WHAT IS THE IRS INFORMATION TECHNOLOGY DIVISION? The mission of IRS Information Technology is to provide leadership in the delivery of information technology solutions that anticipate and meet enterprise-wide needs by empowering employees to deliver customer-centered, value-creating systems, products, services, and support.Learn more about this agency
See Other Information for Locations
WHAT DOES A CYBER SECURITY INFORMATION TECHNOLOGY SPECIALIST DO? As a Cyber Security Information Technology Specialist you will operate as a project leader whose authority and scope of responsibility crosses organizational and geographic lines. You will develop guidelines that will be used by other specialists in the course of the projects, which have an impact on broad agency goals. In this position, you will lead major national level projects such as the review of proposed new systems, networks, and software designs for potential security risks, recommending mitigation or countermeasures, and resolving integration issues related to the implementation of new systems within the existing infrastructure. The various projects have an impact on broad agency goals. They deal with multi-year plans, new cutting-edge technologies, or issues, and develop new policies or make significant changes to existing policies that have IRS-wide impact.
As a Cyber Security Information Technology Specialist, you will:
- Lead the implementation of security programs designed to anticipate and minimize system vulnerabilities.
- Review proposed new systems, networks, and software designs for potential security risks; recommend mitigation or counter measures and resolve integration issues related to the implementation of new systems within the existing infrastructure.
- Develop contingency plans (Disaster Recover or Business Continuation Plans for information technology systems) to ensure availability and accessibility of network resources.
- Develop long-range plans for IT security systems that anticipate, identify, evaluate, mitigate, and minimize risks associated with IT systems vulnerabilities.
- Coordinate the implementation of security programs across Tier I, II, and III systems, and establish vulnerability reporting criteria.
- Review security incident response policies and identify the need for changes based on new security technologies or threats.
- Implement security requirements, integrate security programs and define the scope and level of detail for security plans and policies.
- Design, deploy, implement, configure, administer and maintain the SPIIDE DLP Environment and recommend strategic direction for the program.
- Provide project management for the consolidation and migration of systems into the production environment.
- Lead server and vendor security product evaluations and technical studies and task forces.
- Direct pilot testing programs.
- Analyze new technology for its impact on various environments.
- Test new releases on supported platforms.
- Develop product configuration standards for use in the environments.
- Develop a holistic cloud security environment effectively by maintaining industry and globally accepted standards.
- In-depth understanding of cloud security concepts, principals and frameworks FedRAMP.
- Develop and deliver Information Technology (IT) Security Policy and Guidance, providing enterprise security controls that safeguard the confidentiality, integrity, and availability of IRS systems and application and ensure IRS security policies are developed in accordance with the Federal Information Security Management Act (FISMA), Office of Management and Budget (OMB), National Institute of Standards and Technology (IST), Department of Treasury and Industry's Best Practices for Information Assurance and Cybersecurity.
- Provide an enterprise cyber monitoring, analytics, and coordination capability 24x7x365.
- Provide fraud analytics monitoring to examine designated dashboards, events, and logs to identify and escalate potential indicators of fraud.
- Coordinate the IRS-wide response to significant cyber and disclosure/communications incidents resulting from the use of IRS information technology systems.
- Perform forensic analysis (handling compromised machines), evaluate/deconstruct malware (e.g. obfuscated code) through open-source and vendor provided tools.
- Develop intrusion detection signatures to identify those specific indicators that are unique to a particular exposure or zero-day vulnerability, delivering threat and awareness/education briefings, coordination of process development, and technical writing.
- Provide security control integration support to IRS system administrators.
- Build applications and resolve build, compile, and debug errors.
- Review and analyze scan results.
- Prepare source code security reports, discuss results and mitigation options with developers and other stakeholders.
- Serve as point of contact for source code review inquiries, schedules reviews and correspond with customers.
WHERE CAN I FIND OUT MORE ABOUT OTHER IRS CAREERS? If you want to find out more about IRS careers, visit us on the web at www.jobs.irs.gov
Occasional travel - 1-5 nights per month may be required.
Job family (Series)
This job originated on www.usajobs.gov. For the full announcement and to apply, visit www.usajobs.gov/GetJob/ViewDetails/542209000. Only resumes submitted according to the instructions on the job announcement listed at www.usajobs.gov will be considered.