IT SPECIALIST (INFOSEC/NETWORK)

2 days left

Employer
USAJobs
Location
Middle River, Maryland
Posted
Sep 12, 2019
Closes
Sep 20, 2019
Hours
Full Time
Duties

Summary

THIS IS A NATIONAL GUARD TITLE 32 EXCEPTED SERVICE POSITION.

This National Guard position is for an IT Specialist (Infosec/Network) , Position Description Number D2339000and is part of the Maryland Air National Guard.

This is a developmental position with promotion potential to GS-12. Full operating level of GS-2210-12, IT Specialist (Infosec/Network), is covered under Position Description Number D2338000.

Member must meet physical requirements.
Learn more about this agency

Responsibilities

This position is eligible for a Recruitment Incentive of up to $2000 for newly-appointed employees.

The incumbent of this position meets the experience and/or educational requirements for entry at this developmental level. Knowledge, experience and skill are being acquired for promotion to the full operating level (GS-2210-12) described in Position Description D2338000. Promotion to the target position may be effected as a career promotion in accordance with applicable regulations, after qualifications and eligibility requirements have been satisfied and the supervisor and Human Resources Office are satisfied the full scope of duties in the target position are being performed in a satisfactory manner under normal supervisory controls. Assistance, guidance and support may be obtained from the supervisor or co-workers until statutory and performance requirements for advancement to the full operating level are met.

As an IT Specialist (Infosec/Network), you will prepare for, maintain currency for, and execute an advanced role in Cyberspace Operations. Utilize knowledge of systems security principles and concepts of emerging Information Technology (IT) security developments, and of the infrastructure protection environment to select appropriate tools to be used by team members. Establish methodology and determines best techniques to secure computer systems and to protect cyber key terrain from exploitation of information within these systems and/or to achieve other tasked objectives in cyberspace. Leverage knowledge of multiple entities with a stake in current operations to plan and build appropriate courses of action and training scenarios.

Functions in at least one of the following advanced roles: Cyberspace Crew Commander, Cyberspace Operations Controller, Operations Planner/Scheduler, Industrial Control Systems (ICS) Cyberspace Operator, National Mission Team Cyberspace Operator.

Prepare Unit Training Assembly, Annual Training and currency training events for Mission Ready Cyberspace Operators to optimize training time available. Ensure training for each event has been prepared and is ready. Monitor assigned military members' go-no-go readiness status and ensures deficiencies are recognized. Work with scheduling section to provide opportunities for assigned members to maintain full mission readiness. Coordinate with maintenance section to ensure all assigned equipment is in good working condition and ready for each training and mission event.

Conduct extensive research of new vulnerabilities and insecurities discovered in operating systems, application software, infrastructure and boundary protection devices. Investigate, analyze, and develop methods that could be used to exploit these vulnerabilities. Conduct testing on training range to validate findings and to develop and refine methods and procedures to mitigate vulnerabilities. Coordinate research and findings with the Cyberspace Weapons Officer for inclusion in unit and cyberspace community tactics, techniques, and procedures.

Conduct extensive research of tools currently being used to attack or gain unauthorized access to information networks. Analyze and test these tools on training range to determine effectiveness, stability, and scope of the tools. Recommend and refine tools for use on Cyberspace Weapon System to provide the customer with the best possible evaluation of their security posture.

Travel Required

Occasional travel - You may be expected to travel for this position.

Supervisory status
No

Promotion Potential
12

Requirements

Conditions of Employment


MILITARY REQUIREMENTS :

Compatible military grade and assignment required prior to the effective date of placement. This is an excepted service position that requires membership in a compatible military assignment in the employing state's National Guard. Applicants who are not currently a member of the National Guard must be eligible for immediate membership. If you are not sure you are eligible for military membership, please contact a National Guard recruiter prior to applying for this position.

Military Grades: A1C (E3) - TSgt (E6)

Compatible Military Assignments: 1B4X1, 3D0X2, 3D0X3, 3D1X2

Applicants must obtain and maintain a Top Secret/Special Compartmented Information (TS/SCI) security clearance and Information Assurance Management Program Certification Level Technical Level II (IAT II) to qualify for considerations.

NATIONAL GUARD MEMBERSHIP IS REQUIRED: This is an excepted service position that requires membership in a compatible military assignment in the National Guard. Selectee will be required to wear the military uniform. Acceptance of an excepted service position constitutes concurrence with these requirements as a condition of employment. Applicants who are not currently a member of the National Guard must be eligible for immediate membership and employment in the National Guard in the military grade listed in this announcement.

National Guard Membership is required.Males born after 31 December 1959 must be registered for Selective Service.Federal employment suitability as determined by a background investigation.May be required to successfully complete a probationary period.Participation in direct deposit is mandatory.

Qualifications

GENERAL EXPERIENCE : All series personnel must be certified at the next higher level before being eligible for that level and must have a minimum of one year on-the-job experience in the grade immediately below the next higher level. An applicant must have a validated understanding of the basic principles and concepts of the occupational series and grade.

SPECIALIZED EXPERIENCE :Must have at least 12 months experience as a Cyberspace Operator. Experienced in the work at an acceptable level of expertise for the preparation and execution of tasked unit missions. Experiences included preparing, maintaining currency for, and executing an advanced role in Cyberspace Operations. Knowledgeable of systems security principles and concepts of emerging Information Technology (IT) security developments. Experiences included duties directed within the infrastructure protection environment and the selection of appropriate tools for team members. Experienced in the methodologies for determining the better techniques needed to secure computer systems and to protect cyber key terrains from exploitation of information within these cyberspace systems. Experiences included the ability to leverage knowledge of multiple entities with a stake in current operations to plan and build appropriate courses of action and training scenarios. Some work experiences were in one or more of the following unit assignments: Cyber-space Crew Commander; Cyberspace Operations Controller; Operations Planner and Scheduler; Industrial Control Systems (ICS) Cyberspace Operator; and National Mission Team Cyberspace Operator. Experiences may include one or more of the following business tasks: Developing tactical objectives or tactical taskings for Cyberspace Operators; liaison duties between assigned team and other teams or external entities; directing tactical execution for a team of Cyberspace Operators; developing tactical approaches and synchronizes actions of multiple qualified operators in order to achieve objectives;representing the unit's capability, availability, and interests at high-level Operational Planning Team (OPT) meetings to define the missions, environments, enemy, effects, capabilities, overall plans, phasing, operational agreements and contingencies needed to conduct the operation or exercise; developing tactical plans for assigned missions and exercises; translating operational objectives into tactical objectives comprised of specific tactical tasks. May have experiences in developing Measures of Effectiveness and Measures of Performance that were used in mission exercise assessments. Experiences include work accomplished to prepare and coordinate operators, resources, facilities and equipment schedules, in coordination with unit and flight commanders, in order to ensure training, currency, and mission timelines and objectives were met. Experiences may include the assessment and evaluation of mission vulnerabilities and/or adversary activity in ICS enclaves. Experienced in detecting, characterizing, and resolving insecurities in ICS networks. Experienced in conducting reviews and analyzing ICS network traffic, configurations, and operating procedures and provided methods to improve system security posture. Experienced in the Air Force currency and additional national-level requirements to execute US Cyber Command's Defend-the-Nation priority. Skilled in presenting formal and informal briefing and written reports in regard to the Cyber program mission readiness. Competent in preparing Unit Training Assembly, Annual Training and currency training events for Mission Ready Cyberspace Operators to optimize training times. Knowledgeable on unit military members' go-or-no-go readiness status and skilled to recognize deficiencies. Experiences included working with assigned members to maintain full mission readiness. Experienced in coordinating with the unit's maintenance section to ensure all assigned equipment is in good working condition and ready for each training and mission event. Experienced in conducting extensive researches of new vulnerabilities and insecurities in operating systems, application software, infrastructure, and boundary protection devices. Experiences included investigations, analysis, and the development of actions used to exploit these vulnerabilities. Competent on conducting tests to validate findings and to develop and refine methods and procedures to mitigate vulnerabilities within the cyberspace community tactics, techniques, and procedures. Experienced in providing customers with the best possible evaluations of their security postures.

Education

Must have high school diploma. Dependent on the education requirements for award of the position's compatible military skill (AFSC), an undergraduate degree in Computer and Information Sciences and Support Services from an accredited college/university is desired. Completion of higher education courses in Computer Engineering; Engineering Physics/Applied Physics; Industrial Engineering; Electromechanical Engineering; Electrical, Electronics and Communications; Computer Technology/Computer Systems Technology; Cyber/Electronics Operations and Warfare; Mathematics and Computer Science; Accounting and Computer Science; Computational Science; Management Information Systems and Mathematics; or, courses in business, English composition, computer software, and keyboarding is desired. A graduate degree in Computer and Information Sciences and Support Services is optimum.

Additional information

If you are a male applicant who was born after 12/31/1959 and are required to register under the Military Selective Service Act, the Defense Authorization Act of 1986 requires that you be registered or you are not eligible for appointment in this agency ( https://www.sss.gov/RegVer/wfRegistration.aspx ).

How You Will Be Evaluated

You will be evaluated for this job based on how well you meet the qualifications above.

Once the announcement has closed, your resume and supporting documentation will be used to determine if you meet the qualifications listed on this announcement. If you are minimally qualified, your resume and supporting documentation will be compared to your responses on the assessment questionnaire to determine your level of experience. If you rate yourself higher than is supported by your application package, your responses may be adjusted and/or you may be excluded from consideration for this position. If you are found to be among the top qualified candidates, you will be referred to the selecting official for employment consideration.

Your qualifications will be evaluated on the following competencies (knowledge, skills, abilities and other characteristics):

Thorough knowledge of the mission, objectives, terminology, and management practices in the activity, the agency and the department to recognize probable areas of interaction and to serve as a technical expert in systems/network security.

Knowledge of project management principles and methods sufficient to assign and provide expert technical direction to team members concerning their role in vulnerability assessments.

Thorough knowledge of network systems design, development, testing, installation, operating, management, and maintenance concepts and methods to provide and protect network services.

Knowledge of, and skill in applying IT security principles and methods and of IT security products and services sufficient to evaluate and recommend the acquisition of, implement, and disseminate IT security tools, procedures, and practices to protect information assets.

Extensive knowledge of information technology methods and information protection techniques and procedures. This includes government and Commercial-Off-The-Shelf (COTS) technology using industry standards and an ability to understand the capabilities and limitations of software, utility programs, network management systems and programming.

Knowledge of hardware, software, and operating systems; systems configuration and integration; maintenance, upgrades, and modifications.

Extensive knowledge and skill in applying applicable policies, standards, directives, and operations manuals to perform systems analysis, evaluate approaches, offer advice, define alternative approaches, and coordinate requirements regarding the merits of proposed applications.

Extensive knowledge of hardware, software, network operations functions, firewalls, packet switching communications protocols, and diagnostic tools to analyze difficult and complex system problems and provides resolutions.

Knowledge of systems analysis, configuration management, and computer equipment requirements related to networks to assess vulnerabilities. Skill in evaluating innovative approaches in formulation of programs or systems specifications.

Background checks and security clearance

Security clearance
Sensitive Compartmented Information

Drug test required
No

Required Documents

To apply for this position, you must submit a complete Application Package which includes:

1. Your resume showing work schedule, hours worked per week, dates (including Month and Year, e.g., 02/2017, Feb 2017, etc.) of employment and duties performed.

2. Other supporting documents:

If you are relying on your education to meet qualification requirements:

Education must be accredited by an accrediting institution recognized by the U.S. Department of Education in order for it to be credited towards qualifications. Therefore, provide only the attendance and/or degrees from schools accredited by accrediting institutions recognized by the U.S. Department of Education .

Failure to provide all of the required information as stated in this vacancy announcement may result in an ineligible rating or may affect the overall rating.

Similar jobs