Today
Secret
Unspecified
Unspecified
Management
Houston, TX (On-Site/Office)
Duties
Plans and carries out routine assignments using standard Information Technology systems security methods, approaches, and procedures. Participates in the development, implementation and coordination of activities designed to ensure, protect and restore IT systems, services, and capabilities. Monitors and evaluates system security compliance. Assists in the application of system security and accreditation processes for organizational Information Technology systems. Develops security procedures. Prepares and presents reports and briefings. Represents the organization in interactions with other organizations. Provides technical leadership on group projects. Evaluates and recommends adoption of new or enhanced approaches to system security. Applies information security and information assurance policy, principles, and practices.
Requirements
Conditions of employment
Resumes must be two pages (or less). Resumes should clearly demonstrate the applicant's relevant experience, skills, knowledge and abilities as they pertain to this position.
A qualified candidate must possess the following:
Progressive IT experience in applying methods for evaluating, implementing, and disseminating IT security tools and procedures; network operations and protocols; computer forensics principles; and IT security certification and accreditation requirements. Experience must be equivalent in skill and complexity to the next lower grade or equivalent to include the following:
1. Attention to detail through demonstrated experience in maintaining system logs, running network and system level scans, and preparing reports and administrative documents.
2. Demonstrated experience providing effective customer service in a collaborative environment with all IT related disciplines and serviced organizations.
3. Demonstrated skill in oral communication including developing and conducting training, delivering briefs/presentations, and providing reports to superiors.
4. Demonstrated problem-solving skills to include monitoring and detecting intrusion in both systems and network infrastructures. Must have the demonstrated ability to use and understand common network monitoring techniques and review logs to discover anomalies.
Education may be substituted for experience as follows: A doctorate degree in computer science, information systems management, technology management, or doctorate degree in other disciplines which includes at least 24 semester hours in one or more of the fields identified above. The education must have included coursework in information systems security, networking, and/or systems analysis.
In addition to the above qualifications, candidates who possess the following qualifications will be considered "Highly Preferred" or "Best Qualified":
At least 3 years of experience familiarity with Risk Management Framework (RMF), conducting vulnerability assessments, and applying Security Technical Implementation Guidelines (STIGs).
Proficiency in Cybersecurity tools such as Assured Compliance Assessment Solution (ACAS), Army Endpoint Security System (AESS), and Microsoft Endpoint Defender
Knowledge of NIST SP 800 series standards and DoD cybersecurity policies
Education
This job does not have an education qualification requirement.
Additional information
Area of Consideration
Plans and carries out routine assignments using standard Information Technology systems security methods, approaches, and procedures. Participates in the development, implementation and coordination of activities designed to ensure, protect and restore IT systems, services, and capabilities. Monitors and evaluates system security compliance. Assists in the application of system security and accreditation processes for organizational Information Technology systems. Develops security procedures. Prepares and presents reports and briefings. Represents the organization in interactions with other organizations. Provides technical leadership on group projects. Evaluates and recommends adoption of new or enhanced approaches to system security. Applies information security and information assurance policy, principles, and practices.
Requirements
Conditions of employment
- Direct Deposit and Social Security Card is required.
- Meet qualification/eligibility/background requirements for this position.
- A one-year probationary period may be required.
- Satisfactorily complete an employment verification (E-Verify) check.
- Subject to satisfactory completion of all pre-employment checks in accordance with AR 215-3, para.2 to include a Tier III background investigation.
- Incumbent must become DOD 8570.01 Information Assurance Management Level 2, baseline certification compliant within six months of employment.
Resumes must be two pages (or less). Resumes should clearly demonstrate the applicant's relevant experience, skills, knowledge and abilities as they pertain to this position.
A qualified candidate must possess the following:
Progressive IT experience in applying methods for evaluating, implementing, and disseminating IT security tools and procedures; network operations and protocols; computer forensics principles; and IT security certification and accreditation requirements. Experience must be equivalent in skill and complexity to the next lower grade or equivalent to include the following:
1. Attention to detail through demonstrated experience in maintaining system logs, running network and system level scans, and preparing reports and administrative documents.
2. Demonstrated experience providing effective customer service in a collaborative environment with all IT related disciplines and serviced organizations.
3. Demonstrated skill in oral communication including developing and conducting training, delivering briefs/presentations, and providing reports to superiors.
4. Demonstrated problem-solving skills to include monitoring and detecting intrusion in both systems and network infrastructures. Must have the demonstrated ability to use and understand common network monitoring techniques and review logs to discover anomalies.
Education may be substituted for experience as follows: A doctorate degree in computer science, information systems management, technology management, or doctorate degree in other disciplines which includes at least 24 semester hours in one or more of the fields identified above. The education must have included coursework in information systems security, networking, and/or systems analysis.
In addition to the above qualifications, candidates who possess the following qualifications will be considered "Highly Preferred" or "Best Qualified":
At least 3 years of experience familiarity with Risk Management Framework (RMF), conducting vulnerability assessments, and applying Security Technical Implementation Guidelines (STIGs).
Proficiency in Cybersecurity tools such as Assured Compliance Assessment Solution (ACAS), Army Endpoint Security System (AESS), and Microsoft Endpoint Defender
Knowledge of NIST SP 800 series standards and DoD cybersecurity policies
Education
This job does not have an education qualification requirement.
Additional information
Area of Consideration
- This job is open to The Public.
- The Duty Station for this position is located at Fort Sam Houston, TX. You will be expected to physically reside within commuting distance of Fort Sam Houston, TX. Situational telework can be provided for weather-related emergencies, office closures, or other situations where telework serves a compelling Agency need.
- If you are unable to apply online, you can complete a paper application. To get started, contact servicing NAF Human Resources representative or office listed in the Agency Contact Information section (at the bottom of this announcement) to request a copy of the application form.
- Be sure to submit your completed application form, along with your resume and any required supporting documents, no later than11:59pm CST on 11/07/2025 to ensure timely processing.
- Important : Incomplete applications, including missing responses to questionnaire items may result in an ineligible rating.
- Payment of Permanent Change of Station (PCS) costs are authorized based on a determination that a PCS move is in the Government's interest.
- This job is part of a pay-banded system. Sunday premium pay for regularly scheduled employees and night differential pay may be authorized by the Garrison Commander.
- Access to certain federal facilities may require a REAL ID-compliant driver's license/ID (marked with a star) or an Enhanced Driver's License (EDL) from WA, MI, MN, NY, or VT. See for details.
- After you apply, your application remains valid for 90 days and may be referred to hiring officials as new vacancies arise. Additional referrals may occur for up to 90 days after the closing date.
- Before you apply, take a moment to explore our Applicant Information Kit, your go-to guide for understanding our hiring processes and making your application stand out.
- Inside you will find helpful tips, insights, and everything you need to feel confident and prepared.
- Click this URL to view the kit: .
group id: DOA