Skip to main content
U.S. flag
Back to results

IT CYBERSECURITY SPECIALIST (INFOSEC)

Department of the Navy
U.S. Marine Corps
This job announcement has closed

Summary

You will serve as a Senior Security Operations Center (SOC) Analyst in the MARFORCYBER Joint Mission Operations Center (JMOC) and is responsible for leading activities related to 24/7/365 device monitoring, event correlation and analysis, incident response support, security configuration monitoring, and mitigation decisions.

*SEE ADDITIONAL INFORMATION SECTION FOR CONTINUATION OF SUMMARY

Overview

Help
Reviewing applications
Open & closing dates
12/15/2022 to 12/23/2022
Salary
$117,763 to - $160,940 per year
Pay scale & grade
GG 13
Location
Fort Meade, MD
1 vacancy
Remote job
No
Telework eligible
No
Travel Required
25% or less - You may be expected to travel for this position.
Relocation expenses reimbursed
No
Appointment type
Permanent
Work schedule
Full-time
Service
Excepted
Promotion potential
13
Supervisory status
No
Security clearance
Top Secret
Drug test
Yes
Position sensitivity and risk
Special-Sensitive (SS)/High Risk
Trust determination process
Announcement number
DE-11726696-23-ARB
Control number
695103800

This job is open to

Help

Clarification from the agency

U.S. Citizens

Duties

Help
  • *SEE QUALIFICATIONS SECTION FOR POSITION DUTIES/RESPONSIBILITIES.

Requirements

Help

Conditions of employment

  • Must be a US Citizen.
  • Must be determined suitable for federal employment.
  • Must participate in the direct deposit pay program.
  • New employees to the Department of the Navy will be required to successfully pass the E-Verify employment verification check. To learn more about E-Verify, including your rights and responsibilities, visit e-verify.gov
  • Within the Department of Defense (DoD), the appointment of retired military members within 180 days immediately following retirement date to a civilian position is subject to the provisions of 5 United States Code 3326.
  • Males born after 12-31-59 must be registered for Selective Service.
  • Per the preliminary nationwide injunction on E.O. 14043, COVID-19 vaccinations will not be implemented or enforced. For more information on vaccine status and workplace safety protocol requirements see Additional Information below.
  • You are required to possess and maintain a TOP SECRET/SCI security clearance prior to entrance on duty. Failure to possess and maintain the required level of clearance may result in the withdrawal of a job offer or removal.
  • The incumbent must obtain and maintain NSA badging for NIPR/SIPR/NSANet accounts.
  • Successful completion of a pre-employment drug test (including marijuana) is required. A tentative offer of employment will be rescinded if you fail to report to the drug test appointment or fail the test. You will be subject to random testing.
  • This position may require travel from normal duty station to CONUS and OCONUS and may include remote or isolated sites. You must be able to travel on military and commercial aircraft for extended periods of time.
  • You will be required to complete training, obtain, and maintain a government credit card for travel and travel-related purchases.
  • This position is designated as a Mission Essential (ME) position.
  • A Counterintelligence Polygraph is required, and a non-disclosure agreement must be signed.
  • This position requires shift work, weekend, holiday work, overtime, and irregular hours

Qualifications

QUALIFYING ITEMS:

  • Serves as a Senior Security Operations Center (SOC) Analyst in the MARFORCYBER Joint Mission Operations Center (JMOC) and is responsible for leading activities related to 24/7/365 device monitoring, event correlation and analysis, incident response support, security configuration monitoring, and mitigation decisions.
  • Desired experience is a minimum of five (5) years of professional experience in incident detection and response, malware analysis, or cyber forensics.
  • Some experience may be substituted for a bachelor's degree in Computer Science, Engineering, Information Technology, Cybersecurity, Cyberspace Operations, or related field.
  • The candidates must have extensive experience analyzing and synthesizing information with other relevant data sources, providing guidance and mentorship to others in cyber threat analysis and operations, evaluating, interpreting, and integrating all sources of information, and fusing computer network attack analysis with counterintelligence and law enforcement investigations.
  • 5 (+) years in an SOC Analyst or Incident Responder/Handler role
  • Full understanding of Tier 1 responsibilities/duties and how the duties feed into Tier 2.
  • The ability to take lead on incident research when appropriate and be able to mentor junior analysts
  • Advanced knowledge of TCP/IP protocols
  • Knowledge of Windows, Linux operating systems
  • Knowledge of Intrusion Detection Systems (IDS) and SIEM technologies; Splunk or ArcSight experience
  • Deep packet and log analysis
  • Some Forensic and Malware Analysis preferred
  • Cyber Threat and Intelligence gathering and analysis
  • Bachelor's degree or equivalent experience
  • Knowledge and experience with scripting and programming are also highly preferred
Desirable certifications include, but are not limited to:
  • GCIH, GCIA, GCFE, GREM, GCFA, GSEC
  • Security +
  • CEH, CISSP, CCNA (Security) or equivalent Certifications.
  • CySA+
This position is within the Work Category PROFESSIONAL at Work Level FULL PERFORMANCE, Series and Grade GG-2210-13.

Additional qualifications information can be found from the following Department of Defense website: https://dodcio.defense.gov/Cyber-Workforce/CES.aspx

Experience refers to paid and unpaid experience, including volunteer work done through National Service programs (e.g., professional, philanthropic, religious, spiritual, community, student, social). Volunteer work helps build critical competencies, knowledge, and skills and can provide valuable training and experience that translates directly to paid employment.
Performs other duties as assigned.

*POSITION DUTIES/RESPONSIBILITIES:
  • Shift Work (rotating) in a high OPTEMPO SOC
  • Monitor, protect, and defend the enterprise against malicious network traffic, ongoing and emerging threats
  • Utilize state of the art technologies such as host analysis, Endpoint Detection & Response tools, log analysis (Splunk) and network forensics (full packet capture solution) to perform hunt and investigative activity to examine endpoint and network-based data
  • Conduct analysis, host and network, forensics, log analysis, and triage in support of incident response
  • Recognize attacker and APT activity, tactics, and procedures as indicators of compromise (IOCs) that can be used to improve monitoring, analysis and incident response
  • Develop and build security content, scripts, tools, or methods to enhance the incident investigation processes
  • Lead Response activities and mentor junior staff
  • Work with key stakeholders to implement remediation plans in response to incidents
  • Effectively investigative and identify root cause findings then communicate findings to stakeholders including technical staff, and leadership
  • Author Standard Operating Procedures (SOPs) and training documentation when needed
  • Generates end-of-shift reports for documentation and knowledge transfer to subsequent analysts on duty

Education


Additional information

This is a public notice flyer to notify interested applicants of anticipated vacancies. Applications will not be accepted through this flyer. Interested applicants must follow the directions in the "How to Apply" section of this flyer to be considered. There may or may not be actual vacancies filled from this flyer. Notice of Result letters will not be sent to applicants who respond to this flyer.

COVID VACCINATION INFORMATION: To comply with the recent preliminary nationwide injunction on Executive Order 14043, Requiring Coronavirus Disease 2019 Vaccination for Federal Employees, the Department of the Navy is not taking any action to implement or enforce the COVID-19 vaccination requirement. New hires will need to provide their vaccination status as well as comply with workplace safety protocols related to masking, physical distancing, testing, travel, and quarantine.

This position is covered by the Department of Defense Priority Placement Program.

This position is a DoD Cyber Excepted Service (CES) personnel system position in the Excepted Service under 10 U.S.C. 1599f.

This position is in the excepted service and does not confer competitive status.

Several vacancies may be filled.

Certain incentives (such as Recruitment, Relocation or Student Loan Repayment) may be authorized to eligible selectees.

A relocation incentive is generally a single payment intended to offset some of the relocation costs experienced by the selectee. A relocation incentive may be authorized.

This position is not telework eligible.

A tentative offer of employment will be rescinded if the selectee fails to meet the pre-employment requirements, including failure to report to any of the scheduled appointments.

Federal annuitant information: The selection of an annuitant is subject to the Department of Defense and Department of the Navy policy on the employment of annuitants. Policy information may be found at: http://www.secnav.navy.mil/donhr/Documents/CivilianJobs/FedCivAnnuitants.pdf.

The Cyber Interagency Transfer Authority (CITA) permits movement of CES employees appointed under Section 1599f of Title 10 U.S.C. and excepted service employees appointed under Schedule A, Section 213.3106(b)(11) of Title 5 CFR, into cyber workforce positions in the competitive service and movement of competitive service employees into DoD Cyber Workforce positions within the Military Departments and Defense Agencies.

*CONTINUATION OF SUMMARY:
The ideal candidate possesses the following: Desired experience is a minimum of five (5) years of professional experience in incident detection and response, malware analysis, or cyber forensics. Some experience may be substituted for a bachelor's degree in Computer Science, Engineering, Information Technology, Cybersecurity, Cyberspace Operations, or related field. The candidates must have extensive experience analyzing and synthesizing information with other relevant data sources, providing guidance and mentorship to others in cyber threat analysis and operations, evaluating, interpreting, and integrating all sources of information, and fusing computer network attack analysis with counterintelligence and law enforcement investigations.

How you will be evaluated

You will be evaluated for this job based on how well you meet the qualifications above.

In order to qualify for this position, your resume must provide sufficient experience and/or education, knowledge, skills, and abilities to perform the duties of the specific position for which you are being considered. Your resume is the key means we have for evaluating your skills, knowledge, and abilities as they relate to this position. Therefore, we encourage you to be clear and specific when describing your experience.

As vacancies occur, the Human Resources Office will review your resume to ensure you meet the hiring eligibility and qualification requirements listed in this flyer. You will be rated based on the information provided in your resume, along with your supporting documentation.

If selected, you may be required to provide additional supporting documentation.

If after reviewing your resume and supporting documentation, a determination is made that you inflated your qualifications and/or experience, you may be found ineligible/not qualified.

Please follow all instructions carefully. Errors or omissions may affect your rating or consideration for employment.

All qualification requirements must be met before being considered for any vacancies.

Your session is about to expire!

Your USAJOBS session will expire due to inactivity in 8 minutes. Any unsaved data will be lost if you allow the session to expire. Click the button below to continue your session.