INFORMATION TECHNOLOGY SPECIALIST (INFOSEC) (Title 5) Job in Fort Smith, AR

Vacancy No. AF-25-037-12600136 Department Air National Guard Units
Salary $73,286.00 to $113,047.00 Grade 11 to 12
Perm/Temp Permanent FT/PT Full-time
Open Date 11/6/2024 Close Date 11/21/2024
Job Link Apply Online Who may apply Public
Locations:
Fort Smith, AR


Summary

THIS IS A NATIONAL GUARD TITLE 5 EXCEPTED SERVICE POSITION

This National Guard position is for a INFORMATION TECHNOLOGY SPECIALIST (INFOSEC) (Title 5), Position Description Number T5807900/T5821400 and is part of the AR ANG 188 CMN FT, National Guard.

Duties

GS-11 DUTIES:

1. Serves as the Computer Security (COMPUSEC) Manager. Protects and maintains the availability, integrity, confidentiality, and accountability of information system resources and information processed throughout the system's life cycle. Establishes and publishes squadron policy to manage the COMPUSEC program. Disseminates information and ensures computer security practices are adhered to by all functional areas in-garrison and in support of deployed war-fighting personnel. Reviews, analyzes, and validates certification and accreditation packages. Continuously identifies and analyzes threats and vulnerabilities to the information systems to maintain an appropriate level of protection. Ensures computer software designs address information system security requirements. Accomplishes risk analysis, security testing, and certification due to modifications or changes to computer systems. Evaluates, assesses, or locally tests and approves all hardware, software, and firmware products that provide security features prior to use on any accredited information system or network. Certifies all software prior to installation and use on communications and computer systems. Executes computer security plans and enforces mandatory access control techniques such as trusted routers, bastion hosts, gateways, firewalls, or other methods of information systems protection.

2. Manages the Information Assurance Program. Implements procedures to ensure protection of information transmitted to the squadron, among units in the squadron, and from the squadron units using local or wide area networks, the worldwide web or other communications modes. Utilizes current and future multi-level security products collectively to provide data integrity, confidentiality, authentication, non-repudiation, and access control of the Local Area Network (LAN). Reports to Major Command (MAJCOM), Air Force Communications Agency (AFCA), National Security Agency (NSA), and Air Force Computer Emergency Response Team (AFCERT) all incidents involving viruses, tampering, or unauthorized system entry. Controls access to prevent unauthorized persons from using network facilities. Limits access to privileged programs (i.e., operating system, system parameter and configuration files, and databases), utilities, and security-relevant programs/data files to authorized personnel. Implements methods to prevent or minimize direct access, electronic or other forms of eavesdropping, interpreting electro-mechanical emanations, electronic intercept, telemetry interpretation, and other techniques designed to gain unauthorized access to Automated Data Processing (ADP) information, equipment, or processes. Recognizes such potential and defines vulnerabilities and oversees the installation of physical and technical security barriers to prevent others from improperly obtaining such information.

3. Serves as the Communications Security (COMSEC) Manager for all cryptographic activities including managing the Cryptographic Access Program (CAP). Formulates and develops communications security criteria and requirements for inclusion in mobility, contingency, and exercise plans. Maintains accountability for sensitive cryptographic materials and related COMSEC information. Oversees issuance of COMSEC materials. Maintains COMSEC inventory on the Computerized Management of COMSEC Material (CM2) database. Prepares and evaluates written plans for emergency actions and ensures personnel are fully qualified in the execution of plans. Investigates security incidents to determine the possibility of compromise to COMSEC materials and ensures documentation and reporting to appropriate channels. Performs destruction, receiving, issuing, and inspecting COMSEC material within the most stringent timelines. Furnishes written guidance to user accounts concurring effective dates, accounting procedures, destruction requirements, and physical security of COMSEC keying materials. Performs semi-annual functional reviews of all COMSEC user accounts, physically inspecting the user's COMSEC facilities, reviewing procedures, and audit of all cryptographic holdings. As required, manages the Certification Authority Workstation. Administers the CAP by conducting briefings prior to granting access to cryptographic information. Documents cryptographic access certificates and acts as liaison for scheduling polygraph examinations of personnel enrolled in the program.

DUTIES CONTINUED UNDER EDUCATION

Requirements

Conditions of Employment

Federal employment suitability as determined by a background investigation.
May be required to successfully complete a probationary period.
Participation in direct deposit is mandatory.
Information Assurance Certification is a condition of employment. Per DoD 8570.01-M, the incumbent must achieve the appropriate IAM Level II certification within 12 months of assignment of these duties.
Must be able to obtain/maintain appropriate security clearance

Qualifications

GENERAL EXPERIENCE:
Experience, education, and/or training that has provided a basic knowledge of data processing functions and general management principles that enabled the applicant to understand the stages required to automate a work process. Experience may have been gained in work such as computer operator or assistant, computer sales representative, program analyst, or other positions that required the use or adaptation of computer programs and systems

SPECIALIZED EXPERIENCE (GS-11):
1-year specialized experience equivalent to at least the next lower grade. In addition to the OPM IORs (Alternative A) specialized experience examples, specialized experience includes experience, education, or training that approaches techniques and requirements appropriate to an assigned computer applications area or computer specialty area in an organization. Experience planning the sequence of actions necessary to accomplish the assignment where this entailed coordination with others outside the organizational unit and development of project controls. Experience that required adaptations of guidelines or precedents to meet the needs of the assignment. Experience preparing documentation on cost/benefit studies where is involved summarizing the material and organizing it in a logical fashion.

SPECIALIZED EXPERIENCE (GS-12):
1-year specialized experience equivalent to at least the next lower grade.

Education

GS-11 DUTIES CONTINUED:

4. Implements and manages the Air Force Electronic Key Management System program. This includes system configuration and operation of the Local Management Device, Data Transfer Device, and Key Processor. Initializes the system, performs system backups, determines operator access, and control functions (privilege management), reloads and configures the operating system's parameters. Installs or oversees installation of local COMSEC account hardware and software, including training alternates in the AFEKMS operations. Serves as secure telecommunications units/elements (STU-III) representative and Emissions Security Program (EMSEC) administrator. Develops, implements, and monitors security systems for the protection of controlled cryptographic cards, documents, ciphers, devices, communications centers, and equipment. Validates strapping and configuration options of cryptographic units.

5. Provides technical training and instruction on Computer Security Awareness Training and Education (SATE) program procedures to supervisors, employees, and/or unit security representatives. Utilizes computer-based training for both initial and recurring information protection training. Conveys the degree of reliance on information systems, the potential consequences arising from the lack of secure information systems, the organization's commitment to secure information systems, and the means by which users can protect information systems. Conducts annual COMSEC training for squadron COMSEC users. Uses a wide variety of formal training materials, such as outlines, handouts, publications, films, exhibits, protective devices, and visual aids to provide and/or reinforce information related to communications-computer systems security awareness practices. Promotes security campaigns through oral presentations at local security committee meetings; and extracts, compiles, and prepares security articles, bulletins, and pamphlets for local use by squadron personnel. Maintains required course records.

6. Assists unit personnel with duties involving a wide range of communications and information systems and telecommunications programs consisting of tactical communications equipment, LAN systems, information resource management, and information protection programs.

7. Performs other duties as assigned

GS-12 DUTIES:

1. Performs as the Team Technical Lead during vulnerability assessments of DoD information systems. Utilizes knowledge of systems security principles and concepts, of new Information Technology (IT) security developments, and of the infrastructure protection environment to select appropriate tools to be used by team members. Establishes methodology, and determines best techniques to penetrate computer systems and exploit information within these systems. Directs the team during actual assessments to find vulnerabilities due to improper configurations, missing or improperly applied patches, or procedural errors. Provides assistance to owners of assessed systems by providing recommendations pertaining to implementing security programs designed to anticipate, assess, and minimize system vulnerabilities, to correct deficiencies discovered, and to apply new IT security concepts. Briefs commanders and network administrators on the purpose and findings of the assessment, and prepares reports on the findings. Assists in developing security solutions to correct deficiencies that cannot be fixed with existing solutions.

2. Conducts extensive research of new vulnerabilities discovered in operating systems, application software, infrastructure and firewalls. Investigates, analyses, and develops methods that could be used to exploit those vulnerabilities. Conducts testing on training range to validate findings and to develop and refine methods and procedures to mitigate vulnerabilities.Conducts extensive research of tools currently being used to attack or gain unauthorized access to information networks. Analyzes and tests these tools on training range to determine effectiveness, stability, and scope of the tools. Modifies and refines tools for use in vulnerability assessments to provide the customer with the best possible evaluation of their security posture.

3. Performs information operations that protect and defend (or assess the capability to protect and defend) information and information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation. This includes providing for restoration of information systems by incorporating protection, detection, and reaction capabilities. Conducts risk and vulnerability assessments of DoD information systems to identify associated vulnerabilities, risks and protection needs. Performs OPFOR and other operational tasking. Operates fixed and deployed communications-computer systems. Performs activities such as configuring and monitoring hardware and software for system operation, processing and control of data flow, and client-server multi-user system support including network management or administration. Performs microcomputer fault isolation and restoration actions. Evaluates and assesses vulnerabilities of customer network and application server hardware, operating system software, and peripheral network equipment such as routers, bridges, switches, attached cabling system, network interface cards, modems, multiplexers, and concentrators. Conducts evaluations to ensure compliance with applicable standards. Ensures system backups are performed to ensure expedient restoration of the database for the respective network equipment. Evaluates effectiveness of customer network firewalls.

4. Performs other duties as assigned.

Additional information

Veteran Preference may apply if the first area of consideration are not met.

Veterans Information: Veterans' information must be validated by formal submissions including all necessary supporting documentation. You must provide acceptable documents for eligibility. Acceptable documentation may be:

1. A copy of your DD-214, "Certificate of Release or Discharge from Active Duty," which shows dates of service and discharge under honorable conditions.
2. A "certification" that is a written document from the armed forces that certifies the service member is expected to be discharged or released from active duty service in the armed forces under honorable conditions not later than 120 days after the date the certification is signed.
3. You may obtain a letter from the Department of Veterans Affairs reflecting your level of disability for preference eligibility by visiting a VA Regional Office, contacting a VA call center or online. If claiming over 30% disability a SF-15 is required to be submitted with your letter.

NOTE: Prior to appointment, an agency will require the service member to provide a copy of the DD-214.

If you are a male applicant who was born after 12/31/1959 and are required to register under the Military Selective Service Act, the Defense Authorization Act of 1986 requires that you be registered or you are not eligible for appointment in this agency (https://www.sss.gov/RegVer/wfRegistration.aspx).

Benefits

A career with the U.S. government provides employees with a comprehensive benefits package. As a federal employee, you and your family will have access to a range of benefits that are designed to make your federal career very rewarding. Opens in a new windowLearn more about federal benefits.

Eligibility for benefits depends on the type of position you hold and whether your position is full-time, part-time or intermittent. Contact the hiring agency for more information on the specific benefits offered.

How You Will Be Evaluated

You will be evaluated for this job based on how well you meet the qualifications above.

Once the announcement has closed, your resume and supporting documentation will be used to determine if you meet the qualifications listed on this announcement. If you are minimally qualified, your resume and supporting documentation will be compared to your responses on the assessment questionnaire to determine your level of experience. If you rate yourself higher than is supported by your application package, your responses may be adjusted and/or you may be excluded from consideration for this position. If you are found to be among the top qualified candidates, you will be referred to the selecting official for employment consideration.

Your qualifications will be evaluated on the following competencies (knowledge, skills, abilities, general and specialized experience):

  • Knowledge of a wide range of communications and computer security, techniques, requirements, methods, sources, and procedures for the following programs: Computer Security (COMPUSEC); network security, communications security (COMSEC), Electronic Key Management System (AFEKMS), Emissions Security (EMSEC), STU III, FORTEZZA security, and Security Awareness, Training and Education (SATE). This knowledge is necessary to provide appropriate direction to squadron level functions.
  • Knowledge of concepts, principles, methods, and practices in the information systems security to design, develop, implement, and maintain secure systems and services, assess the effectiveness of current systems security and services, evaluate the feasibility of new systems security and services, and provide advice and guidance on complex issues.
  • In-depth knowledge of a wide variety of communications and computer security concepts, principles, practices, and governing directives to interpret, disseminate, and adapt local policy, and implement instructions for unit and/or squadron personnel. Incumbent must be capable of analyzing and resolving difficult and complex security problems.
  • In-depth knowledge of communications and computer software and programs to protect systems from viruses, data tampering, and unauthorized system entry. This includes knowledge of computer-based instructional software and other media to increase and reinforce communications-computer security awareness.
  • In-depth knowledge of the AFEKMS program and related hardware and software, including knowledge of operating systems, local COMSEC Management Software, relational data base management systems, computer-communications software, and Computerized Management of COMSEC Material (CM2).
  • Knowledge of a wide range of communications and computer techniques, requirements, methods, sources, and procedures, including familiarity with approaches used by ADP and communications organizations in other agencies and/or the private sector to accomplish a variety of assignments in the communications and computer security specialty area.
  • Knowledge of system software and systems development life cycles including systems documentation, design development, configuration management, cost analysis, data administration, systems integration, and testing.

Required Documents

To apply for this position, you must submit a complete Application Package which includes:

1. Your resume showing work schedule, hours worked per week, dates (including Month and Year, e.g., 02/2017, Feb 2017, etc.) of employment and duties performed.

2. The following documents are accepted, and may be required if applicable to your eligibility and/or qualifications for this position. Please use this checklist to make sure you have included other documents required for your application.

a. A copy of your transcript (if using education to qualify)
b. SF-50's (current/former Federal employees)
c. DD-214
d. Other Veterans Document
e. SF-15 (VA Disability Form)
f. SF-50 (Mandatory for Internal Announcements)


RESUME REMINDER-
Your resume must include the following information for each job listed: Job title Duties (be as detailed as possible) Month & year start/end dates (e.g. June 2007 to April 2008) Full-time or part-time status (include hours worked per week) Series and Grade, if applicable, for all Federal positions you have held. Be sure that your resume clearly supports your responses to all of the questions in the assessment by addressing your work experience in detail. Recommended: Even though we do not require a specific resume format, your resume must be clear so that we are able to fully evaluate your qualifications. To ensure you receive appropriate consideration, please list the duties you performed under each individual job title. If we are unable to match your experiences with the positions held, you may lose consideration for this vacancy. We cannot make assumptions regarding your qualifications.

DO NOT COPY THE SPECIALIZED EXPERIENCE QUALIFICATIONS WORD FOR WORD AND PLACE INTO YOUR RESUME; YOU MUST DESCRIBE YOUR PERSONAL EXPERIENCE AS IT PERTAINS TO EACH STATEMENT.

If you are relying on your education to meet qualification requirements:

Education must be accredited by an accrediting institution recognized by the U.S. Department of Education in order for it to be credited towards qualifications. Therefore, provide only the attendance and/or degrees from schools accredited by accrediting institutions recognized by the U.S. Department of Education.

Failure to provide all of the required information as stated in this vacancy announcement may result in an ineligible rating or may affect the overall rating.

How to Apply

To apply for this position, you must complete the online application and submit the documentation specified in the Required Documents section below.

A complete application package must be submitted by 11:59 PM (EST) on the closing date of the announcement to receive consideration.

To begin, click Apply to access the online application. You will need to be logged into your USAJOBS account to apply. If you do not have a USAJOBS account, you will need to create one before beginning the application.

Follow the prompts to select your resume and/or other supporting documents to be included with your application package. You will have the opportunity to upload additional documents to include in your application before it is submitted. Your uploaded documents may take several hours to clear the virus scan process.

After acknowledging you have reviewed your application package, complete the Include Personal Information section as you deem appropriate and click to continue with the application process.

You will be taken to the online application which you must complete in order to apply for the position. Complete the online application, verify the required documentation is included with your application package, and submit the application.

To verify the status of your application, log into your USAJOBS account (https://my.usajobs.gov/Account/Login), all of your applications will appear on the Welcome screen. The Application Status will appear along with the date your application was last updated. For information on what each Application Status means, visit: https://www.usajobs.gov/Help/how-to/application/status/.

Agency contact information

AR HRO Customer Service
Address
AR ANG 188 CMN FT
Bldg 7300-Camp Robinson
North Little Rock, AR 72199-9600
US
Learn more about this agency

Next steps

Once your online application is submitted you will receive a confirmation notification by email. Your application will be evaluated by the Human Resources Office to determine your eligibility for the position. After the evaluation is complete, you will receive another notification regarding the status of your application.


Note: We cannot accept applications on behalf of Federal Agencies. Application instructions are listed within the Job Description.