Job opening: IT CYBERSECURITY SPECIALIST (INFOSEC)
Salary: $117 962 - 153 354 per year
Relocation: YES
Published at: May 22 2024
Employment Type: Full-time
Click on "Learn more about this agency" button below to view Eligibilities being considered and other IMPORTANT information.
The primary purpose of this position is to serve as the Branch Chief of the Tactical Operations Branch (TACOPS), under the Analytics Division (AD), within the DoD Defense Industrial Base (DIB) Collaborative Information Sharing Environment (DCISE).
Duties
Branch Chief, Tactical Operations Branch (TACOPS). The TACOPS Branch Chief is an experienced Information Security (INFOSEC) professional.
Cyber Threat Analyses and Investigations. As the TACOPS Branch Chief, the incumbent provides their knowledge and guidance for investigating and analyzing the most complex issues that arise, including those that set new precedents for the branches and the analytical community.
Documentation of Threat Analyses. Compiles this information in various classified and unclassified forms.
Performs supervisory personnel management responsibilities for the TACOPS Branch.
As appropriate, proactively shares information derived from threat analyses with colleagues throughout DCISE, DC3, and other DoD/USG cyber elements.
Requirements
- U.S. Citizenship Required
- Males must be registered for Selective Service, see www.sss.gov
- If authorized, PCS will be paid IAW JTR and AF Regulations. If receiving an authorized PCS, you may be subject to completing/signing a CONUS agreement. More information on PCS requirements, may be found at: https://afciviliancareers.com/regulatory/
- This position is subject to provisions of the DoD Priority Placement Program
- Disclosure of Political Appointments
- Advance in hire may be authorized if there is demonstrable proof provided on your resume
- Leave accrual may be authorized upon request
- Position is Centrally Managed; DNRP is authorized.
- The position is designated Critical-Sensitive, and the employee must be able to obtain and maintain a Top Secret (TS) security clearance. A non-disclosure agreement must be signed.
- This position has been designated by the Air Force as a Testing Designated Position (TDP) under the Air Force Civilian Drug Testing Program.
- Illegal drug use by employees in sensitive positions presents a clear threat to the mission of the Air Force, national security, and public safety.
- Therefore, the incumbent is required to: (a) refrain from the use of illegal drugs, and (b) if requested, submit to urinalysis testing.
- The incumbent may be selected for random drug testing and may be subject to reasonable suspicion testing and safety mishap or accident testing.
- Incumbent is required to satisfactorily complete the appropriate training and obtain the required certification/recertification for this position as outlined in DoD Publication 8570.01-M...
- ... Information Assurance Workforce Improvement Program, dated 19 December 2005 (incorporating Change 4, 11 Oct 2015)
- The incumbent will be required to be available for other than normal duty hours, to include weekends, to support exercises and crisis response.
- TDY will be required. The incumbent may be required to travel by military and/or commercial aircraft in the performance of assigned tasks.
Qualifications
In order to qualify, you must meet the requirements described in the Office of Personnel Management (OPM) Qualification Standards for General Schedule Positions, Information Technology (IT) Management Series, GS-2210 (Alternate A). https://www.opm.gov/policy-data-oversight/classification-qualifications/general-schedule-qualification-standards/2200/information-technology-it-management-series-2210-alternative-a/???
Experience: Must have IT-related experience demonstrating each of the four competencies listed below: Attention to Detail, Customer Service, Oral Communication, and Problem Solving AND one year of specialized experience at the next lower grade GS-12 (or equivalent in other pay systems) which includes experience in applying INFOSEC and analytical concepts, practices and tools to the analysis of intrusions on classified/unclassified computer networks, application of project planning and management concepts and methods to lead broad-based technical analyses requiring the collaborative effort of various technical and intelligence SMEs. Ability to document and communicate the scope and objectives of cyber incident analyses, define roles and responsibilities of contributing analysts to ensure full coverage of scope, facilitate project team members' activities, and assess interim findings and work products to determine adequacy and the effects of this improved understanding on project approaches. Ability to communicate complex technical and programmatic information relevant to cyber threats.
FEDERAL TIME-IN-GRADE (TIG) REQUIREMENT FOR GENERAL SCHEDULE (GS) POSITIONS: Merit promotion applicants must meet applicable time-in-grade requirements to be considered eligible. One year at the GS-12 level is required to meet the time-in-grade requirements for the GS-13 level. TIG applies if you are in a current GS position or held a GS position within the previous 52 weeks. NOTE: Applicants applying as VEOA candidates who are current GS civil service employees or are prior GS civil service employees within the past 52 weeks must also meet time-in-grade requirements.
KNOWLEDGE, SKILLS AND ABILITIES (KSAs): Your qualifications will be evaluated on the basis of your level of knowledge, skills, abilities and/or competencies in the following areas:
Experience in application of Information Security (INFOSEC) concepts, practices, and tools to the analysis of intrusions on unclassified computer networks, including identification of threat actors, mechanism employed and targeting patterns.
Knowledge of the full range of principles and concepts of intelligence collection, analysis, evaluation, interpretation, and dissemination of information.
Experience in computer incident response, and/or cyber threat analysis, which demonstrates understanding of information required by other INFOSEC specialists to define appropriate and effective tactics, techniques and procedures (TTPs) to counter and mitigate the effects of identified threats to computer system security and integrity.
Experience performing technical analyses involving cyber intrusions and exploitation of data from compromised systems, evaluating malicious code, documenting unusual files and data, and identifying TTPs used by adversaries to gain access.
Ability to work collaboratively with other cyberspace technical subject matter experts (SMEs) and intelligence analysts to evaluate and integrate data derived from reports of intrusions to classified and unclassified computer networks and systems.
Ability to serve as a team leader, including skill in application of project planning and management concepts and methods to lead broad-based technical analyses requiring the collaborative effort of various SMEs. Ability to communicate complex technical and programmatic information, often in the form of verbal and visual operational updates, situation reports and briefings.
PART-TIME OR UNPAID EXPERIENCE: Credit will be given for appropriate unpaid and or part-time work. You must clearly identify the duties and responsibilities in each position held and the total number of hours per week.
VOLUNTEER WORK EXPERIENCE: Refers to paid and unpaid experience, including volunteer work done through National Service Programs (i.e., Peace Corps, AmeriCorps) and other organizations (e.g., professional; philanthropic; religious; spiritual; community; student and social). Volunteer work helps build critical competencies, knowledge and skills that can provide valuable training and experience that translates directly to paid employment. You will receive credit for all qualifying experience, including volunteer experience.
Education
This job does not have an education qualification requirement.
Contacts
- Address DoD Cyber Crime Center - DC3 - Pentagon
1720 Air Force Pentagon
Washington, DC 20330
US
- Name: Total Force Service Center
- Phone: 1-800-525-0102
- Email: [email protected]
Map