Job Overview


About the Agency

Applications for this position are being processed through an on-line applicant assessment system that has been specifically configured for Department of Justice, Office of Justice Programs applicants. Even if you have already developed a resume in USAJOBS, you will need to access this on-line system to complete the application process. To obtain information about this position and TO APPLY, please click on


(The duties described reflect the full performance level of this position)

As a recognized expert in the field of information technology (IT) security, provides authoritative guidance to DOJ IT security program. Develops long-range plans for IT security systems that anticipate, identify, evaluate, mitigate, and minimize risks associated with IT systems vulnerabilities. Manage the implementation of security programs/projects designed to anticipate, assess, and minimize system vulnerabilities. Coordinates the implementation of security programs/projects across platforms and establishes vulnerability reporting criteria. Has responsibility for assuring that Certification and Accreditation (C&A) of the Office of Justice Programs systems are in compliance with NIST and DOJ regulations. Primary duties consist of assuring the protection and the management Office of Justice Programs systems and information assets. Will serve as a key advising role to ITSD Director when implementing new IT security technologies. Manages the OCIO Information Assurance security program/projects by providing guidance and recommendations to management on critical security issues within the context of published accepted Government standards and leading practices within the FISMA, GIRSA, Computer Security Act, OMB Circular A-130 to include all Federal security regulations and DOJ security directives.

Ensures, or participates in ensuring, the confidentiality, integrity, and availability of systems, networks, and data through the planning, analysis, development, implementation, maintenance, and enhancement of information systems security programs, policies, procedures, and tools. Evaluates, acquires, configures, and uses software intended to ensure that automated systems are secure from unauthorized use, viral infection, and other problems that would compromise sensitive information in terms of confidentiality, integrity, and availability, or would compromise other aspects of overall system security.

Assesses policy needs, and develops and provides information technology (IT) policy, procedure, and/or guideline additions, revisions, and/or updates to IT management and staff in order to govern IT activities and accomplish IT projects or programs.

Develops specifications for information technology (IT) contracts and programs involving hardware, software, components, systems, subsystems, and/or services. Prepares statements of work (SOWs), requests for Information (RFIs), and requests for proposals (RFPs). Evaluates computer requirements. Develops evaluation plans. Participates on proposal evaluation teams. Evaluates vendor proposals for adequacy in terms of vendor ability to perform desired actions and produce proper results. Serves as Contracting Officer's Technical Representative (COTR) in monitoring vendor/contractor performance.

Travel Required

  • Not Required

Relocation Authorized

  • No