Job opening: Supervisory Information Technology Specialist (Security)
Salary: $99 200 - 185 930 per year
Published at: Jul 02 2024
Employment Type: Full-time
This position is located within the Information Technology Security Office (ITSO). As an IT Specialist (Security) within ITSO, the incumbent is a recognized IT security and strategic intelligence expert within the federal government with a strong background in cyber threat intelligence, strategic intelligence, and the intelligence planning process.
Duties
The incumbent of this position will collaborate across government and industry to support the federal judiciary and leverage national resources, the intelligence community, and private industry to defend against potential cyberattacks. The incumbent will function as the Cyber Threat Intelligence (CTI) Team Lead and will be responsible for promoting, developing, and updating threat profiles associated with the United States Federal Courts. The CTI Lead will lead and assist with the development of priority intelligence requirements, associated collection plans, and the development of relevant and actionable threat intelligence.
Duties of the position include, but are not limited to:
Performing a full range of supervisory responsibilities for the CTI federal staff in meeting the team's responsibilities.
Leading a team of federal and contract professionals in providing tactical, operational, and strategic intelligence services to the federal judiciary.
Leading projects for intelligence development or emerging cyber threat related that requires coordination with multiple groups of civilian, military, and contract personnel.
Developing and maintaining team procedures for daily tasks to ensure compliance with the appropriate judiciary policies.
Monitoring, researching, and developing products and briefings on cyber threats to the judiciary's critical assets to enable customers to develop new procedures and mitigation strategies in response to evolving threats.
Interpreting and assessing intelligence reports and other information to identify trends, linkages, and draw conclusions based on current and past cyber threat intelligence, and cyber incidents and attacks to advance ITSO's understanding of cyber threats to the judiciary and to inform the development of new standards and procedures.
Applying intelligence and analytic processes, standards, and tradecraft to perform and enhance analyses and identification of emerging cyber adversary tactics and threats to the judiciary.
Developing, maintaining, and updating judiciary intelligence requirements and collection plans.
Developing technical gap analyses for collection plans.
Developing finished cyber intelligence products that include timely technical assessments and recommendations.
Constructing link analysis graphs.
Developing mitigation strategies as required.
Developing and reviewing Threat Intelligence Reports.
Facilitating technical exchange meetings with partner government agencies and private industry.
Serving as the Contract Officer Representative (COR) for CTI tools, systems, and contractor support.
Providing weekly activity reports and contract monitoring reports as required.
Serving as a subject matter expert on cyber threats to the judiciary.
Advising and consulting stakeholders on the application of cyber intelligence to identify risks and/or enable mitigation strategies.
Coordinating and collaborating with federal, state, and local government partners and commercial vendors.
Ensuring a high-level of customer satisfaction.
Developing key performance metrics to measure and track CTI's operational effectiveness and efficiency.
Training and developing other cybersecurity and intelligence professionals within the federal judiciary on intelligence development, analytics, and collection techniques in accordance with industry standards, e.g., NIST Special Publication 800-181.
Performing the tasks and meeting the skills, knowledge and abilities as described in NIST Special Publication 800-181 National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce, NIST Special Publication 800-30 Risk Management Guide for IT Systems, NIST Special Publication 800-53 Recommended Security Controls for Federal Systems and Organizations, and NIST Special Publication 800-137 Information Security Continuous Monitoring for Federal Information Systems and Organizations.
Qualifications
Applicants must have demonstrated experience as listed below. This requirement is according to the AO Classification, Compensation, and Recruitment Systems which include interpretive guidance and reference to the OPM Operating Manual for Qualification Standards for General Schedule Positions.
Specialized Experience: Applicants must have at least one full year (52 weeks) of specialized experience which is in or directly related to the line of work of this position. Specialized experience is demonstrated experience in ALL of the following:
Extensive knowledge of Advanced Persistent Threats (APT) tactics, techniques, and procedures;
Understanding of possible attack activities such as network probing/scanning, DDOS, malicious code activity, etc.;
Understanding of basic networking protocols such as TCP/IP, DNS, HTTP; and
Understanding of basic adversary attack methodologies.
Desired but not required: The ideal candidate will possess at least one of the following IT Security certifications:
Certified Information Systems Security Professional (CISSP)
Certified Information Security Manager (CISM)
Certified Ethical Hacker (CEH)
Similar cybersecurity certification listed on my resume
Education
This position does not require education to qualify.
Contacts
- Address Department of Technology Services
One Columbus Circle, NE
Washington, DC 20544
US
- Name: Kymberli Camber
- Phone: (210) 301-6303
- Email: [email protected]
Map