Baltimore, Maryland
Jul 20, 2021
Jul 28, 2021
Full Time



This National Guard position is for a IT SPECIALIST (INFOSEC), Position Description Number D2178P01 and is part of the MD 175th ANG, National Guard.

Learn more about this agency


1. Serves as the Wing Information Assurance Manager. Applies Information Technology (IT)security principles, methods, and security products to protect and maintain the availability, integrity, confidentiality, and accountability of information system resources and information processed throughout the system's life cycle. Establishes and publishes base-wide policy to manage t he INFOSEC (also known as COMPUSEC) program and provides advice and guidance in its implementation and in procedures used in the development and operation of systems. Assists all base organizations in the development of their individual INFOSEC program. Disseminates information and ensures computer security practices are adhered to by all functional areas. Reviews, analyzes, and validates certification and accreditation (C&A) packages. Continuously identifies and analyzes threats and vulnerabilities to the information systems. Accomplishes risk analysis, security testing, and certification due to modifications or changes to computer systems. Evaluates, assesses, or locally tests and approves all hardware, software, and firmware products that provide security features. Manages the Network Security Program. Maintains required information assurance certification IAW DoD 8570.01-M, Federal Information Security Management Act of 2002, Clinger Cohen Act of1996.
Implements and advises on IT security policies and procedures to ensure protection of information transmitted to the installation Utilizes current and future multi-level security products collectively to provide data integrity, confidentiality, authentication, non-repudiation, and access control of the LAN. Limits access to privileged programs (i.e., operating system, system parameter and configuration files, and databases), utilities, and security-relevant programs/data files to authorized personnel. Implements methods to prevent or minimize direct access, electronic or other forms of eavesdropping, interpreting electro-mechanical emanations, electronic
intercept, telemetry interpretation, and other techniques designed to gain unauthorized access to IT information, equipment, or processes. Evaluates unusual circumstances to recognize and define potential vulnerabilities. 3. Serves as the Communications Security (COMSEC) Manager for all cryptographic activities including managing the Cryptographic Access Program (CAP). Formulates and develops communications security criteria and requirements for inclusion in mobility, contingency, and exercise plans. Maintains accountability for sensitive cryptographic materials and related COMSEC information. Oversees issuance of COMSEC materials. Maintains COMSEC inventory. Prepares and evaluates written plans for emergency actions and ensures personnel are fully qualified in the execution of plans. Investigates COMSEC security incidents to determine the possibility of compromise to COMSEC materials. Performs semi-annual functional reviews of all COMSEC user accounts, physically inspecting the user's COMSEC facilities, reviewing procedures, and audit of all cryptographic holdings. Manages the Certification Authority Workstation. Implements and manages the Electronic Key Management System (EKMS) program. This includes system configuration and operation of the Local Management Device, Data Transfer Device, and Key Processor. Initializes the system, performs system backups, determines operator access, and control functions (privilege management), reloads and configures the operating system's parameters. Installs or oversees installation of local COMSEC account hardware and software, including training alternates in the AFEKMS operations. Serves as secure voice equipment(e.g., STE, secure VoIP) user Representative and Emissions Security Program Manager. Develops, implements, and monitors security systems for the protection of controlled cryptographic cards, documents, ciphers, devices, communications centers, and equipment. Adheres to management control plan requirements by conducting self inspection and staff assistance visits. Resolves identified discrepancies.
Performs other duties as assigned.

Travel Required

Not required

Supervisory status

Promotion Potential


Conditions of Employment

NATIONAL GUARD MEMBERSHIP IS REQUIRED. If you are not sure you are eligible for military membership, please contact a National Guard recruiter prior to applying for this position. This is an excepted service position that requires membership in a compatible military assignment in the employing state's National Guard, required prior to the effective date of placement. Selectee will be required to wear the military uniform. Acceptance of an excepted service position constitutes concurrence with these requirements as a condition of employment. Applicants who are not currently a member of the National Guard must be eligible for immediate membership and employment in the National Guard in the military grade listed in this announcement. Males born after 31 December 1959 must be registered for Selective Service. Federal employment suitability as determined by a background investigation. Participation in direct deposit is mandatory. THIS POSITION CONDUCTS INFORMATION ASSURANCE FUNCTIONS. THE INCUMBENT SHALL COMPLY WITH THE REQUIREMENTS OF THE CERTIFICATION PROGRAM AND WILL BE REQUIRED TOO BTAIN AND MAINTAIN CERTIFICATION. CERTIFICATION REQUIREMENTS ARE OUTLINED IN DODINSTRUCTION 8570.01-M. Must have Security+ or equivalent within 6 months of appointment

1. Must be able to obtain and maintain the appropriate security clearance of the position.
2. This position is covered by the Domestic Violence Misdemeanor Amendment (30 Sep 96) of the Gun Control Act (Lautenberg Amendment) of 1968. An individual convicted of a qualifying crime of domestic violence may not perform the duties of this position.
3. Ability to establish effective professional working relationships with coworkers and customers, contributing to a cooperative working environment and successful accomplishment of the mission.
4. May occasionally be required to work other than normal duty hours; overtime may be required.
5. The duties and responsibilities of your job may significantly impact the environment. You are responsible to maintain awareness of your environmental responsibilities as dictated by legal and regulatory requirements, your organization, and its changing mission.


Military Grades: TSgt(E6) and below

Indefinite Technician position not to exceed the date of 30 Sept 2022 with authority to convert to Permanent Technician pending resource availability. This is a career ladder position, GS-7/9/11. If selected at the GS-07 or GS-09 level, you may be promoted without further competition to the next level, up to the maximum promotion potential of GS-11, once all regulatory requirements have been met and upon management request.

GENERAL EXPERIENCE : Experience, education or training that has provided a basic knowledge of data processing functions and general management principles that enabled the applicant to understand the stages required to automate a work process. Experience may have been gained in work such as computer operator or assistant, computer sales representative, program analyst, or other positions that required the use or adaptation of computer programs and systems.


GS-07 -
Must have at least 12 months experience, education, or training in translating detailed logical steps developed by others into language codes that computers accept where this required understanding of procedures and limitations appropriate to use of a programming language. Experience interviewing subject-matter personnel to get facts regarding work processes, and synthesizing the resulting data into charts showing information flow.

GS-09 - Must have at least 24 months experience, education, or training in analysis of the interrelationship of pertinent components of the system. Experience planning the sequence of actions necessary to accomplish the assignment. Experience scheduling
the sequence of programs to be processed by computers where alternatives had to be weighed with a view to production efficiency.

GS-11 Must have at least 36 months experience, education, or training that approaches techniques and requirements appropriate to an assigned computer applications area or computer specialty area in an organization. Experience planning the sequence of actions necessary to accomplish the assignment where this entailed coordination with others outside the organizational unit and development of project controls. Experience that required adaptations of guidelines or precedents to meet the needs of the assignment. Experience preparing documentation on cost/benefit studies where is involved summarizing the material and organizing it in a logical fashion.

Quality of Experience - Length of time is not of itself qualifying. Candidates' experience should be evaluated on the basis of duties performed rather than strictly on the rank of the individual; however, established compatibility criteria/assignments must be followed. The applicant's record of experience, training, and education must show possession of the knowledge, skills, and abilities needed to fully perform the duties of the position to be filled


If you are using Education to qualify for this position, Substitution of Education for Specialized Experience At the GS-7 level, one full year of graduate level education or superior academic achievement. At the GS-9 level, a masters or equivalent graduate degree or 2 full years of progressively higher level graduate education leading to such a degree may be substituted. At the GS-11 level, a Ph.D. or equivalent, or 3 years of progressively higher level graduate education leading to such a degree

You must provide transcripts or other documentation to support your Educational claims. To receive credit for Education, you must provide documentation of proof that you meet the Education requirements for this position.

Additional information

If you are a male applicant who was born after 12/31/1959 and are required to register under the Military Selective Service Act, the Defense Authorization Act of 1986 requires that you be registered or you are not eligible for appointment in this agency ( ).

If you are unable to apply online or need to fax a document you do not have in electronic form, view the following link for information regarding an Alternate Application .

Your qualifications will be evaluated on the following competencies (knowledge, skills, abilities and other characteristics): Knowledge of a full range of IT security principles, methods, regulations, policies, products and services sufficient to develop specifications to ensure compliance with security requirements at the LAN level and to plan and coordinate the delivery of an IT security awareness training program for end users at all levels at the installation.
Knowledge of a full range of IT security requirements for certification and accreditation; network operations and protocols; systems testing and evaluation; and performance management methods sufficient to implement and coordinate activities designed to ensure, protect, and restore IT systems, services, and capabilities; to monitor and evaluate systems compliance with IT security requirements; provide advice and guidance in implementing IT security policies and procedures in the development and operation of network systems; to plan and conduct security accreditation reviews for installed systems or networks; and to recommend new or revised security measures and countermeasures based on the results of accreditation reviews.
Knowledge of a wide range of IT and communication computer security techniques, requirements, methods, sources, and procedures in INFOSEC, EKMS, EMSEC, and secure voice (e.g., STE, Secure VoIP) Automated Software security.
Knowledge of the EKMS program and related hardware and software, including knowledge of operating systems, local COMSEC Management Software, relational data base management systems, computer-communications software.
Knowledge of a broad range of telecommunications equipment, operating techniques, concepts ,principles, practices, requirements, methods, sources, and procedures (including familiarity with approaches used by telecommunications organizations in other agencies and/or the private sector)sufficient to manage the Communications Security (COMSEC) program, and the Cryptographic Access Program to interpret policy originating from higher organizational levels and to analyze and resolve difficult and complex telecommunications security problems where telecommunications knowledge is paramount.
Knowledge of system software and systems development life cycles including systems documentation, design development, configuration management, cost analysis, data administration, systems integration, and testing.
Knowledge of IT security requirements sufficient to develop and evaluate program documentation to include: mission needs statements, operational requirements documents and support plans, specifications, and proposals.

How You Will Be Evaluated

You will be evaluated for this job based on how well you meet the qualifications above.

Once the announcement has closed, your resume and supporting documentation will be used to determine if you meet the qualifications listed on this announcement. If you are minimally qualified, your resume and supporting documentation will be compared to your responses on the assessment questionnaire to determine your level of experience. If you rate yourself higher than is supported by your application package, your responses may be adjusted and/or you may be excluded from consideration for this position. If you are found to be among the top qualified candidates, you will be referred to the selecting official for employment consideration.

Your qualifications will be evaluated on the following competencies (knowledge, skills, abilities and other characteristics): Ability to serve as the focal point for information security, providing authoritative advice and assistance on complex, technical, controversial, and precedent setting matters to improve the IT security program comprising many unique organizations and large, complex computer and communications security systems.
Ability to apply sound judgment in the use of security knowledge and in weighing the impact of variables such as granting access to classified keying material and other issues that influence the course of actions taken in resolving security questions or issues.
Ability to apply policies, principles, and IT security concepts sufficient to carry out activities leading to security C&A.
Ability to apply findings of assessments to mitigate IT security risks through the implementation of corrective actions.

Background checks and security clearance

Security clearance

Drug test required

Required Documents

To apply for this position, you must submit a complete Application Package which includes:

1. Your resume showing work schedule, hours worked per week, dates (including Month and Year, e.g., 02/2017, Feb 2017, etc.) of employment and duties performed.

If you are relying on your education to meet qualification requirements:

Education must be accredited by an accrediting institution recognized by the U.S. Department of Education in order for it to be credited towards qualifications. Therefore, provide only the attendance and/or degrees from schools accredited by accrediting institutions recognized by the U.S. Department of Education .

Failure to provide all of the required information as stated in this vacancy announcement may result in an ineligible rating or may affect the overall rating.

More searches like this