Posted today
Top Secret
Unspecified
Unspecified
Management
Colorado Springs, CO (On-Site/Office)
Duties
The United States Space Force (USSF) at Peterson Space Force Base, Colorado Springs, CO is searching for a Cybersecurity Analyst to support 31STS (NH-2210-03, GS-12/13 Equivalent).
Description:
The 31st Sustainment Squadron's Cyber Branch is responsible for reviewing proposed modifications to the Global Positioning System (GPS) and the Satellite Control Network (SCN) to ensure that hardware/software solutions are sound from a cybersecurity perspective. The branch manages cyber authorization packages for GPS and SCN systems including artifact verification, eMASS entry, and compliance plans. This includes coordinating Security Control Assessments and meeting Risk Management Framework requirements. The Cyber Branch analyzes test results from a variety of cyber assessments and proposes system modifications to mitigate vulnerabilities. The branch also coordinates internal and external penetration test activities and develops continuous monitoring and incident response capabilities used by cyber defenders
Ideal Candidate:
The ideal candidate will possess a background in mission system sustainment (cyber analysis of system modifications, contract verbiage), mission system authorizations (Risk Management Framework, Security Control Assessments, ISSM/ISSO), defensive Cyber operations (cyber tools, cyber incident response, exercise planning), vulnerability management (patch, scan, STIG, cyber orders processing) and penetration testing (analysis of vulnerabilities, red/blue team activities, scenario planning). Possess an Undergraduate or Graduate Education degree in computer science, engineering, information science, information systems management, mathematics, operations research, statistics, or technology management or degree that provided a minimum of 24 semester hours in one or more of the fields identified above and required the development or adaptation of applications, systems, or networks.
Key Skills and Abilities:
1. IT professional who demonstrates that they can manage a cybersecurity program at the enterprise level using the DoD's cybersecurity / RMF management system, currently eMASS, Xacta, and ITIPS. Can maintain cybersecurity documentation including: creating policies, SSPs, network topologies, POA&Ms.
2. Knowledge of the missions, roles, functions, organizational structures, and operation of the Department of Defense, and entities that govern, interface with, and/or influence management control of proposed and ongoing service contracts.
3. Knowledge of the principles, methods, and techniques of IT assessment, planning, management, monitoring, and evaluation as well as knowledge of the principles, methods, or tools for developing, scheduling, coordinating, managing IT projects and resources, monitoring and inspecting costs, work, and contractor performance. Ability to lead and manage information systems planning, development, implementation, operation, and maintenance.
4. Knowledge of the principles, methods, and tools for the coordinated management of IT programs to include providing oversight of multiple IT projects, integrating dependent schedules and deliverables, and related activities such as life cycle management and program governance.
5. Knowledge of the principles and methods to identify, analyze, specify, design, and manage functional and infrastructure requirements; includes translating functional requirements into technical requirements used for logical design or alternative technologies or approaches. Ability to research and analyze external products to determine their potential for meeting mission requirements and business needs.
6. Knowledge of concepts, practices, and techniques used to identify, engage, influence and monitor relationships with individuals and groups connected to IT work/development efforts. Includes those who are actively involved, those who exert influence over the process and its results, and those who have a vested interest in the outcome. Ability to work effectively with customers to assess their requirements then provide information, expertise, and assistance to satisfy those needs.
7. Ability to communicate effectively, both orally and in writing, clearly, concisely, with technical accuracy and to use computers and a variety of software programs and databases, gather and analyze a variety of program information, make sound judgments concerning program progress, and effectively communicate recommendations orally and in writing to higher organizational management and contractors.
Requirements
Conditions of employment
The 2210 series has an individual occupational requirement that must be met and can be viewed . There is no Group Coverage Qualification Standard for this series.
Additional information
Employed Annuitants (Reemployed Annuitants): Applicants in receipt of an annuity based on civilian employment in the Federal Service are subject to the DoD Policy on The Employment of Annuitants. Click for more information.
is available to a Federal employee hired on/after 5 Nov 2016, who is a veteran with a service-connected disability rating of 30% or more. For more information, click .
The United States Space Force (USSF) at Peterson Space Force Base, Colorado Springs, CO is searching for a Cybersecurity Analyst to support 31STS (NH-2210-03, GS-12/13 Equivalent).
Description:
The 31st Sustainment Squadron's Cyber Branch is responsible for reviewing proposed modifications to the Global Positioning System (GPS) and the Satellite Control Network (SCN) to ensure that hardware/software solutions are sound from a cybersecurity perspective. The branch manages cyber authorization packages for GPS and SCN systems including artifact verification, eMASS entry, and compliance plans. This includes coordinating Security Control Assessments and meeting Risk Management Framework requirements. The Cyber Branch analyzes test results from a variety of cyber assessments and proposes system modifications to mitigate vulnerabilities. The branch also coordinates internal and external penetration test activities and develops continuous monitoring and incident response capabilities used by cyber defenders
Ideal Candidate:
The ideal candidate will possess a background in mission system sustainment (cyber analysis of system modifications, contract verbiage), mission system authorizations (Risk Management Framework, Security Control Assessments, ISSM/ISSO), defensive Cyber operations (cyber tools, cyber incident response, exercise planning), vulnerability management (patch, scan, STIG, cyber orders processing) and penetration testing (analysis of vulnerabilities, red/blue team activities, scenario planning). Possess an Undergraduate or Graduate Education degree in computer science, engineering, information science, information systems management, mathematics, operations research, statistics, or technology management or degree that provided a minimum of 24 semester hours in one or more of the fields identified above and required the development or adaptation of applications, systems, or networks.
Key Skills and Abilities:
1. IT professional who demonstrates that they can manage a cybersecurity program at the enterprise level using the DoD's cybersecurity / RMF management system, currently eMASS, Xacta, and ITIPS. Can maintain cybersecurity documentation including: creating policies, SSPs, network topologies, POA&Ms.
2. Knowledge of the missions, roles, functions, organizational structures, and operation of the Department of Defense, and entities that govern, interface with, and/or influence management control of proposed and ongoing service contracts.
3. Knowledge of the principles, methods, and techniques of IT assessment, planning, management, monitoring, and evaluation as well as knowledge of the principles, methods, or tools for developing, scheduling, coordinating, managing IT projects and resources, monitoring and inspecting costs, work, and contractor performance. Ability to lead and manage information systems planning, development, implementation, operation, and maintenance.
4. Knowledge of the principles, methods, and tools for the coordinated management of IT programs to include providing oversight of multiple IT projects, integrating dependent schedules and deliverables, and related activities such as life cycle management and program governance.
5. Knowledge of the principles and methods to identify, analyze, specify, design, and manage functional and infrastructure requirements; includes translating functional requirements into technical requirements used for logical design or alternative technologies or approaches. Ability to research and analyze external products to determine their potential for meeting mission requirements and business needs.
6. Knowledge of concepts, practices, and techniques used to identify, engage, influence and monitor relationships with individuals and groups connected to IT work/development efforts. Includes those who are actively involved, those who exert influence over the process and its results, and those who have a vested interest in the outcome. Ability to work effectively with customers to assess their requirements then provide information, expertise, and assistance to satisfy those needs.
7. Ability to communicate effectively, both orally and in writing, clearly, concisely, with technical accuracy and to use computers and a variety of software programs and databases, gather and analyze a variety of program information, make sound judgments concerning program progress, and effectively communicate recommendations orally and in writing to higher organizational management and contractors.
Requirements
Conditions of employment
- Must be a U.S Citizen.
- Must be able to obtain and maintain a Top-Secret security clearance.
- Safeguards classified or sensitive budget-related information and/or files.
- May be required to work overtime on an unscheduled or emergency basis.
- Eligible for situational telework only, including Emergency and OPM prescribed "Unscheduled Telework".
- This position will close after 5 business days or 75 applications, whichever comes first.
- Employee may be required to perform travel by military or commercial passenger aircraft in the performance of temporary duty assignments.
- PCS / relocation funding is authorized.
- Required to handle and safeguard sensitive and/or classified information in accordance with regulations to reduce potential compromise; employee must obtain and maintain the appropriate security clearance.
- Will attain appropriate DoD approved cybersecurity baseline certification applicable for cybersecurity functions required for the position held
- This position is designated as a Testing Designated Position (TDP) under the Air Force Civilian Drug Testing Program.
- Subject to Temporary Duty Assignment (TDY): 20 days a year.
- Employee must within 30-days of assuming this position and by 31 October annually thereafter, file an OGE-450, "Confidential Financial Disclosure Report.
- This position is designated a NON-CRITICAL APDP position.
The 2210 series has an individual occupational requirement that must be met and can be viewed . There is no Group Coverage Qualification Standard for this series.
Additional information
Employed Annuitants (Reemployed Annuitants): Applicants in receipt of an annuity based on civilian employment in the Federal Service are subject to the DoD Policy on The Employment of Annuitants. Click for more information.
is available to a Federal employee hired on/after 5 Nov 2016, who is a veteran with a service-connected disability rating of 30% or more. For more information, click .
group id: DOAF