Opened Area(s) of Consideration: 1, 2, 3Learn more about this agency
DEFINITION OF AREA(S) OF CONSIDERATION:
Area 1 - All current on-board AKNG T5 Competitive or Excepted Service Employees.
Area 2 - All other current onboard AKNG T32 Excepted Service Employees.
Area 3- All current military members of the AKNG.
Selecting Supervisor: Herbert Gladwill
Prepares for, maintains currency for, and executes an advanced role in Cyberspace Operations. Utilizes knowledge of systems security principles and concepts of emerging Information Technology (IT) security developments, and of the infrastructure protection environment to select appropriate tools to be used by team members. Establishes methodology and determines best techniques to secure computer systems and to protect cyber key terrain from exploitation of information within these systems and/or to achieve other tasked objectives in cyberspace. Leverages knowledge of multiple entities with a stake in current operations to plan and build appropriate courses of action and training scenarios. Functions in at least one of the following advanced roles. Cyberspace Crew Commander. Develops tactical objectives and/or tactical taskings for a team of Cyberspace Operators. Serves as the liaison between assigned team and other teams or external entities. Cyberspace Operations Controller. Directs tactical execution for a team of Cyberspace Operators. Develops tactical approach and synchronizes actions of multiple qualified operators in order to achieve objectives. Operations Planner/Scheduler. Represents the unit's capability, availability, and interests at high-level Operational Planning Team (OPT) meetings to define the mission, environment, enemy, effects, capabilities, overall plan, phasing, operational agreements and contingencies needed to conduct the operation or exercise. Develops a tactical plan for assigned missions and exercises. Works as a member of the mission leadership element to translate operational objectives into tactical objectives comprised of specific tactical tasks. Develops Measures of Effectiveness and Measures of Performance to be used in the assessment of the mission's or exercises success. Prepares and coordinates operator, resource, facilities and equipment schedules in coordination with unit and flight commanders in order to ensure training, currency, and mission timelines and objectives are met. Industrial Control Systems (ICS) Cyberspace Operator. Assesses and evaluates vulnerabilities and/or adversary activity in ICS enclaves. Detects, characterizes, and resolves insecurities in ICS networks. Reviews and analyzes ICS network traffic, configurations, and operating procedures and provides recommendations to improve system security posture. National Mission Team Cyberspace Operator. Maintains both Air Force currency and additional national-level requirements to execute US Cyber Command's Defend-the-Nation priority. Prepares Unit Training Assembly, Annual Training and currency training events for Mission Ready Cyberspace Operators to optimize training time available. Ensures training for each event has been prepared and is ready. Monitors assigned military members' go-no-go readiness status and ensures deficiencies are recognized. Works with scheduling section to provide opportunities for assigned members to maintain full mission readiness. Coordinates with maintenance section to ensure all assigned equipment is in good working condition and ready for each training and mission event. Conducts extensive research of new vulnerabilities and insecurities discovered in operating systems, application software, infrastructure and boundary protection devices. Investigates, analyzes, and develops methods that could be used to exploit these vulnerabilities. Conducts testing on training range to validate findings and to develop and refine methods and procedures to mitigate vulnerabilities. Coordinates research and findings with the Cyberspace Weapons Officer for inclusion in unit and cyberspace community tactics, techniques, and procedures. Conducts extensive research of tools currently being used to attack or gain unauthorized access to information networks. Analyzes and tests these tools on training range to determine effectiveness, stability, and scope of the tools. Recommends and refines tools for use on Cyberspace Weapon System to provide the customer with the best possible evaluation of their security posture. Performs other duties as assigned.
Occasional travel - Training, TDYs etc...
Job family (Series)
This job originated on www.usajobs.gov. For the full announcement and to apply, visit www.usajobs.gov/GetJob/ViewDetails/580335800. Only resumes submitted according to the instructions on the job announcement listed at www.usajobs.gov will be considered.