INFORMATION TECHNOLOGY SPECIALIST (ENTARCH)
- Employer
- USAJobs
- Location
- Fort Meade, Maryland
- Closing date
- Oct 3, 2023
View more
- Industry
- Government and Public Services, Federal
- Function
- Administrative
- Hours
- Full Time
- Career Level
- Experienced (Non-Manager)
You need to sign in or create an account to save a job.
Duties
Requirements
Conditions of Employment
Qualifications
Applicant must have directly applicable experience that demonstrates the possession of knowledge, skills, abilities, and competencies necessary for immediate success in the position. Qualifying experience may have been acquired in any public or private sector job, but will clearly demonstrate past experience in the application of the particular competencies or knowledge, skills and abilities necessary to successfully perform the duties of the position. Such experience is typically in or directly related to the work of the position to be filled. Qualifying experience would be demonstrated by: Serve as a Network Analyst or Host Analyst on a U.S. Marine Corps Cyber Protection Team (CPT) in the Marine Corps Cyberspace Warfare Group (MCCYWG). Participate in the development of Marine Corps/Department of Defense (DoD) threat/vulnerability analysis and threat mitigation. Provide technical advice, guidance and assistance on a wide range of complex cybersecurity issues. Install, operate, maintain, configure, and test and secure various operating systems. Develop and implement network backup and recovery procedures on Deployment Mission Support Systems (DMSS). Provide feedback on network security requirements, including network architecture and infrastructure. Identify baselines to facilitate locating adverse network trends, anomalous traffic or Malicious Cyberspace Activity (MCA). Take appropriate action to identify threats and implement network countermeasures.
This position is within the Work Category PROFESSIONAL at Work Level SENIOR, Series and Grade GG-2210-13.
Additional qualification information can be found from the following Office of Personnel Management website:
Experience refers to paid and unpaid experience, including volunteer work done through National Service programs (e.g., professional, philanthropic, religious, spiritual, community, student, social). Volunteer work helps build critical competencies, knowledge, and skills and can provide valuable training and experience that translates directly to paid employment.
MAJOR DUTIES:
Assessing cyber security plans; bolstering cyber defenses; performing cyber threat emulation; assessing intelligence; assessing malware analysis; remaining cognizant with the missions and priorities of the CPT to which assigned; development and updating of Concept of Operations (CONOPs) and procedures. The incumbent applies a high level of technical and analytical expertise, and a broad knowledge of Defensive Cyber Operations (DCO) to support the MARFORCYBER mission. Responsible for evaluating, defining, designing, and redesigning IT architectures and infrastructures, including policies and processes for ensuring the security and integrity of data networks. The incumbent must have experience with internet/network technologies and designs, networking protocols and computer audit techniques/tools applied on DoD Information Networks (DoDIN). Plan, manage and coordinate fact-finding and analytical projects requiring collaboration with the cooperation of other CPT members and occasionally with various entities external to the assigned CPT. Applies knowledge of network architecture, security fundamentals, and familiarization with multiple computer operating systems (OS). Directs scans and analysis of network vulnerability, configuration analysis, and network architecture analysis. Utilize DCO tools and devices to detect unauthorized activities on the DoDIN. Conducts auditing and logging procedures (including server-based logging). Perform network enumeration and mapping of information environment to ensure continuing services for the organization. Uses methods and techniques to detect various exploitation activities. Monitors computer Emergency Response Team (CERT) response phases. Applies current software and methodologies for active defense and system hardening. Perform routing protocols, Public Key Infrastructure (PKI), and vulnerability scanners to ensure the performance and security of systems. Apply system administration concepts for Windows operating systems to include mastery of the different security features to identify vulnerability, risks, and protection needed. Applies expertise and broad professional knowledge of infrastructure systems policy and standards and intensive knowledge of IT infrastructure systems policy and standards and intensive knowledge of IT systems, software, hardware, signature based detection and system virtualization disciplines to staff management and implementation of assigned IT programs. Performs Active Directory functions, specifically how the network and its objects are organized by constructs such as domains, trees, forests, trust relationships, organizational units (OUs), and sites. Recommends standards concerning common networking protocols, services (e.g. web, mail, DNS) and how they interact to provide network communications. Analyze and define security requirements for wireless applications and structure, including vulnerabilities in various types of wireless applications. The incumbent provides expert input for current software and methodologies for active defense and system hardening. Monitors the physical network layer with respect to the Open Systems Interconnection (OSI) model and underlying network protocols. The incumbent must be proficient in the use of and thoroughly familiar with Network construction, topology, and Transmission Control Protocol/Internet Protocol (TCP/IP) networking protocols. Demonstrates the ability to work in a team environment and present ideas in a clear, positive manner.
Performs other duties as assigned.
Education
This job does not have an education qualification requirement.
Additional information
This position is a DoD Cyber Excepted Service (CES) personnel system position in the Excepted Service under 10 U.S.C. 1599f
This position is covered by the Department of Defense Priority Placement Program.
Several vacancies may be filled.
A tentative offer of employment will be rescinded if the selectee fails to meet the pre-employment requirements, including failure to report to any of the scheduled appointments.
Federal annuitant information: The selection of an annuitant is subject to the Department of Defense and Department of the Navy policy on the employment of annuitants. Policy information may be found at: http://www.secnav.navy.mil/donhr/Documents/CivilianJobs/FedCivAnnuitants.pdf .
The Cyber Interagency Transfer Authority (CITA) permits movement of CES employees appointed under Section 1599f of Title 10 U.S.C. and excepted service employees appointed under Schedule A, Section 213.3106(b)(11) of Title 5 CFR, info cyber workforce positions in the competitive service and movement of competitive service employees into DoD Cyber Workforce positions within the Military Departments and Defense Agencies.
Certain incentives (such as Recruitment, Relocation or Student Loan Repayment) may be authorized to eligible selectees.
A relocation incentive is generally a single payment intended to offset some of the relocation costs experienced by the selectee. A relocation incentive may be authorized.
This position is not telework eligible.
JOB SUMMARY CONTINUATION:
A component of the cyber mission force and part of the Friendly Cyber Defense Forces (FCDF), the Cyber Protection Team (CPT) is to be employed to provide advanced mission defense capabilities in support of USCYBERCOM, or supported Unified Combatant Command (CCMD)/Service, direction and under CDRUSCYBERCOM authorities. A CPT's area of operations is the DOD cyberspace supporting a commander's mission, not the individual network enclaves or systems themselves. There are three primary operational effects achieved through CPT employment: active defense of cyber key terrain, operationally linked to aggressive counter-cyber threat actions (active maneuver defense); improvement of an organization's overall mission security posture (operational preparation of the environment); and reinforcement of organic network defenders during a cyber event (cyberspace defense). The incumbent reports directly to the Deputy Operations Officer of the CPT to which assigned, but directly deals with several other O-4/5's and GG-13/14's, with regard to MARFORCYBER and CPT equities.
- SEE QUALIFICATIONS SECTION FOR MAJOR DUTIES
Requirements
Conditions of Employment
- Must be a US Citizen.
- Must be determined suitable for federal employment.
- Must participate in the direct deposit pay program.
- New employees to the Department of the Navy will be required to successfully pass the E-Verify employment verification check. To learn more about E-Verify, including your rights and responsibilities, visit e-verify.gov
- Within the Department of Defense (DoD), the appointment of retired military members within 180 days immediately following retirement date to a civilian position is subject to the provisions of 5 United States Code 3326.
- Males born after 12-31-59 must be registered for Selective Service.
- Must possess and maintain a TOP SECRET/SCI security clearance and must obtain and maintain NSA badging for NIPR/SIPR/NSANet accounts.
- Must pass a Counterintelligence Polygraph. Failure to retain this level of security clearance and access will be grounds for reassignment, demotion, or removal from the Federal Service
- Employee must successfully pass a urinalysis screening for illegal drug use prior to appointment and subsequent periodic drug screening thereafter.
- The incumbent must also attain and maintain a DoDI 8570.01-M certification of at least IAM-II, within 12 months of assignment.
- The incumbent may be required to perform minimal travel (50% or less) which may involve the use of commercial and/or government aircraft.
- You will be required to complete training, obtain, and maintain a government credit card for travel and travel-related purchases.
- Must be willing to work a flexible schedule to include periodic weekend/holiday work in order to accomplish mission assignments.
- Must be able to attend numerous conferences and community meetings internal and external to the organization; occasional Temporary Assigned Duty (TAD) is required.
Qualifications
Applicant must have directly applicable experience that demonstrates the possession of knowledge, skills, abilities, and competencies necessary for immediate success in the position. Qualifying experience may have been acquired in any public or private sector job, but will clearly demonstrate past experience in the application of the particular competencies or knowledge, skills and abilities necessary to successfully perform the duties of the position. Such experience is typically in or directly related to the work of the position to be filled. Qualifying experience would be demonstrated by: Serve as a Network Analyst or Host Analyst on a U.S. Marine Corps Cyber Protection Team (CPT) in the Marine Corps Cyberspace Warfare Group (MCCYWG). Participate in the development of Marine Corps/Department of Defense (DoD) threat/vulnerability analysis and threat mitigation. Provide technical advice, guidance and assistance on a wide range of complex cybersecurity issues. Install, operate, maintain, configure, and test and secure various operating systems. Develop and implement network backup and recovery procedures on Deployment Mission Support Systems (DMSS). Provide feedback on network security requirements, including network architecture and infrastructure. Identify baselines to facilitate locating adverse network trends, anomalous traffic or Malicious Cyberspace Activity (MCA). Take appropriate action to identify threats and implement network countermeasures.
This position is within the Work Category PROFESSIONAL at Work Level SENIOR, Series and Grade GG-2210-13.
Additional qualification information can be found from the following Office of Personnel Management website:
- https://dodcio.defense.gov/Cyber-Workforce/CES.aspx
- Information Technology (IT) Management Series 2210 (Alternative A) (opm.gov)
Experience refers to paid and unpaid experience, including volunteer work done through National Service programs (e.g., professional, philanthropic, religious, spiritual, community, student, social). Volunteer work helps build critical competencies, knowledge, and skills and can provide valuable training and experience that translates directly to paid employment.
MAJOR DUTIES:
Assessing cyber security plans; bolstering cyber defenses; performing cyber threat emulation; assessing intelligence; assessing malware analysis; remaining cognizant with the missions and priorities of the CPT to which assigned; development and updating of Concept of Operations (CONOPs) and procedures. The incumbent applies a high level of technical and analytical expertise, and a broad knowledge of Defensive Cyber Operations (DCO) to support the MARFORCYBER mission. Responsible for evaluating, defining, designing, and redesigning IT architectures and infrastructures, including policies and processes for ensuring the security and integrity of data networks. The incumbent must have experience with internet/network technologies and designs, networking protocols and computer audit techniques/tools applied on DoD Information Networks (DoDIN). Plan, manage and coordinate fact-finding and analytical projects requiring collaboration with the cooperation of other CPT members and occasionally with various entities external to the assigned CPT. Applies knowledge of network architecture, security fundamentals, and familiarization with multiple computer operating systems (OS). Directs scans and analysis of network vulnerability, configuration analysis, and network architecture analysis. Utilize DCO tools and devices to detect unauthorized activities on the DoDIN. Conducts auditing and logging procedures (including server-based logging). Perform network enumeration and mapping of information environment to ensure continuing services for the organization. Uses methods and techniques to detect various exploitation activities. Monitors computer Emergency Response Team (CERT) response phases. Applies current software and methodologies for active defense and system hardening. Perform routing protocols, Public Key Infrastructure (PKI), and vulnerability scanners to ensure the performance and security of systems. Apply system administration concepts for Windows operating systems to include mastery of the different security features to identify vulnerability, risks, and protection needed. Applies expertise and broad professional knowledge of infrastructure systems policy and standards and intensive knowledge of IT infrastructure systems policy and standards and intensive knowledge of IT systems, software, hardware, signature based detection and system virtualization disciplines to staff management and implementation of assigned IT programs. Performs Active Directory functions, specifically how the network and its objects are organized by constructs such as domains, trees, forests, trust relationships, organizational units (OUs), and sites. Recommends standards concerning common networking protocols, services (e.g. web, mail, DNS) and how they interact to provide network communications. Analyze and define security requirements for wireless applications and structure, including vulnerabilities in various types of wireless applications. The incumbent provides expert input for current software and methodologies for active defense and system hardening. Monitors the physical network layer with respect to the Open Systems Interconnection (OSI) model and underlying network protocols. The incumbent must be proficient in the use of and thoroughly familiar with Network construction, topology, and Transmission Control Protocol/Internet Protocol (TCP/IP) networking protocols. Demonstrates the ability to work in a team environment and present ideas in a clear, positive manner.
Performs other duties as assigned.
Education
This job does not have an education qualification requirement.
Additional information
This position is a DoD Cyber Excepted Service (CES) personnel system position in the Excepted Service under 10 U.S.C. 1599f
This position is covered by the Department of Defense Priority Placement Program.
Several vacancies may be filled.
A tentative offer of employment will be rescinded if the selectee fails to meet the pre-employment requirements, including failure to report to any of the scheduled appointments.
Federal annuitant information: The selection of an annuitant is subject to the Department of Defense and Department of the Navy policy on the employment of annuitants. Policy information may be found at: http://www.secnav.navy.mil/donhr/Documents/CivilianJobs/FedCivAnnuitants.pdf .
The Cyber Interagency Transfer Authority (CITA) permits movement of CES employees appointed under Section 1599f of Title 10 U.S.C. and excepted service employees appointed under Schedule A, Section 213.3106(b)(11) of Title 5 CFR, info cyber workforce positions in the competitive service and movement of competitive service employees into DoD Cyber Workforce positions within the Military Departments and Defense Agencies.
Certain incentives (such as Recruitment, Relocation or Student Loan Repayment) may be authorized to eligible selectees.
A relocation incentive is generally a single payment intended to offset some of the relocation costs experienced by the selectee. A relocation incentive may be authorized.
This position is not telework eligible.
JOB SUMMARY CONTINUATION:
A component of the cyber mission force and part of the Friendly Cyber Defense Forces (FCDF), the Cyber Protection Team (CPT) is to be employed to provide advanced mission defense capabilities in support of USCYBERCOM, or supported Unified Combatant Command (CCMD)/Service, direction and under CDRUSCYBERCOM authorities. A CPT's area of operations is the DOD cyberspace supporting a commander's mission, not the individual network enclaves or systems themselves. There are three primary operational effects achieved through CPT employment: active defense of cyber key terrain, operationally linked to aggressive counter-cyber threat actions (active maneuver defense); improvement of an organization's overall mission security posture (operational preparation of the environment); and reinforcement of organic network defenders during a cyber event (cyberspace defense). The incumbent reports directly to the Deputy Operations Officer of the CPT to which assigned, but directly deals with several other O-4/5's and GG-13/14's, with regard to MARFORCYBER and CPT equities.
You need to sign in or create an account to save a job.
Get job alerts
Create a job alert and receive personalized job recommendations straight to your inbox.
Create alert