Job opening: Supervisory Information Technology Specialist (Security)
Salary: $117 962 - 191 900 per year
Published at: Dec 13 2024
Employment Type: Full-time
This position is located within the Security Operations Division of the Information Technology Security Office (ITSO). The incumbent will function as the Incident Response Branch (IRB) Chief and will be responsible for preparation, analysis containment, eradication, recovery, and post incident activity associated with enterprise cyber security incident.
Duties
The incumbent of this position leads the incident response activities of the Security Operations Center and leverages digital forensics, malware analysis and other Tier 3 investigative and response capabilities to analyze, contain and eradicate cyber threats affecting the Federal Judiciary. The IRB Chief is the incident commander that directs and allocates resources and staff to respond to any security incidents, and liaises with law enforcement, court units and other AO program offices to obtain the appropriate support and expertise to eliminate threats. The candidate will provide subject matter expertise and operational support to the Security Operation Center's 24/7 continuous monitoring and incident response operations and facilitate the implementation of Defensive Cyber Operations - Internal Defensive Measures (DCO-IDM) as necessary to contain and remove malicious threats, as well as assist impacted organizations with recovery to full operational status.
Duties of the position include, but are not limited to:
Directing the day-to-day operations of an incident response team consisting of federal and contract resources.
Functioning as an incident commander for enterprise security incidents.
Determining and objectively validating incident impact based on availability, observed activity, location of activity, and sensitivity of data.
Directing the preparation, testing, and execution of incident response (IR) playbooks.
Identifying the scope of forensic investigations, ensuring appropriate reporting and documentation.
Participating in the development of executive summaries of security incidents, and briefs to executives and customers.
Developing performance work statements for IR service contracts.
Defining, surveilling, monitoring, and reporting on acceptable quality levels of contracted support vendors.
Functioning as a Contracting Officer Representative (COR) II for service contracts.
Identifying the unique requirements associated with cloud-based IR for applications developed and maintained by third parties.
Defining security monitoring use cases in collaboration with stakeholders.
Engaging stakeholders in review of the Judiciary Security Operations Center (JSOC) Incident Response Plan.
Developing and conducting tabletop IR exercises.
Directing After-Action Reporting and Analysis for each major security incident.
Recruiting and developing a diverse base of IR professionals.
Developing technical webinars that advance and share technical knowledge exchange with other teams in the Security Operations Division
Providing monthly summaries of incidents, including metrics and trending to enable proactive hunt and tuning of cyber tools.
Defining and forecasting the hardware and software needs of the branch.
Making recommendations for improving threat detection efficacy.
Operating with exceptional customer focus with attention to detail and bias for action.
Managing competing priorities in dynamic, fast-paced enterprise environment.
Performing Supervisory functions for a team of government personnel.
Qualifications
Applicants must have demonstrated experience as listed below. This requirement is according to the AO Classification, Compensation, and Recruitment Systems which include interpretive guidance and reference to the OPM Operating Manual for Qualification Standards for General Schedule Positions.
Specialized Experience: Applicants must have at least one full year (52 weeks) of specialized experience which is in or directly related to the line of work of this position. Specialized experience is demonstrated hands on experience leading threat detection and incident response activities to detect and remove potentially malicious cyber actors from organizational IT environments.
Desired, but not required: Applicants with the following certificates are highly desirable:
Offensive Security Certified Professional (OSCP)
GIAC Reverse Engineering Malware (GREM)
GIAC Exploit Researcher and Advanced Penetration Tester (GXPN)
Education
This position does not require education to qualify.
Contacts
- Address Department of Technology Services
One Columbus Circle, NE
Washington, DC 20544
US
- Name: Frances Arthur
- Phone: 2103016304
- Email: [email protected]
Map