• Help

    Duties

    Summary

    THIS IS A NATIONAL GUARD TITLE 32 EXCEPTED SERVICE POSITION.

    This position is for an IT SPECIALIST (INFOSEC/NETWORK), Position Description # D2341000 and is part of the ID 224 Cyber Operations Squadron, Idaho Air National Guard.

    INDEFINITE POSITION- MAY CONVERT TO A PERMANENT STATUS WITHOUT FURTHER COMPETITION IF POSITION BECOMES AVAILABLE. SEE MORE INFORMATION IN QUALIFICATIONS SECTION.

    ONLY OPEN TO CURRENT MEMBERS OF THE THE IDAHO AIR NATIONAL GUARD ASSIGNED TO THE 224TH COS.

    Learn more about this agency

    Responsibilities

    This position is located in a Cyberspace Operations unit. This is an Air National Guard (ANG) Dual Status Technician position requiring military membership, compatible military skill assignment, and classification. The purpose of this position is to serve as a Cyber Operations (CO) Technician, ensuring the confidentiality, integrity, and availability of information systems, networks and data through the enhancement of Department of Defense (DoD) information systems security programs, policies, procedures and tools.

    Performs cyberspace operations that protect and defend (or assess the capability to protect and defend) information and information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation. Provides for mission assurance of information systems by incorporating protection, detection, and reaction capabilities. Conducts risk and vulnerability assessments of DoD information systems to identify associated vulnerabilities, risks and protection needs. Operates in-garrison and deployed cyberspace weapon systems. Performs activities such as configuring and monitoring hardware and software for systems operation, processing and control of data flow, and client-server multi-user system support, including network management or administration. Specializes in one or more of the following tasks.

    Evaluates and assesses vulnerabilities of customer network and application server hardware, operating systems, and peripheral network equipment such as routers, bridges, switches, attached cabling system, network interface cards, modems, multiplexers, and concentrators. Conducts evaluations to ensure compliance with applicable standards. Ensures system backups are performed to ensure expedient restoration of the database for the respective network equipment. Evaluates effectiveness of customer network perimeter and internal defenses.

    Hunts for and illuminates advanced persistent threats in DOD Cyber systems and protects priority DOD missions for a specified duration. Detects, discovers and characterizes advanced adversary tradecraft. Monitors target systems/networks for unusual activity to identify and remove adversary activity that evade routine security measures on assigned cyber terrain.

    Performs analysis and design of automated and manual systems related to the network. Provides data for intrusion detection analysis. Determines applicability of established methods. Provides technical advice to users. Examines and evaluates alternative means of satisfying user requirements. Suggests technically feasible approaches and makes recommendations regarding the most effective countermeasures.

    Replicates tactics, techniques and procedures of specific cyber threats as appropriate to evaluate cyber defenses and prepare DOD defensive cyber operations. Assesses posture and processes from an outside perspective. Provides the ability to plan/conduct/enhance counter infiltration operations, mission protection operations, cyber readiness operations, cyber threat emulation operations and counter-measure development.

    Conducts cyber key terrain analysis and mission-oriented mapping, identifying cyber dependencies in mission owner network. Develops courses of action for risk mitigation and mission defense and leads development of written plans which integrate team capabilities to provide these effects.

    Assesses and evaluates vulnerabilities and/or adversary activity in industrial control system (ICS) enclaves. Detects, characterizes, and resolves insecurities in ICS networks. Reviews and analyzes ICS network traffic, configurations, and operating procedures and provides recommendations to improve system security posture.

    Prepares Unit Training Assembly, Annual Training and currency training events for Mission Ready Cyberspace Operators and is prepared for events in order to optimize training time available. Monitors assigned military members' go-no-go readiness status and ensures deficiencies are recognized. Works with scheduling section to provide opportunities for assigned members, to maintain full mission readiness. Ensures training for each event has been prepared and is ready. Coordinates with maintenance section to ensure all assigned equipment is in good working condition and ready for each training and mission event.

    Consults with supervisors, Drill Status Guardsmen, specialists, vendors, and sister Cyberspace Operations Units to procure and maintain training range devices and software that realistically emulate mission networks which are flexibly re-configurable to emulate as needed to prepare for Cyber Protection and Industrial Control System defense missions. Assists with oversight and maintenance of the unit's digital offline training environment.

    Travel Required

    Occasional travel - You may be expected to travel for this position.

    Supervisory status

    No

    Promotion Potential

    11

This job originated on www.usajobs.gov. For the full announcement and to apply, visit www.usajobs.gov/GetJob/ViewDetails/556415300. Only resumes submitted according to the instructions on the job announcement listed at www.usajobs.gov will be considered.