The University of Texas at Austin Job Posting

This posting is Closed

Information Technology Coordinator I - Alternate Information Systems Security Manager

Hiring department Applied Research Lab
Monthly salary $4,167 - $5,208+ depending on qualifications
Hours per week 40.00 Standard from 730AM to 430PM
Posting number 18-06-14-02-9304
Job Status Closed
FLSA status Non-exempt
Earliest Start Date Immediately
Position Duration Funding expected to continue
Position open to all applicants
Location Austin - J. J. Pickle Research Campus (North Austin)
Number of vacancies 1
General Notes

An agency designated by the federal government handles the investigation as to the requirement for eligibility for access to classified information. Factors considered during this investigation include but are not limited to allegiance to the U.S., foreign influence, foreign preference, criminal conduct, security violations, drug involvement, the likelihood of continuation of such conduct, etc.

Required Application Materials

  • A Resume is required in order to apply
  • A Letter of Interest is required in order to apply.
  • A List of 3 References is required in order to apply.

Note: The following additional materials are also required for consideration: References must be former employers. Instructions for submission of these materials will be provided at the time the online application has been completed.

Additional Information


The Alternate Information Systems Security Manger is responsible for classified IS compliance by designing/executing an Information Assurance security program.

Essential Functions

Categorize the Information System and document results in the SSP. Describe the information system (including system boundary) and document the description in the SSP. Register the IS with the appropriate organizational program management offices. Identify security controls provided by the organization as common controls for organizational IS and document in the SSP. Select security controls for IS and document in SSP. Develop Continuous Monitoring strategy of security control effectiveness and any proposed/actual changes to IS and operational environment. Review and approve draft SSP. Implement the security controls specified in the SSP. Document the security control implementation, as appropriate in the SSP, providing a functional description of the control implementation. Develop/review/approve security control assessment plan. Assess controls in accordance with plan. Prepare SAR documenting assessment issues/ findings/recommendations. Conduct initial remedial actions on security controls based on findings/recommendations of SAR. Reassess remediated controls. Prepare the Plan of Action and Milestones (POA and M) based on the findings and recommendations of the SAR. Assemble the Security Authorization Package submit the package to AO for adjudication. Determine the risk to organizational operations. Determine if risk to is acceptable. Prepare (POA and M) based on findings/recommendations of SAR. Assemble the Security Authorization Package and submit package to AO. Conduct remediation actions. Update SSP, SAR, and (POA and M). Report the security status of the IS. Review the reported security status of the IS. Implement IS Decommissioning Strategy when needed.

Marginal/Incidental functions

Serving as a voting member of the Configuration Control Board (CCB)as needed by the ISSM. In extreme/emergency circumstances AISSM will/can support IS related security training/briefings for the security office. Other related functions as assigned.

Required qualifications

HS/GED. 6 yrs dem ability w/info assurance in National Security computing environment. 3 yrs w/Risk Mgmt Framework methodology. Dem ability supporting various system configurations; auditing/certifying security aspects of various operating systems/networks. Strong communication, critical thinking, problem solving skills; Self-motivated w/ability to effectively prioritize multiple projects. U.S. Citizen. Applicant selected will be subject to government security investigation and must meet eligibility requirements for access to classified info at the level appropriate to the project requirements of the position. Employment is contingent on selected applicant submitting application for access and receiving notification of eligibility w/in time-period specified in the job offer. Employment must begin w/in 30 days of confirmation of eligibility. Eligibility for access to classified information must continue w/out interruption during employment. Employment will be contingent on selected applicant obtaining a DoDM 8570.01 compliant certification, equivalent to IAT Level II w/in 6 mos. of start date. Continued compliant certification, equiv to IAT Level II is required during employment. Equivalent combination of relevant education and experience may be substituted as appropriate.

Preferred Qualifications

Bachelor's Degree: Computer Science, Information Systems Management, or related field. Eligibility for immediate access to classified information at the level appropriate to the project requirements of the position. Three years of experience in information assurance in a National Security computing environment. Two years experience with the Risk Management Framework methodology. Experience with policy creation and documentation preparation and maintenance. Windows Operating System and Linux Operating System certifications. Possess a current DoDM 8570.01 compliant certification, equivalent to Information Assurance Technical (IAT) Level II (i.e. Security+).

Working conditions

May work around standard office conditions Repetitive use of a keyboard at a workstation Use of manual dexterity Some weekend, evening and holiday work. Frequent use of manuals and books. May work in shared, windowless office space. Possible intrastate/interstate travel.

Return to top of page