IT SPECIALIST (INFOSEC) Government - Hurlburt Field, FL at Geebo

IT SPECIALIST (INFOSEC)

In order to qualify, you must meet the specialized experience requirements described in the Office of Personnel Management (OPM) Qualification Standards for General Schedule Positions, Qualifications Standards for Information Technology Management (Alt A) Positions; IT Management Series for GS-2210. For more information please click here. BASIC REQUIREMENT OR INDIVIDUAL OCCUPATIONAL REQUIREMENT:
Experience must be IT related; the experience may be demonstrated by paid or unpaid experience and/or completion of specific, intensive training (for example, IT certification), as appropriate GS-5 through GS-15 (or equivalent):
For all positions individuals must have IT-related experience demonstrating each of the four competencies listed below. The employing agency is responsible for identifying the specific level of proficiency required for each competency at each grade level based on the requirements of the position being filled. Attention to Detail - Is thorough when performing work and conscientious about attending to detail. Customer Service - Works with clients and customers (that is, any individuals who use or receive the services or products that your work unit produces, including the general public, individuals who work in the agency, other agencies, or organizations outside the Government) to assess their needs, provide information or assistance, resolve their problems, or satisfy their expectations; knows about available products and services; is committed to providing quality products and services. Oral Communication - Expresses information (for example, ideas or facts) to individuals or groups effectively, taking into account the audience and nature of the information (for example, technical, sensitive, controversial); makes clear and convincing oral presentations; listens to others, attends to nonverbal cues, and responds appropriately. Problem Solving - Identifies problems; determines accuracy and relevance of information; uses sound judgment to generate and evaluate alternatives, and to make recommendations. In addition to meeting the basic requirement above, to qualify for this position you must also meet the qualification requirements listed below:
SPECIALIZED
Experience:
Applicants must have at least one (1) year of specialized experience at the next lower grade GS-12, or equivalent in other pay systems. Examples of specialized experience includes in applying advance IT principles, concepts, methods, standards, and practices in order to provide technical oversight and advisory services regarding IT functions and operations; Expert knowledge on policy development sufficient to develop and interpret policies, procedures, and strategies governing security of command information systems; and Experience in implementing Cyber Security Risk Management Framework for conducting complex cybersecurity risk assessments and Cyber Assurance capabilities to protect confidentiality, integrity, and availability of Special Operations Forces (SOF) information systems, networks, and data. FEDERAL TIME-IN-GRADE (TIG) REQUIREMENT FOR GENERAL SCHEDULE (GS) POSITIONS:
Merit promotion applicants must meet applicable time-in- grade requirements to be considered eligible. One year at the GS-12 level is required to meet the time-in-grade requirements for the GS-13 level. TIG applies if you are in a current GS position or held a GS position within the previous 52 weeks. KNOWLEDGE, SKILLS AND ABILITIES (KSAs):
Your qualifications will be evaluated on the basis of your level of knowledge, skills, abilities and/or competencies in the following areas:
Mastery of and skill in applying a full range of IT security principles, concepts, practices, products, services, and policy (including systems software, database software, immediate access storage technology), and methods for evaluating risk and vulnerability, implementing mitigating improvement, and disseminating security tools and procedures. Knowledge of authorization and assessment of IT systems, and new or revised security measures and countermeasures based on the results of authorization reviews. Knowledge of WAN and LAN system security requirements and techniques for protecting computer and information system from cyber threats. Ability to review and assess new systems, devices, platforms etc. for potential security risks and make sound recommendations in support of the Risk Management Framework process. Ability to research, analyze and advise on AF Special Operations aircraft, programs, missions, and requirements in support of unit or staff assignments with an AF or Joint Operations environment, in the area of Communications and Information, Operations, Intelligence, or deployment on contingency operations. Ability to communicate, both orally and in writing, clearly, concisely, with technical accuracy, and negotiate complex issues. PART-TIME OR UNPAID
Experience:
Credit will be given for appropriate unpaid and or part-time work. You must clearly identify the duties and responsibilities in each position held and the total number of hours per week. VOLUNTEER WORK
Experience:
Refers to paid and unpaid experience, including volunteer work done through National Service Programs (i.e., Peace Corps, AmeriCorps) and other organizations (e.g., professional; philanthropic; religious; spiritual; community; student and social). Volunteer work helps build critical competencies, knowledge and skills that can provide valuable training and experience that translates directly to paid employment. You will receive credit for all qualifying experience, including volunteer experience.
  • Department:
    2210 Information Technology Management
  • Salary Range:
    $91,231 to $118,603 per year

Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.