Over 1 Million Paying Vacancies Available. Discover Your Dream Vacancy with Us!

Are you looking for a Information Technology Specialist (Information Security)? We suggest you consider a direct vacancy at U.S. Army Cyber Command in Monterey County. The page displays the terms, salary level, and employer contacts U.S. Army Cyber Command person

Job opening: Information Technology Specialist (Information Security)

Salary: $85 508 - 111 157 per year
Relocation: YES
Published at: Jul 11 2023
Employment Type: Full-time
About the Position: This position is a DOD Cyber Excepted Service (CES) personnel system position in the Excepted Service under 10 USC 1599f. Employees occupying CES positions are in the Excepted Service and must adhere to U.S. Code, Title 10, as well as Department of Defense Instruction 1400.25. This position is located at in Monetery County, California.

Duties

Plan, develop, implement, and maintain Cybersecurity programs, policies, procedures, and Information Technology (IT) systems to protect the confidentiality, integrity, and availability of the installations systems, networks, and data. Monitor and evaluate the overall classified and unclassified network compliance with Information Assurance Vulnerability Management (IAVMA) security requirements utilizing approved DoD/Army tools. Configure and maintain log/audit monitoring tools to detect anomalous events to determine if they are indicators of information security incidents. Conduct risk and vulnerability assessments of planned and installed information systems to the network to identify vulnerabilities, risks, and protection needs. Develop and enforce established procedures, policies, and regulations for the protection of the Communications Security (COMSEC) equipment, materials and aids. Report all levels of Information Systems Security vulnerabilities in the manner appropriate to the risk involved.

Requirements

  • Appointment may be subject to a suitability or fitness determination, as determined by a completed background investigation.
  • Three year trial/probationary period may be required.
  • The incumbent will be required to attend security and IT training which will aid in the performance of the assigned duties.
  • The employee must possess a valid motor vehicle driver's license and be able to obtain and maintain a valid government vehicles operator's license.
  • Overtime and on-call duty maybe required on short notice to include nights, holidays, and weekends in support of related mission requirements.
  • Employee may be required to wear an electronic pager or cellular telephone and maintain a working home telephone at all times.
  • This position requires the incumbent be able to obtain and maintain a determination of eligibility for a Secret security clearance or access for the duration of employment.
  • May be required to perform 24X7 shift work in support of operational IT related mission/after duty hours.
  • See "Additional Information" section for additional requirements and Conditions of Employment.

Qualifications

Who May Apply: Only applicants who meet one of the employment authority categories below are eligible to apply for this job. You will be asked to identify which category or categories you meet, and to provide documents which prove you meet the category or categories you selected. See Proof of Eligibility for an extensive list of document requirements for all employment authorities. United States Citizen Applying to a Cyber Excepted Service (CES) Position Army CES positions apply Veteran's Preference to preference eligible candidates, as defined by Section 2108 of Title 5 U.S.C., in accordance with the procedures provided in DoD Instruction 1400.25, Volume 3005, "CES Employment and Placement". If you are a veteran claiming veterans' preference, as defined by Section 2108 of Title 5 U.S.C., you must submit documents verifying your eligibility with your application package. This position is in the Professional Work Category at the Full Performance Work Level within the CES Occupational Structure. In order to qualify, you must meet the education and/or experience requirements described below. Experience refers to paid and unpaid experience, including volunteer work done through National Service programs (e.g., Peace Corps, AmeriCorps) and other organizations (e.g., professional; philanthropic; religious; spiritual; community; student; social). You will receive credit for all qualifying experience, including volunteer experience. Your resume must clearly describe your relevant experience; if qualifying based on education, your transcripts will be required as part of your application. Additional information about transcripts is in this document. To qualify based on your experience, your resume must describe one year of specialized experience that demonstrates the possession of knowledge, skills, abilities, and competencies necessary for immediate success in the position. Such experience is typically in or directly related to the work of the position to be filled. Specialized experience would be demonstrated by assisting with risk or vulnerability assessments of organizational information systems; coordinating work to mitigate information system security issues or deficiencies; and providing guidance on established standardized security procedures within the organization. Plan, develop, implement, and maintain Cybersecurity programs, policies, procedures, and Information Technology (IT) systems to protect the confidentiality, integrity, and availability of the installations systems, networks, and data. The specialized experience must include, or be supplemented by, information technology related experience (paid or unpaid experience and/or completion of specific, intensive training, as appropriate) which demonstrates each of the four competencies, as defined: (1) Attention to Detail - Is thorough when performing work and conscientious about attending to detail. Examples of IT-related experience demonstrating this competency include: completing work independently that rarely requires editing or review by others (2) Customer Service - Works with clients and customers (that is, any individuals who use or receive the services or products that your work unit produces, including the general public, individuals who work in the agency, other agencies, or organizations outside the Government) to assess their needs, provide information or assistance, resolve their problems, or satisfy their expectations; knows about available products and services; is committed to providing quality products and services. Examples of IT-related experience demonstrating this competency include: resolving simple and routine problems, questions, or complaints and providing support and guidance to customers on non-routine issues; serving as a primary resource for customers, requesting assistance with complex issues when necessary; and participating in meetings and providing advice to customers in own area of expertise. (3) Oral Communication - Expresses information (for example, ideas or facts) to individuals or groups effectively, taking into account the audience and nature of the information (for example, technical, sensitive, controversial); makes clear and convincing oral presentations; listens to others, attends to nonverbal cues, and responds appropriately. Examples of IT-related experience demonstrating this competency include: expressing facts and ideas in a clear, concise, convincing, and organized manner; clearly conveying moderately complex ideas, concepts, and information to customers; exhibiting active listening by demonstrating understanding of audience comments and/or questions. (4) Problem Solving - Identifies problems; determines accuracy and relevance of information; uses sound judgment to generate and evaluate alternatives, and to make recommendations. Examples of IT-related experience demonstrating this competency include: identifying and solving problems by gathering and applying information from a variety of materials or sources that provide several alternatives; recognizing and taking action to address non-routine problems; soliciting feedback from multiple stakeholders to understand an issue or problem and accurately assess its root causes and potential solutions; seeking supervisory review where appropriate. OR Education: Ph.D. or equivalent doctoral degree or 3 full years of progressively higher level graduate education leading to such a degree from an accredited or pre-accredited institution in computer science, engineering, information science, information systems management, mathematics, operations research, statistics, or technology management; or, three full years of graduate education from an accredited or pre-accredited institution that provided a minimum of 24 semester hours in one or more of the fields identified above and required the development or adaptation of applications, systems, or networks.

Education

FOREIGN EDUCATION: If you are using education completed in foreign colleges or universities to meet the qualification requirements, you must show the education credentials have been evaluated by a private organization that specializes in interpretation of foreign education programs and such education has been deemed equivalent to that gained in an accredited U.S. education program; or full credit has been given for the courses at a U.S. accredited college or university. For further information, visit: http://www.ed.gov/about/offices/list/ous/international/usnei/us/edlite-visitus-forrecog.html

Contacts

  • Address KB-W6SVAA USA SIG NTWK ENT CTR MONTEREY DO NOT MAIL Presidio of Monterey, CA 93944 US
  • Name: Army Applicant Help Desk

Map

Similar vacancies

SUPERVISORY IT SPECIALIST (INFOSEC) Sep 09 2024
$128 717 - 175 919

The incumbent is responsible for administration and control of assigned Information Technology (IT) projects for the command with emphasis on both Cybersecurity and Business and Plans (BnP) functional...

Information Technology Specialist (Information Security) Jul 11 2023
$85 508 - 111 157

Plan, develop, implement, and maintain Cybersecurity programs, policies, procedures, and Information Technology (IT) systems to protect the confidentiality, integrity, and availability of the installa...