Campus Pride Jobs

Mobile Campus Pride Logo

Job Information

Air National Guard Units IT SPECIALIST (INFOSEC) in New Castle, Delaware

Summary THIS IS A NATIONAL GUARD TITLE 32 EXCEPTED SERVICE POSITION. This National Guard position is for a IT SPECIALIST (INFOSEC), Position Description Number D2179P01 & D1533P01 is part of the DE 166 Communication Flight, National Guard. Responsibilities GS-2210-09: 1. Administers the COMPUSEC Program and protects Information Technology (IT) assets against unauthorized, accidental, or deliberate modification, disclosure, and destruction of data. Utilizes knowledge of IT principles, methods and security regulations and policies to carry out established base-wide policy to administer the INFOSEC (also known as COMPUSEC) program. Conducts risk assessments to identify possible security violations by analyzing computer assets and establishing security requirements based on possible countermeasures to achieve an optimum level of security. Executes and analyzes the effectiveness of computer security plans and enforces mandatory access control techniques such as trusted routers, bastion hosts, gateways, firewalls, or other methods of information systems protection. Performs program and system test plans devised to test for illegal input and unauthorized access. 2. Administers the Network Security Program. Maintains required information assurance certification IAW DoD 8570.01-M, Federal Information Security Management Act of 2002, Clinger Cohen Act of 1996. Implements procedures to ensure protection of information transmitted to the installation, among organizations on the installation, and from the installation on the local or wide area networks, the World Wide Web, or other communications modes. Utilizes current and future multi-level security products collectively to provide data integrity, confidentiality, authentication, non-repudiation, and access control of the LAN (Local Area Network). Reports all incidents involving viruses, tampering, or unauthorized system entry to appropriate authority. Carries out information technology (IT) security to prevent the penetration of computer systems for espionage, sabotage, or fraudulent purposes. 3. Administers the Communications Security (COMSEC) program. Controls and protects all cryptographic material and administers the Cryptographic Access Program (CAP). Safeguards and controls all COMSEC equipment entered into the COMSEC Management Control System, keying material, COMSEC information, and other COMSEC-related functions. Receives, inventories, issues, transfers, destroys and inspects COMSEC material. Conducts security investigations or advises investigative appointees, as appropriate. Interprets and applies regulations/directives; develops cryptographic plans; determines new COMSEC requirements; and assures proper disposition of excess COMSEC materials including key. 4. Administers the Electronic Key Management System (EKMS) or Key Management Infrastructure (KMI) program. This includes system configuration and operation of the Local Management Device, Data Transfer Device, and Key Processor. Initializes the system, performs system backups, determines operator access, and control functions (privilege management), reloads and configures the operating system's parameters. Installs local COMSEC account hardware and software, including training alternates in the EKMS or KMI operations. Serves as secure voice (e.g., STE, Secure VoIP). GS-2210-11: (1) Manages the COMSEC account for the Wing/Base and subordinate units. Ensures that the COMSEC Responsible Officer's (CRO's), Secure Telephone Unit (STUIII) Voice Responsible Officer's (SRO's) (SVRO's), and FORTEZZA Responsible Officers (FRO's), comply with Air Force, National Guard, state, Federal laws and applicable regulations. Act as the sole point of contact to the wing commander concerning the Wing COMSEC posture. (2) Manages the AFEKMS program for the Wing/Base. Initializes the system, performs system backups, determines operator access and control functions (privilege management), reloads and configures the operating system's parameters. Installs hardware and software and trains alternate(s) in the AFEKMS operations. Provides Data Transfer Device (DTD) Modern Key transfer device training to assigned CROs. (3) Prepares Emergency Action Plans (EAP's) Operating instruction to ensure that the EAPs can be implemented immediately. Itemizes procedures on task cards that are necessary while simultaneously preventing compromise of COMSEC material. Conducts and documents semi-annual dry runs involving all personnel associated with the COMSEC account. (4) Serves as the Base Computer Security (COMPUSEC) Manager. Establishes and publishes base-wide policy, as required, to effectively manage the Wing/Base COMPUSEC programs. Serves as Wing/Base Information Systems Security Manager (ISSM). Assists all Wing/Base organizations in the development of their individual COMPUSEC program. Manages, provides guidance and assists in the preparations of all certification and accreditation packages in accordance with prescribing directives. Makes recommendations to the Designated Approval Authority (DAA). For full copies of the position descriptions, please contact HRO at (302)326-7807. Requirements Conditions of Employment Qualifications Military Grades: E-4/SrA - E-6/TSgt Compatible Military Assignments: 1D7X1Q Preferred SPECIALIZED EXPERIENCE: GS-2210-09: Must have 1-year specialized experience equivalent to at least the next lower grade. In addition to the OPM IORs (Alternative A) specialized experience examples, specialized experience includes experience, education, or training of systems security principles and concepts of emerging Information Technology (IT) security developments. Experiences included duties directed within the infrastructure protection environment and the selection of appropriate tools for team members. Experienced in the methodologies for determining the better techniques needed to secure computer systems and to protect cyber key terrains from exploitation of information within these cyberspace systems. Experiences included the ability to leverage knowledge of multiple entities with a stake in current operations to plan and build appropriate courses of action and training scenarios. Skilled in presenting formal and informal briefing and written reports in regard to the Cyber program mission readiness. Competent in preparing Unit Training Assembly, Annual Training and currency training events for Mission Ready Cyberspace Operators to optimize training times. Knowledgeable on unit military members' go-or-no-go readiness status and skilled to recognize deficiencies. Experiences included working with assigned members to maintain full mission readiness. Experienced in conducting extensive researches of new vulnerabilities and insecurities in operating systems, application software, infrastructure, and boundary protection devices. GS-2210-11: Must have 1-year specialized experience equivalent to at least the next lower grade with minimal supervision. In addition to the OPM IORs (Alternative A) specialized experience examples, specialized experience includes experience, education, or training of systems security principles and concepts of emerging Information Technology (IT) security developments. Experiences included duties directed within the infrastructure protection environment and the selection of appropriate tools for team members. Experienced in the methodologies for determining the better techniques needed to secure computer systems and to protect cyber key terrains from exploitation of information within these cyberspace systems. Experiences included the ability to leverage knowledge of multiple entities with a stake in current operations to plan and build appropriate courses of action and training scenarios. Skilled in presenting formal and informal briefing and written reports in regard to the Cyber program mission readiness. Competent in preparing Unit Training Assembly, Annual Training and currency training events for Mission Ready Cyberspace Operators to optimize training times. Knowledgeable on unit military members' go-or-no-go readiness status and skilled to recognize deficiencies. Experiences included working with assigned members to maintain full mission readiness. Experienced in conducting extensive researches of new vulnerabilities and insecurities in operating systems, application software, infrastructure, and boundary protection devices. QUALITY OF EXPERIENCE: Length of time is not of itself qualifying. Candidates' experience should be evaluated on the basis of duties performed rather than strictly on the rank of the individual; however, established compatibility criteria/assignments must be followed. The applicant's record of experience, training, and education must show possession of the knowledge, skills, and abilities needed to fully perform the duties of the position to be filled. Other Requirements: For positions requiring the operation of motor vehicles, candidates must have a valid state driver's license for the state in which they live or are principally employed. For positions requiring a security clearance (Secret or Top Secret) the applicant must possess or be able to obtain a clearance within one year of appointment. Education master's degree or equivalent graduate degree or 2 full years of progressively higher level graduate education leading to a master's degree or equivalent graduate degree Ph.D. or equivalent doctoral degree or 3 full years of progressively higher level graduate education leading to a Ph.D. or equivalent doctoral degree Additional Information If you are a male applicant who was born after 12/31/1959 and are required to register under the Military Selective Service Act, the Defense Authorization Act of 1986 requires that you be registered or you are not eligible for appointment in this agency (Register | Selective Service System : Selective Service System (sss.gov)).

DirectEmployers