AREA I = All presently employed Delaware Air National Guard permanent federal technicians.
AREA II = All currently active members of the Delaware Air National Guard.
AREA III = Must be willing to become a member of the Delaware Air National Guard
THIS IS A NATIONAL GUARD TITLE 32 EXCEPTED SERVICE POSITION.
This National Guard position is for a IT SPECIALIST (INFOSEC/NETWORK), Position Description Number D2341000 and D2336000 and is part of the DE 166 Operation Group, National Guard.Learn more about this agency
1. Performs cyberspace operations that protect and defend (or assess the capability to protect and defend) information and information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation. Provides for mission assurance of information systems by incorporating protection, detection, and reaction capabilities. Conducts risk and vulnerability assessments of DoD information systems to identify associated vulnerabilities, risks and protection needs. Operates in-garrison and deployed cyberspace weapon systems. Performs activities such as configuring and monitoring hardware and software for systems operation, processing and control of data flow, and client-server multi-user system support, including network management or administration. Specializes in one or more of the following tasks. (45%)
a. Evaluates and assesses vulnerabilities of customer network and application server hardware, operating systems, and peripheral network equipment such as routers, bridges, switches, attached cabling system, network interface cards, modems, multiplexers, and concentrators. Conducts evaluations to ensure compliance with applicable standards. Ensures system backups are performed to ensure expedient restoration of the database for the respective network equipment. Evaluates effectiveness of customer network perimeter and internal defenses.
b. Hunts for and illuminates advanced persistent threats in DOD Cyber systems and protects priority DOD missions for a specified duration. Detects, discovers and characterizes advanced adversary tradecraft. Monitors target systems/networks for unusual activity to identify and remove adversary activity that evade routine security measures on assigned cyber terrain.
c. Performs analysis and design of automated and manual systems related to the network. Provides data for intrusion detection analysis. Determines applicability of established methods. Provides technical advice to users. Examines and evaluates alternative means of satisfying user requirements. Suggests technically feasible approaches and makes recommendations regarding the most effective countermeasures.
d. Replicates tactics, techniques and procedures of specific cyber threats as appropriate to evaluate cyber defenses and prepare DOD defensive cyber operations. Assesses posture and processes from an outside perspective. Provides the ability to plan/conduct/enhance counter infiltration operations, mission protection operations, cyber readiness operations, cyber threat emulation operations and counter-measure development.
e. Conducts cyber key terrain analysis and mission-oriented mapping, identifying cyber dependencies in mission owner network. Develops courses of action for risk mitigation and mission defense and leads development of written plans which integrate team capabilities to provide these effects.
f. Assesses and evaluates vulnerabilities and/or adversary activity in industrial control system (ICS) enclaves. Detects, characterizes, and resolves insecurities in ICS networks. Reviews and analyzes ICS network traffic, configurations, and operating procedures and provides recommendations to improve system security posture.
2. Prepares Unit Training Assembly, Annual Training and currency training events for Mission Ready Cyberspace Operators and is prepared for events in order to optimize training time available. Monitors assigned military members' go-no-go readiness status and ensures deficiencies are recognized. Works with scheduling section to provide opportunities for assigned members, to maintain full mission readiness. Ensures training for each event has been prepared and is ready. Coordinates with maintenance section to ensure all assigned equipment is in good working condition and ready for each training and mission event. (35%)
3. Consults with supervisors, Drill Status Guardsmen, specialists, vendors, and sister Cyberspace Operations Units to procure and maintain training range devices and software that realistically emulate mission networks which are flexibly re-configurable to emulate as needed to prepare for Cyber Protection and Industrial Control System defense missions. Assists with oversight and maintenance of the unit's digital offline training environment. (20%)
Performs other duties as assigned.
Job family (Series)
This job originated on www.usajobs.gov. For the full announcement and to apply, visit www.usajobs.gov/GetJob/ViewDetails/554927000. Only resumes submitted according to the instructions on the job announcement listed at www.usajobs.gov will be considered.