INFORMATION TECHNOLOGY SPECIALIST INFOSEC (Title 5) INDEF

Air National Guard Units

This position is located at the 273 COS, Kelly AFB in San Antonio, TX. The purpose of this position is to serve as an advanced Cyberspace Operator, leveraging a high level of expertise for the preparation and execution of tasked missions.

Texas is one of 9 states with NO state income tax.

As a INFORMATION TECHNOLOGY SPECIALIST INFOSEC (Title 5) INDEF (TITLE 5) with the Texas National Guard, your duties will include, but will not be limited to:

  • Prepares for, maintains currency for, and executes an advanced role in Cyberspace Operations. Utilizes knowledge of systems security principles and concepts of emerging Information Technology (IT) security developments, and of the infrastructure protection environment to select appropriate tools to be used by team members. Establishes methodology and determines best techniques to secure computer systems and to protect cyber key terrain from exploitation of information within these systems and/or to achieve other tasked objectives in cyberspace. Leverages knowledge of multiple entities with a stake in current operations to plan and build appropriate courses of action and training scenarios. Functions in at least one of the following advanced roles: Cyberspace Crew Commander. Develops tactical objectives and/or tactical taskings for a team of Cyberspace Operators. Serves as the liaison between assigned team and other teams or external entities. Cyberspace Operations Controller. Directs tactical execution for a team of Cyberspace Operators. Develops tactical approach and synchronizes actions of multiple qualified operators in order to achieve objectives’. Operations Planner/Scheduler. Represents the unit’s capability, availability, and interests at high-level Operational Planning Team (OPT) meetings to define the mission, environment, enemy, effects, capabilities, overall plan, phasing, operational agreements and contingencies needed to conduct the operation or exercise. Develops a tactical plan for assigned missions and exercises. Works as a member of the mission leadership element to translate operational objectives into tactical objectives comprised of specific tactical tasks. Develops Measures of Effectiveness and Measures of Performance to be used in the assessment of the mission’s or exercises success. Prepares and coordinates operator, resource, facilities and equipment schedules in coordination with unit and flight commanders in order to ensure training, currency, and mission timelines and objectives are met.d. Industrial Control Systems (ICS) Cyberspace Operator. Assesses and evaluates vulnerabilities and/or adversary activity in ICS enclaves. Detects, characterizes, and resolves insecurities in ICS networks. Reviews and analyzes ICS network traffic, configurations, and operating procedures and provides recommendations to improve system security posture.e. National Mission Team Cyberspace Operator. Maintains both Air Force currency and additional national-level requirements to execute US Cyber Command’s Defend-the-Nation priority.
  • Prepares Unit Training Assembly, Annual Training and currency training events for Mission Ready Cyberspace Operators to optimize training time available. Ensures training for each event has been prepared and is ready. Monitors assigned military members’ go-no-go readiness status and ensures deficiencies are recognized. Works with scheduling section to provide opportunities for assigned members to maintain full mission readiness. Coordinates with maintenance section to ensure all assigned equipment is in good working condition and ready for each training and mission event.
  • Conducts extensive research of new vulnerabilities and insecurities discovered in operating systems, application software, infrastructure and boundary protection devices. Investigates, analyzes, and develops methods that could be used to exploit these vulnerabilities. Conducts testing on training range to validate findings and to develop and refine methods and procedures to mitigate vulnerabilities. Coordinates research and findings with the Cyberspace Weapons Officer for inclusion in unit and cyberspace community tactics, techniques, and procedures.
  • Conducts extensive research of tools currently being used to attack or gain unauthorized access to information networks. Analyzes and tests these tools on training range to determine effectiveness, stability, and scope of the tools. Recommends and refines tools for use on Cyberspace Weapon System to provide the customer with the best possible evaluation of their security posture.
  • Performs other duties as assigned.

To be considered for qualification, your resume must include relevant experience with beginning and ending dates of employment/experience reflecting the following:

Specialized Experience Required:
At least 1-year specialized experience equivalent to at least the next lower grade (GS-11) with knowledge of the mission, objectives, terminology, and management practices in the activity, the agency and the department to recognize probable areas of interaction and to serve as a technical expert in systems/network security. AND Knowledge of project management principles and methods sufficient to assign and provide expert technical direction to team members concerning their role in vulnerability assessments. AND Thorough knowledge of network systems design, development, testing, installation, operating, management, and maintenance concepts and methods to provide and protect network services. AND Knowledge of, and skill in applying IT security principles and methods and of IT security products and services sufficient to evaluate and recommend the acquisition of, implement, and disseminate IT security tools, procedures, and practices to protect information assets. AND Extensive knowledge of information technology methods and information protection techniques and procedures. This includes government and Commercial-Off-The-Shelf (COTS) technology using industry standards and an ability to understand the capabilities and limitations of software, utility programs, network management systems and programming. AND Knowledge of hardware, software, and operating systems; systems configuration and integration; maintenance, upgrades, and modifications. AND Extensive knowledge and skill in applying applicable policies, standards, directives, and operations manuals to perform systems analysis, evaluate approaches, offer advice, define alternative approaches, and coordinate requirements regarding the merits of proposed applications. AND Extensive knowledge of hardware, software, network operations functions, firewalls, packet switching communications protocols, and diagnostic tools to analyze difficult and complex system problems and provides resolutions. AND Knowledge of systems analysis, configuration management, and computer equipment requirements related to networks to assess vulnerabilities. AND Skill in evaluating innovative approaches in formulation of programs or systems specifications.

To apply for this job please visit www.usajobs.gov.