Information Technology Specialist (INFOSEC)

2 days left

Employer
USAJobs
Location
Fort Belvoir, Virginia
Posted
Jul 12, 2017
Closes
Jul 25, 2017
Function
Administrative
Hours
Full Time
JOB SUMMARY:

Civilian employees serve a vital role in supporting the Army mission. They provide the skills that are not readily available in the military, but crucial to support military operations. The Army integrates the talents and skills of its military and civilian members to form a Total Army.

This position is being filled under the Expedited Hiring Authority (EHA) for Defense Acquisition Workforce Positions in accordance with 10 USC §1705(g)

About the Position:

This IT Specialist (INFOSEC) NH-2210-03 position is located in the Program Executive Office,  IEW&S PM DoD Biometrics Office at Fort Belvoir, VA.   

PEO IEW&S - Program Executive Office, Intelligence, Electronics Warfare and Sensors (PEO IEW&S) headquartered at Aberdeen Proving Ground, MD with offices at Ft Belvoir, VA; Ft Hood, TX; and Huntsville, AL develops network-centric IEW&S systems for the digitized Army and fields Joint IEW&S systems to provide Soldiers the most superior capabilities to completely and immediately understand their environment across the full spectrum of operations. PEO IEW&S is in a human resources demonstration project, offers competitive salaries, pay banding, and pay for contribution. Benefits program include alternate work schedule with flexible hours, pre-tax flexible spending accounts for certain health and dependent care expenses, health insurance, vacation time and sick leave, life insurance, and a three-tiered retirement plan.

PEO IEW&S - PEO IEW&S, US Army Acquisition Support Center, is participating in an alternative personnel system known as the Army Acquisition Demonstration Project. The NH-03 broadband is equivalent to the GS-12 Step 1 to GS-13 step 10 level. In keeping with the Demonstration pay fixing policies, employees earning a salary that falls within the pay band equivalent may not receive an immediate pay increase if appointed to this position. Management will set the selectee's pay within a range that is consistent with their qualifications and the expected contribution for the position. Future pay increases within the broadband will be accomplished through the pay for performance management system.

Who May Apply:

  • All United States Citizens


TRAVEL REQUIRED:
  • Occasional Travel
  • Travel is 10% of the time.

RELOCATION AUTHORIZED:
  • No

KEY REQUIREMENTS:
  • Must file a Financial Disclosure Statement
  • Acquisition Career Field R (Information Technology) Level 2
  • In order to qualify, you must meet the education and/or experience requirements described below. Your resume must clearly describe your relevant experience; if qualifying based on education, your transcripts will be required as part of your application. Additional information about transcripts is in this document.

    Experience required: Experience refers to paid and unpaid experience, including volunteer work done through National Service programs (e.g., Peace Corps, AmeriCorps) and other organizations (e.g., professional; philanthropic; religious; spiritual; community; student; social). You will receive credit for all qualifying experience, including volunteer experience.

    To qualify based on your experience, your resume must describe at least one year of experience which prepared you to do the work in this job. Specialized experience is defined as performing ALL of the following duties:

    measuring designed to protect equipment, control access, and detect cybersecurity threats and system vulnerabilities, and proposed system changes for security requirements and implications; resolve complex and persistent cybersecurity challenges; interpret and apply Army and Department of Defense security regulations and policies and guidelines in the Federal Information Security Management Act (FISMA).

    This definition of specialized experience is typical of work performed at the next lower pay band or equivalent grade/level position in the federal service (NH-02 or GS-11)

    You will be evaluated on the basis of your level of competency (knowledge, skills, abilities) in the following areas:

    • Ability to ensure compliance with Cyber Security policies and regulations
    • Ability to analyze, design, implements, and maintain the security posture of various IT systems
    • Ability to communicate Cyber Security technical concepts in writing
    • Ability to perform Cyber Security system management throughout the lifecycle

    Some federal jobs allow you to substitute your education for the required experience in order to qualify.  For this job, you must meet the qualification requirement using experience alone--no substitution of education for experience is permitted.

    Other Requirements: Click here for expanded definitions.

    • Male applicants born after December 31, 1959 must complete a Pre-Employment Certification Statement for Selective Service Registration.
    • You will be required to provide proof of U.S. Citizenship.
    • Two year trial/probationary period may be required.
    • Direct Deposit of Pay is Required.
    • You are required to submit Financial Disclosure Statement, OGE-450, (per 5CFR Part 2634, Subpart I USOGE, 6/08) which must be completed upon entering the position and annually, in accordance with DoD Directive 5500-7-R, Joint Ethics Regulation, including Changes 1-7 http://www.dtic.mil/whs/directives/corres/pdf/550007r.pdf  (November 17, 2011). Any conflicts of interest will result in the withdrawal of job offer.
    • You will be required to undergo background investigation leading to the successful adjudication of eligibility for Secret security clearance. Derogatory information developed during the background investigation, such as a criminal history, could render the selectee ineligible for both the security clearance and continued employment in the position, if already appointed.
    • This is an Army Acquisition, Logistics and Technology Workforce position.  Selectees must meet position requirements for certification at Level 2 in Acquisition Career Field R -Information Technology within 24 months of entrance on duty."  (Certification requirements may be found in the Defense Acquisitions University Catalog at http://www.dau.mil/.)
    • This is a CP 34 position.
    • Permanent Change of Station costs not authorized.

    Secret


    DUTIES:

    Serves as a Cybersecurity Specialist and subject matter expert with the responsibility of advising management and staff on cybersecurity related topics or other IT initiatives. Ensures compliance with Cybersecurity requirements outlined in DoD, Intelligence Community, and/or organizational regulations or policies which include the Federal Information Security Management Act of 2002; Coordinates and integrates with the PL BAT-A office, Project Manager (PM) DoD Biometrics staff, and the Program Manager (PM), Intelligence, Electronic Warfare & Sensors (IEW&S) staff. Conducts daily management of cybersecurity threats through continuous monitoring of cybersecurity tools and technologies. Serves as an action officer and/or point of contact for coordinating and completing Cybersecurity Operations actions; preparing briefings, tasks, After Action Reports (AAR), Warning Orders, Fragmentary Orders and Operation Orders, and related documents. Prepares, submits, and maintains the Cybersecurity Assessment and Authorization documentation as directed by the Risk Management Framework process for present and future tactical biometric collection capability in order to acquire the Authorization to Operate certification. Develops procedures to generate and maintain required documentation that will validate system security accreditation and puts in place the appropriate functioning security measures. Maintains the Enterprise Mission Assurance Support Service (eMASS) database for system accreditation status; develops reports; and alerts system proponents when authorization documentation must be updated. Performs cybersecurity incident management. Assesses current cybersecurity posture and provides management reports and risk recommendations. Executes the vulnerability management workload and complies with the Army Information Assurance Vulnerability Management (IAVM) program. Oversees the PL BAT-A System Integrator's Cybersecurity subject matter experts, to include both GS and non-GS employees, in meeting daily cybersecurity standards. Ensures the appropriate level of confidentiality, integrity, authentication, non-repudiation, and availability that reflects a balance between security and access to the system. Analyzes cybersecurity costs and provides input to the program budget. Enters cybersecurity data into the Army Portfolio Management Solution. Writes the cybersecurity portion of all organizational program documentation required. Achieves cybersecurity operational objectives by contributing guidance and recommendations to leadership.