IT SPEC (INFOSEC) Accounting - Meridian, MS at Geebo

IT SPEC (INFOSEC)

Summary THIS IS A NATIONAL GUARD TITLE 5 EXCEPTED SERVICE POSITION WITH NO MILITARY REQUIREMENT.
This National Guard position is for a IT SPEC (INFOSEC), Position Description Number PDT5821400 and is part of the Mississippi National Guard.
This position is located in an Information Operations (IO) Squadron.
Responsibilities As a IT SPEC (INFOSEC), GS-2210-12, you will serve as a Computer Network Operations (CNO) Technical Expert, ensuring the confidentiality, integrity, and availability of information systems, networks and data through the enhancement of Department of Defense (DoD) information systems security programs, policies, procedures and tools.
Enhancement of information systems security programs, procedures, and tools are specifically accomplished by conducting vulnerability assessments and Opposing Force (OPFOR) tasking of planned and installed information systems and ensuring all protection needs are met.
1.
Performs as the Team Technical Lead during vulnerability assessments of DoD information systems.
Utilizes knowledge of systems security principles and concepts, of new Information Technology (IT) security developments, and of the infrastructure protection environment to select appropriate tools to be used by team members.
Establishes methodology, and determines best techniques to penetrate computer systems and exploit information within these systems.
Directs the team during actual assessments to find vulnerabilities due to improper configurations, missing or improperly applied patches, or procedural errors.
Provides assistance to owners of assessed systems by providing recommendations pertaining to implementing security programs designed to anticipate, assess, and minimize system vulnerabilities, to correct deficiencies discovered, and to apply new IT security concepts.
2.
Conducts extensive research of new vulnerabilities discovered in operating systems, application software, infrastructure and firewalls.
Investigates, analyses, and develops methods that could be used to exploit those vulnerabilities.
Conducts testing on training range to validate findings and to develop and refine methods and procedures to mitigate vulnerabilities.
Conducts extensive research of tools currently being used to attack or gain unauthorized access to information networks.
Analyzes and tests these tools on training range to determine effectiveness, stability, and scope of the tools.
Modifies and refines tools for use in vulnerability assessments to provide the customer with the best possible evaluation of their security posture.
3.
Performs information operations that protect and defend (or assess the capability to protect and defend) information and information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation.
This includes providing for restoration of information systems by incorporating protection, detection, and reaction capabilities.
Conducts risk and vulnerability assessments of DoD information systems to identify associated vulnerabilities, risks and protection needs.
Performs OPFOR and other operational tasking.
Operates fixed and deployed communications-computer systems.
Performs activities such as configuring and monitoring hardware and software for system operation, processing and control of data flow, and client-server multi-user system support including network management or administration.
Performs microcomputer fault isolation and restoration actions.
Evaluates and assesses vulnerabilities of customer network and application server hardware, operating system software, and peripheral network equipment such as routers, bridges, switches, attached cabling system, network interface cards, modems, multiplexers, and concentrators.
Conducts evaluations to ensure compliance with applicable standards.
4.
Analyzes equipment and software reliability and suitability for vulnerability assessment utilization.
Conducts analyses of network usage, hardware and software capabilities, ineffective practices or procedures, equipment shortcomings, and other relevant factors.
Recommends methods and procedures and coordinates corrective action to optimize utilization of present equipment.
Uses benchmarks, performance measurement, and evaluation data, in conjunction with vulnerability assessment techniques.
Develops recommendations or proposals involving a variety of specialized systems and improved operational efficiency.
Exercises authority and oversight of the squadron's digital training range(s), a suite of servers, routers, switches, hubs and other devices which can be configured with a variety of different operating systems in various versions, and with pre-programmed vulnerabilities, to be used in Computer Network Operations (CNO) training.
5.
Consults with subordinates, supervisors, specialists, vendors, and sister IO squadrons to procure and maintain training range devices that realistically emulate Air Force networks and are flexibly re-configurable to emulate the network(s) of a specific Air Force base as needed to prepare for vulnerability assessment missions.
6.
Performs other duties as assigned.
Requirements Conditions of Employment 1.
This position conducts information assurance functions.
The incumbent shall comply with the requirements of the certification program and will be required to obtain and maintain certification.
Certification requirements are outlined in DoD Instruction 8570.
01-M 2.
Work may require access to classified information.
Must be able to obtain and maintain the appropriate security clearance.
3.
The incumbent of this position description must have at a minimum, a completed National Agency Check (NAC) prior to position assignment.
4.
Irregular and overtime (compensatory) hours may be required to support operational requirements or contingencies.
5.
The employee may be required to travel in military and/or commercial aircraft to perform temporary duty assignments.
6.
Wear of the military uniform is prohibited while in technician status.
7.
Participation in direct deposit is mandatory.
8.
For positions requiring the operation of motor vehicles, candidates must have a valid state driver's license.
Qualifications This is an indefinite position, tenure 3, with a time limit determined by the needs of the agency.
Any permanent military technician who is selected for this position will become tenure 3.
The selectee will receive the same benefits and entitlements as the tenure 1 employee but will be considered tenure 3 for purposes of reduction in force.
You can be terminated at any time with a 30-day notice.
If a permanent resource becomes available, incumbent may be converted to a permanent appointment without competition GENERAL
Experience:
Experience, education or training that has provided a basic knowledge of data processing functions and general management principles that enabled the applicant to understand the stages required to automate a work process.
Experience may have been gained in work such as computer operator or assistant, computer sales representative, program analyst, or other positions that required the use or adaptation of computer programs and systems.
SPECIALIZED
Experience:
Must have at least 36 months experience, education, or training that approaches techniques and requirements appropriate to an assigned computer applications area or computer specialty area in an organization.
Experience planning the sequence of actions necessary to accomplish the assignment where this entailed coordination with others outside the organizational unit and development of project controls.
Experience that required adaptations of guidelines or precedents to meet the needs of the assignment.
Experience preparing documentation on cost/benefit studies where is involved summarizing the material and organizing it in a logical fashion.
If your resume does not include a narrative description of how you meet the GENERAL, SPECIALIZED experiences, and OTHER requirements, you may lose consideration for this position.
Ensure that the Questionnaire is completed online in Application Manager.
NOTES TO CANDIDATES:
a.
Include any volunteer work experience in your resume.
Experience refers to paid and unpaid experience, including volunteer work done through National Service programs (e.
g.
, Peace Corps, AmeriCorps) and other organizations (e.
g.
, professional, philanthropic, religious, spiritual, community, student, social).
b.
Final selection will be based upon qualifications, suitability, and available manpower resources.
c.
This employer will provide the Social Security Administration (SSA) and if necessary, the Department of Homeland Security (DHS) with information from each new employee's Form I-9 to confirm work authorization.
d.
Multiple vacancies may be filled from this announcement.
e.
If this announcement results in a temporary promotion for the selectee, it may become permanent at any time without further competition dependent on funding and manpower requirements.
Education No substitution of education for specialized experience.
Additional Information If you are a male applicant who was born after 12/31/1959 and are required to register under the Military Selective Service Act, the Defense Authorization Act of 1986 requires that you be registered or you are not eligible for appointment in this agency (https:
//www.
sss.
gov/RegVer/wfRegistration.
aspx).
If you are unable to apply online or need to fax a document you do not have in electronic form, view the following link for information regarding an Alternate Application https:
//help.
usastaffing.
gov/Apply/index.
php?title=Alternate_Application_Information Recommended Skills Administration Assessments Automation Business Efficiency Classified Information Client Server Models Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.