IT SPECIALIST (NETWORK) Job in Des Moines, IA

Vacancy No. IA-12700419-AF-25-045 Department Air National Guard Units
Salary $89,341.00 to $116,148.00 Grade 12 to 12
Perm/Temp Permanent FT/PT Full-time
Open Date 2/24/2025 Close Date 3/7/2025
Job Link Apply Online Who may apply Status Candidates
Locations:
Des Moines, IA


Summary

IOWA AIR NATIONAL GUARD - TITLE 32 EXCEPTED SERVICE POSITION
This position is restricted to current Military members of the Air Force, Air Reserve, or Air National Guard willing and eligible to become a member of the Iowa Air National Guard. Please contact a recruiter at (515) 261-8535 to verify military membership eligibility.

LOCATION: 132d Wing Combat Training Squadron/Cyber Range, Des Moines, Iowa

This job is open to

Clarification from the agency

Applicants must be willing and eligible to become a member of the 132d Wing, Des Moines, Iowa Air National Guard

Duties

As a IT SPECIALIST (NETWORK), GS-2210-12 your duties are below.

  1. Performs as the Team Technical Lead during vulnerability assessments of DoD information systems. Utilizes knowledge of systems security principles and concepts, of new Information Technology (IT) security developments, and of the infrastructure protection environment to select appropriate tools to be used by team members. Establishes methodology, and determines best techniques to penetrate computer systems and exploit information within these systems. Directs the team during actual assessments to find vulnerabilities due to improper configurations, missing or improperly applied patches, or procedural errors. Provides assistance to owners of assessed systems by providing recommendations pertaining to implementing security programs designed to anticipate, assess, and minimize system vulnerabilities, to correct deficiencies discovered, and to apply new IT security concepts. Briefs commanders and network administrators on the purpose and findings of the assessment, and prepares reports on the findings.
  2. Conducts extensive research of new vulnerabilities discovered in operating systems, application software, infrastructure and firewalls. Investigates, analyses, and develops methods that could be used to exploit those vulnerabilities. Conducts testing on training range to validate findings and to develop and refine methods and procedures to mitigate vulnerabilities.
  3. Conducts extensive research of tools currently being used to attack or gain unauthorized access to information networks. Analyzes and tests these tools on training range to determine effectiveness, stability, and scope of the tools. Modifies and refines tools for use in vulnerability assessments to provide the customer with the best possible evaluation of their security posture.
  4. Performs information operations that protect and defend (or assess the capability to protect and defend) information and information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation. This includes providing for restoration of information systems by incorporating protection, detection, and reaction capabilities. Conducts risk and vulnerability assessments of DoD information systems to identify associated vulnerabilities, risks and protection needs. Performs OPFOR and other operational tasking. Operates fixed and deployed communications-computer systems. Performs activities such as configuring and monitoring hardware and software for system operation, processing and control of data flow, and client-server multi-user system support including network management or administration.
  5. Evaluates and assesses vulnerabilities of customer network and application server hardware, operating system software, and peripheral network equipment such as routers, bridges, switches, attached cabling system, network interface cards, modems, multiplexers, and concentrators. Conducts evaluations to ensure compliance with applicable standards. Ensures system backups are performed to ensure expedient restoration of the database for the respective network equipment. Evaluates effectiveness of customer network firewalls.
  6. Analyzes equipment and software reliability and suitability for vulnerability assessment utilization. Conducts analyses of network usage, hardware and software capabilities, ineffective practices or procedures, equipment shortcomings, and other relevant factors. Recommends methods and procedures and coordinates corrective action to optimize utilization of present equipment. Uses benchmarks, performance measurement, and evaluation data, in conjunction with vulnerability assessment techniques. Develops recommendations or proposals involving a variety of specialized systems and improved operational efficiency.
  7. Exercises authority and oversight of the squadron's digital training range(s), a suite of servers, routers, switches, hubs and other devices which can be configured with a variety of different operating systems in various versions, and with pre-programmed vulnerabilities, to be used in Computer Network Operations (CNO) training.
  8. Consults with subordinates, supervisors, specialists, vendors, and sister IO squadrons to procure and maintain training range devices that realistically emulate Air Force networks and are flexibly re-configurable to emulate the network(s) of a specific Air Force base as needed to prepare for vulnerability assessment missions.
  9. Performs analysis and design of automated and manual systems related to the network. Provides data for intrusion detection analysis. Determines applicability of established methods. Provides technical advice to users. Examines and evaluates alternative means of satisfying user requirements. Suggests technically feasible approaches and makes recommendations regarding the most effective countermeasures.
  10. Performs other duties as assigned. D1749000

Requirements

Conditions of Employment

NATIONAL GUARD MEMBERSHIP IS REQUIRED: This is an excepted position that requires military membership in a compatible military assignment in the Iowa Air National Guard. Selectee will be required to wear the military uniform. Acceptance of this excepted position constitutes concurrence with these requirements as a condition of employment.

APPLICATION MATERIALS MUST BE RECEIVED BY 03/07/2025 . FAILURE TO PROVIDE COMPLETE INFORMATION MAY RESULT IN YOUR NOT RECEIVING CONSIDERATION FOR THIS POSITION. Please refer to the Qualifications and Evaluations Section of this Announcement to understand the qualification requirements, and the How to Apply Section for detailed instruction on applying.

SECURITY CLEARANCE REQUIREMENT: Employment is subject to attaining and maintaining a clearance as required by this position. If the selectee does not possess the applicable security clearance when hired, application must be made within 30 days of the start date. Failure to make application for the required security clearance will result in termination of employment.

Failure to complete prescribed courses may be cause for reassignment or termination of FTS.

Military Rank Requirements: ENLISTED (E-4 to E-7)

Qualifications

In describing your experience, please be clear and specific. We will not make assumptions regarding your experience. Applicants who do not fully address the minimum/specialized experience needed for the position in their resume will not be referred for consideration.

MINIMUM REQUIREMENTS:
Experience, education, and/or training that has provided a basic knowledge of data processing functions and general management principles that enabled the applicant to understand the stages required to automate a work process. Experience may have been gained in work such as computer operator or assistant, computer sales representative, program analyst, or other positions that required the use or adaptation of computer programs and systems

SPECIALIZED EXPERIENCE REQUIREMENTS: GS-2210-12: Must haveexperience in the following:
  • 1-year specialized experience equivalent to at least the next lower grade.
  • Experience, education, or training that approaches techniques and requirements appropriate to an assigned computer applications area or computer specialty area in an organization.
  • Experience planning the sequence of actions necessary to accomplish the assignment where this entailed coordination with others outside the organizational unit and development of project controls.
  • Experience that required adaptations of guidelines or precedents to meet the needs of the assignment.
  • Experience preparing documentation on cost/benefit studies where is involved summarizing the material and organizing it in a logical fashion.

Education

Substitution of Education for Specialized Experience -For the GS-5 level, a 4-year course of study leading to a bachelor's degree may be substituted for the experience requirements. At the GS-7 level, one full year of graduate level education or superior academic achievement. At the GS-9 level, a masters or equivalent graduate degree or 2 full years of progressively higher level graduate education leading to such a degree may be substituted. At the GS-11 level, a Ph.D. or equivalent, or 3 years of progressively higher level graduate education leading to such a degree.

Undergraduate or Graduate Education: Degree in computer science, engineering, information science, information systems management, mathematics, operations research, statistics, or technology management or degree that provided a minimum of 24 semester hours in one or more of the fields identified above and required the development or adaptation of applications, systems or networks.


To receive credit for education, you must provide college transcripts to support your educational claims.

Additional information

ENLISTMENT CASH BONUSES: Acceptance of a technician position may affect any bonus and/or educational assistance that may be applicable. Please contact your Education Office prior to accepting a position with the Iowa Army National Guard.
Participation in direct deposit is mandatory.

If you are a male applicant born after 12/31/1959 and are required to register under the Military Selective Service Act, the Defense Authorization Act of 1986 requires that you are not eligible for appointment in this agency (https://www.sss.gov/RegVer/wfRegistration.aspx).

Benefits

A career with the U.S. government provides employees with a comprehensive benefits package. As a federal employee, you and your family will have access to a range of benefits that are designed to make your federal career very rewarding. Opens in a new windowLearn more about federal benefits.

Review our benefits

Eligibility for benefits depends on the type of position you hold and whether your position is full-time, part-time or intermittent. Contact the hiring agency for more information on the specific benefits offered.

How You Will Be Evaluated

You will be evaluated for this job based on how well you meet the qualifications above.

Once the announcement has closed, your resume and supporting documentation will be used to determine if you meet the qualifications listed on this announcement. If you are found to be among the qualified candidates, you will be referred to the selecting official for employment consideration.

Knowledge, Skills and Abilities required for this position:

  • Thorough knowledge of the mission, objectives, terminology, and management practices in the activity, the agency and the department to recognize probable areas of interaction and to serve as a technical expert in systems/network security.
  • Knowledge of project management principles and methods sufficient to assign and provide expert technical direction to team members concerning their role in vulnerability assessments.
  • Thorough knowledge of network systems design, development, testing, installation, operating, management, and maintenance concepts and methods to provide and protect network services.
  • Knowledge of, and skill in applying IT security principles and methods and of IT security products and services sufficient to evaluate and recommend the acquisition of, implement, and disseminate IT security tools, procedures, and practices to protect information assets.
  • Extensive knowledge of information technology methods and information protection techniques and procedures. This includes government and Commercial Off The Shelf (COTS) technology using industry standards and an ability to understand the capabilities and limitations of software, utility programs, network management systems and programming.
  • Knowledge of hardware, software, and operating systems; systems configuration and integration; maintenance, upgrades, and modifications.
  • Extensive knowledge and skill in applying applicable policies, standards, directives, and operations manuals to perform systems analysis, evaluate approaches, offer advice, define alternative approaches, and coordinate requirements regarding the merits of proposed applications.
  • Extensive knowledge of hardware, software, network operations functions, firewalls, packet switching communications protocols, and diagnostic tools to analyze difficult and complex system problems and provides resolutions.
  • Knowledge of systems analysis, configuration management, and computer equipment requirements related to networks to assess vulnerabilities. Skill in evaluating innovative approaches in formulation of programs or systems specifications.

Required Documents

To apply for this position, you must submit a complete Application Package which includes:

  1. Your resume showing work schedule, hours worked per week, dates (format should include Month and Year) of employment and duties performed.
  2. Additional Supporting Documents (if applicable): Cover Letter, Transcripts, DD 214, SF-50, ect.

If you are relying on your education to meet qualification requirements:

Education must be accredited by an accrediting institution recognized by the U.S. Department of Education in order for it to be credited towards qualifications. Therefore, provide only the attendance and/or degrees from schools accredited by accrediting institutions recognized by the U.S. Department of Education.

Failure to provide all of the required information as stated in this vacancy announcement may result in an ineligible rating or may affect the overall rating.

How to Apply

To apply for this position, you must complete the online application and submit the documentation specified in the Required Documents section below.

A complete application package must be submitted by 11:59 PM (EST) on the closing date of the announcement to receive consideration.

To begin, click Apply to access the online application. You will need to be logged into your USAJOBS account to apply. If you do not have a USAJOBS account, you will need to create one before beginning the application.

Follow the prompts to select your resume and/or other supporting documents to be included with your application package. You will have the opportunity to upload additional documents to include in your application before it is submitted. Your uploaded documents may take several hours to clear the virus scan process.

After acknowledging you have reviewed your application package, complete the Include Personal Information section as you deem appropriate and click to continue with the application process.

You will be taken to the online application which you must complete in order to apply for the position. Complete the online application, verify the required documentation is included with your application package, and submit the application.

To verify the status of your application, log into your USAJOBS account (https://my.usajobs.gov/Account/Login), all of your applications will appear on the Welcome screen. The Application Status will appear along with the date your application was last updated. For information on what each Application Status means, visit: https://www.usajobs.gov/Help/how-to/application/status/.

Agency contact information

Christopher Powders
Address
IA 132nd Wing
3100 McKinley Ave
Des Moines, IA 50321-2799
US

Next steps

Once your online application is submitted you will receive a confirmation notification by email. Your application will be evaluated by the Human Resources Office to determine your eligibility for the position. After the evaluation is complete, you will receive another notification regarding the status of your application.


Note: We cannot accept applications on behalf of Federal Agencies. Application instructions are listed within the Job Description.