Over 1 Million Paying Vacancies Available. Discover Your Dream Vacancy with Us!

Are you looking for a IT CYBERSECURITY SPECIALIST (INFOSEC)? We suggest you consider a direct vacancy at Air National Guard Units in Elmendorf AFB. The page displays the terms, salary level, and employer contacts Air National Guard Units person

Job opening: IT CYBERSECURITY SPECIALIST (INFOSEC)

Salary: $105 676 - 133 853 per year
Relocation: YES
Published at: Mar 12 2024
Employment Type: Full-time
Opened Area(s) of Consideration: 1, 2, 3 DEFINITION OF AREA(S) OF CONSIDERATION: Area 1 - All current on-board AKNG T5 Competitive or Excepted Service Employees. Area 2 - All other current onboard AKNG T32 Excepted Service Employees. Area 3 - All current or former members of the Alaska National Guard PDCN: T5895000 MPCN: 1087417 Selecting Supervisor: Jeremiah Brewer

Duties

Serves as a technical expert and focal point for Information Technology (IT) security and information assurance policies, planning, programs, initiatives, certification and accreditation. Provides advice and assistance regarding security aspects of processing, storage, retrieval, transmission, and access of classified and unclassified information. Administers and monitors installation compliance with all applicable DoD, USAF, National Guard Bureau (NGB) and Air National Guard (ANG) Information Assurance regulations and policies. Administers and maintains the organization certification & accreditation process for assigned SCIF(s) using the Risk Management Framework (RMF), and coordinates, compiles and maintains all certification & accreditation documentation for appropriate accreditation authorities. Reviews and implements local policies regarding system access, network rights, and physical access to systems and equipment. Conducts risk and vulnerability assessments of DoD classified information systems to identify associated vulnerabilities, risks and protection needs. Leads or serves as a member of the configuration control board for applicable installation facilities/networks Evaluates and assesses vulnerabilities of classified network and application server hardware, operating system software, and peripheral network equipment such as routers, bridges, switches, attached cabling system, network interface cards, modems, multiplexers, and concentrators. Updates hardware and software architecture databases to reflect installations, turn-ins, and changes in reportable software. Provides input to the ANG Continuity of Operation Plan (COOP) procedures for system disaster recovery. COOP recovery includes reestablishment of systems at multiple sites and locations. Conducts evaluations to ensure compliance with applicable standards. Ensures system backups are performed to ensure expedient restoration of respective network equipment. Reviews national, DOD and other policies, program proposals, operational and strategic plans, and identifies issues requiring tier two actions or inputs. Based on these reviews, provides technical recommendations for changes to the security posture to the Wing Information System Security Manager (ISSM). Prepares and presents applicable briefings and reports to high-level managers. Advises the Wing ISSM and Group/Squadron Commander on the impact of tier two level Information Assurance (IA) and Computer Network Defense (CND) policy on squadron group/squadron activities. Implements audit measures to ensure activity compliance with regulatory requirements. Participates in inspections and surveys of computer system. Incumbent makes recommendations to the Wing ISSM on the approval of various computer operations based on security guidelines. When feasible, provides alternatives to the Wing ISSM and Group/Squadron Commander to meet security requirements based on the unique needs of the organization and mission requirements. Develops guidance papers on security issues affecting classified systems, enclaves, and applications. Analyzes equipment and software reliability and suitability for vulnerability assessment utilization. Conducts analyses of classified network usage, hardware and software capabilities, ineffective practices or procedures, equipment shortcomings, and other relevant factors. Recommends methods and procedures and coordinates corrective action to optimize utilization of present equipment. Uses benchmarks, performance measurement, and evaluation data, in conjunction with vulnerability assessment techniques. Develops recommendations or proposals involving a variety of specialized systems to improve operational efficiency. Determines, develops, and ensures cooperation and coordination with related IA/CND program efforts. Incumbent must analyze the vulnerabilities and weaknesses of existing computer security programs that could benefit from group training and translate those needs into training and education media for the ISSM. Designs and delivers to the Group/Squadron Commander tailored programs of instruction to reduce risks, increase the level of computer security awareness, and improve the security posture for the automated systems and activities. Performs other duties as assigned.

Requirements

  • Federal employment suitability as determined by a background investigation.
  • May be required to successfully complete a probationary period.
  • U.S. citizenship is required.
  • This position is subject to provisions of the DoD Priority Placement Program.
  • Bargaining Unit: Non- Bargaining.
  • Must be registered for Selective Service, see Legal and Regulatory Guide.
  • May be required to obtain and maintain a satisfactory security clearance.
  • APPOINTMENT FACTORS: T5 Excepted Service appointment in the Alaska National Guard.
  • Must possess a TOP SECRET clearance with SCI prior to appointment.
  • This position is covered by the Domestic Violence Misdemeanor Amendment (30 Sep 96) of the Gun Control Act (Lautenberg Amendment) of 1968. An individual convicted of a qualifying crime of domestic violence may not perform the duties of this position.
  • Ability to establish effective professional working relationships with coworkers and customers, contributing to a cooperative working environment and successful accomplishment of the mission.
  • May be required to travel by car, in military and/or commercial aircraft, and by other means of transportation as appropriate, to perform temporary duty assignments.
  • Irregular and overtime (compensatory) hours may be required to support operational requirements or contingencies.
  • The employee will be required to have, or obtain, and maintain a valid driver’s license.

Qualifications

SPECIALIZED EXPERIENCE is experience which is directly related to the position to be filled and which has equipped you with the particular knowledge, skills and abilities to successfully perform the duties of this position. GS-12- Must have at least 1-year of specialized experience equivalent to at least the next lower grade, GS-11. Some examples of Specialized Experience are, Serves as a technical expert and focal point for Information Technology (IT) security and information assurance policies, planning, programs, initiatives, certification and accreditation. Evaluates and assesses vulnerabilities of classified network and application server hardware, operating system software, and peripheral network equipment such as routers, bridges, switches, attached cabling system, network interface cards, modems, multiplexers, and concentrators. Updates hardware and software architecture databases to reflect installations, turn-ins, and changes in reportable software. Reviews national, DOD and other policies, program proposals, operational and strategic plans, and identifies issues requiring tier two actions or inputs. Analyzes equipment and software reliability and suitability for vulnerability assessment utilization. Conducts analyses of classified network usage, hardware and software capabilities, ineffective practices or procedures, equipment shortcomings, and other relevant factors. EXPERIENCE REQUIREMENTS: Resume must have complete dates and hours worked per week for each occurrence of both civilian and military employment (Example: 2 JAN 1980 to 3 MAR 1981; 0800-1630 M-F or JAN 1980 to MAR 1981; 40 hrs/wk) Use of year only will result in disqualification. The duties listed must fully substantiate -in your own words- that you meet the minimum requirements and specialized experience listed above, in detail; otherwise, you will not be considered qualified for this position. Length of time is not of itself qualifying. Your experience will be evaluated on the basis of duties performed. Your record of experience, training, and education must show possession of the knowledge, skills and abilities needed to fully perform the duties of the position.

Contacts

  • Address Alaska Air National Guard P.O Box 5800 JBER, AK 99505 US
  • Name: Lucy Dieterich
  • Phone: (907) 428-6462
  • Email: [email protected]

Map

Similar vacancies

SUPERVISORY INFORMATION TECHNOLOGY SPECIALIST (INFOSEC) Apr 09 2024
$116 811 - 151 858

Plans, organizes, and directs the activities of the 3 Wing Advanced Programs Office, ensuring that the 3 Wing complies with legal and regulatory requirements and meets customer needs. Exercises sup...

SUPERVISORY IT SPECIALIST (CUSTSPT) Aug 17 2023
$111 026 - 144 331

Plans, organizes, and oversees operational activities of the 611 Air Communications Squadron. Exercises supervisory personnel management responsibilities. Represents 611 Air Communications Squadro...

INFORMATION TECHNOLOGY SPECIALIST (INFOSEC) May 01 2024
$105 676 - 137 375

Organizes and executes Information Assurance activities of the JITTC Programs Office. Administrator for JITTC Special Access Program Automated Information Systems. Implements the JITTC Special Acc...

SUPERVISORY INFORMATION TECHNOLOGY SPECIALIST (NETWORK) Feb 08 2024
$105 676 - 137 375

Plans, organizes, and directs the activities of 673 CS Network Transport Branch personnel, ensuring they comply with legal and regulatory requirements and meets customer needs. Exercises supervisor...

INFORMATION TECHNOLOGY SPECIALIST (SYSTEMS ANALYSIS) Dec 04 2024
$105 676 - 137 375

Serves as a senior systems analyst and advisor to the installation. Plans, organizes, coordinates, and manages acquisition of information technology (IT) assets. Serves as contracting officer repr...