Over 1 Million Paying Vacancies Available. Discover Your Dream Vacancy with Us!

Are you looking for a INFORMATION TECHNOLOGY SPECIALIST (INFOSEC)? We suggest you consider a direct vacancy at Office of Naval Research in Naval Research Laboratory, Washington. The page displays the terms, salary level, and employer contacts Office of Naval Research person

Job opening: INFORMATION TECHNOLOGY SPECIALIST (INFOSEC)

Salary: $87 388 - 167 637 per year
Published at: Feb 13 2024
Employment Type: Full-time
You will serve as an Information Technology Specialist (INFOSEC) in the Mission Support Division, Code 122400 of NAVAL RESEARCH LABORATORY.

Duties

You will serve as a Cyber Security professional for all NRL Special Access and SCI information systems for the purposes of auditing, validations, full documentation, and compliance assistance.. You will be responsible for all aspects of cyber security within assigned areas. You will manage audit and validation activities for IA vulnerability alerts, IA vulnerability bulletins, and technical advisories for all operating systems in assigned areas. You will provide guidance and oversight for the review, validation, and audit activities of all Operating Systems, software, and hardware within the area of responsibility to ensure compliance. You will identify patterns of non-compliance and recommend appropriate administrative or technical actions to minimize security risks and insider threats.

Requirements

  • Must be a US Citizen.
  • Must be determined suitable for federal employment.
  • Must participate in the direct deposit pay program.
  • New employees to the Department of the Navy will be required to successfully pass the E-Verify employment verification check. To learn more about E-Verify, including your rights and responsibilities, visit e-verify.gov
  • Within the Department of Defense (DoD), the appointment of retired military members within 180 days immediately following retirement date to a civilian position is subject to the provisions of 5 United States Code 3326.
  • Males born after 12-31-59 must be registered for Selective Service.
  • This position is designated as a Cyber IT/Cybersecurity Workforce position. You must obtain and maintain the credentials as described in SECNAV M-5239.2 for specialty area 46 level II within 12 months of appointment.
  • You will be required to obtain and maintain an interim and/or final security clearance prior to entrance on duty. Failure to obtain and maintain the required level of clearance may result in the withdrawal of a job offer or removal.
  • Successful completion of a pre-employment drug test (including marijuana) is required. A tentative offer of employment will be rescinded if you fail to report to the drug test appointment or fail the test. You will be subject to random testing.
  • This position may require travel from normal duty station to CONUS and OCONUS and may include remote or isolated sites. You must be able to travel on military and commercial aircraft for extended periods of time.

Qualifications

Your resume must demonstrate at least one year of specialized experience at or equivalent to the next lower grade level (GS-11/12) or pay band (NO-3) in the federal service or equivalent experience in the private or public sector performing most or all of the following duties: 1) Performing cyber security functions of auditing, validation, documentation, and compliance for Special Access and Information Systems (IS) utilizing knowledge of cyber security policies and procedures as they relate to Navy Assess and Authorization of networks and systems; 2) Auditing IS to ensure compliance with established security requirements utilizing in depth knowledge of Navy Risk Management Framework, JSIG DoD, DON, SECNAV, OPNAV, JSIG, ICD705 policies, procedures and directives; 3) Ensuring the secure integration and operation of IS applying knowledge of cybersecurity concepts, practices and procedures; 4) Ensuring secure configurations for Microsoft Windows operating systems, Linux systems, and hardware; 5) Implementing security risk mitigation procedures and practices utilizing multi-tiered Group policy, Scripts, registry editor, and third-party software; and 6) Creating and maintaining IS security documentation (e.g., Special Access Body of Evidence documentation). Your experience must reflect skill in the following areas: attention to detail, customer service, oral communication, and problem solving. Additional qualification information can be found from the following Office of Personnel Management website: https://www.opm.gov/policy-data-oversight/classification-qualifications/general-schedule-qualification-standards/2200/information-technology-it-management-series-2210-alternative-a/ Experience refers to paid and unpaid experience, including volunteer work done through National Service programs (e.g., professional, philanthropic, religious, spiritual, community, student, social). Volunteer work helps build critical competencies, knowledge, and skills and can provide valuable training and experience that translates directly to paid employment.

Contacts

  • Address NAVAL RESEARCH LABORATORY 4555 Overlook Avenue SW Washington, DC 20375-5324 US
  • Name: Department of Navy EIC
  • Email: [email protected]

Map

Similar vacancies

SUPERVISORY IT SPECIALIST (INFOSEC) Jul 17 2023
$130 256 - 183 500

You will be responsible for coordinating security measures including analysis, periodic testing, evaluation, verification, certification, accreditation, and review of information system installation a...

IT Specialist (SYSADMIN) Mar 01 2024
$81 995 - 130 428

You will manage efforts for IT system administration, IT security implementation and associated technical documentation and accreditation. You will provide ...

IT Specialist (APPSW/OS) Feb 09 2024
$81 995 - 153 630

You will receive and track customer requests for support and incidents from initial receipt of the request or notification of the incident through completion. ...

Information Technology Specialist (Systems Administrator) Jul 13 2023
$77 862 - 123 854

You will be responsible for the configuration of patching and remediation tools, creating scripts for custom security policies, and researching and resolving new security vulnerabilities on a variety ...