Posted today
Top Secret
Unspecified
Unspecified
Management
TX (On-Site/Office)
Duties
As a IT SPECIALIST (INFOSEC/NETWORK) (TITLE 5) with the Texas National Guard, your duties will include, but will not be limited to:
Conditions of employment
Appointment Factor(s): This is a Title 5 Excepted Service position.
Areas of Consideration: Nationwide Excepted. This includes:
Remarks:
In describing your experience in your resume, please be clear and specific. Assumptions regarding your experience will not be made. To be considered for qualification, your resume must include relevant experience with beginning and ending dates of employment/experience reflecting the following:
Specialized Experience Required
At least 1-year specialized experience equivalent to at least the next lower grade (GS-11). In addition to the OPM IORs (Alternative A) specialized experience examples, specialized experience includes experience, education, or training that approaches techniques and requirements appropriate to an assigned computer applications area or computer specialty area in an organization. Experience planning the sequence of actions necessary to accomplish the assignment where this entailed coordination with others outside the organizational unit and development of project controls. Experience that required adaptations of guidelines or precedents to meet the needs of the assignment. Experience preparing documentation on cost/benefit studies where is involved summarizing the material and organizing it in a logical fashion. Thorough knowledge of the mission, objectives, terminology, and management practices in the activity, the agency and the department to recognize probable areas of interaction and to serve as a technical expert in systems/network security. Knowledge of project management principles and methods sufficient to assign and provide expert technical direction to team members concerning their role in vulnerability assessments. Thorough knowledge of network systems design, development, testing, installation, operating, management, and maintenance concepts and methods to provide and protect network services. -Knowledge of, and skill in applying IT security principles and methods and of IT security products and services sufficient to evaluate and recommend the acquisition of, implement, and disseminate IT security tools, procedures, and practices to protect information assets. Extensive knowledge of information technology methods and information protection techniques and procedures. This includes government and Commercial Off The Shelf (COTS) technology using industry standards and an ability to understand the capabilities and limitations of software, utility programs, network management systems and programming. Knowledge of hardware, software, and operating systems; systems configuration and integration; maintenance, upgrades, and modifications. Extensive knowledge and skill in applying applicable policies, standards, directives, and operations manuals to perform systems analysis, evaluate approaches, offer advice, define alternative approaches, and coordinate requirements regarding the merits of proposed applications. Extensive knowledge of hardware, software, network operations functions, firewalls, packet switching communications protocols, and diagnostic tools to analyze difficult and complex system problems and provides resolutions. Knowledge of systems analysis, configuration management, and computer equipment requirements related to networks to assess vulnerabilities. Skill in evaluating innovative approaches in formulation of programs or systems specifications.
Additional information
Trial Period:
As a condition of employment, you will be required to serve a 1- 2 trial period during which we will evaluate your fitness and whether your continued employment advances the public interest. In determining if your employment advances the public interest, we may consider:
- your performance and conduct;
- the needs and interests of the agency;
- whether your continued employment would advance organizational goals of the agency or the Government; and
- whether your continued employment would advance the efficiency of the Federal service.
Upon completion of your trial period your employment will be terminated unless you receive certification, in writing, that your continued employment advances the public interest.
As a IT SPECIALIST (INFOSEC/NETWORK) (TITLE 5) with the Texas National Guard, your duties will include, but will not be limited to:
- Performs as the Team Technical Lead during vulnerability assessments of DoD information systems. Utilizes knowledge of systems security principles and concepts, of new Information Technology (IT) security developments, and of the infrastructure protection environment to select appropriate tools to be used by team members. Provides assistance to owners of assessed systems by providing recommendations pertaining to implementing security programs designed to anticipate, assess, and minimize system vulnerabilities, to correct deficiencies discovered, and to apply new IT security concepts. Briefs commanders and network administrators on the purpose and findings of the assessment, and prepares reports on the findings. Assists in developing security solutions to correct deficiencies that cannot be fixed with existing solutions.
- Performs information operations that protect and defend (or assess the capability to protect and defend) information and information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation. This includes providing for restoration of information systems by incorporating protection, detection, and reaction capabilities. Conducts risk and vulnerability assessments of DoD information systems to identify associated vulnerabilities, risks and protection needs. Performs OPFOR and other operational tasking. Operates fixed and deployed communications-computer systems. Performs activities such as configuring and monitoring hardware and software for system operation, processing and control of data flow, and client-server multi-user system support including network management or administration. Evaluates and assesses vulnerabilities of customer network and application server hardware, operating system software, and peripheral network equipment such as routers, bridges, switches, attached cabling system, network interface cards, modems, multiplexers, and concentrators. Conducts evaluations to ensure compliance with applicable standards. Ensures system backups are performed to ensure expedient restoration of the database for the respective network equipment. Evaluates effectiveness of customer network firewalls.
- Conducts analyses of network usage, hardware and software capabilities, ineffective practices or procedures, equipment shortcomings, and other relevant factors. Recommends methods and procedures and coordinates corrective action to optimize utilization of present equipment. Uses benchmarks, performance measurement, and evaluation data, in conjunction with vulnerability assessment techniques. Develops recommendations or proposals involving a variety of specialized systems and improved operational efficiency. Exercises authority and oversight of the squadron's digital training range(s), a suite of servers, routers, switches, hubs and other devices which can be configured with a variety of different operating systems in various versions, and with pre-programmed vulnerabilities, to be used in Computer Network Operations (CNO) training.
- Consults with subordinates, supervisors, specialists, vendors, and sister IO squadrons to procure and maintain training range devices that realistically emulate Air Force networks and are flexibly re-configurable to emulate the network(s) of a specific Air Force base as needed to prepare for vulnerability assessment missions. Performs analysis and design of automated and manual systems related to the network. Provides data for intrusion detection analysis. Determines applicability of established methods. Examines and evaluates alternative means of satisfying user requirements. Suggests technically feasible approaches and makes recommendations regarding the most effective countermeasures.
- Performs analysis and design of automated and manual systems related to the network. Provides data for intrusion detection analysis. Determines applicability of established methods. Provides technical advice to users. Examines and evaluates alternative means of satisfying user requirements. Suggests technically feasible approaches and makes recommendations regarding the most effective countermeasures.
- When something can't be done due to security concerns it is the ISSO's responsibility to suggest an alternative.
- The ISSO will need to be very familiar with network security as well as log analysis.
- The ISSO is considered the technical SME for the ISSM and for the ISO. The Commander and the ISSM rely heavily on the ISSO to educate leadership on the importance of the security posture.
- It is the ISSO's role as apart of the IA shop to have full oversight over CIA.
Conditions of employment
Appointment Factor(s): This is a Title 5 Excepted Service position.
Areas of Consideration: Nationwide Excepted. This includes:
- All currently employed full-time permanent, indefinite and temporary personnel of the Texas Army/Air National Guard.
- All current members of the Texas Army/Air National Guard
- US citizens, US nationals or individuals who owe allegiance to the United States
Remarks:
- The Texas National Guard is an Equal Opportunity employer.
- Cyber Security Codes: 802, 511, 531
- Direct deposit is mandatory.
- Must be able to obtain and maintain a top secret security clearance of the within 12 months of appointment.
- Applicants who meet one of the DoD Priority Placement Program categories below are eligible to apply with this preference.
- Trial period required (see remarks)
- This is a Non-Bargaining Unit position.
- This position conducts information assurance functions. The incumbent shall comply with the requirements of the certification program and will be required to obtain and maintain certification. Certification requirements are outlined in DoD Instruction 8570.01-M
- Work may require access to classified information.
- The incumbent of this position description must have, at a minimum, a completed National Agency Check (NAC) prior to position assignment.
- Irregular and overtime (compensatory) hours may be required to support operational requirements or contingencies.
- The employee may be required to travel in military and/or commercial aircraft to perform temporary duty assignments.
In describing your experience in your resume, please be clear and specific. Assumptions regarding your experience will not be made. To be considered for qualification, your resume must include relevant experience with beginning and ending dates of employment/experience reflecting the following:
Specialized Experience Required
At least 1-year specialized experience equivalent to at least the next lower grade (GS-11). In addition to the OPM IORs (Alternative A) specialized experience examples, specialized experience includes experience, education, or training that approaches techniques and requirements appropriate to an assigned computer applications area or computer specialty area in an organization. Experience planning the sequence of actions necessary to accomplish the assignment where this entailed coordination with others outside the organizational unit and development of project controls. Experience that required adaptations of guidelines or precedents to meet the needs of the assignment. Experience preparing documentation on cost/benefit studies where is involved summarizing the material and organizing it in a logical fashion. Thorough knowledge of the mission, objectives, terminology, and management practices in the activity, the agency and the department to recognize probable areas of interaction and to serve as a technical expert in systems/network security. Knowledge of project management principles and methods sufficient to assign and provide expert technical direction to team members concerning their role in vulnerability assessments. Thorough knowledge of network systems design, development, testing, installation, operating, management, and maintenance concepts and methods to provide and protect network services. -Knowledge of, and skill in applying IT security principles and methods and of IT security products and services sufficient to evaluate and recommend the acquisition of, implement, and disseminate IT security tools, procedures, and practices to protect information assets. Extensive knowledge of information technology methods and information protection techniques and procedures. This includes government and Commercial Off The Shelf (COTS) technology using industry standards and an ability to understand the capabilities and limitations of software, utility programs, network management systems and programming. Knowledge of hardware, software, and operating systems; systems configuration and integration; maintenance, upgrades, and modifications. Extensive knowledge and skill in applying applicable policies, standards, directives, and operations manuals to perform systems analysis, evaluate approaches, offer advice, define alternative approaches, and coordinate requirements regarding the merits of proposed applications. Extensive knowledge of hardware, software, network operations functions, firewalls, packet switching communications protocols, and diagnostic tools to analyze difficult and complex system problems and provides resolutions. Knowledge of systems analysis, configuration management, and computer equipment requirements related to networks to assess vulnerabilities. Skill in evaluating innovative approaches in formulation of programs or systems specifications.
Additional information
Trial Period:
As a condition of employment, you will be required to serve a 1- 2 trial period during which we will evaluate your fitness and whether your continued employment advances the public interest. In determining if your employment advances the public interest, we may consider:
- your performance and conduct;
- the needs and interests of the agency;
- whether your continued employment would advance organizational goals of the agency or the Government; and
- whether your continued employment would advance the efficiency of the Federal service.
Upon completion of your trial period your employment will be terminated unless you receive certification, in writing, that your continued employment advances the public interest.
group id: DOAF