IT SPECIALIST (INFOSEC/NETWORK) Government - Horsham, PA at Geebo

IT SPECIALIST (INFOSEC/NETWORK)

As an IT SPECIALIST (INFOSEC/NETWORK), GS-2210-11, you will perform cyberspace operations that protect and defend (or assess the capability to protect and defend) information and information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation. Evaluate and assess vulnerabilities of customer network and application server hardware, operating systems, and peripheral network equipment such as routers, bridges, switches, attached cabling system, network interface cards, modems, multiplexers, and concentrators. Hunt for and illuminate advanced persistent threats in DOD Cyber systems and protects priority DOD missions for a specified duration. Perform analysis and design of automated and manual systems related to the network. Provides data for intrusion detection analysis. Replicate tactics, techniques and procedures of specific cyber threats as appropriate to evaluate cyber defenses and prepare DOD defensive cyber operations. Conduct cyber key terrain analysis and mission-oriented mapping, identifying cyber dependencies in mission owner network. Assess and evaluate vulnerabilities and/or adversary activity in industrial control system (ICS) enclaves. Detects, characterizes, and resolves insecurities in ICS networks. Prepare Unit Training Assembly, Annual Training and currency training events for Mission Ready Cyberspace Operators and is prepared for events in order to optimize training time available. Monitors assigned military members' go-no-go readiness status and ensures deficiencies are recognized. Consult with supervisors, Drill Status Guardsmen, specialists, vendors, and sister Cyberspace Operations Units to procure and maintain training range devices and software that realistically emulate mission networks which are flexibly re-configurable to emulate as needed to prepare for Cyber Protection and Industrial Control System defense missions. Perform other duties as assigned. As an IT SPECIALIST (INFOSEC/NETWORK), GS-2210-12, you will perform for, maintain for, and execute an advanced role in Cyberspace Operations. Develop tactical objectives and/or tactical taskings for a team of Cyber Operators. Direct tactical execaution for a team of Cyberspace Operators. Represent the unit's capability, availability, and interests high-level Operational Planning Team (OPT) meetings to define the mission, environment, enemy, effects, capabilities, overall plan, phasing, operational agreements and contingencies needed to conduct the operation or exercise. Assess and evaluate vulnerabilities, and and/or adversary activity in Industrial Control Systems (ICS) enclaves. Maintain Air Force currency and additional national-level requirements to execute US Cyber Command's Defend-the-Nation priority. Prepare Unit Training Assembly, Annual Training and currency training events for Mission Ready Cyberspace Operators to optimize training time available. Conduct extensive research of new vulnerabilities and insecurities discovered in operating discovered in operating systems, application software, infrastructure and boundary protection devices. Conduct extensive research of tools currently being used to attack or gain unauthorized access to information networks. Perform other duties as assigned. TEMPORARY PROMOTION/REASSIGNMENT:
Currently employed permanent technician selected will occupy this position as a Promotion not to exceed or Reassignment as appropriate in their present status. INDEFINITE:
Indefinite employment status pertains to applicant nominated, who are not a currently employed permanent technician. Indefinite appointments may acquire permanent status depending upon future force structure requirements; indefinite appointments do not serve a trial period. Indefinite appointments may be separated when their services are no longer needed or when funding is no longer available via a 30-day termination notice. APPOINTMENT STATUS:
EXCEPTED This is a Dual Status Excepted Service Technician position in the Pennsylvania Air National Guard. AREA OF CONSIDERATION:
Bargaining Position Category 1:
Qualified, currently employed Title 32 Federal Technicians working at the location specified in the job announcement. Category 2:
Qualified, currently employed Title 32 Federal Technicians of the Pennsylvania National Guard. (Army and/or Air) Category 3:
Qualified, currently employed Federal Employees (T5) or Federal Technicians (T32) within the Pennsylvania National Guard (Army and/or Air). Category 4:
Qualified current members of the Pennsylvania National Guard. (Army and/or Air) Military Grades:
ENLISTED E1-E9 Supervisor for this position is Maj Love Manpower # 1059947 Other Requirements:
NOTE:
Accessioning into this position is contingent upon verification of TOP Secret Security Clearance GENERAL
Experience:
All series personnel must be certified at the next higher level before being eligible for that level and must have a minimum of one year on-the-job experience in the grade immediately below the next higher level. An applicant must have a validated understanding of the basic principles and concepts of the occupational series and grade. SPECIALIZED EXPERIENCE GS-11:
Applicant must indicate at least 12 months experience as a Cyberspace Operator. Experienced in the work at an acceptable level of expertise for the preparation and execution of tasked unit missions. Experiences included preparing, maintaining currency for, and executing an advanced role in Cyberspace Operations. Knowledgeable of systems security principles and concepts of emerging Information Technology (IT) security developments. Experiences included duties directed within the infrastructure protection environment and the selection of appropriate tools for team members. Experienced in the methodologies for determining the better techniques needed to secure computer systems and to protect cyber key terrains from exploitation of information within these cyberspace systems. Experiences included the ability to leverage knowledge of multiple entities with a stake in current operations to plan and build appropriate courses of action and training scenarios. SPECIALIZED EXPERIENCE GS-12:
Applicant must indicate at least 24 months experience as a fully qualified Cyberspace Operator. Experienced in the work at a high level of expertise for the preparation and execution of tasked unit missions. Experiences included preparing, maintaining currency for, and executing an advanced role in Cyberspace Operations. Knowledgeable of systems security principles and concepts of emerging Information Technology (IT) security developments. Experiences included duties directed within the infrastructure protection environment and the selection of appropriate tools for team members. Experienced in the methodologies for determining the better techniques needed to secure computer systems and to protect cyber key terrains from exploitation of information within these cyberspace systems. Experiences included the ability to leverage knowledge of multiple entities with a stake in current operations to plan and build appropriate courses of action and training scenarios. Direct work experiences are required in one or more of the following unit assignments:
Cyber-space Crew Commander; Cyberspace Operations Controller; Operations Planner and Scheduler; Industrial Control Systems (ICS) Cyberspace Operator; and National Mission Team Cyberspace Operator. KNOWLEDGE, SKILLS, AND COMPETENCIES:
Applicants who meet the eligibility requirements will be further evaluated by the nominating supervisor based on the following competencies considered essential to perform the duties and responsibilities of the position. - Knowledge of project management principles and methods sufficient to assign and provide expert technical direction to team members concerning their role in vulnerability assessments. - Knowledge of, and skill in applying IT security principles and methods and of IT security products and services sufficient to evaluate and recommend the acquisition of, implement, and disseminate IT security tools, procedures, and practices to protect information assets. - Knowledge of hardware, software, and operating systems; systems configuration and integration; maintenance, upgrades, and modifications. - Knowledge and skill in applying applicable policies, standards, directives, and operations manuals to perform systems analysis, evaluate approaches, offer advice, define alternative approaches, and coordinate requirements regarding the merits of proposed applications. - Knowledge of systems analysis, configuration management, and computer equipment requirements related to networks to assess vulnerabilities. Skill in evaluating innovative approaches in formulation of programs or systems specifications. - Knowledge of network systems design, development, testing, installation, operating, management, and maintenance concepts and methods to provide and protect network services. - Knowledge of systems analysis, configuration management, and computer equipment requirements related to networks to assess vulnerabilities. - Skill in evaluating innovative approaches in formulation of programs or systems specifications. QUALITY OF
Experience:
Length of time is not of itself qualifying. Candidates' experience should be evaluated on the basis of duties performed rather than strictly on the rank of the individual; however, established compatibility criteria/assignments must be followed. The applicant's record of experience, training, and education must show possession of the knowledge, skills, and abilities needed to fully perform the duties of the position to be filled. SPECIAL NOTE:
Per the Labor Relations Management Agreement if there are more than 15 qualified applicants for each position, by category, a KSA board will be convened in accordance with Section 17.8 of the LMRA. PCS STATEMENT:
PERMANENT CHANGE OF STATION COSTS WILL NOT BE PAID FOR THIS POSITION
  • Department:
    2210 Information Technology Management
  • Salary Range:
    $69,579 to $108,421 per year

Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.