Over 1 Million Paying Vacancies Available. Discover Your Dream Vacancy with Us!

Are you looking for a IT CYBERSECURITY SPECIALIST (INFOSEC) (32)? We suggest you consider a direct vacancy at Air National Guard Units in Little Rock AFB. The page displays the terms, salary level, and employer contacts Air National Guard Units person

Job opening: IT CYBERSECURITY SPECIALIST (INFOSEC) (32)

Salary: $82 830 - 107 680 per year
Published at: Dec 19 2023
Employment Type: Full-time
THIS IS A NATIONAL GUARD TITLE 32 EXCEPTED SERVICE POSITION. This National Guard position is for a IT CYBERSECURITY SPECIALIST (INFOSEC) (32), Position Description Number D2792000 and is part of the 223 COS, National Guard. NATIONAL GUARD MEMBERSHIP IS REQURED THIS IS AN INDEFINITE POSITION MAY CONVERT TO PERM.

Duties

1. Serves as a technical expert and focal point for Information Technology (IT) security and information assurance policies, planning, programs, initiatives, certification and accreditation. Provides advice and assistance regarding security aspects of processing, storage, retrieval, transmission, and access of classified and unclassified information. Administers and monitors installation compliance with all applicable DoD, USAF, National Guard Bureau (NGB) and Air National Guard (ANG) Information Assurance regulations and policies. Administers and maintains the organization certification & accreditation process for assigned SCIF(s) using the Risk Management Framework (RMF), and coordinates, compiles and maintains all certification & accreditation documentation for appropriate accreditation authorities. Reviews and implements local policies regarding system access, network rights, and physical access to systems and equipment. Conducts risk and vulnerability assessments of DoD classified information systems to identify associated vulnerabilities, risks and protection needs. Leads or serves as a member of the configuration control board for applicable installation facilities/networks (35%) 2. Evaluates and assesses vulnerabilities of classified network and application server hardware, operating system software, and peripheral network equipment such as routers, bridges, switches, attached cabling system, network interface cards, modems, multiplexers, and concentrators. Updates hardware and software architecture databases to reflect installations, turn-ins, and changes in reportable software. Provides input to the ANG Continuity of Operation Plan (COOP) procedures for system disaster recovery. COOP recovery includes reestablishment of systems at multiple sites and locations. Conducts evaluations to ensure compliance with applicable standards. Ensures system backups are performed to ensure expedient restoration of respective network equipment. (25%) 3. Reviews national, DOD and other policies, program proposals, operational and strategic plans, and identifies issues requiring tier two actions or inputs. Based on these reviews, provides technical recommendations for changes to the security posture to the Wing Information System Security Manager (ISSM). Prepares and presents applicable briefings and reports to high-level managers. Advises the Wing ISSM and Group/Squadron Commander on the impact of tier two level Information Assurance (IA) and Computer Network Defense (CND) policy on squadron group/squadron activities. Implements audit measures to ensure activity compliance with regulatory requirements. Participates in inspections and surveys of computer system. Incumbent makes recommendations to the Wing ISSM on the approval of various computer operations based on security guidelines. When feasible, provides alternatives to the Wing ISSM and Group/Squadron Commander to meet security requirements based on the unique needs of the organization and mission requirements. Develops guidance papers on security issues affecting classified systems, enclaves, and applications. (15%) 4. Analyzes equipment and software reliability and suitability for vulnerability assessment utilization. Conducts analyses of classified network usage, hardware and software capabilities, ineffective practices or procedures, equipment shortcomings, and other relevant factors. Recommends methods and procedures and coordinates corrective action to optimize utilization of present equipment. Uses benchmarks, performance measurement, and evaluation data, in conjunction with vulnerability assessment techniques. Develops recommendations or proposals involving a variety of specialized systems to improve operational efficiency. (15%) 5. Determines, develops, and ensures cooperation and coordination with related IA/CND program efforts. Incumbent must analyze the vulnerabilities and weaknesses of existing computer security programs that could benefit from group training and translate those needs into training and education media for the ISSM. Designs and delivers to the Group/Squadron Commander tailored programs of instruction to reduce risks, increase the level of computer security awareness, and improve the security posture for the automated systems and activities. (10%) Performs other duties as assigned.

Requirements

Qualifications

GENERAL EXPERIENCE: In general, to qualify an applicant for any GS-2210 position, apply and evaluate the applicant's competencies (Skills, Knowledge, Abilities, and Behaviors), military and civilian experiences, completed education, learned skills, obtained knowledge, endorsed abilities, and training program accomplishments. The following qualification factors are applicable to the Cyberspace positions: Skilled in collecting and analyzing data effectively, efficiently, and accurately; Ability to plan, direct, and coordinate difficult and complex programs; Ability to develop, apply, and adjust cyber program plans to attain agency objectives; Ability to select, develop, and supervise a subordinate staff; Ability to establish and maintain effective working relationships, not only with subordinate staff, but with all levels of key management officials, the latter particularly requiring the exercise of tact, ingenuity, and resourcefulness; Ability to make oral and written presentations in a clear and concise manner; Ability to apply a high level of sound and independent judgment in the solution of cyber program problems and cyber mission requirements; A broad knowledge of and ability to utilize principles, methods, techniques, and systems; Ability to write proper English in reports and presentation formats; Ability to communicate clearly and effectively; Skilled in training, mentoring, and problem solving; and, Skilled in applying procedures and directives by reading and interpreting program material. SPECIALIZED EXPERIENCE: Must have at least 24 months experience as a fully qualified Cyberspace Operator. Experienced in the work at a high level of expertise for the preparation and execution of tasked unit missions. Experiences included preparing, maintaining currency for, and executing an advanced role in Cyberspace Operations. Knowledgeable of systems security principles and concepts of emerging Information Technology (IT) security developments. Experiences included duties directed within the infrastructure protection environment and the selection of appropriate tools for team members. Experienced in the methodologies for determining the better techniques needed to secure computer systems and to protect cyber key terrains from exploitation of information within these cyberspace systems. Experiences included the ability to leverage knowledge of multiple entities with a stake in current operations to plan and build appropriate courses of action and training scenarios. Direct work experiences are required in one or more of the following unit assignments: Cyberspace Crew Commander; Cyberspace Operations Controller; Operations Planner and Scheduler; Industrial Control Systems (ICS) Cyberspace Operator; and National Mission Team Cyberspace Operator. Experiences must include one or more of the following business tasks: Developing tactical objectives or tactical taskings for Cyberspace Operators; liaison duties between assigned team and other teams or external entities; directing tactical execution for a team of Cyberspace Operators; developing tactical approaches and synchronizes actions of multiple qualified operators in order to achieve objectives; representing the unit's capability, availability, and interests at high-level Operational Planning Team (OPT) meetings to define the missions, environments, enemy, effects, capabilities, overall plans, phasing, operational agreements and contingencies needed to conduct the operation or exercise; developing tactical plans for assigned missions and exercises; translating operational objectives into tactical objectives comprised of specific tactical tasks. Experienced in developing Measures of Effectiveness and Measures of Performance that were used in the assessment of mission exercises. Experiences included work accomplished to prepare and coordinate operators, resources, facilities and equipment schedules, in coordination with unit and flight commanders, in order to ensure training, currency, and mission timelines and objectives were met. Experiences may include the assessment and evaluation of mission vulnerabilities and/or adversary activity in ICS enclaves. Experienced in detecting, characterizing, and resolving insecurities in ICS networks. Experienced in conducting reviews and analyzing ICS network traffic, Series GS configurations, and operating procedures and provided methods to improve system security posture. Experienced in the Air Force currency and additional national-level requirements to execute US Cyberspace Command's Defend-the-Nation priority. Skilled in presenting formal and informal briefing and written reports in regard to the Cyberspace program mission readiness. Competent in preparing Unit Training Assembly, Annual Training and currency training events for Mission Ready Cyberspace Operators to optimize training times. Knowledgeable on unit military members' go-or-no-go readiness status and skilled to recognize deficiencies. Experiences included providing opportunities for assigned members to maintain full mission readiness. Experienced in coordinating with the unit's maintenance section to ensure all assigned equipment is in good working condition and ready for each training and mission event. Experienced in conducting extensive researches of new vulnerabilities and insecurities in operating systems, application software, infrastructure, and boundary protection devices. Experiences included investigations, analysis, and the development of actions used to exploit these vulnerabilities. Competent on conducting tests to validate findings and to develop and refine methods and procedures to mitigate vulnerabilities within the cyberspace community tactics, techniques, and procedures. Experienced in providing customers with the best possible evaluations of their security postures.

Contacts

  • Address AR ANG 189 OPS GP Bldg 7300-Camp Robinson North Little Rock, AR 72199-9600 US
  • Name: AR HRO Customer Service
  • Email: [email protected]

Map

Similar vacancies

SUPV IT SPEC (PLCYPLN) (Title 32) Jan 11 2024
$103 409 - 134 435

1. Manages, plans, organizes, controls, and directs the communications activities for the Wing and Base to ensure mission accomplishment and optimum use of resources. Sets policy, directs and monitors...