Cyber Security Technical Writer

Oak Ridge, TN
Work Type: Hybrid
  • Job Category: Information Technology
  • Travel: Yes, 25 % of the Time
  • Clearance: Able to Obtain DOE Q
  • Shift: Day Job
  • Req ID: AIS00552

Apply Now

Job Summary:

Akima Infrastructure Services, LLC (AIS), is actively seeking Engineering, Professional, Technical, and Administrative support personnel as part of our staff augmentation team supporting the Department of Energy at the Y‑12 National Security Complex located in Oak Ridge, Tennessee and the Pantex Plant located in Amarillo, Texas.

Successful candidates will be employees of AIS, a premier government contractor charged with employing highly motivated and well-qualified personnel who can advance Y-12's core mission to ensure a safe, secure, and reliable U.S. nuclear deterrent, which is essential to national security. Though employed by AIS, the employee will take day-to-day direction and assignments from Y-12 staff employed directly by the security complex. Pay, benefits, Human Resources, and Employment Management functions are provided by AIS.

Qualified applicants must be a US citizen, at least 18 years of age, and able to meet pre-employment requirements including any required physicals, drug screen, and/or background investigation to satisfy clearance requirements from the Department of Energy.

Job responsibilities:

This is a professional technical writing position within the Information Systems & Services (IS&S) Cyber Security Organization. The responsibilities of the person in this position is documenting cyber security policies, procedures and authorization documentation pertaining to all network and operating environments to include but not limited to:

  • Ability to present administrative, technical, and operational information clearly and effectively through the oral and written word as well as diagrams and charts

  • Coordinating and ensuring technical requirements of cyber security are appropriately documented and integrated into the overall site security efforts.

  • Reviewing and analyzing planned projects and initiatives that may have an impact on the cyber security policies and procedures.

  • Evaluating cyber threats, vulnerabilities, and risk to computing resources and clearly communicate into written policies and procedures.

  • Researching and documenting security best practices for particular devices, applications, and emerging technologies.

  • Evaluating compliance with the organization's security policies and making recommendations for areas of improvement.

  • Occasional travel may be required between the two sites.

Minimum Qualifications:

  • This position requires at a minimum a bachelor’s degree in computer science, Information Systems or related field with 5-12 years of relevant experience, or an equivalent combination of education and experience including certifications (e.g., SANS Training, CISSP, or other security certifications).

  • The successful candidate must have excellent verbal and written communications skills.

  • Applicants must be able to obtain and maintain a DOE “Q” clearance.

  • Formal training or a demonstrated knowledge of cyber security is required.

  • Good technical computing expertise with working knowledge of security controls for networks, systems, databases, and enterprise applications is required as well as knowledge of system life cycle methodologies to include risk management and configuration management.

  • Experience with the integration of new information technology into existing infrastructures is desired as well as familiarity with DOE/NNSA cyber security policy and associated implementation.

Desired Qualifications:

  • Knowledge of federal cybersecurity protection standards and baselines (e.g. NIST Cybersecurity Framework, NIST 800 series Special Publications, DoD STIGs, CNSSI 1253, DOE SD 205.1, DOE O 205.1)

  • Ability to develop and update cybersecurity policy documents, system security plans, baselines and threat models for deployment and risk acceptance decisions.

  • Strong teamwork skills, including interaction with end users and operations personnel, in a service-oriented environment.

  • Understanding of networking technologies and protocols

Apply Now