Over 1 Million Paying Vacancies Available. Discover Your Dream Vacancy with Us!

Are you looking for a TITLE 5 IT CYBERSECURITY SPECIALIST (INFOSEC) GS-2210-11? We suggest you consider a direct vacancy at Army National Guard Units in Charleston. The page displays the terms, salary level, and employer contacts Army National Guard Units person

Job opening: TITLE 5 IT CYBERSECURITY SPECIALIST (INFOSEC) GS-2210-11

Salary: $69 996 - 90 992 per year
Published at: Sep 25 2023
Employment Type: Full-time
TYPE OF APPOINTMENT: NATIONAL GUARD TITLE 5 EXCEPTED SERVICE POSITION WEST VIRGINIA ARMY NATIONAL GUARD This is NOT a bargaining position. Please read the entire announcement, as important/legal guidance is throughout. To view the entire announcement, hit the print button. Please see Required Documents tab for important information.

Duties

Position Description #: T5701700 This position is located at JFHQ-WV State in the Cybersecurity directorate. The primary purpose of this position is to serve as an Information Systems Security Officer (ISSO) for the organization, ensuring secure operations of the network enclave and provide incident response actions as directed. Disseminates and ensures implementation of Information Assurance (IA) policy, guidance, and training requirements. Ensures implementation of Information Assurance Vulnerability Management (IAVM) program, following reporting and compliance procedures. Conducts periodic scans using Assured Compliance Assessment Solution (ACAS), Security Content Automation Protocol (SCAP) Compliance Checker, and other cybersecurity tools to verify compliance with Security Technical Implementation Guides (STIGS) and Information Assurance Vulnerability Alerts (IAVA). Reviews threat and vulnerability assessments to analyze the risk to information systems and networks and determines appropriate measures to effectively manage those risks. Utilizes Army Training and Certification Tracking System (ACTCS) to ensure all users meet the requisite favorable security investigations, proper clearances, authorization, need-to-know, separation of duties, and security responsibilities before granting access to the information system (IS). Participates as needed on Change Configuration Board and other bodies proposing changes to network or information systems and applications. Performs other duties as assigned. Details of the duties and responsibilities are contained in the applicable position description located online. For a complete position description for this position, go to the FASCLASS website: https://acpol2.army.mil/fasclass/search_fs/search_fasclass.asp

Requirements

  • Federal employment suitability as determined by a background investigation. Selectee will not be appointed untill investigation is complete.
  • Will be required to successfully complete a probationary period.
  • Participation in direct deposit is mandatory.
  • U.S. Citizenship is required.
  • Required to obtain and maintain a satisfactory security clearance, AND, as a minimum, a completed SECRET Security prior to assignment.
  • Direct Deposit is mandatory.
  • Must have a valid driver’s license.
  • May occasionally be required to work other than normal duty hours; overtime may be required.
  • The agency will provide additional information regarding what information or documentation will be needed and how you can request of the agency a legally required exception from this requirement.
  • Must obtain and maintain a TOP SECRET clearance level.
  • Selectee must meet position requirements for certification at Level II in Information Assurance Technician (IAT-II). Certification requirements may be found in DoD 8570.01-M Information Assurance Workforce Improvement Program.
  • All certifications are required within 6 months of employment.
  • Position is designated as PR-VAM-001 within the Defense Cybersecurity Workforce as guided by NIST SP 800-181; National Initiative for Cybersecurity Education, Cybersecurity Workforce Framework.
  • This position is designated as Essential Personnel and may be subject to duty in preparation for, or in response to, a state emergency or disaster declaration.

Qualifications

YOU MUST FULLY SUBSTANTIATE IN YOUR OWN WORDS THAT YOU MEET THE REQUIREMENTS LISTED BELOW. WHEN EXPLAINING MINIMUM REQUIREMENTS AND SPECIALIZED EXPERIENCE YOU MUST GIVE EXAMPLES. DO NOT COPY FROM THE VACANCY ANNOUNCEMENT OR THE POSITION DESCRIPTION. EXPLAIN IT IN YOUR OWN WORDS AND GIVE EXAMPLES TO BE CONSIDERED FOR THIS VACANCY. GENERAL EXPERIENCE: Skilled in collecting and analyzing data effectively, efficiently, and accurately; Ability to plan, direct, and coordinate difficult and complex programs; Ability to develop, apply, and adjust cybersecurity plans to attain agency objectives; Ability to establish and maintain effective working relationships with all levels of key management officials, requiring the exercise of tact, ingenuity, and resourcefulness; Ability to make oral and written presentations in a clear and concise manner; Ability to apply a high level of sound and independent judgment in the solution of cybersecurity problems and cyber mission requirements; A broad knowledge of and ability to utilize principles, methods, techniques, and systems; Ability to write proper English in reports and presentation formats; Ability to communicate clearly and effectively; Skilled in training, mentoring, and problem solving; and, Skilled in applying procedures and directives by reading and interpreting program material. SPECIALIZED EXPERIENCE: Must have at least 12 months experience as a Cybersecurity Specialist. Experienced in the work at an acceptable level of expertise for the preparation and execution of tasked unit missions. Specialized experience would be demonstrated by monitoring and scanning of network resources to ensure the network complies with policies, procedures, and/or guidelines; identifying risk management principals to analyze threats and vulnerabilities of Information Technology (IT) systems, and recommending appropriate countermeasures to mitigate the risks; recognizing security breaches and taking appropriate action to identify and perform analysis to enable timely and appropriate response to events. Knowledgeable of systems security principles and concepts of emerging Information Technology IT security developments. Experienced in the methodologies for determining the better techniques needed to secure computer systems and to protect cyber key terrains from exploitation. Experiences included the ability to leverage knowledge of multiple entities with a stake in current operations to plan and build appropriate courses of action and training scenarios. Experienced in detecting, characterizing, and resolving insecurities in IT networks. Experienced in conducting reviews and analyzing network traffic, configurations, and operating procedures and provided methods to improve system security posture. Skilled in presenting formal and informal briefing and written reports in regard to the Cybersecurity posture and mitigation requirements. Experienced in conducting extensive research of new vulnerabilities and insecurities in operating systems, application software, infrastructure, and boundary protection devices. Experiences included investigations, analysis, and the development of actions used to exploit these vulnerabilities. Competent on conducting tests to validate findings and to develop and refine methods and procedures to mitigate vulnerabilities within the cyberspace community tactics, techniques, and procedures.

Education

Ph.D. or equivalent doctoral degree or 3 full years of progressively higher level graduate education leading to such a degree from an accredited or pre-accredited institution in computer science, engineering, information science, information systems management, mathematics, operations research, statistics, or technology management; or, three full years of graduate education from an accredited or pre-accredited institution that provided a minimum of 24 semester hours in one or more of the fields identified above and required the development or adaptation of applications, systems, or networks.


If choosing to certify based of the education substitution option, you must upload a word document stating you are using the education substitution option, your degree and transcript OR the Military Courses completed. If these are not uploaded you will not be referred to the selecting Supervisor.

Contacts

  • Address WV JFHQ 1703 Coonskin Drive Charleston, WV 25311 US
  • Name: Timmy Thompson
  • Phone: 304-561-6380
  • Email: [email protected]

Map

Similar vacancies

TITLE 5 IT CYBERSECURITY SPECIALIST (INFOSEC) GS-2210-12 Jul 10 2023
$82 830 - 107 680

Position Description #: T5710200 This position is located in a National Guard JFHQ-State organization under the office of the Chief Information Officer(CIO/G6/J6). The primary purpose of this positio...

TITLE 5 IT CYBERSECURITY SPECIALIST (INFOSEC) GS-2210-12 Jul 10 2023
$82 830 - 107 680

Position Description #: T5710200 This position is located in a National Guard JFHQ-State organization under the office of the Chief Information Officer(CIO/G6/J6). The primary purpose of this positio...

TITLE 32 IT SPECIALIST (NETWORK) GS-2210-11 Dec 12 2023
$81 545 - 106 006

Position Description #D0262000 This position is located in an information management organization. The purpose of this position is to function as a technical specialist on issues relating to the wide...

TITLE 32 IT SPECIALIST (CUSTSPT)GS-2210-11 May 01 2024
$73 286 - 95 270

Position Description # D2182000 This position description (PD) has been reviewed and it is determined that: the major duties equal 100%; the statement Performs other duties as assigned (PODAA) is pr...

TITLE 32 IT CYBERSECURITY SPECIALIST (INFOSEC) GS-2210-9/11 Dec 12 2023
$63 736 - 90 992

Position Description # D2524000 This position is located at the JFHQ-State in the Chief Information Officer directorate. The primary purpose of this position is to provide auditing to ensure secure o...