Job opening: IT SPECIALIST (INFOSEC)
Salary: $83 634 - 108 724 per year
Published at: Jan 09 2024
Employment Type: Full-time
THIS IS A NATIONAL GUARD TITLE 5 EXCEPTED SERVICE POSITION.
NEW MEXICO AIR NATIONAL GUARD
(YOU MUST BE A PERMANENT PRESENTLY EMPLOYED EXCEPTED FEDERAL TECHNICIAN IN THE NEW MEXICO AIR NATIONAL GUARD TO BE ELIGIBLE FOR THIS POSITION)
This National Guard position is for a IT SPECIALIST (INFOSEC), Position Description Number T5821400 and is part of the NM 150th SOW Information Systems Flight, National Guard.
Duties
This position is located in an Information Operations (IO) Squadron. The purpose of this position is to serve as a Computer Network Operations (CNO) Technical Expert, ensuring the confidentiality, integrity, and availability of information systems, networks and data through the enhancement of Department of Defense (DoD) information systems security programs, policies, procedures and tools. Enhancement of information systems security programs, procedures, and tools are specifically accomplished by conducting vulnerability assessments and Opposing Force (OPFOR) tasking of planned and installed information systems and ensuring all protection needs are met.
Performs as the Team Technical Lead during vulnerability assessments of DoD information systems. Utilizes knowledge of systems security principles and concepts, of new Information Technology (IT) security developments, and of the infrastructure protection environment to select appropriate tools to be used by team members. Establishes methodology, and determines best techniques to penetrate computer systems and exploit information within these systems. Directs the team during actual assessments to find vulnerabilities due to improper configurations, missing or improperly applied patches, or procedural errors. Provides assistance to owners of assessed systems by providing recommendations pertaining to implementing security programs designed to anticipate, assess, and minimize system vulnerabilities, to correct deficiencies discovered, and to apply new IT security concepts. Briefs commanders and network administrators on the purpose and findings of the assessment, and prepares reports on the findings. Assists in developing security solutions to correct deficiencies that cannot be fixed with existing solutions.
Conducts extensive research of new vulnerabilities discovered in operating systems, application software, infrastructure and firewalls. Investigates, analyses, and develops methods that could be used to exploit those vulnerabilities. Conducts testing on training range to validate findings and to develop and refine methods and procedures to mitigate vulnerabilities.
Conducts extensive research of tools currently being used to attack or gain unauthorized access to information networks. Analyzes and tests these tools on training range to determine effectiveness, stability, and scope of the tools. Modifies and refines tools for use in vulnerability assessments to provide the customer with the best possible evaluation of their security posture.
3. Performs information operations that protect and defend (or assess the capability to protect and defend) information and information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation. This includes providing for restoration of information systems by incorporating protection, detection, and reaction capabilities. Conducts risk and vulnerability assessments of DoD information systems to identify associated vulnerabilities, risks and protection needs. Performs OPFOR and other operational tasking. Operates fixed and deployed communications-computer systems. Performs activities such as configuring and monitoring hardware and software for system operation, processing and control of data flow, and client-server multi-user system support including network management or administration. Performs microcomputer fault isolation and restoration actions. Evaluates and assesses vulnerabilities of customer network and application server hardware, operating system software, and peripheral network equipment such as routers, bridges, switches, attached cabling system, network interface cards, modems, multiplexers, and concentrators. Conducts evaluations to ensure compliance with applicable standards. Ensures system backups are performed to ensure expedient restoration of the database for the respective network equipment. Evaluates effectiveness of customer network firewalls.
Analyzes equipment and software reliability and suitability for vulnerability assessment utilization. Conducts analyses of network usage, hardware and software capabilities, ineffective practices or procedures, equipment shortcomings, and other relevant factors. Recommends methods and procedures and coordinates corrective action to optimize utilization of present equipment. Uses benchmarks, performance measurement, and evaluation data, in conjunction with vulnerability assessment techniques. Develops recommendations or proposals involving a variety of specialized systems and improved operational efficiency.
Performs other duties as assigned.
Requirements
- Federal employment suitability as determined by a background investigation.
- May be required to successfully complete a probationary period.
- Participation in direct deposit is mandatory.
- This position conducts information assurance functions.
- The incumbent shall comply with the requirements of the certification program and will be required to obtain and maintain certification. Certification requirements are outlined in DoD Instruction 8570.01-M
- Work may require access to classified information. Must be able to obtain and maintain the appropriate security clearance.
- The incumbent of this position description must have, at a minimum, a completed National Agency Check (NAC) prior to position assignment.
Qualifications
SPECIALIZED EXPERIENCE: Must have experience, education, or training that approaches techniques and requirements appropriate to an assigned computer applications area or computer specialty area in an organization. Experience planning the sequence of actions necessary to accomplish the assignment where this entailed coordination with others outside the organizational unit and development of project controls. Experience that required adaptations of guidelines or precedents to meet the needs of the assignment. Experience preparing documentation on cost/benefit studies where is involved summarizing the material and organizing it in a logical fashion. Must possess resource advisor, government purchase card and contracting experience.
Education
Substitution of Education for Specialized Experience - For the GS-5 level, a 4-year course of study leading to a bachelor's degree may be substituted for the experience requirements. At the GS-7 level, one full year of graduate level education or superior academic achievement. At the GS-9 level, a masters or equivalent graduate degree or 2 full years of progressively higher level graduate education leading to such a degree may be substituted. At the GS-11 level, a Ph.D. or equivalent, or 3 years of progressively higher level graduate education leading to such a degree.
You must provide transcripts or other documentation to support your Educational claims. To receive credit for Education, you must provide documentation of proof that you meet the Education requirements for this position.
Contacts
- Address NM 150th SOW Information Systems Flight
Kirtland AFB
Albuquerque, NM 87117-5875
US
- Name: Jonelle Suina
- Phone: 505-407-3610
- Email: [email protected]
Map