Job opening: IT Specialist (ENTARCH)
Salary: $129 239 - 176 632 per year
Relocation: YES
Published at: Oct 21 2024
Employment Type: Full-time
DCSA's National Background Investigation System (NBIS) is looking for non-supervisory IT Specialist with a strong cybersecurity and DevSecOps background. The incumbent will provide support, guidance and expertise to ensure the implementation of secure computing architectures, Zero Trust principals, and automated DevSecOps tools. Performs a variety of duties that involve knowledge of a wide variety of IT applications, environments, and methods. Visit www.dcsa.mil - America's Gatekeeper!
Duties
The Office Under Secretary of Defense for Intelligence and Security established a Targeted Local Market Supplement (TLMS) for certain Science, Technology, Engineering, Mathematics, and Cyber positions within the Defense Civilian Intelligence Personnel System. Eligibility for the TLMS is based on cyber work roles within certain occupational series and on the work performed. This vacancy is designated as a STEM and/or Cyber position and pay for the incumbent will be based on the STEM and Cyber Pay Table.
As a IT Specialist (ENTARCH) you will be responsible for the following duties:
* Reviews and evaluates proposals affecting security architecture for NBIS initiatives.
* Develop/integrate cybersecurity designs for systems and networks with multilevel security requirements or requirements for the processing of multiple classification levels of data primarily applicable to government organizations (e.g., UNCLASSIFIED, SECRET, and TOP SECRET).
* Evaluates the maturity level of the NBIS security architecture / zero trust compliance and measures progress toward goals.
* Works with system owners and managers to ensure that each system is interoperable, integrated and configured to support the enterprise business and systems architectures.
* Designs, implements, and oversees automated development, security, and operations (DevSecOps) pipeline, architectures, tools, and concepts in a cloud native environment.
* Serves as a technical authority regarding the availability and maturity of technology for use in creating cloud constructs that enable more efficient, effective, and secure use of applications.
Requirements
- Must be a US citizen
- Selective Service Requirement: Males born after 12-31-59 must be registered for Selective Service. For more information http://www.sss.gov
- Resume and supporting documents received by 11:59PM EST will be considered
- This is a Drug Testing designated position
- Position is a (DCIPS) position in the Excepted Service under U.S.C. 1601
- Work Schedule: Full Time
- Overtime: Occasionally
- Tour of Duty: Flexible
- PCS (Permanent Change of Station): Authorized
- Fair Labor Standards Act (FLSA): Exempt
- Financial Disclosure: Not Required
- Telework Eligibility: This position is telework eligible, but is not a full time telework position. The incumbent will be required to report to the office on a routine basis.
- If selected, the incumbent must obtain and maintain appropriate security clearance as indicated in job announcement.
- In accordance with DoDD 8140.01/DoDI 8140.02, the position compliance requirement details are outlined in the Defense Cyber Workforce Annex.
- Any Information Technology/Security certifications / education specified in the DCWF Annex as defined by DoD 8140-M within six months of appointment date.
- The incumbent must sign a Statement of Understanding regarding the certification requirements and maintaining the appropriate certification is a condition of employment.
Qualifications
The experience described in your resume will be evaluated and screened from the Office of Personnel Management's (OPMs) basic qualifications requirements. https://www.opm.gov/policy-data-oversight/classification-qualifications/general-schedule-qualification-standards/0300/gs-2210-information-technology-management-series/ for OPM qualification standards, competencies and specialized experience needed to perform the duties of the position as described in the MAJOR DUTIES and QUALIFICATIONS sections of this announcement by 10/31/2024
Applicant must have directly applicable experience that demonstrates the possession of the knowledge, skills, abilities and competencies necessary for immediate success in the position. Qualifying experience may have been acquired in any public or private sector job, but will clearly demonstrate past experience in the application of the particular competencies/knowledge, skills and abilities necessary to successfully perform the duties of the position.
You must have specialized experience sufficient to demonstrate that you have acquired all the competencies necessary to perform at a level equivalent in difficulty, responsibility, and complexity to the next lower grade GS/GG-12 in the Federal service and are prepared to take on greater responsibility.
Generally, this would include one year or more of such specialized experience. Specialized experience for this position includes: Experience supporting Agile delivery methodologies to build secure information technology systems; experience using/managing tools to automate scans, code verification and other development security tasks; experience with automation of application security testing; experience with designing/engineering solutions compliant with security controls; experience designing/engineering appropriate technological mitigations and countermeasures; experience engineering a security architecture; experience with Continuous Integration Continuous Delivery (CI/CD); cloud experience, experience with zero trust and Zero Trust Architecture (ZTA).
Specifically you will be evaluated on the following competencies:
1. IT Cybersecurity Architecture: Designs, develops, and implements information systems security architecture and processes to ensure confidentiality, integrity, and availability.
2. Software Engineering: Knowledge of software engineering design and development methodologies, paradigms, and tools; the software life cycle; software reusability; and software reliability metrics.
3. Cybersecurity: Protect and defend information and information systems in order to ensure confidentiality, integrity, and availability. (AKA Information Assurance)
4. Risk Management Framework (RMF): Unified Information security framework for the entire federal government.
5. Systems Engineering: Knowledge of the practice of integrating multiple disciplines into a team as part of a structured development process throughout a system's life cycle.
Education
Substitution of education may not be used in lieu of specialized experience for this grade level.
Contacts
- Address Defense Counterintelligence and Security Agency
27130 Telegraph Road
Quantico, VA 22134
US
- Name: DCSA Servicing Team
- Phone: 614-692-2886
- Email: [email protected]