Over 1 Million Paying Vacancies Available. Discover Your Dream Vacancy with Us!

Are you looking for a Intelligence Specialist (Operations)? We suggest you consider a direct vacancy at U.S. Army Intelligence and Security Command in Fort Eisenhower. The page displays the terms, salary level, and employer contacts U.S. Army Intelligence and Security Command person

Job opening: Intelligence Specialist (Operations)

Salary: $142 517 - 185 277 per year
Relocation: YES
Published at: Jul 25 2024
Employment Type: Full-time
About the Position: This position is in the Defense Civilian Intelligence Personnel System (DCIPS). Employees occupying DCIPS positions are in the Excepted Service and must adhere to U.S. Code, Title 10, as well as Department of Defense Instruction 1400.25. This position is with the 780th780th MI BDE executing research and development of technologies and capabilities in support of Joint Warfighter and National requirements in support of Cyberspace capabilities.

Duties

Conducting specialized research and developing software and/or hardware used in direct support of Army and DoD requirements Performing code and systems analysis of malicious software and hardware technologies in support of operations and development of new and existing Computer Network Operations (CNO) applications Creating unique systems and software to grow the Army and DoD Computer Network Operations (CNO) capabilities Testing and supporting software/hardware based on technical design specifications Writing and performing technical and informational briefings in support of mission priorities Reviewing message traffic, intelligence information, data analysis, and identifying intelligence gaps to assist in developing operational programs

Requirements

  • Appointment may be subject to a suitability or fitness determination, as determined by a completed background investigation.
  • Two year trial/probationary period may be required.
  • In accordance with Change 3 to AR 600-85, Alcohol and Drug Abuse Prevention and Control Program, individual must successfully pass a urinalysis screening for illegal drug use prior to appointment and periodically thereafter.
  • Must be willing to undergo and successfully complete a counterintelligence-scope polygraph examination with No Deception Indicated (NDI) on a pre-appointment and periodic basis.
  • Must be able to obtain and maintain a TOP SECRET security clearance based on a Single-Scope Background Investigation (SSBI) with eligibility for Sensitive Compartmented Information (SCI).
  • Must be able to obtain and maintain access to National Security Agency (NSA) facilities and networks.
  • Temporary duty (TDY) travel may be required 25% or less.
  • All INSCOM employees may be subject to extended TDY or worldwide deployments during crisis situations to perform mission essential functions as determined by management.
  • Stress is inherent in the nature of work. Short-suspense actions and pressures of time contribute to heightened demands. May be subject to short notice expanded hours, possible recall situations, and irregular work hours, including weekends/holidays.
  • Overtime/shift work may be required.

Qualifications

Who May Apply: Only applicants who meet one of the employment authority categories below are eligible to apply for this job. You will be asked to identify which category or categories you meet, and to provide documents which prove you meet the category or categories you selected. See Proof of Eligibility for an extensive list of document requirements for all employment authorities. 10-Point Other Veterans’ Rating30 Percent or More Disabled Veterans5-Point Veterans' PreferenceCurrent Army Defense Civilian Intelligence Personnel System (DCIPS) EmployeeCurrent Department of Army Civilian EmployeesCurrent Department of Defense (DOD) Civilian Employee (non-Army)Current DoD Defense Civilian Intelligence Personnel System (DCIPS) Employee (non-Army)Defense Civilian Intelligence Personnel System (DCIPS) Interchange AgreementDisabled Veteran w/ a Service-Connected Disability, More than 10%, Less than 30%Non-Department of Defense (DoD) TransferPrior Federal Service EmployeePriority Placement Program, DoD Military Reserve (MR) and National Guard (NG) Technician EligiblePriority Placement Program, DoD MR and NG Preference Eligible Tech Receiving Disability RetirementPriority Placement Program, DoD Retained Grade Preference EligibleUnited States Citizen Applying to a DCIPS Position Army DCIPS positions apply Veteran's Preference to preference eligible candidates as defined by Section 2108 of Title 5 U.S.C., in accordance with the procedures provided in DoD Instruction 1400.25, Volume 2005, DCIPS Employment and Placement. In order to qualify, you must meet the experience requirements described below. Experience refers to paid and unpaid experience, including volunteer work done through National Service programs (e.g., Peace Corps, AmeriCorps) and other organizations (e.g., professional; philanthropic; religious; spiritual; community; student; social). You will receive credit for all qualifying experience, including volunteer experience. Your resume must clearly describe your relevant experience. To qualify based on your experience, your resume must describe at least one (1) year of experience which prepared you to do the work in this job. Specialized experience is defined as experience developing and coordinating the development of software to create unique capabilities to execute Signals Intelligence (SIGINT), Computer Network Exploitation (CNE), and/or full-spectrum cyberspace operations which has included software engineering, test and evaluation, and related research and analysis. This definition of specialized experience is typical of work performed at the next lower grade/level in the federal service (GG/GS-12). Progressively responsible experience is that which has included intelligence-related research, analysis, collections and /or operations. This experience should have included intelligence analysis and/or production, intelligence collection and/or operations, counterintelligence, or threat support directly related to the position to be filled. This experience should demonstrate: Knowledge of intelligence processes, cycle and organizations; Knowledge of and/or ability to use research tools such as library holdings, photographs, statistics, graphics and maps; Knowledge of the systems, procedures and methods of analyzing, compiling, reporting and disseminating intelligence data; and/or Knowledge of organization(s) for and methods of collecting and analyzing intelligence data. You will be evaluated on the basis of your level of competency in the following areas: PartneringSoftware DevelopmentSoftware Testing and Evaluation

Education

This job does not have an education qualification requirement.

Contacts

  • Address ST-IC-W0K0AA 780TH MI BDE OPS SPT ELEMENT DO NOT MAIL Fort Huachuca, AZ 85613 US
  • Name: Army Applicant Help Desk

Map

Similar vacancies

Supervisory Intelligence Specialist (Operations) Aug 09 2023
$156 856 - 183 500

Applying emerging technology trends to the development of cutting-edge offensive and defensive cyber capabilities Performing malware analysis, reverse engi...

Supervisory Intelligence Specialist (Staff Management) Apr 12 2024
$143 736 - 186 854

Managing Counterintelligence (CI) and Human Intelligence (HUMINT) programs, collection, and exploitation efforts and requirements. Providing oversight and t...

Intelligence Specialist (Cyber) Sep 25 2024
$142 517 - 191 900

Serves as a senior Exploitation Analyst (EA) and subject matter expert for the 780th MI BDE, 782d MI BN, Cyber. Responsible for planning and coordinating te...

Intelligence Specialist (Cyber) Oct 11 2024
$142 517 - 191 900

Serves as a senior Exploitation Analyst (EA) and subject matter expert for the 780th MI BDE, 782d MI BN, Cyber. Responsible for planning and coordinating te...

Supervisory Intelligence Specialist (Operations) Sep 19 2024
$122 198 - 158 860

Using expertise of digital network intelligence and Signals intelligence (SIGINT)/Computer Network Exploitation (CNE) to identify foreign computer network vulnerabilities. ...