IT SPECIALIST (INFOSEC/NETWORK)
Relocation expenses reimbursed No
Compatible military grade and assignment required prior to the effective date of placement. This is an excepted service position that requires membership in a compatible military assignment in the employing state's National Guard. Applicants who are not currently a member of the National Guard must be eligible for immediate membership. If you are not sure you are eligible for military membership, please contact a National Guard recruiter prior to applying for this position.
Military Grades: MSgt and below
Compatible Military Assignments: 1B4X1 (REQUIRED)
Must have or be able to pass CI Poligraph.
Must be able to obtain and maintain a Top Secret/Special Compartmented Information (TS/SCI) eligible security clearance.
Must be certified IAW DOD 8570.01-M, Federal Information Security Management Act of 2002, Clinger Cohen Act of 1996 and current AF directives. Minimum requirements are specified in the most recent 8570 PD template on the A3CC Page of the GKO Portal at https://gkoportal.ng.mil/ang/A3/A3C/A3CC/Cyber%20Ops%20Templates/Forms/AllItems.aspx.
SPECIALIZED EXPERIENCE: Must have at least 12 months of specialized experience working the cyber program's standardization and evaluation programs. Skilled in weapon systems, crew positions, and developing policies used to assess Cyberspace Operator mission readiness. Experiences included coordinating with MAJCOMs, Numbered Air Forces, Group Standardization and Evaluation, and active duty counterparts to validate that the unit's evaluation program reflected AF standards and metrics. Experienced in developing procedures used to assess an operator's currency and readiness to perform contingency and training missions. Skilled in identifying performance trends and knowledgeable in applying remediation to improve operator performance. Demonstrated abilities, skills, and knowledge competencies required to assess and document a Cyberspace Operator's evaluations and qualifications. Capabilities to write clear directions for the Crew Information Files that provide timely operational requirements for operators to read before they are cleared to conduct missions. Knowledgeable of published cyber operation regulations. Experienced in analyzing, evaluating and examining Cyberspace Operators in order to determine their proficiency levels as required to operate cyberspace weapon systems and meet the of particular crew positions' standards and special mission profiles. Skilled in conducting scheduled and unscheduled positional, written and supplemental evaluations and examinations.
If you are a male applicant who was born after 12/31/1959 and are required to register under the Military Selective Service Act, the Defense Authorization Act of 1986 requires that you be registered or you are not eligible for appointment in this agency (https://www.sss.gov/RegVer/wfRegistration.aspx).
If you are unable to apply online or need to fax a document you do not have in electronic form, view the following link for information regarding an Alternate Application.
You will be evaluated for this job based on how well you meet the qualifications above.
Once the announcement has closed, your resume and supporting documentation will be used to determine if you meet the qualifications listed on this announcement. If you are minimally qualified, your resume and supporting documentation will be compared to your responses on the assessment questionnaire to determine your level of experience. If you rate yourself higher than is supported by your application package, your responses may be adjusted and/or you may be excluded from consideration for this position. If you are found to be among the top qualified candidates, you will be referred to the selecting official for employment consideration.
Your qualifications will be evaluated on the following competencies (knowledge, skills, abilities and other characteristics):
--Thorough knowledge of the mission, objectives, terminology, and management practices in the activity, the agency and the department to recognize probable areas of interaction and to serve as a technical expert in systems/network security.
--Knowledge of project management principles and methods sufficient to assign and provide expert technical direction to team members concerning their role in vulnerability assessments.
-- Thorough knowledge of network systems design, development, testing, installation, operating, management, and maintenance concepts and methods to provide and protect network services.
--Knowledge of, and skill in applying IT security principles and methods and of IT security products and services sufficient to evaluate and recommend the acquisition of, implement, and disseminate IT security tools, procedures, and practices to protect information assets.
--Extensive knowledge of information technology methods and information protection techniques and procedures. This includes government and Commercial-Off-The-Shelf (COTS) technology using industry standards and an ability to understand the capabilities and limitations of software, utility programs, network management systems and programming.
--Knowledge of hardware, software, and operating systems; systems configuration and integration; maintenance, upgrades, and modifications.
--Extensive knowledge and skill in applying applicable policies, standards, directives, and operations manuals to perform systems analysis, evaluate approaches, offer advice, define alternative approaches, and coordinate requirements regarding the merits of proposed applications.
--Extensive knowledge of hardware, software, network operations functions, firewalls, packet switching communications protocols, and diagnostic tools to analyze difficult and complex system problems and provides resolutions.
--Knowledge of systems analysis, configuration management, and computer equipment requirements related to networks to assess vulnerabilities. Skill in evaluating innovative approaches in formulation of programs or systems specifications.