Posted today
Top Secret
Unspecified
Unspecified
Management
Little Rock, AR (On-Site/Office)
Duties
1. Prepares for, maintains currency for, and executes an advanced role in Cyberspace Operations. Utilizes knowledge of systems security principles and concepts of emerging Information Technology (IT) security developments, and of the infrastructure protection environment to select appropriate tools to be used by team members. Establishes methodology and determines best techniques to secure computer systems and to protect cyber key terrain from exploitation of information within these systems and/or to achieve other tasked objectives in cyberspace. Leverages knowledge of multiple entities with a stake in current operations to plan and build appropriate courses of action and training scenarios. Functions in at least one of the following advanced roles:
a. Cyberspace Crew Lead. Develops tactical objectives and/or tactical taskings for a team of Cyberspace Operators. Serves as the liaison between assigned team and other teams or external entities.
b. Cyberspace Operations Analyst. Directs tactical execution for a team of Cyberspace Operators. Develops tactical approach and synchronizes actions of multiple qualified operators in order to achieve objectives.
c. Operations Planner/Scheduler. Represents the unit's capability, availability, and interests at high-level Operational Planning Team (OPT) meetings to define the mission, environment, enemy, effects, capabilities, overall plan, phasing, operational agreements and contingencies needed to conduct the operation or exercise. Develops a tactical plan for assigned missions and exercises. Works as a member of the mission leadership element to translate operational objectives into tactical objectives comprised of specific tactical tasks. Develops Measures of Effectiveness and Measures of Performance to be used in the assessment of the mission's or exercises success. Prepares and coordinates operator, resource, facilities and equipment schedules in coordination with unit and flight commanders in order to ensure training, currency, and mission timelines and objectives are met.
d. Industrial Control Systems (ICS) Cyberspace Operator. Assesses and evaluates vulnerabilities and/or adversary activity in ICS enclaves. Detects, characterizes, and resolves insecurities in ICS networks. Reviews and analyzes ICS network traffic, configurations, and operating procedures and provides recommendations to improve system security posture.
2. Prepares Unit Training Assembly, Annual Training and currency training events for Mission Ready Cyberspace Operators to optimize training time available. Ensures training for each event has been prepared and is ready. Monitors assigned military members' go-no-go readiness status and ensures deficiencies are recognized. Works with scheduling section to provide opportunities for assigned members to maintain full mission readiness. Coordinates with maintenance section to ensure all assigned equipment is in good working condition and ready for each training and mission event.
3. Conducts extensive research of new vulnerabilities and insecurities discovered in operating systems, application software, infrastructure and boundary protection devices. Investigates, analyzes, and develops methods that could be used to exploit these vulnerabilities. Conducts testing on training range to validate findings and to develop and refine methods and procedures to mitigate vulnerabilities. Coordinates research and findings with the Cyberspace Weapons Officer for inclusion in unit and cyberspace community tactics, techniques, and procedures.
4. Conducts extensive research of tools currently being used to attack or gain unauthorized access to information networks. Analyzes and tests these tools on training range to determine effectiveness, stability, and scope of the tools. Recommends and refines tools for use on Cyberspace Weapon System to provide the customer with the best possible evaluation of their security posture.
5. Performs other duties as assigned.
Requirements
Conditions of employment
NATIONAL GUARD MEMBERSHIP IS REQUIRED. If you are not sure you are eligible for military membership, please contact a National Guard recruiter prior to applying for this position.
Compatible military grade and assignment required prior to the effective date of placement. This is an excepted service position that requires membership in a compatible military assignment in the employing state's National Guard. Applicants who are not currently a member of the National Guard must be eligible for immediate membership in the military grade listed below. Selectee will be required to wear the military uniform.
Military Grades: Enlisted
Compatible Military Assignments: Selectee must be a member of the Arkansas Air National Guard.
IMPORTANT NOTES (AS APPLICABLE): Upon selection for this position, individual must possess or initiate a National Agency Check with Inquiries (NACI) background investigation. A favorable determination based upon investigative results is mandatory for this position. Failure to meet these requirements will result in termination of employment. A pre-placement physical is required if not already current. Upon selection, must complete mandatory Full-Time Support (FTS) Training at the Professional Education Center (PEC) within six months of assignment (if applicable, training will be coordinated by the supervisor). Individual must meet all military requirements of the position without creating a grade inversion, as determined by the Human Resources Office (HRO). Technicians will not be militarily senior to their full-time supervisor or wage leader (Grade Inversion). Enlisted members currently at a higher grade than allowed by the position (see Military Grade Requirement above) may apply; however, they must administratively reduce prior to appointment and provide confirmation of the reduction to HRO.
ADDITIONAL REQUIREMENTS ARE LISTED UNDER ADDITIONAL INFORMATION.
Qualifications
GENERAL EXPERIENCE:
Work in this series includes managing, supervising, leading, administering, developing, delivering, and supporting information technology (IT) systems and services. This series covers only those positions for which the paramount requirement is knowledge of IT principles, concepts, and methods, e.g., data storage, software applications, networking.
SPECIALIZED EXPERIENCE :
Must be a qualified Host Analyst or Network Analyst on the Cyberspace Vulnerability Assessment Hunt (CVA/H) Weapon System.
1-year specialized experience equivalent to at least the next lower grade. In addition to the OPM IORs (Alternative A) specialized experience examples, specialized experience includes experience, education, or training that approaches techniques and requirements appropriate to an assigned computer applications area or computer specialty area in an organization. Experience planning the sequence of actions necessary to accomplish the assignment where this entailed coordination with others outside the organizational unit and development of project controls. Experience that required adaptations of guidelines or precedents to meet the needs of the assignment. Experience preparing documentation on cost/benefit studies where is involved summarizing the material and organizing it in a logical fashion.
Additional information
If you are a male applicant who was born after 12/31/1959 and are required to register under the Military Selective Service Act, the Defense Authorization Act of 1986 requires that you be registered or you are not eligible for appointment in this agency ( ).
REQUIREMENTS/CONDITIONS OF EMPLOYMENT:
1. Prepares for, maintains currency for, and executes an advanced role in Cyberspace Operations. Utilizes knowledge of systems security principles and concepts of emerging Information Technology (IT) security developments, and of the infrastructure protection environment to select appropriate tools to be used by team members. Establishes methodology and determines best techniques to secure computer systems and to protect cyber key terrain from exploitation of information within these systems and/or to achieve other tasked objectives in cyberspace. Leverages knowledge of multiple entities with a stake in current operations to plan and build appropriate courses of action and training scenarios. Functions in at least one of the following advanced roles:
a. Cyberspace Crew Lead. Develops tactical objectives and/or tactical taskings for a team of Cyberspace Operators. Serves as the liaison between assigned team and other teams or external entities.
b. Cyberspace Operations Analyst. Directs tactical execution for a team of Cyberspace Operators. Develops tactical approach and synchronizes actions of multiple qualified operators in order to achieve objectives.
c. Operations Planner/Scheduler. Represents the unit's capability, availability, and interests at high-level Operational Planning Team (OPT) meetings to define the mission, environment, enemy, effects, capabilities, overall plan, phasing, operational agreements and contingencies needed to conduct the operation or exercise. Develops a tactical plan for assigned missions and exercises. Works as a member of the mission leadership element to translate operational objectives into tactical objectives comprised of specific tactical tasks. Develops Measures of Effectiveness and Measures of Performance to be used in the assessment of the mission's or exercises success. Prepares and coordinates operator, resource, facilities and equipment schedules in coordination with unit and flight commanders in order to ensure training, currency, and mission timelines and objectives are met.
d. Industrial Control Systems (ICS) Cyberspace Operator. Assesses and evaluates vulnerabilities and/or adversary activity in ICS enclaves. Detects, characterizes, and resolves insecurities in ICS networks. Reviews and analyzes ICS network traffic, configurations, and operating procedures and provides recommendations to improve system security posture.
2. Prepares Unit Training Assembly, Annual Training and currency training events for Mission Ready Cyberspace Operators to optimize training time available. Ensures training for each event has been prepared and is ready. Monitors assigned military members' go-no-go readiness status and ensures deficiencies are recognized. Works with scheduling section to provide opportunities for assigned members to maintain full mission readiness. Coordinates with maintenance section to ensure all assigned equipment is in good working condition and ready for each training and mission event.
3. Conducts extensive research of new vulnerabilities and insecurities discovered in operating systems, application software, infrastructure and boundary protection devices. Investigates, analyzes, and develops methods that could be used to exploit these vulnerabilities. Conducts testing on training range to validate findings and to develop and refine methods and procedures to mitigate vulnerabilities. Coordinates research and findings with the Cyberspace Weapons Officer for inclusion in unit and cyberspace community tactics, techniques, and procedures.
4. Conducts extensive research of tools currently being used to attack or gain unauthorized access to information networks. Analyzes and tests these tools on training range to determine effectiveness, stability, and scope of the tools. Recommends and refines tools for use on Cyberspace Weapon System to provide the customer with the best possible evaluation of their security posture.
5. Performs other duties as assigned.
Requirements
Conditions of employment
NATIONAL GUARD MEMBERSHIP IS REQUIRED. If you are not sure you are eligible for military membership, please contact a National Guard recruiter prior to applying for this position.
Compatible military grade and assignment required prior to the effective date of placement. This is an excepted service position that requires membership in a compatible military assignment in the employing state's National Guard. Applicants who are not currently a member of the National Guard must be eligible for immediate membership in the military grade listed below. Selectee will be required to wear the military uniform.
Military Grades: Enlisted
- Minimum Military Grade: E-6/ TSgt
- Maximum Military Grade: E-8/ SMSgt
Compatible Military Assignments: Selectee must be a member of the Arkansas Air National Guard.
IMPORTANT NOTES (AS APPLICABLE): Upon selection for this position, individual must possess or initiate a National Agency Check with Inquiries (NACI) background investigation. A favorable determination based upon investigative results is mandatory for this position. Failure to meet these requirements will result in termination of employment. A pre-placement physical is required if not already current. Upon selection, must complete mandatory Full-Time Support (FTS) Training at the Professional Education Center (PEC) within six months of assignment (if applicable, training will be coordinated by the supervisor). Individual must meet all military requirements of the position without creating a grade inversion, as determined by the Human Resources Office (HRO). Technicians will not be militarily senior to their full-time supervisor or wage leader (Grade Inversion). Enlisted members currently at a higher grade than allowed by the position (see Military Grade Requirement above) may apply; however, they must administratively reduce prior to appointment and provide confirmation of the reduction to HRO.
ADDITIONAL REQUIREMENTS ARE LISTED UNDER ADDITIONAL INFORMATION.
Qualifications
GENERAL EXPERIENCE:
Work in this series includes managing, supervising, leading, administering, developing, delivering, and supporting information technology (IT) systems and services. This series covers only those positions for which the paramount requirement is knowledge of IT principles, concepts, and methods, e.g., data storage, software applications, networking.
SPECIALIZED EXPERIENCE :
Must be a qualified Host Analyst or Network Analyst on the Cyberspace Vulnerability Assessment Hunt (CVA/H) Weapon System.
1-year specialized experience equivalent to at least the next lower grade. In addition to the OPM IORs (Alternative A) specialized experience examples, specialized experience includes experience, education, or training that approaches techniques and requirements appropriate to an assigned computer applications area or computer specialty area in an organization. Experience planning the sequence of actions necessary to accomplish the assignment where this entailed coordination with others outside the organizational unit and development of project controls. Experience that required adaptations of guidelines or precedents to meet the needs of the assignment. Experience preparing documentation on cost/benefit studies where is involved summarizing the material and organizing it in a logical fashion.
Additional information
If you are a male applicant who was born after 12/31/1959 and are required to register under the Military Selective Service Act, the Defense Authorization Act of 1986 requires that you be registered or you are not eligible for appointment in this agency ( ).
REQUIREMENTS/CONDITIONS OF EMPLOYMENT:
- Males born after 31 December 1959 must be registered for Selective Service.
- Federal employment suitability as determined by a background investigation.
- May be required to successfully complete a probationary period.
- Participation in direct deposit is mandatory.
- Must be able to obtain/maintain appropriate security clearance
group id: DOAF