GENERAL EXPERIENCE: Experience, education or training that has provided a basic knowledge of data processing functions and general management principles that enabled the applicant to understand the stages required to automate a work process. Experience may have been gained in work such as computer operator or assistant, computer sales representative, program analyst, or other positions that required the use or adaptation of computer programs and systems.
SPECIALIZED EXPERIENCE: Your resume and any other supporting documentation you wish to provide must clearly substantiate you currently possess
36 months of specialized experience in the following:
- Experience, education, or training that approaches techniques and requirements appropriate to an assigned computer
applications area or computer specialty area in an organization.
- Experience planning the sequence of actions necessary to accomplish the assignment where this entailed coordination with others outside the organizational unit and development of project controls.
- Experience that required adaptations of guidelines or precedents to meet the needs of the assignment.
- Experience preparing documentation on cost/benefit studies where is involved summarizing the material and organizing it in a logical fashion.
KNOWLEDGE, SKILLS AND ABILITIES:
- Knowledge of a full range of IT security principles, methods, regulations, policies, products and services sufficient to develop specifications to ensure compliance with security requirements at the LAN level and to plan and coordinate the delivery of an IT security awareness training program for end users at all levels at the installation.
- Knowledge of a wide range of IT and communication computer security techniques, requirements, methods, sources, and procedures in INFOSEC, EKMS, EMSEC, and secure voice (e.g., STE, Secure VoIP) Automated Software security.
- Knowledge of the EKMS program and related hardware and software, including knowledge of operating systems, local COMSEC Management Software, relational data base management systems, computer-communications software.
- Knowledge of a broad range of telecommunications equipment, operating techniques, concepts, principles, practices, requirements, methods, sources, and procedures (including familiarity with approaches used by telecommunications organizations in other agencies and/or the private sector) sufficient to manage the Communications Security (COMSEC) program, and the Cryptographic Access Program to interpret policy originating from higher organizational levels and to analyze and resolve difficult and complex telecommunications security problems where telecommunications knowledge is paramount.
- Knowledge of system software and systems development life cycles including systems documentation, design development, configuration management, cost analysis, data administration, systems integration, and testing.
- Knowledge of IT security requirements sufficient to develop and evaluate program documentation to include: mission needs statements, operational requirements documents and support plans, specifications, and proposals.
- Skill to develop and evaluate program documentation to include mission needs statements, operational requirements documents and support plans, specifications, proposals, and plans for systems operational test and evaluation of communications and information security systems.
- Ability to serve as the focal point for information security, providing authoritative advice and assistance on complex, technical, controversial, and precedent setting matters to improve the IT security program comprising many unique organizations and large, complex computer and communications security systems.
- Ability to apply sound judgment in the use of security knowledge and in weighing the impact of variables such as granting access to classified keying material and other issues that influence the course of actions taken in resolving security questions or issues.
- Ability to apply policies, principles, and IT security concepts sufficient to carry out activities leading to security C&A.
- Ability to apply findings of assessments to mitigate IT security risks through the implementation of corrective actions.
COMPATIBLE MILITARY ASSIGNMENT: All applications will be considered regardless of AFSC. Incumbent will be required to be assigned to compatible military position within 1 year of selection. The selected individual may be required to attend formal technician school training.
MILITARY GRADE (Prior to Application): Enlisted: E-4 through E-7
UNIT OF ASSIGNMENT: 103d Air Wing or any subordinate unit
MANPOWER NUMBER: 0872-574
POSITION SEQUENCE NUMBER: 1053917
SPECIAL REQUIREMENTS: This position requires a security clearance (Secret) which the applicant must possess or be able to obtain a clearance within one year of appointment. For positions requiring the operation of motor vehicles, candidates must have a valid state driver's license for the state in which they live or are principally employed.
CONDITION OF EMPLOYMENT: This position is covered under the Information Assurance Workforce Improvement Program and requires Information Assurance (IA) Management Level I Certification. IA Baseline Certification is required within 6 months of assignment to the position. Employee will be required to maintain certification status and complete continuous education or sustainment training as required by certification. Failure to receive the proper IA certification may results in removal from this position.