Offutt AFB, NE, 68113, USA
3 days ago
IT SPECIALIST (INFOSEC)
Summary Click on "Learn more about this agency" button below to view Eligibilities being considered and other IMPORTANT information. This position is established specifically to provide developmental experience designed to broaden the skills and/or enhance the leadership perspective of an identified high-potential, mid-level manager/executive; it is not a continuing position and assignment duration is limited to 36 months. Responsibilities DUTY 1 In a Career Broadening capacity, provides technical guidance and activities to the J631. Develops and maintains working relationships with professional peers authorized to represent the Command's external program partners (e.g., DISA, NSA, Services, Gov't Agencies). DUTY 2 Serves as a Career Broadener, leads and personally contributes expertise to preliminary analyses of issues concerning the J63 operations and to conduct direct defensive cyber operations across the command. Advises the J6 as to what team and other specialized SME resources should be leveraged to provide in-depth assessment of issues identified as requiring high priority. DUTY 3 In a Career Broadening capacity, serves as a lead technical oversight of command proactive defensive cyber operations. Drives the development of long- and short-term plans and policies for the Network Threat Response, Vulnerability Management, and Cyber Threat Analysis teams IAW all relevant policies and guidance. DUTY 4 As a Career Broadener, serves as a technical and subject matter expert and principal advisor. Serves as a principal staff advisor on a wide-range of cyber threat and vulnerability topics affecting USSTRATCOM and/or the DoD. Requirements Conditions of Employment Qualifications In order to qualify, you must meet the specialized experience requirements described in the Office of Personnel Management (OPM) Qualification Standards for General Schedule Positions. Specialized Experience: Experience that demonstrated accomplishment of computer project assignments that required a wide range of knowledge of computer requirements and techniques pertinent to the position to be filled. This knowledge is generally demonstrated by assignments where the applicant analyzed a number of alternative approaches in the process of advising management concerning major aspects of ADP system design, such as what system interrelationships must be considered, or what operating mode, system software, and/or equipment configuration is most appropriate for a given project. FEDERAL TIME-IN-GRADE (TIG) REQUIREMENT FOR GENERAL SCHEDULE (GS) POSITIONS: Applicants must have served at least 52 weeks at the GS-13 or higher grade (or equivalent in an alternate pay system) within the Federal Civil Service to be considered for referral. TIG applies if you are in a current GS position or held a GS position within the previous 52 weeks. KNOWLEDGE, SKILLS AND ABILITIES (KSAs): Your qualifications will be evaluated on the basis of your level of knowledge, skills, abilities and/or competencies in the following areas: 1. Knowledge of a full range of IT and cybersecurity principles, concepts, and methods as well as risk management processes (e.g., methods for assessing and mitigating risk), specific operational impacts of cybersecurity lapses and their application to the organization's core mission processes, and emerging technologies that have potential for exploitation by adversaries sufficient to provide expert technical advice to management on a wide range of complex IT issues, to manage the evaluation of risks and vulnerabilities, to oversee the development of mitigating improvements, and to manage the dissemination of IT security tools and procedures. 2. Knowledge of computer networking concepts and protocols (e.g., TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services); network security methodologies and architecture concepts including topology, components, and principles (e.g., application of defense-in depth); and related computer disciplines such as systems, communication lines, intrusion detection systems, firewalls, and routers as they relate to computer network defense (CND) operations and environments. 3. Knowledge of cyber threats, vulnerabilities, and attack methodologies and stages (e.g., foot printing and scanning, enumeration, gaining access, escalation or privileges, maintaining access, network exploitation, covering tracks); threat types and capabilities; different classes of attacks (e.g., passive, active, insider, close-in, distribution); and system and application threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, and malicious code). 4. Knowledge of complex cyber forensics, cyber threat, and intrusion detection concepts, disciplines, methodologies, and techniques for detecting host and network-based intrusions via intrusion detection technologies sufficient to oversee the development of countermeasures to classified and unclassified computer network and system attacks. 5. Knowledge of advanced incident management, analysis, and response concepts and procedures; incident categories, incident responses, and timelines for responses; incident response and handling methodologies; and computer security incident response processes including countermeasure mitigation strategies, malware analysis, network traffic analysis, and network system analysis/forensics. 6. Knowledge of vulnerability management processes and procedures; vulnerability categories, responses, and timelines for response; as well as computer network defense and vulnerability assessment tools (commercial and open source) and their capabilities, network traffic analysis tools, identification and authentication technologies, Security Information and Event Management (SIEM) tools, firewalls, malicious code identification tools, intrusion detection/prevention tools, proxies, email security filters, and vulnerability scanning tools among other technologies designed to protect systems and networks. 7. Skill in conducting technical and non-technical risk and vulnerability assessments, in administering and utilizing vulnerability scanning tools to protect systems and networks; in using network analysis tools to identify vulnerabilities; and in recognizing and categorizing types of vulnerabilities and associated attacks. 8. Ability to communicate effectively, clearly, interpret, implement, and apply Federal cybersecurity and cyber defense laws, policies, regulations, procedures, standards, and compliance measures to command information systems and to the development of policy, plans, and strategies in support of cyber activities and the DoD Information Network (DODIN) security posture. Education Additional Information PCS restrictions: An employee selected to make a PCS to a Career Broadening assignment is restricted from making a second PCS for 12 months Defense National Relocation Program is Authorized Direct Deposit: All federal employees are required to have direct deposit. Incentives: Recruitment and/or retention incentives may not be used. Disabled veteran leave is available to a Federal employee hired on/after 5 Nov 2016, who is a veteran with a service-connected disability rating of 30% or more. For more information, click here. If you have questions regarding this announcement and have hearing or speech difficulties click here. Tax Law Impact for PCS: On 22-Dec-2017, Public Law 115-97 - the "Tax Cuts and Jobs Act of 2017" suspended qualified moving expense deductions along with the exclusion for employer reimbursements and payments of moving expenses effective 01-Jan-2018 for tax years 2018 through 2025. The law made taxable certain reimbursements and other payments, including driving mileage, airfare and lodging expenses, en-route travel to the new duty station, and temporary storage of those items. The Federal Travel Regulation Bulletin (FTR) 18-05 issued by General Services Administration (GSA) has authorized agencies to use the Withholding Tax Allowance (WTA) and Relocation Income Tax Allowance (RITA) to pay for "substantially all" of the increased tax liability resulting from the "2018 Tax Cuts and Jobs Act" for certain eligible individuals. For additional information on WTA/RITA allowances and eligibilities please click here. Subsequently, FTR Bulletin 20-04 issued by GSA, provides further information regarding NDAA FY2020, Public Law 116-92, and the expansion of eligibility beyond "transferred" for WTA/RITA allowances. For additional information, please click here.
Confirm your E-mail: Send Email