully addressed in each respective squadron's applicable security SOPs and/or OIs, and incorporated into the overall SATE program.Responsibilities include, but are not limited to, the following:

  • COMSEC Records: Prepare and maintain a six-part folder for each separate COMSEC account in accordance with AFMAN 17-1302-0, as supplemented, and established local procedures.COMSEC records will be retained on file locally in accordance with the Air Force Records Disposition Schedule.

  • COMSEC Operating Instruction and Emergency Action: Develop and maintain COMSEC OIs and emergency action task cards for each account, and ensure all assigned personnel are thoroughly familiar with the contents of each; existing OIs and task cards will be provided by the government upon contract award.The CROs will ensure each COMSEC user is properly trained on these procedures, as well as their individual responsibilities.

  • COMSEC Duties: Perform daily, weekly, monthly, quarterly and annual COMSEC duties in accordance with applicable policy directives and established local procedures, as appropriate.Duties include operation, maintenance, and required reconfiguration of cryptographic equipment and keying material. The contractor shall request, secure, and account for all accountable COMSEC keying material and maintenance manuals.The contractor shall also order, ship, receive, courier delivery and pick-up, and secure required cryptographic equipment.Records pertaining to the above equipment will be maintained and delivered by the contractor as required.The CROs will ensure all secure communications equipment is properly maintained and readily available for use at all times.

  • COMSEC Training: Conduct initial and refresher training for all assigned COMSEC users.As a minimum, refresher training will be conducted at not more than twelve month intervals following initial training.The CRO will document each individual's training using AF IMT 4168, COMSEC Responsible Officer and User Training Checklist, an maintain a copy in the respective account's six-part folder.

  • Perform and report on initial indoctrinations, annual debriefings, foreign travel briefings, OPSEC briefings, debriefing/access termination briefings.

  • Coordinate with the STO security manager to plan, document, and implement procedures such as Security Operating Procedures (SOP), Operating Instructions (OI), Communication Security (COMSEC), Emergency Action Plans (EAP), TEMPEST, and Top Secret Control Officer (TSCO) activities.



  • Three years’ experience with security management (physical, personnel, technical and information working with CJCSI, ICDs/DoDMs and other guiding policy documents.

  • One year experience using IBM-compatible and Macintosh personal computer systems (computers, peripherals, etc.) that are common to ACC, ACC/STO, and automated data processing environments. This includes following the policies and procedures associated with maintaining the security and integrity of devices within classified and unclassified environments.

  • Three years’ experience with computer systems and programs such as Planning and Decision Aid System (PDAS), Joint Personnel Adjudication System (JPAS).


  • Top Secret clearance based on a Single Scope Background Investigation (SSBI) (within the last four years), and eligible for Sensitive Compartmented Information (SCI) and SAP access; must be willing to submit to a counterintelligence polygraph.

  • All candidates will be subject to a pre-employment background investigation and drug screening per HII requirements.

About Us

Camber Corporation is part of the Integrated Mission Solutions Group of HII’s Technical Solutions division. Integrated Mission Solutions Group is a leading provider of Agile Software Engineering and Information Technology solutions; All Hazards services; Modeling, Simulation, and Training solutions and services; Unmanned Systems support; Intelligence Analysis and Operations; and Engineering and Management services to Department of Defense, Federal, and commercial customers.

Integrated Mission Solutions Group (Camber), a subsidiary of Huntington Ingalls Industries, Inc. (HII) is headquartered in Huntsville, AL. From Camber’s founding in 1990, we have grown to 32 offices, positioned to provide responsive support to our customers across the United States. We deploy personnel to support our customers globally, including many locations in Asia, Africa, and Europe, providing daily interface on technical, programmatic, and operations issues. Overall, more than 1,600 Camber professionals deliver ISO 9001:2008-certified and CMMI ML3 high-value solutions to customers worldwide.

Camber Corporation is an Equal Opportunity Employer EOE/AA Minorities/Females/Veterans/Disabled