Duties
D2178P01
This position is located in the Plans and Resources Section of a Base Communications Unit. This is an Air National Guard (ANG) Dual Status Technician position requiring military membership, compatible military skill assignment, and classification. The purpose of this position is to serve as the Base Information Assurance Manager who is the wing commander's authority and focal point for Information Assurance. Manages the communication-computer security (COMPUSEC) program, Electronic Key Management System (EKMS), Emission Security, and Information Assurance Awareness Programs.
MAJOR DUTIES:
1. Serves as the Wing Information Assurance Manager. Applies Information Technology (IT) security principles, methods, and security products to protect and maintain the availability, integrity, confidentiality, and accountability of information system resources and information processed throughout the system's life cycle. Establishes and publishes base-wide policy to manage the INFOSEC (also known as COMPUSEC) program and provides advice and guidance in its implementation and in procedures used in the development and operation of systems. Assists all base organizations in the development of their individual INFOSEC program. Disseminates information and ensures computer security practices are adhered to by all functional areas. Reviews, analyzes, and validates certification and accreditation (C&A) packages. Continuously identifies and analyzes threats and vulnerabilities to the information systems to maintain an appropriate level of protection. Ensures computer software designs address information system security requirements. Accomplishes risk analysis, security testing, and certification due to modifications or changes to computer systems. Evaluates, assesses, or locally tests and approves all hardware, software, and firmware products that provide security features prior to use on any accredited information system or network.
2. Manages the Network Security Program. Maintains required information assurance certification IAW DoD 8570.01-M, Federal Information Security Management Act of 2002, Clinger Cohen Act of 1996. Implements and advises on IT security policies and procedures to ensure protection of information transmitted to the installation, among organizations on the installation, and from the installation using Local Area Networks (LAN), Wide Area Networks (WAN), the World Wide Web, or other communications modes. Utilizes current and future multi-level security products collectively to provide data integrity, confidentiality, authentication, non-repudiation, and access control of the LAN. Reports to MAJCOM, Air Force Communications Agency, National Security Agency, and Air Force Computer Emergency Response Team all incidents involving viruses, tampering, or unauthorized system entry. Controls access to prevent unauthorized persons from using network facilities. Limits access to privileged programs (i.e., operating system, system parameter and configuration files, and databases), utilities, and security-relevant programs/data files to authorized personnel. Implements methods to prevent or minimize direct access, electronic or other forms of eavesdropping, interpreting electro-mechanical emanations, electronic intercept, telemetry interpretation, and other techniques designed to gain unauthorized access to IT information, equipment, or processes.
3. Serves as the Communications Security (COMSEC) Manager for all cryptographic activities including managing the Cryptographic Access Program (CAP). Formulates and develops communications security criteria and requirements for inclusion in mobility, contingency, and exercise plans. Maintains accountability for sensitive cryptographic materials and related COMSEC information. Oversees issuance of COMSEC materials. Maintains COMSEC inventory. Prepares and evaluates written plans for emergency actions and ensures personnel are fully qualified in the execution of plans. Investigates COMSEC security incidents to determine the possibility of compromise to COMSEC materials and ensures documentation and reporting to appropriate channels. Performs destruction, receiving, issuing transferring and inspecting COMSEC material within the most stringent timelines.
4. Implements and manages the Electronic Key Management System (EKMS) program. This includes system configuration and operation of the Local Management Device, Data Transfer Device, and Key Processor. Initializes the system, performs system backups, determines operator access, and control functions (privilege management), reloads and configures the operating system's parameters. Installs or oversees installation of local COMSEC account hardware and software, including training alternates in the AFEKMS operations. Serves as secure voice equipment (e.g., STE, secure VoIP) user Representative and Emissions Security Program Manager.
Requirements
Conditions of employment
- NATIONAL GUARD MEMBERSHIP IS REQUIRED. If you are not sure you are eligible for military membership, please contact a National Guard recruiter prior to applying for this position.
- This is an excepted service position that requires membership in a compatible military assignment in the employing state's National Guard, required prior to the effective date of placement.
- Selectee will be required to wear the military uniform.
- Acceptance of an excepted service position constitutes concurrence with these requirements as a condition of employment.
- Applicants who are not currently a member of the National Guard must be eligible for immediate membership and employment in the National Guard in the military grade listed in this announcement.
- Males born after 31 December 1959 must be registered for Selective Service.
- Federal employment suitability as determined by a background investigation.
- May be required to successfully complete a trial period.
- Participation in direct deposit is mandatory.
- Must be able to obtain and maintain a Top Secret Security Clearnace
- Must be able to complete all required training within 6 months of hire.
Qualifications
Military Grades: E7 and Below
Compatible Military Assignments: 1D7XXX
GENERAL EXPERIENCE:
Experience, education or training that has provided a basic knowledge of data processing functions and general management principles that enabled the applicant to understand the stages required to automate a work process. Experience may have been gained in work such as computer operator or assistant, computer sales representative, program analyst, or other positions that required the use or adaptation of computer programs and systems.
SPECIALIZED EXPERIENCE:
Must have at least 36 months experience, education, or training that approaches techniques and requirements appropriate to an assigned computer applications area or computer specialty area in an organization. Experience planning the sequence of actions necessary to accomplish the assignment where this entailed coordination with others outside the organizational unit and development of project controls. Experience that required adaptations of guidelines or precedents to meet the needs of the assignment. Experience preparing documentation on cost/benefit studies where is involved summarizing the material and organizing it in a logical fashion.
Education
If you are using Education to qualify for this position,
You must provide transcripts or other documentation to support your Educational claims. To receive credit for Education, you must provide documentation of proof that you meet the Education requirements for this position.
Additional information
Candidates should be committed to improving the efficiency of the Federal government, passionate about the ideals of our American republic, and committed to upholding the rule of law and the United States Constitution.
A career with the U.S. government provides employees with a comprehensive benefits package. As a federal employee, you and your family will have access to a range of benefits that are designed to make your federal career very rewarding. Opens in a new windowLearn more about federal benefits.
Review our benefits
Eligibility for benefits depends on the type of position you hold and whether your position is full-time, part-time or intermittent. Contact the hiring agency for more information on the specific benefits offered.
How you will be evaluated
You will be evaluated for this job based on how well you meet the qualifications above.
Once the announcement has closed, your resume and supporting documentation will be used to determine if you meet the qualifications listed on this announcement. If you are minimally qualified, your resume and supporting documentation will be compared to your responses on the assessment questionnaire to determine your level of experience. If you rate yourself higher than is supported by your application package, your responses may be adjusted and/or you may be excluded from consideration for this position. If you are found to be among the top qualified candidates, you will be referred to the selecting official for employment consideration.
Your qualifications will be evaluated on the following competencies (knowledge, skills, abilities and other characteristics):
-- Knowledge of a full range of IT security principles, methods, regulations, policies, products, and services sufficient to develop specifications to ensure compliance with security requirements at the LAN level and to plan and coordinate the delivery of an IT security awareness training program for end users at all levels at the installation.
-- Knowledge of a wide range of IT and communication computer security techniques, requirements, methods, sources, and procedures in COMSEC, INFOSEC, KMI, EMSEC, and secure voice (e.g., STE, Secure VoIP) Automated Software security.
-- Skill to develop and evaluate program documentation to include mission needs statements, operational requirements documents and support plans, specifications, proposals, and plans for systems operational test and evaluation of communications and information security systems.
-- Ability to serve as the focal point for information security, providing authoritative advice and assistance on complex, technical, controversial, and precedent setting matters to improve the IT security program comprising many unique organizations and large, complex computer and communications security systems.
-- Ability to apply sound judgment in the use of security knowledge and in weighing the impact of variables such as granting access to classified keying material and other issues that influence the course of actions taken in resolving security questions or issues.
Required Documents
To apply for this position, you must submit a complete Application Package which includes:
1. Your resume showing:
- Contact Information-your name and the best way to contact you.
- Relevant work experience-include the employer's name, job title, start and end dates (month/year), the number of hours worked per week and describe how you meet the required qualifications of the job. Federal jobs should include series and grade.
- Education, certifications or licensures.
It is highly suggested that applicants address the General and Specialized Experience required of the position within their resume or on a separate document. All information provided during the application process will be verified.
Failure to address all General and Specialized Experience requirements may result in non-selection for an interview.
If you are relying on your education to meet qualification requirements:
Education must be accredited by an accrediting institution recognized by the U.S. Department of Education in order for it to be credited towards qualifications. Therefore, provide only the attendance and/or degrees from
schools accredited by accrediting institutions recognized by the U.S. Department of Education.
Failure to provide all of the required information as stated in this vacancy announcement may result in an ineligible rating or may affect the overall rating.