OMS/JMPS Administration

Job Description:

OMS Administrators are expected to perform tasks to support the Offboard Mission Support Environment (OMSE). Many tasks performed by the DBAs and  System Administrators are also tasks that are performed by an OMS Administrator to support the  OMSE.

The ability to obtain and maintain an active secret clearance with an investigation completed in the last 6 years is required. A Security+ certification (or equivalent-GSEC, CAP, CASP, CISM, CISSP, CISA, etc.) is required within 60 days of starting a position.

Junior-Senior level opportunities available, salary ranges are based on education/certifications and years of experience.

All positions require standard business travel usually once every 6 months for 1-3 weeks to other US base locations. 

* denotes locations that require overseas travel every 1.5 years for 3-6 months

OMS Tasks

  • Provide, manage and support the OMSE:
    • Maintain/Install MPSE updates
    • Support pilots in Mission Planning/Debriefing Process
    • Support Portable Memory Device (PMD) data transfer and maintenance
    • Administer Ground Data Receptacle (GDR)
  • Perform data management of mission planning and mission recorded data.
  • Maintain and store GDR, OMS, and OMS gateway (for SOUv1) or OMS Collaboration
  • Module (for SOUv2) security logs and audit data.
  • Install and configure MPSE on the appropriate units at the site.
  • Assist in managing GOTS for .
  • Monitor OMS Work Station (WS) and GDR.
  • Support cost planning and estimating efforts.
  • Identification of resource requirements.
  • Identification of risk and development mitigation plans.
  • Support software release activities.
  • Support implementation activities at site (e.g. standup of SOU at a site).
  • Setup user accounts with different levels of software/data access.
  • Maintain mission planning data/databases.

Key Management

  • Perform cryptographic key loading tasks for the GDR and the OMS WS.
  • Perform cryptographic key processing as required to support the GDR.
  • Audit cryptographic keys by reviewing audit logs on GDR and OMS WS.

Offboard Mission Support (OMS) Administrators provide OMS support in effort to provide the software operations for the Mission Planning, Theater Data Generation, Tactical/Intel Debrief, AV Authentication & Crypto, Key Management, and AV Secure Interface capabilities of the .

Tools & Applications

  • MS Windows 7
  • MS Windows Server 2012
  • Linux
  • MS Office 2010 Pro
  • Joint Mission Planning System (JMPS)
  • Communication Security (COMSEC) management
  • 4.4 Processes & Procedures
  • JMPS Installation and Configuration Procedure
  • Mission Planning Support Environment (MPSE) Installation and Configuration Procedure
  • Military Operations & Planning Processes (e.g. mission planning, post flight debriefing, etc.)
  • Additional activities associated with equipment will be performed in accordance with processes and procedures found in the appropriate ALOG referenced above.

Desired Certifications

  • General Dynamics Encryption Management System (GEMS)
  • Security+ CE Certification

Dependencies

Hardware and software support are similar between an OMS Administrator and an  System Administrator. Configuration of OMS hardware, such as the OMS WS, may require  System Administrators to configure the workstation’s hardware with  software prior to an OMS Administrator configuring any OMS software tools.

For ongoing support, an OMS Administrator may rely on an  System Administrator to manage server storage for mission planning or post flight debrief data.

Security Analyst

Tasks

  • Ensure that the audit logs indicate compliance with established security policies.
  • Ensure security patching (IAVAs, IAVBs, IAVAMs, antivirus signatures) are properly applied to accredited systems.
  • Manage, implement, and/or coordinate, and administer system security policies and processes.
  • Coordinate with security data owner in specifying and/or setting up the permissions specified for data and user accounts.
  • Monitor for compliance and enforcement of established security policies such as National Industrial Security Program Manual (NISPOM), Department of Defense (DoD)
  • Operating Procedures (OP), Defense Information Technology Security Certification & Accreditation Program (DITSCAP), DOD Information Assurance Certification and
  • Accreditation Process (DIACAP), or local country equivalent, as appropriate (password strength, audit configurations, user privileges, etc.).
  • Periodically validate that security relevant files (e.g. configurations, audit logs) have not been tampered with or altered.
  • Monitor system for and user account for malicious, inappropriate, or negligent use/misuse (e.g. probing, penetration, or bypass of security functions) of systems or resources, as well as malicious logic (either by insertion, malicious configuration, or mis-configuration).
  • Audit user access and activity within to ensure accountability of user actions.
  • Assess and address each areas of risk.
  • Coordinate with the network administrator to verify that the traffic is being transmitted to and from the by the correct means with acceptable performance.
  • Coordinate with the software administrator to perform needed maintenance and support for the given application for which the software administrator is responsible for ensuring the availability and integrity of his/her applications.
  • Responsible for all Vulnerability Alert Review (VAR) activities.
  • Responsible for all P3 compliance actions that occur in the .

The Security administrator shall use a series of automated auditing tools augmented with manual processes to ensure that auditing occurs to guarantee compliance of the accredited systems with established security policies.

Skills and Knowledge Set

Tools & Applications

  • MS Windows 7
  • MS Windows Server 2012
  • MS Office 2007 Pro
  • NetIQ Security Manager
  • Knowledge of Windows audit policy and ability to audit security logs to ensure compliance with security policy.

Processes and Procedures

Windows audit policy determines the type of information found in the Security log. Each Windows system has nine audit policies that can be enabled or disabled:

  1. Audit account logon events
  2. Audit account management
  3. Audit directory service access
  4. Audit logon events
  5. Audit object access
  6. Audit policy change
  7. Audit privilege use
  8. Audit process tracking
  9. Audit system events.

Desired Certifications

  • Security+ CE
  • GIAC Certified Intrusion Analysts (GCIA)
  • MCITP Microsoft Certified IT Professional

 

Latest News

happy clients

Our Top Customers
Training and Testing Partners