Information Technology Specialist (Infomation Seccurity)
Civilian employees serve a vital role in supporting the Army mission. They provide the skills that are not readily available in the military, but crucial to support military operations. The Army integrates the talents and skills of its military and civilian members to form a Total Army.
About the Position:
The incumbent serves as a Joint Service Provider (JSP )senior subject matter expert specializing in enterprise-wide information systems security development, installation, and operation and specific actions in support of the overall Defensive Cyber Operations - Internal Defensive Measures (DCO-IDM). DCO-IDM operations require extensive internal and external coordination and integration of work which is often of extreme urgency and of unusual importance to senior leaders within the Department of the Department of Defense. Major recommendations have a direct and substantial affect on all aspects of the organization and program/projects managed, including all resource requirements, such as equipment, systems, personnel, and funding.
This is a direct hire solicitation.
ITA/JSP is projected to transfer to the Defense Information Systems Agency on or about 1 October 2017.
Who May Apply: US Citizens
- Not Required
In order to qualify, you must meet the experience requirements described below. Experience refers to paid and unpaid experience, including volunteer work done through National Service programs (e.g., Peace Corps, AmeriCorps) and other organizations (e.g., professional; philanthropic; religious; spiritual; community; student; social). You will receive credit for all qualifying experience, including volunteer experience. Your resume must clearly describe your relevant experience; if qualifying based on education, your transcripts will be required as part of your application. Additional information about transcripts is in this document.
Specialized Experience: One year of specialized experience which includes Information technology related experience demonstrating each of the four competencies: 1) Attention to detail 2) Customer Service 3) Oral Communication and 4) Problem Solving. My Information technology related experience is demonstrated by paid or unpaid experience and/or completion of specific, intensive training (IT certification).
One year of specialized experience in the Federal service which includes assessing and providing recommendations for classified and unclassified administrative information networks; conducting systems security field reviews of Intrusion Detection Systems (IDS) and Wireless Intrusion Detection Systems (WIDS) ); and assessing the vulnerabilities in Wired and Wireless networks. This definition of specialized experience is typical of work performed at the next lower grade/level position in the federal service (GS-13).
Some federal jobs allow you to substitute your education for the required experience in order to qualify. For this job, you must meet the qualification requirement using experience alone--no substitution of education for experience is permitted.
Other Requirements: Click here for expanded definitions.
- Male applicants born after December 31, 1959, must complete a Pre-Employment Certification Statement for Selective Service Registration.
- You will be required to provide proof of U.S. Citizenship.
- Two year trial/probationary period may be required.
- Appointment is subject to the completion of a favorable suitability or fitness determination.
- Direct Deposit of Pay is Required.
- This is a Career Program (CP) 34 position.
- This position is covered by the Alcohol and Drug Abuse Prevention and Control Program. The incumbent is required to sign a DA Form 5019-R (Condition of Employment for Certain Positions Identified as Critical Under the Drug Abuse Testing Program) and must pass urinalysis testing, as required prior to appointment and periodically thereafter.
The primary duties include:
- Providing counsel and recommendations for classified and unclassified administrative information networks.
- Conducting high level systems security field reviews of Intrusion Detection Systems (IDS) and Wireless Intrusion Detection Systems (WIDS).
- Assessing the vulnerabilities in Wired and Wireless networks and ensuring JSP systems are protected from these vulnerabilities.
- Provides a wide range of substantive oral and written presentations and reports to high level military and civilian officials.