Campus Pride Jobs

Mobile Campus Pride Logo

Job Information

Air National Guard Units IT CYBERSECURITY SPECIALIST (INFOSEC) (Title 32) in Oklahoma City, Oklahoma

Summary THIS IS A NATIONAL GUARD TITLE 32 EXCEPTED SERVICE POSITION. This National Guard position is for a IT CYBERSECURITY SPECIALIST (INFOSEC) (Title 32), Position Description Number D2791000 and is part of the OK 137th Special Operations Wing, Oklahoma Air National Guard. Responsibilities This position is located in the 137th Special Operations Communication Squadron, 137th Special Operations Wing, Will Rogers Air National Guard Base. Plan and organize cyber-support activities. Design and develop organizational structures and determine equipment, training and supplies required for systems implementation and support. Interact with customers to promote customer satisfaction. Evaluate operational readiness of communications equipment, network devices, sensors, intrusion detection and related support equipment. Manages and performs Defensive Cyber Operations (DCO) and cyber functions (DoDIN operations) in garrison and in deployed environments. Surveys, secures, protects, defends, preserves, designs, builds, operates and extends data, networks, net-centric capabilities and other designated systems. Serves as an Information Technology Specialist providing Cybersecurity for an Air National Guard Wing's SAP or Sensitive Compartmented Information Facility (SCIF) infrastructure. Operates within the DoD, Air Force and NGB security procedures, operations, and practices. Ensures systems are operated and maintained IAW AFI 17-101, Joint SAP Implementation Guidance (JSIG), and all applicable command and DOD security directives and procedures. Monitors DoD information security bulletins and notifications as they relate to Information Security Vulnerability Alerts (ISVAs). Coordination is required with peer Wing contacts, MAJCOM elements, and commercial vendors. Incumbent is required to ensure compliance with Federal, DoD, Air Force, MAJCOM Information Assurance/Cyber Security policies. Utilizes extensive knowledge of all areas of automation security to establish operating standards and procedures for the installation Information Security Program. Coordinates requirements with the responsible personnel and tracks suspense for completing required actions and reports virus problems in accordance with established procedures. Ensures the confidentiality, integrity and availability of systems and networks by planning, analyzing, developing, and implementing information systems security programs, policies, procedures, and tools. The incumbent serves as a subject matter expert (SME) in advising, posturing, preparing and auditing the organization for Wing Self Inspection Program, Compliance Inspections, and accreditations. May serve in a team lead role for assessment teams, such as a Site Assistance Visit (SAV). Coordinates with Information System Security Managers at the Wing and MAJCOM level to verify or clarify information pertinent to cybersecurity/Information Assurance procedures. Ensures all IS and COTS/GOTS within the enclave are properly certified and accredited in accordance with the Risk Management Framework (RMF), and configuration management policies and practices prior to installing devices/systems. The incumbent has program oversight responsibility for networks and information systems residing within Wing SAP facilities (Joint Worldwide Intelligence Communications System (JWICs) and SCIF facilities for Intelligence ISSO). Duties include ensuring certification and accreditation (C&A) documentation and implementation meets AFI 17-101, JSIG, and Risk Management Framework (RMF) standards for DoD Information Technology. Validates all aspects of RMF are implemented for all assets connected, or to be added, to the local network are accepted and approved by the appropriate Designated Approving Authorities (DAAs). Maintains an operational knowledge base of past, current, and possible future threats to the security posture by attending courses, conferences, seminars, online research, and information sharing between other Cyber Security/Information Security professionals. Using this knowledgebase, the incumbent will be able to devise and implement new policies and procedures to prevent or react to security concerns. Requirements Conditions of Employment Qualifications Military Grades: E5 through E6 Applicants must obtain and maintain a Top Secret/Special Compartmented Information (TS/SCI) security clearance and Information Assurance Management Program Certification Level Technical Level II (IAT II) to qualify for considerations to hire, promote, or reassign. GENERAL EXPERIENCE: All series personnel must be certified at the next higher level before being eligible for that level and must have a minimum of one year on-the-job experience in the grade immediately below the next higher level. An applicant must have a validated understanding of the basic principles and concepts of the occupational series and grade. BASIC EXPERIENCE: Skilled in collecting and analyzing data effectively, efficiently, and accurately. Ability to plan, direct, and coordinate difficult and complex programs. Ability to develop, apply, and adjust cyber program plans to attain agency objectives. Ability to select, develop, and supervise a subordinate staff. Ability to establish and maintain effective working relationships, not only with subordinate staff, but with all levels of key management officials, the latter particularly requiring the exercise of tact, ingenuity, and resourcefulness. Ability to make oral and written presentations in a clear and concise manner. Ability to apply a high level of sound and independent judgment in the solution of cyber program problems and cyber mission requirements. A broad knowledge of and ability to utilize principles, methods, techniques, and systems. Ability to write proper English in reports and presentation formats. Ability to communicate clearly and effectively. Skilled in training, mentoring, and problem solving; and. Skilled in applying procedures and directives by reading and interpreting program material. SPECIALIZED EXPERIENCE: Must have at least 24 months experience as a fully qualified Cyberspace Operator. Experienced in the work at a high level of expertise for the preparation and execution of tasked unit missions. Experiences included preparing, maintaining currency for, and executing an advanced role in Cyberspace Operations. Knowledgeable of systems security principles and concepts of emerging Information Technology (IT) security developments. Experiences included duties directed within the infrastructure protection environment and the selection of appropriate tools for team members. Experienced in the methodologies for determining the better techniques needed to secure computer systems and to protect cyber key terrains from exploitation of information within these cyberspace systems. Experiences included the ability to leverage knowledge of multiple entities with a stake in current operations to plan and build appropriate courses of action and training scenarios. Direct work experiences are required in one or more of the following unit assignments: Cyber-space Crew Commander; Cyberspace Operations Controller; Operations Planner and Scheduler; Industrial Control Systems (ICS) Cyberspace Operator; and National Mission Team Cyberspace Operator. Experiences must include one or more of the following business tasks: Developing tactical objectives or tactical taskings for Cyberspace Operators; liaison duties between assigned team and other teams or external entities; directing tactical execution for a team of Cyberspace Operators; developing tactical approaches and synchronizes actions of multiple qualified operators in order to achieve objectives; representing the unit's capability, availability, and interests at high-level Operational Planning Team (OPT) meetings to define the missions, environments, enemy, effects, capabilities, overall plans, phasing, operational agreements and contingencies needed to conduct the operation or exercise; developing tactical plans for assigned missions and exercises; translating operational objectives into tactical objectives comprised of specific tactical tasks. Experienced in developing Measures of Effectiveness and Measures of Performance that were used in the assessment of mission exercises. Experiences included work accomplished to prepare and coordinate operators, resources, facilities and equipment schedules, in coordination with unit and flight commanders, in order to ensure training, currency, and mission timelines and objectives were met. Experiences may include the assessment and evaluation of mission vulnerabilities and/or adversary activity in ICS enclaves. Experienced in detecting, characterizing, and resolving insecurities in ICS networks. Experienced in conducting reviews and analyzing ICS network traffic, Series GS configurations, and operating procedures and provided methods to improve system security posture. Experienced in the Air Force currency and additional national-level requirements to execute US Cyberspace Command's Defend-the-Nation priority. Skilled in presenting formal and informal briefing and written reports in regard to the Cyberspace program mission readiness. Competent in preparing Unit Training Assembly, Annual Training and currency training events for Mission Ready Cyberspace Operators to optimize training times. Knowledgeable on unit military members' go-or-no-go readiness status and skilled to recognize deficiencies. Experiences included providing opportunities for assigned members to maintain full mission readiness. Experienced in coordinating with the unit's maintenance section to ensure all assigned equipment is in good working condition and ready for each training and mission event. Experienced in conducting extensive research of new vulnerabilities and insecurities in operating systems, application software, infrastructure, and boundary protection devices. Experiences included investigations, analysis, and the development of actions used to exploit these vulnerabilities. Competent on conducting tests to validate findings and to develop and refine methods and procedures to mitigate vulnerabilities within the cyberspace community tactics, techniques, and procedures. Experienced in providing customers with the best possible evaluations of their security postures. Education Must have high school diploma. Dependent on the education requirements for award of the position's compatible military skill (AFSC), an undergraduate degree in Computer and Information Sciences and Support Services from an accredited college/university is desired. Completion of higher education courses in Computer Engineering; Engineering Physics/Applied Physics; Industrial Engineering; Electromechanical Engineering; Electrical, Electronics and Communications; Computer Technology/Computer Systems Technology; Cyber/Electronics Operations and Warfare; Mathematics and Computer Science; Accounting and Computer Science; Computational Science; Management Information Systems and Mathematics; or, courses in business, English composition, computer software, and keyboarding is desired. A graduate degree in Computer and Information Sciences and Support Services is optimum. Additional Information If you are a male applicant who was born after 12/31/1959 and are required to register under the Military Selective Service Act, the Defense Authorization Act of 1986 requires that you be registered or you are not eligible for appointment in this agency (Register | Selective Service System : Selective Service System (sss.gov)). This position may be eligible for Union Membership.

DirectEmployers