Logo
United States Fleet Forces Command

IT SPECIALIST (INFOSEC)

United States Fleet Forces Command, Norfolk, Virginia, United States, 23500


Summary This is a public notice flyer to notify interested applicants of anticipated vacancies. Applications will not be accepted through this flyer. Interested applicants must follow the directions in the "How to Apply" section of this flyer to be considered. There may or may not be actual vacancies filled from this flyer. Notice of Result letters will not be sent to applicants who respond to this flyer. Responsibilities You will serve as the IT Specialist (INFOSEC) in the Cyber Security Division Two (N00SM32) of the Security Office-Security Manager (N00SM), at the Naval Computer and Telecommunications Area Master Station Atlantic (NCTAMS LANT). You will serve as a Vulnerability Security Analyst supporting the Cyber Security efforts by working with the Compliance Officer to develop policy, planning, organization, evaluation of security products and configure existing systems. You will manage the vulnerability management programs, receive and analyze network vulnerability alerts from various sources. You will be responsible for the application of cybersecurity principles, policies, and procedures to ensure information systems’ reliability and accessibility and to prevent and defend against unauthorized access to systems, networks, and data. You will configure hardware and software in support of vulnerability scanning activities and provides consultation and instruction on vulnerability process and techniques. You will perform detailed and complex analysis of hardware, operation systems, data communications and applications to determine adequacy of system security safeguards for configuration control, communications, TEMPEST, Physical, and Cybersecurity. You will serve as a Validator of risk management framework packages; and assembles feedback from Red Teams, Secure Content Managers, Navy Authorizing Officials representatives, and other vulnerability assessments are used to target systems at risk. You will serve as work group leader for both military/civilian employees in the division, provide expert level advice and assistance in the areas of security architecture, systems auditing, security tools, and areas related to the Cyber Condition. Requirements Conditions of Employment Qualifications Applicants must have directly applicable experience that demonstrates the possession of knowledge, skills, abilities, and competencies necessary for immediate success in the position. Qualifying experience may have been acquired in any public or private sector job,but will clearly demonstrate past experience in the application of the particular competencies or knowledge, skills and abilities necessary to successfully perform the duties of the position. Such experience is typically in or directly relates to the work of the position to be filled. You must have IT-related experience demonstrating each of the four competencies listed below: 1. Attention to Detail - Is thorough when performing work and conscientious about attending to detail. Examples of experience demonstrating this competency include: Applying IT security principles to interpret policies, standards, and guidelines to mitigate cybersecurity risks. 2. Customer Service - Works with clients and customers (that is, any individuals who use or receive the services or products that your work unit produces, including the general public, individuals who work in the agency, other agencies, or organizations outside the Government) to assess their needs, provide information or assistance, resolve their problems, or satisfy their expectations; knows about available products and services; is committed to providing quality products and services. Experience demonstrating this competency include: Collaborating and coordinating with point of contacts on information systems products and software. 3. Oral Communication - Expresses information (for example, ideas or facts) to individuals or groups effectively, taking into account the audience and nature of the information (for example, technical, sensitive, controversial); makes clear and convincing oral presentations; listens to others, attends to nonverbal cues, and responds appropriately. Examples of experience demonstrating this competency include: Presenting information to internal and external stakeholders related to security control and vulnerabilities. 4. Problem Solving - Identifies problems; determines accuracy and relevance of information; uses sound judgment to generate and evaluate alternatives, and to make recommendations. Examples of experience demonstrating this competency include: Assessing, identifying and adapting guidelines for risk assessments and vulnerabilities. In addition to my experience demonstrating the four competencies above, I have qualifying experience such as: Experience performing system security evaluations, audits and reviews to detect possible attacks/intrusions. Experience developing evaluation and testing plans to ensure security functions are complete and accurate. Experience conducting on-site and remote analysis of information systems standard security products to determine overall cyber security status at all levels of information security. Experience training end users on cybersecurity awareness. This position is within the Work Category Professional at Work Level Full Performance, Series and Grade GG-2210-12. Experience refers to paid and unpaid experience, including volunteer work done through National Service programs (e.g., professional, philanthropic, religious, spiritual, community, student, social). Volunteer work helps build critical competencies, knowledge, and skills and can provide valuable training and experience that translates directly to paid employment. Education Additional Information This position is covered by the Department of Defense Priority Placement Program. Several vacancies may be filled. A tentative offer of employment will be rescinded if the selectee fails to meet the pre-employment requirements, including failure to report to any of the scheduled appointments. Federal annuitant information: The selection of an annuitant is subject to the Department of Defense and Department of the Navy policy on the employment of annuitants. Policy information may be found at: http://www.secnav.navy.mil/donhr/Documents/CivilianJobs/FedCivAnnuitants.pdf. Veteran's preference does not apply when selecting individuals under this specific hiring authority. However, if you claim veteran's preference, you will be required to submit supporting documentation with your application as described in the Required Documents section below. The work shift may be on a 24/7 schedule (24 hours a day, 7 days a week). Work 5 days on and two days off, 40 hours per week. Shift assignments are based on the needs of the department and command mission. Must be able to work any shift assignment, with adequate notice. The incumbent is required to be available as the security point of contact during off-duty hours on an occasional basis when identified as such. The incumbent will ensure they can be contacted via cellular/home phone in case of emergency during nonduty hours. This position is in the excepted service and does not confer competitive status. In accordance with DoDI 1400.25, Volume 3005, Section 3.15, all employees newly appointed to a CES position will serve a 3-year probationary period. Permanent and term employees currently serving in a probationary period in the competitive service or a probationary or trial period in the excepted service will complete the period as prescribed in their original conditions of employment in the new CES position if they transfer without a break in service or are promoted, demoted, or reassigned to a CES position. This position is a DoD Cyber Excepted Service (CES) personnel system position in the Excepted Service under 10 U.S.C. 1599f. The Cyber Interagency Transfer Authority (CITA) permits movement of CES employees appointed under Section 1599f of Title 10 U.S.C. and excepted service employees appointed under Schedule A, Section 213.3106(b)(11) of Title 5 CFR, into cyber workforce positions in the competitive service and movement of competitive service employees into DoD Cyber Workforce positions within the Military Departments and Defense Agencies.