Over 1 Million Paying Vacancies Available. Discover Your Dream Vacancy with Us!

Are you looking for a ITSPEC (INFOSEC) (T5)? We suggest you consider a direct vacancy at Air National Guard Units in Fort Smith. The page displays the terms, salary level, and employer contacts Air National Guard Units person

Job opening: ITSPEC (INFOSEC) (T5)

Salary: $82 830 - 107 680 per year
Published at: Aug 07 2023
Employment Type: Full-time
THIS IS A NATIONAL GUARD TITLE 5 EXCEPTED SERVICE POSITION This National Guard position is for a ITSPEC (INFOSEC) (T5), Position Description Number T5821400 and is part of the AR ANG 188 OPS GP, National Guard.

Duties

1. Supervises a team of four IT Cybersecurity Specialists professionals while additionally performing as the Team Technical Lead during vulnerability assessments of DoD information systems. Utilizes knowledge of systems security principles and concepts, of new Information Technology (IT) security developments, and of the infrastructure protection environment to select appropriate tools to be used by team members. Establishes methodology, and determines best techniques to penetrate computer systems and exploit information within these systems. Directs the team during actual assessments to find vulnerabilities due to improper configurations, missing or improperly applied patches, or procedural errors. Provides assistance to owners of assessed systems by providing recommendations pertaining to implementing security programs designed to anticipate, assess, and minimize system vulnerabilities, to correct deficiencies discovered, and to apply new IT security concepts. Briefs commanders and network administrators on the purpose and findings of the assessment, and prepares reports on the findings. Assists in developing security solutions to correct deficiencies that cannot be fixed with existing solutions. 2. Conducts extensive research of new vulnerabilities discovered in operating systems, application software, infrastructure and firewalls. Investigates, analyses, and develops methods that could be used to exploit those vulnerabilities. Conducts testing on training range to validate findings and to develop and refine methods and procedures to mitigate vulnerabilities.Conducts extensive research of tools currently being used to attack or gain unauthorized access to information networks. Analyzes and tests these tools on training range to determine effectiveness, stability, and scope of the tools. Modifies and refines tools for use in vulnerability assessments to provide the customer with the best possible evaluation of their security posture. 2. Conducts extensive research of new vulnerabilities discovered in operating systems, application software, infrastructure and firewalls. Investigates, analyses, and develops methods that could be used to exploit those vulnerabilities. Conducts testing on training range to validate findings and to develop and refine methods and procedures to mitigate vulnerabilities. Conducts extensive research of tools currently being used to attack or gain unauthorized access to information networks. Analyzes and tests these tools on training range to determine effectiveness, stability, and scope of the tools. Modifies and refines tools for use in vulnerability assessments to provide the customer with the best possible evaluation of their security posture. 4. Analyzes equipment and software reliability and suitability for vulnerability assessment utilization. Conducts analyses of network usage, hardware and software capabilities, ineffective practices or procedures, equipment shortcomings, and other relevant factors. Recommends methods and procedures and coordinates corrective action to optimize utilization of present equipment. Uses benchmarks, performance measurement, and evaluation data, in conjunction with vulnerability assessment techniques. Develops recommendations or proposals involving a variety of specialized systems and improved operational efficiency. Exercises authority and oversight of the squadron's digital training range(s), a suite of servers, routers, switches, hubs and other devices which can be configured with a variety of different operating systems in various versions, and with pre-programmed vulnerabilities, to be used in Computer Network Operations (CNO) training. 5. Consults with subordinates, supervisors, specialists, vendors, and sister IO squadrons to procure and maintain training range devices that realistically emulate Air Force networks and are flexibly re-configurable to emulate the network(s) of a specific Air Force base as needed to prepare for vulnerability assessment missions. Performs analysis and design of automated and manual systems related to the network. Provides data for intrusion detection analysis. Determines applicability of established methods. Provides technical advice to users. Examines and evaluates alternative means of satisfying user requirements. Suggests technically feasible approaches and makes recommendations regarding the most effective countermeasures. Performs other duties as assigned.

Requirements

Qualifications

GENERAL EXPERIENCE: Experience, education or training that has provided a basic knowledge of data processing functions and general management principles that enabled the applicant to understand the stages required to automate a work process. Experience may have been gained in work such as computer operator or assistant, computer sales representative, program analyst, or other positions that required the use or adaptation of computer programs and systems. SPECIALIZED EXPERIENCE: Must have at least 36 months experience, education, or training that approaches techniques and requirements appropriate to an assigned computer applications area or computer specialty area in an organization. Experience planning the sequence of actions necessary to accomplish the assignment where this entailed coordination with others outside the organizational unit and development of project controls. Experience that required adaptations of guidelines or precedents to meet the needs of the assignment. Experience preparing documentation on cost/benefit studies where is involved summarizing the material and organizing it in a logical fashion.

Contacts

  • Address AR ANG 188 OPS GP Bldg 7300-Camp Robinson North Little Rock, AR 72199-9600 US
  • Name: AR HRO Customer Service
  • Email: [email protected]

Map

Similar vacancies

SUPV ITSPEC (PLCYPLN) (32) Oct 12 2023
$98 496 - 128 043

1. Manages, plans, organizes, controls, and directs the communications activities for the Wing and Base to ensure mission accomplishment and optimum use of resources. Sets policy, directs and monitors...

ITSPEC (INFOSEC) (Title 5) Jan 11 2024
$86 962 - 113 047

1. Performs as the Team Technical Lead during vulnerability assessments of DoD information systems. Utilizes knowledge of systems security principles and concepts, of new Information Technology (IT) s...

IT CYBERSECURITY SPECIALIST (INFOSEC) (T5) Oct 11 2023
$82 830 - 107 680

1. Serves as a technical expert and focal point for Information Technology (IT) security and information assurance policies, planning, programs, initiatives, certification and accreditation. Provides ...

ITSPEC (PLCYPLN) (32) Oct 06 2023
$81 545 - 106 006

1. Information Technology Planning: (30%) (a) Analyzes requirements and establishes plans of action for improving IT applications. Analyzes existing and planned IT applications, both hardware and sof...

ITSPEC (CUSTSPT) (Title 5) Jan 11 2024
$73 286 - 95 270

1. Manages the assigned IT/communications environment with privileged access at the network level for the Wing, Geographically Separated Units (GSU), and Tenants. Plans, coordinates, installs, and con...