Job opening: SUPERVISORY IT SPECIALIST (INFOSEC)
Salary: $129 709 - 168 624 per year
Published at: Nov 29 2024
Employment Type: Full-time
Click on "Learn more about this agency" button below for IMPORTANT additional information.
The primary purpose of this position is to serve as the Cyber Defense Branch Chief exercising supervisory and managerial authorities over a staff composed of a highly technical staff of IT experts.
U.S. Strategic Command (USSTRATCOM), C4 Systems Directorate (J6), IT Operations Division (J63), Cyber Defense Branch (J631), Offutt AFB, NE.
Duties
Plans, organizes, and oversees the activities of the Cyber Defense Branch.
Exercises supervisory personnel management responsibilities.
Serves as the technical lead of command proactive defensive cyber operations.
Serves as a technical and subject matter expert and principal advisor.
Requirements
- U.S. Citizenship Required
- All new CES employees are required to complete a three-year CES trial period
- Must be able to obtain and maintain a Top Secret clearance with access to Sensitive Compartmented Information
(SCI).
- If authorized, PCS will be paid IAW JTR and AF Regulations. If receiving an authorized PCS, you may be subject to completing/signing a CONUS agreement. More information on PCS requirements, may be found at: https://afciviliancareers.com/regulatory/
- This posn is subject to provisions of the DoD Priority Placement Program
- Must be registered for Selective Service, see Legal and Regulatory Guide
- This position has been designated by the Air Force as a Testing Designated Position (TDP) under the Air Force
Civilian Drug Demand Reduction Program. Employee must pass initial and periodic short notice drug testing.
- Illegal drug use by employees in sensitive positions presents a clear threat to the mission of the Air Force, national security, and public safety.
- Work may occasionally require travel away from the normal duty station on military or commercial
aircraft/vehicle to conferences, meetings, or functions away from the duty office/location. Travel may include
overnight stays.
- May occasionally be required to work other than normal duty hours and/or Shift work may be required which
may include overtime and/or irregular hours.
- Disclosure of Political Appointments
- The duties of this position meet all requirements as a category 4 designation, and shall not be vacated during a
national emergency or mobilization without seriously impairing the capability of the parent Federal Agency.
- Office to function effectively. This position must be removed from the Ready Reserve and cannot become a member of the Ready Reserve. (IAW: DoDD 1200.7, "Screening the Ready Reserve,")
- Cyberspace Qualification is a condition of employment. This position includes Cyberspace work as a paramount
duty requirement. Per DoDM 8140.03, para 4.2.a.(2).
- Requires foundational qualification requirements within 9 months of assignment to a cyberspace work role and resident qualification requirements within 12 months of assignment to a cyberspace work role.
- A waiver of these requirements may be granted per DoDM 8140.03. Failure to achieve and maintain the proper Cyberspace Qualification may result in removal from this position.
- This is a Mission-Essential position performing a Mission-Critical-Function which must continue uninterrupted
after the occurrence of an emergency and continued through full resumption of all functions.
Qualifications
This is a GG-14 position in the Cyber Excepted Service (CES). The GG-14 duties for the "Supervision and Management" work category are at the "Senior" work level and are equivalent to those at the GS-14 level. The selectee's salary will be set within the grade equivalent to a GS/GG grade based on the selectee's qualifications in relation to the job.
In order to qualify, you must meet the experience requirements described in the Office of Personnel Management (OPM) Qualification Standards for Individual Occupational Requirements for Information Technology (IT) Management Series, 2210 (Alternative A)
BASIC REQUIREMENT OR INDIVIDUAL OCCUPATIONAL REQUIREMENT:
The employing agency is responsible for identifying the specific level of proficiency required for each competency at each grade level based on the requirements of the position being filled.
Attention to Detail - Is thorough when performing work and conscientious about attending to detail.
Customer Service - Works with clients and customers (that is, any individuals who use or receive the services or products that your work unit produces, including the general public, individuals who work in the agency, other agencies, or organizations outside the Government) to assess their needs, provide information or assistance, resolve their problems, or satisfy their expectations; knows about available products and services; is committed to providing quality products and services.
Oral Communication - Expresses information (for example, ideas or facts) to individuals or groups effectively, taking into account the audience and nature of the information (for example, technical, sensitive, controversial); makes clear and convincing oral presentations; listens to others, attends to nonverbal cues, and responds appropriately.
Problem Solving - Identifies problems; determines accuracy and relevance of information; uses sound judgment to generate and evaluate alternatives, and to make recommendations.
In addition to meeting the basic requirement above, to qualify for this position you must also meet the qualification requirements listed below:
EXPERIENCE REQUIRED: Your resume must reflect the quality level of experience which demonstrates the possession of the knowledge, skills, abilities, and competencies necessary for successful job performance required for this position. Examples of creditable experience include: The position oversees the development of new technical advances in proactive defensive cyber operations where legislative guidance and organizational responsibilities are not yet fully defined, and where applicable technology is
evolving at a rapid rate. Precedents are often lacking, considering the constantly changing nature of cyber threats and the ever-changing composition of DoD networks and capabilities. Note: Creditable experience may include previous military experience, experience gained in the private sector, or experience gained in another government agency.
KNOWLEDGE, SKILLS AND ABILITIES (KSAs): Your qualifications will be evaluated on the basis of your level of knowledge, skills, abilities and/or competencies in the following areas:
1. Knowledge of a full range of IT and cybersecurity principles, concepts, and methods as well as risk management processes (e.g., methods for assessing and mitigating risk), specific operational impacts of cybersecurity lapses and their application to the organization's core mission processes, and emerging technologies that have potential for exploitation by adversaries sufficient to provide expert technical advice to management on a wide range of complex IT issues, to manage the evaluation of risks and vulnerabilities, to oversee the development of mitigating improvements, and to manage the dissemination of IT security tools and procedures. Ability to interpret, implement, and apply Federal cybersecurity and cyber defense laws, policies, regulations, procedures, standards, and compliance measures to command information systems and to the development of policy, plans, and strategies in support of cyber activities and the DoD Information Network (DODIN) security posture.
2. Knowledge of computer networking concepts and protocols (e.g., TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services); network security methodologies and architecture concepts including topology, components, and principles (e.g., application of defense-in-depth); and related computer disciplines such as systems, communication lines, intrusion detection systems, firewalls, and routers as they relate to computer network defense (CND) operations and environments. Skill in conducting technical and non-technical risk and vulnerability assessments, in administering and utilizing
vulnerability scanning tools to protect systems and networks; in using network analysis tools to identify
vulnerabilities; and in recognizing and categorizing types of vulnerabilities and associated attacks
3. Knowledge of cyber threats, vulnerabilities, and attack methodologies and stages (e.g., foot printing and
scanning, enumeration, gaining access, escalation or privileges, maintaining access, network exploitation, covering tracks); threat types and capabilities; different classes of attacks (e.g., passive, active, insider, close-in, distribution); and system and application threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, and malicious code).
4. Knowledge of complex cyber forensics, cyber threat, and intrusion detection concepts, disciplines,
methodologies, and techniques for detecting host and network-based intrusions via intrusion detection technologies sufficient to oversee the development of countermeasures to classified and unclassified computer network and system attacks. Knowledge of safety and security regulations, practices, and procedures.
5. Knowledge of advanced incident management, analysis, and response concepts and procedures; incident categories, incident responses, and timelines for responses; incident response and handling methodologies; and computer security incident response processes including countermeasure mitigation strategies, malware analysis, network traffic analysis, and network system analysis/forensics. Ability to communicate effectively, clearly, and concisely sufficient to convey complex technical information to
varying audiences using verbal, visual, and written communication methods.
6. Knowledge of vulnerability management processes and procedures; vulnerability categories, responses, and timelines for response; as well as computer network defense and vulnerability assessment tools (commercial and open source) and their capabilities, network traffic analysis tools, identification and authentication technologies, Security Information and Event Management (SIEM) tools, firewalls, malicious code identification tools, intrusion detection/prevention tools, proxies, email security filters, and vulnerability scanning tools among other technologies designed to protect systems and networks. Ability to plan, organize, and direct the functions and staff of a small organizational segment through subordinate supervisors.
Education
PART-TIME OR UNPAID EXPERIENCE: Credit will be given for appropriate unpaid and or part-time work. You must clearly identify the duties and responsibilities in each position held and the total number of hours per week.
VOLUNTEER WORK EXPERIENCE: Refers to paid and unpaid experience, including volunteer work done through National Service Programs (i.e., Peace Corps, AmeriCorps) and other organizations (e.g., professional; philanthropic; religious; spiritual; community; student and social). Volunteer work helps build critical competencies, knowledge and skills that can provide valuable training and experience that translates directly to paid employment. You will receive credit for all qualifying experience, including volunteer experience.
Contacts
- Address Cyber Excepted Service
550 C Street W
JBSA Randolph AFB, TX 78150
US
- Name: Total Force Service Center
- Phone: 1-800-525-0102
- Email: [email protected]
Map