Job opening: IT CYBERSECURITY SPECIALIST (INFOSEC) (32)
Salary: $82 830 - 107 680 per year
Published at: Dec 19 2023
Employment Type: Full-time
THIS IS A NATIONAL GUARD TITLE 32 EXCEPTED SERVICE POSITION.
This National Guard position is for a IT CYBERSECURITY SPECIALIST (INFOSEC) (32), Position Description Number D2792000 and is part of the 223 COS, National Guard.
NATIONAL GUARD MEMBERSHIP IS REQURED
THIS IS AN INDEFINITE POSITION MAY CONVERT TO PERM.
Duties
1. Serves as a technical expert and focal point for Information Technology (IT) security and information assurance policies, planning, programs, initiatives, certification and accreditation. Provides advice and assistance regarding security aspects of processing, storage, retrieval, transmission, and access of classified and unclassified information. Administers and monitors installation compliance with all applicable DoD, USAF, National Guard Bureau (NGB) and Air National Guard (ANG) Information Assurance regulations and policies. Administers and maintains the organization certification & accreditation process for assigned SCIF(s) using the Risk Management Framework (RMF), and coordinates, compiles and maintains all certification & accreditation documentation for appropriate accreditation authorities. Reviews and implements local policies regarding system access, network rights, and physical access to systems and equipment. Conducts risk and vulnerability assessments of DoD classified information systems to identify associated vulnerabilities, risks and protection needs. Leads or serves as a member of the configuration control board for applicable installation facilities/networks (35%)
2. Evaluates and assesses vulnerabilities of classified network and application server hardware, operating system software, and peripheral network equipment such as routers, bridges, switches, attached cabling system, network interface cards, modems, multiplexers, and concentrators. Updates hardware and software architecture databases to reflect installations, turn-ins, and changes in reportable software. Provides input to the ANG Continuity of Operation Plan (COOP) procedures for system disaster recovery. COOP recovery includes reestablishment of systems at multiple sites and locations. Conducts evaluations to ensure compliance with applicable standards. Ensures system backups are performed to ensure expedient restoration of respective network equipment. (25%)
3. Reviews national, DOD and other policies, program proposals, operational and strategic plans, and identifies issues requiring tier two actions or inputs. Based on these reviews, provides technical recommendations for changes to the security posture to the Wing Information System Security Manager (ISSM). Prepares and presents applicable briefings and reports to high-level managers. Advises the Wing ISSM and Group/Squadron Commander on the impact of tier two level Information Assurance (IA) and Computer Network Defense (CND) policy on squadron group/squadron activities. Implements audit measures to ensure activity compliance with regulatory requirements. Participates in inspections and surveys of computer system. Incumbent makes recommendations to the Wing ISSM on the approval of various computer operations based on security guidelines. When feasible, provides alternatives to the Wing ISSM and Group/Squadron Commander to meet security requirements based on the unique needs of the organization and mission requirements. Develops guidance papers on security issues affecting classified systems, enclaves, and applications. (15%)
4. Analyzes equipment and software reliability and suitability for vulnerability assessment utilization. Conducts analyses of classified network usage, hardware and software capabilities, ineffective practices or procedures, equipment shortcomings, and other relevant factors. Recommends methods and procedures and coordinates corrective action to optimize utilization of present equipment. Uses benchmarks, performance measurement, and evaluation data, in conjunction with vulnerability assessment techniques. Develops recommendations or proposals involving a variety of specialized systems to improve operational efficiency. (15%)
5. Determines, develops, and ensures cooperation and coordination with related IA/CND program efforts. Incumbent must analyze the vulnerabilities and weaknesses of existing computer security programs that could benefit from group training and translate those needs into training and education media for the ISSM. Designs and delivers to the Group/Squadron Commander tailored programs of instruction to reduce risks, increase the level of computer security awareness, and improve the security posture for the automated systems and activities. (10%)
Performs other duties as assigned.
Qualifications
GENERAL EXPERIENCE:
In general, to qualify an applicant for any GS-2210 position, apply and evaluate the
applicant's competencies (Skills, Knowledge, Abilities, and Behaviors), military and civilian
experiences, completed education, learned skills, obtained knowledge, endorsed abilities,
and training program accomplishments. The following qualification factors are applicable
to the Cyberspace positions:
Skilled in collecting and analyzing data effectively, efficiently, and accurately;
Ability to plan, direct, and coordinate difficult and complex programs;
Ability to develop, apply, and adjust cyber program plans to attain agency objectives;
Ability to select, develop, and supervise a subordinate staff;
Ability to establish and maintain effective working relationships, not only with
subordinate staff, but with all levels of key management officials, the latter
particularly requiring the exercise of tact, ingenuity, and resourcefulness;
Ability to make oral and written presentations in a clear and concise manner;
Ability to apply a high level of sound and independent judgment in the solution of
cyber program problems and cyber mission requirements;
A broad knowledge of and ability to utilize principles, methods, techniques, and
systems;
Ability to write proper English in reports and presentation formats;
Ability to communicate clearly and effectively;
Skilled in training, mentoring, and problem solving; and,
Skilled in applying procedures and directives by reading and interpreting program
material.
SPECIALIZED EXPERIENCE:
Must have at least 24 months experience as a fully qualified Cyberspace Operator.
Experienced in the work at a high level of expertise for the preparation and execution of
tasked unit missions. Experiences included preparing, maintaining currency for, and
executing an advanced role in Cyberspace Operations. Knowledgeable of systems security
principles and concepts of emerging Information Technology (IT) security developments.
Experiences included duties directed within the infrastructure protection environment and
the selection of appropriate tools for team members. Experienced in the methodologies for
determining the better techniques needed to secure computer systems and to protect cyber
key terrains from exploitation of information within these cyberspace systems. Experiences
included the ability to leverage knowledge of multiple entities with a stake in current
operations to plan and build appropriate courses of action and training scenarios. Direct
work experiences are required in one or more of the following unit assignments: Cyberspace Crew Commander; Cyberspace Operations Controller; Operations Planner and
Scheduler; Industrial Control Systems (ICS) Cyberspace Operator; and National Mission
Team Cyberspace Operator. Experiences must include one or more of the following
business tasks: Developing tactical objectives or tactical taskings for Cyberspace Operators;
liaison duties between assigned team and other teams or external entities; directing tactical
execution for a team of Cyberspace Operators; developing tactical approaches and
synchronizes actions of multiple qualified operators in order to achieve objectives;
representing the unit's capability, availability, and interests at high-level Operational
Planning Team (OPT) meetings to define the missions, environments, enemy, effects,
capabilities, overall plans, phasing, operational agreements and contingencies needed to
conduct the operation or exercise; developing tactical plans for assigned missions and
exercises; translating operational objectives into tactical objectives comprised of specific
tactical tasks. Experienced in developing Measures of Effectiveness and Measures of
Performance that were used in the assessment of mission exercises. Experiences included
work accomplished to prepare and coordinate operators, resources, facilities and
equipment schedules, in coordination with unit and flight commanders, in order to ensure
training, currency, and mission timelines and objectives were met. Experiences may
include the assessment and evaluation of mission vulnerabilities and/or adversary activity
in ICS enclaves. Experienced in detecting, characterizing, and resolving insecurities in ICS
networks. Experienced in conducting reviews and analyzing ICS network traffic, Series GS
configurations, and operating procedures and provided methods to improve system security
posture. Experienced in the Air Force currency and additional national-level requirements
to execute US Cyberspace Command's Defend-the-Nation priority. Skilled in presenting formal and informal briefing and written reports in regard to the Cyberspace program
mission readiness. Competent in preparing Unit Training Assembly, Annual Training and
currency training events for Mission Ready Cyberspace Operators to optimize training
times. Knowledgeable on unit military members' go-or-no-go readiness status and skilled
to recognize deficiencies. Experiences included providing opportunities for assigned
members to maintain full mission readiness. Experienced in coordinating with the unit's
maintenance section to ensure all assigned equipment is in good working condition and
ready for each training and mission event. Experienced in conducting extensive researches
of new vulnerabilities and insecurities in operating systems, application software,
infrastructure, and boundary protection devices. Experiences included investigations,
analysis, and the development of actions used to exploit these vulnerabilities. Competent
on conducting tests to validate findings and to develop and refine methods and procedures
to mitigate vulnerabilities within the cyberspace community tactics, techniques, and
procedures. Experienced in providing customers with the best possible evaluations of their
security postures.
Contacts
- Address AR ANG 189 OPS GP
Bldg 7300-Camp Robinson
North Little Rock, AR 72199-9600
US
- Name: AR HRO Customer Service
- Email: [email protected]
Map