Do you desire to protect American interests and secure our Nation while building a meaningful and rewarding career? If so, the Department of Homeland Security (DHS) is calling. DHS components work collectively to prevent terrorism, secure borders, enforce and administer immigration laws, safeguard cyberspace and ensure resilience to disasters. The vitality and magnitude of this mission is achieved by a diverse workforce spanning hundreds of occupations. Make an impact; join DHS.
When disaster strikes, America looks to FEMA. Now FEMA looks to you. Join our team and use your talent to support Americans in their times of greatest need. The Federal Emergency Management Agency (FEMA) prepares the nation for all hazards and manages Federal response and recovery efforts following any national incident. We foster innovation, reward performance and creativity, and provide challenges on a routine basis with a well-skilled, knowledgeable, high performance workforce.
Who May Apply
- All U.S. Citizens
- For definitions of terms found in this announcement, please click here
This position is ideal for a candidate who has experience in applying Information Technology (IT) systems security principles, methods and infrastructure environment in order to develop long range plans for IT security systems that anticipate, identify, evaluate, mitigate and minimize the risks associated with IT system vulnerabilities. This position starts at a salary of $74,872.00 (GS-12 step 1). The full performance level of this position is at the GS-12 grade level. Apply for this exciting opportunity to become a member of the Disaster Assistance Improvement Program of the National Processing Service Center Operations Division, Recovery Directorate!
This position is being announced under FEMA's CORE Program (Cadre of On-call Response/Recovery employees). These positions are authorized under P.L. 93-288 to perform temporary disaster work and are funded from the Disaster Relief Fund. Appointments are excepted service, temporary appointments. This is a 2 year temporary appointment in the Excepted Service.
EMERGENCY ASSIGNMENT: For all nonbargaining unit positions, the following applies: Every FEMA employee has regular and recurring emergency management responsibilities, though not every position requires routine deployment to disaster sites. All positions are subject to recall around the clock for emergency management operations, which may require irregular work hours, work at locations other than the official duty station, and may include duties other than those specified in the employee's official position description. Travel requirements in support of emergency operations may be extensive in nature (weeks to months), with little advance notice, and may require employees to relocate to emergency sites with physically austere and operationally challenging conditions.
Relocation expenses are not authorized for this position.
You will serve as the Information System Security Officer for organizations located within the National Processing Service Center Operations Division. You will address the practical and statutory requirements for agency wide computer security programs. Typical work assignments include:
- Acts as the Section 508 Compliance Specialist of the Rehabilitation Act (P.L. 105-220) and the point of contact liaison to systems owners and program managers. Assists 508 coordinators with providing guidance and directions with Section 508 issues.
- Provides agency-wide technical support that ensures that effective Information Technology (IT) security practices and measures are incorporated into the networks, applications, and data of Disaster Assistance Improvement Program (DAIP) systems throughout the planning, analysis, development, implementation, maintenance, and enhancement related to systems' programs, policies, procedures, and tools.
- Leads and conducts structured security certification and accreditation activities for all types of IT solutions supporting Agency assets.
- Conducts security oversight inspections, assessments, and reviews. Documents and reports findings to management. Identifies deficiencies and presents them for consideration as minor, moderate, significant, or material weaknesses. Develops remediation strategies.
- Assesses security events to determine impact. Uses computer forensic principles and notifies the proper authorities in the event of suspected violations.