Duties
Information System Security Professionals at NSA play a vital role in Security Architecture and Engineering, Communication and Network Security, Software Development Security, Security Operations, Identity and Access Management, Asset Security, and Security and Risk Management:
- Defining information system security requirements and functionality
- Designing system architectures, modeling, and network designs
- Ability to implement systems engineering principles/methodology
- Assessing the effectiveness of security solutions against present and projected threats
- Producing formal and informal reports, briefings, and direct input to the customer regarding security and functionality of requirements, system architecture, application security, and security planning
- Understanding concepts, principles, structure and standards used to design, implement, monitor and secure operating systems, equipment, networks, applications and controls to enforce levels of confidentiality, integrity and availability
- Conducting security engineering/hardening of the latest operating systems, tailoring them for use in the specific mission area
- Reviewing requests for security relevant changes on the mission infrastructures, ensuring risk is adequately mitigated
- Understanding of cryptography, cloud technologies, and ability to program (Python, Java, etc.)
- Knowledge of Systems Lifecycle Development, Threat Intelligence, and Incident Management
- Ensuring appropriate operational security posture is maintained for a system or program; assessing compliance with the Federal Government's Risk Management Framework (RMF), as maintained by the National Institute of Standards and Technology (NIST)
- Providing recommendations on Plan of Action & Milestones (POA&M)
- Working with system owners to accredit/re-accredit critical mission systems
Depending on their experience and preferences, Information System Security Professionals are hired into positions directly supporting a technical mission office or into the Cybersecurity Engineering Development Program (CSEDP). The development program is 3 years in length and combines formal training and diverse work assignments.
Requirements
Conditions of Employment
- Employment is contingent upon successful completion of a security background investigation and polygraph.
Qualifications
The qualifications listed are the minimum acceptable to be considered for the position.
Degree must be in Computer Science or a related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Systems Engineering, Mathematics, Computer Forensics, Cybersecurity, Information Technology, Information Assurance, Information Security, and Information Systems).
ENTRY/DEVELOPMENTAL
Entry is with a Bachelor's degree and no experience. An Associate's degree plus 2 years of relevant experience may be considered for individuals with in-depth experience that is clearly related to the position.
Relevant experience must be in one or more of the following areas: computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, or updating information assurance documentation (for example System Security Plans, Risk Assessment Reports, Certification and Accreditation packages, and System Requirements Traceability Matrices). Network and system administration may account for some, but not all, of the experience. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis course), Undergraduate Cyber Training (UCT), Network Warfare Bridge Course (NWBC)/Intermediate Network Warfare Training (INWT), Cyber Defense Operations will be considered towards the relevant experience requirement (i.e., 20-24 weeks course will count as 6 months of experience, 10-14 weeks will count as 3 months of experience).
Education
The qualifications listed are the minimum acceptable to be considered for the position.
Degree must be in Computer Science or a related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Systems Engineering, Mathematics, Computer Forensics, Cybersecurity, Information Technology, Information Assurance, Information Security, and Information Systems).
Benefits
A career with the U.S. government provides employees with a comprehensive benefits package. As a federal employee, you and your family will have access to a range of benefits that are designed to make your federal career very rewarding. Opens in a new windowLearn more about federal benefits.
Eligibility for benefits depends on the type of position you hold and whether your position is full-time, part-time or intermittent. Contact the hiring agency for more information on the specific benefits offered.
How You Will Be Evaluated
You will be evaluated for this job based on how well you meet the qualifications above.
- Excellent problem-solving, communication and interpersonal skills
- Is motivated
- Works creatively and effectively in various environments
- Can juggle multiple priorities and assignments
- Applies standards, policies, procedures and requirements for ensuring information security - Possesses specialized skills that prevent, assess, and/or mitigate threats to information systems and infrastructures and the information contained in or transmitted by these systems. This may encompass:
-- threat and vulnerability analysis
-- risk mitigation
-- incident response
-- information assurance
-- risk management framework
-- configuration management
-- monitor/define system security plans
-- penetration testing
-- preparing accreditation documentation