Qualifications
Candidates must possess specialized experience performing duties equivalent in scope and complexity to the next lower grade level to include:
1.Progressive experience in IT fields which provided the ability to manage cyber security operations in a large, complex population of users, computers, applications, and technologies such as: Defensive cyber infrastructure, cross-domain solutions, forensic analytics, and hardware devices such as servers, desktops, printers, and laptops (Windows, Apple, Android).
2.Demonstrated experience processing systems for accreditation using the Risk Management Framework (RMF) in accordance with Federal Information Processing Standards and DoD Guidance.
3. Demonstrated experience in network and host vulnerability scanning and residual risk identification and mitigation.
4. Knowledge of business and management principles involved in strategic planning, resource allocation, cost/benefit analysis, leadership technique, and coordination of people and resources.
-OR-
A Ph.D. or equivalent doctoral degree or 3 full years of progressively higher level graduate education leading to a Ph.D. or equivalent doctoral degree in the following disciplines: Computer science, engineering, information systems management, mathematics, operations research, statistics, or technology management.
In addition to the above, all candidates must possess IT-related experience equivalent in scope and complexity to the next lower grade level to include:
1. Attention to detail - Experience developing and completing detailed risk management reviews based upon thorough evaluation of the
organization's mission and goals.
2. Customer service - Demonstrated experience providing assistance to both internal and external organizations and agencies in the areas of cybersecurity support, user needs, and system requirements. Experience assessing customers' needs, meeting quality standards, and evaluating customer satisfaction.
3. Oral communication - Experience conducting formal presentations and/or briefings to audiences at varying levels of hierarchy and technical expertise.
4. Demonstrated problem-solving skills - Experience evaluating cyber security IT operations to identify the strengths and weaknesses of alternative solutions, conclusions, or approaches to problems.
Best Qualified Criteria
1. Three (3) years' experience working with complex, integrated IT systems
2. Three (3) years' experience writing, interpreting, and implementing Policies and Plans
3. Three (3) years' experience working as an ISSM or ISSO for a large organization
4. Three (3) years' experience using STIGs, ACAS, APMS, ITAS, RMF, and eMASS to obtain and maintain Authorization To Operate (ATO) for technology systems and solutions
5. Two (2) years' experience working as a System Administrator of Domain-based real and virtual servers using Microsoft Windows Server software especially 2012 R2.6.
6. Two (2) years' experience managing, configuring, and troubleshooting networks and requisite components i.e. VLANs, Routers, Switches, Wireless Access Points, Firewalls, Wireless Controllers, etc.
7. CISSP certified professional in good standing for at least 3 years
Referral lists are based on the qualifications stated in the job announcement. Your qualifications MUST be fully described in your resume. In describing your experience, be clear and specific. NO ASSUMPTIONS WILL BE MADE REGARDING YOUR EXPERIENCE.
Education
If qualfying based off of education, a copy of your transcripts is required to be uploaded with your application. Upon selection an official copy will be requested.
FOREIGN EDUCATION: If you are using education completed in foreign colleges or universities to meet the qualification requirements, you must show the education credentials have been evaluated by a private organization that specializes in interpretation of foreign education programs and such education has been deemed equivalent to that gained in an accredited U.S. education program; or full credit has been given for the courses at a U.S. accredited college or university.