Skip to main content
U.S. flag
Back to results

SUPERVISORY IT CYBERSECURITY SPECIALIST(INFOSEC)

Department of the Navy
U.S. Marine Corps
This job announcement has closed

Summary

This is a public notice flyer to notify interested applicants of anticipated vacancies. Applications will not be accepted through this flyer. Interested applicants must follow the directions in the "How to Apply" section of this flyer to be considered. There may or may not be actual vacancies filled from this flyer. Notice of Result letters will not be sent to applicants who respond to this flyer.

*SEE ADDITIONAL INFORMATION SECTION FOR JOB SUMMARY CONTINUATION.

Overview

Help
Job closed
Open & closing dates
03/16/2023 to 03/30/2023
Salary
$132,368 to - $172,075 per year
Pay scale & grade
GG 14
Location
1 vacancy in the following location:
Fort Meade, MD
1 vacancy
Remote job
No
Telework eligible
No
Travel Required
25% or less - You may be expected to travel for this position.
Relocation expenses reimbursed
No
Appointment type
Permanent
Work schedule
Full-time
Service
Excepted
Promotion potential
14
Supervisory status
Yes
Security clearance
Sensitive Compartmented Information
Drug test
Yes
Position sensitivity and risk
Special-Sensitive (SS)/High Risk
Trust determination process
Announcement number
DE-11861892-23-EG
Control number
713406600

This job is open to

Help

Clarification from the agency

U.S. CITIZENS

Duties

Help
  • Knowledge of cyber defense and vulnerability assessment tools, including open source tools, and their capabilities.
  • Knowledge of computer networking concepts and protocols, and network security methodologies.
  • Knowledge of basic concepts and practices of processing digital forensic data.
  • Knowledge of Intrusion Detection System (IDS)/Intrusion Prevention System (IPS) tools and applications.
  • *SEE QUALIFICATIONS SECTION FOR ADDITIONAL QUALIFYING ITEMS.

Requirements

Help

Conditions of employment

  • Must be a US Citizen.
  • Must be determined suitable for federal employment.
  • Must participate in the direct deposit pay program.
  • New employees to the Department of the Navy will be required to successfully pass the E-Verify employment verification check. To learn more about E-Verify, including your rights and responsibilities, visit e-verify.gov
  • Within the Department of Defense (DoD), the appointment of retired military members within 180 days immediately following retirement date to a civilian position is subject to the provisions of 5 United States Code 3326.
  • Males born after 12-31-59 must be registered for Selective Service.
  • Must possess and maintain a TOP SECRET/SCI security clearance and must obtain and maintain NSA badging forNIPR/SIPR/NSANet accounts.
  • A Counterintelligence Polygraph is required, and a non-disclosure agreement must be signed.
  • Failure to retain this level of security clearance and access will be grounds for reassignment, demotion, or removal from the Federal Service.
  • This position is designated as a Mission Essential (ME) position.
  • This is a Drug Testing Designated Position (TDP). A pre-employment drug test is required, and the position is subject to random drug testing.
  • The incumbent may be required to perform occasional travel (25% or less) which may involve the use of commercial and/or government aircraft.
  • You will be required to complete training, obtain, and maintain a government credit card for travel and travel-related purchases.

Qualifications

ADDITIONAL QUALIFYING ITEMS:

  • Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).
  • Knowledge of incident categories, incident responses, and timelines for responses.
  • Knowledge of incident response and handling methodologies.
  • Knowledge of investigative implications of hardware, Operating Systems, and network technologies.
  • Skill in preserving evidence integrity according to standard operating procedures or national standards.
  • Knowledge of intrusion detection methodologies and techniques for detecting host and network-based intrusions via intrusion detection technologies.
  • Knowledge of information technology (IT) security principles and methods (e.g., firewalls, demilitarized zones, encryption).
  • Knowledge of network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services.
  • Knowledge of investigative implications of hardware, Operating Systems, and network technologies.
  • Skill in analyzing memory dumps to extract information.
  • Skill in using forensic tool suites (e.g., EnCase, Sleuthkit, FTK).
  • Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code).
  • Knowledge of new and emerging information technology (IT) and cybersecurity technologies.
  • Knowledge of how traffic flows across the network (e.g., Transmission Control Protocol [TCP] and Internet Protocol [IP], Open System Interconnection Model [OSI], Information Technology Infrastructure Library, current version [ITIL]).
  • Skill in conducting forensic analyses in multiple operating system environments (e.g., mobile device systems).
  • Skill of identifying, capturing, containing, and reporting malware.
  • Skill in preserving evidence integrity according to standard operating procedures or national standards.
  • Skill in collecting data from a variety of cyber defense resources.
  • Knowledge of data carving tools and techniques (e.g., Foremost).
  • Skill in deep analysis of captured malicious code (e.g., malware forensics).
  • Skill in using binary analysis tools (e.g., Hexedit, command code xxd, hexdump).
  • Knowledge of reverse engineering concepts.
  • Knowledge of anti-forensics tactics, techniques, and procedures.
  • Skill in analyzing anomalous code as malicious or benign.
  • Knowledge of industry standard security models.
  • Develop data management capabilities (e.g., cloud based, centralized cryptographic key management) to include support to the mobile workforce.
  • Skill in applying and incorporating information technologies into proposed solutions.
  • Skill in creating and utilizing mathematical or statistical models.
  • Knowledge of web filtering technologies.
  • Ability to conduct vulnerability scans and recognize vulnerabilities in security systems.
  • Knowledge of circuit analysis.
  • Knowledge of covert communication techniques.
  • Ability to prepare and present briefings.
  • Knowledge of engineering concepts as applied to computer architecture and associated computer hardware/software.
  • Knowledge of various types of computer architectures.
  • Knowledge of system fault tolerance methodologies.
  • Knowledge of how system components are installed, integrated, and optimized.
  • Knowledge of industry-standard and organizationally accepted analysis principles and methods.
  • Knowledge of multi-level/security cross domain solutions.
  • Skill in the use of design methods.
This position is within the Work Category SUPERVISION/MANAGEMENT at Work Level SENIOR, Series and Grade GG-2210-14

Additional qualification information can be found from the following Office of Personnel Management website:https://dodcio.defense.gov/Cyber-Workforce/CES.aspx

Experience refers to paid and unpaid experience, including volunteer work done through National Service programs (e.g., professional, philanthropic, religious, spiritual, community, student, social). Volunteer work helps build critical competencies, knowledge, and skills and can provide valuable training and experience that translates directly to paid employment.

*POSITION DUTIES/RESPONSIBILITIES:
Performs as the Security Operations Center (SOC) Analyst Lead 50% Develops, analyzes, and defines information technology (IT) systems security integration, testing, operations, and maintenance requirements for new enterprise applications and systems on the organization's intranet to ensure compliance with systems security requirements, availability and accessibility of mission-critical applications, and protection from unauthorized access. The incumbent is responsible for managing the SOC section while coordinating efforts with the SOC Operations and DCO Change and Compliance Sections within the DCO directorate. Major duties include implementing and overseeing a comprehensive defensive cyberspace operations strategy to enable cyberspace options aligned to command priorities. The incumbent reports directly to the DCO Director. The incumbent ensures that verification, validation, and accreditation for all SOC systems and projects follow the current DoD, USCYBERCOM, JMOC-E, NSA, Joint Capability Access Platform (JCAP) office, and other JMOC-Local DCO directorates and JMOC guidance. Serves as an advocate for all disciplines within the security program, including developing and subsequent enforcement of the organization's security awareness programs, business continuity and incident response plans, and all governmental compliance issues. Oversees and maintains regulatory requirements and reviews changes for security implications and security applications.


Technical and Analytical Expertise 25%Interprets information technology security policy, guidelines, and procedures for systems processing multiple applications that require differing security controls, and are typically accessed by a moderate-to-large user community. The incumbent is the analytical SME, and responsible for the evaluation methods and techniques to perform substantively professional or analytical work assignments. Possess the ability to analyze and articulate functional requirements and standards. Mastery of system testing and evaluation principles, methods, and tools to test the functionality of security controls and optimize the deployment of such controls and system operations. Possess a mastery level of knowledge regarding Internet technologies to analyze potential threats and recommend solutions that provide security controls while enhancing networked systems' capabilities.

Supervisory and/or Managerial Responsibilities 25% Supervises a group of employees performing work at the GG-13 or equivalent level. Provides administrative and technical supervision necessary for accomplishing the work of the unit.

Performs other duties as assigned.

Education

This job does not have an education qualification requirement.

Additional information

This position is a DoD Cyber Excepted Service (CES) personnel system position in the Excepted Service under 10 U.S.C. 1599f.

This position is covered by the Department of Defense Priority Placement Program.

Several vacancies may be filled.

A tentative offer of employment will be rescinded if the selectee fails to meet the pre-employment requirements, including failure to report to any of the scheduled appointments.

Federal annuitant information: The selection of an annuitant is subject to the Department of Defense and Department of the Navy policy on the employment of annuitants. Policy information may be found at: http://www.secnav.navy.mil/donhr/Documents/CivilianJobs/FedCivAnnuitants.pdf.

The Cyber Interagency Transfer Authority (CITA) permits movement of CES employees appointed under Section 1599f of Title 10 U.S.C. and excepted service employees appointed under Schedule A, Section 213.3106(b)(11) of Title 5 CFR, info cyber workforce positions in the competitive service and movement of competitive service employees into DoD Cyber Workforce positions within the Military Departments and Defense Agencies.

Certain incentives (such as Recruitment, Relocation or Student Loan Repayment) may be authorized to eligible selectees.

A relocation incentive is generally a single payment intended to offset some of the relocation costs experienced by the selectee. A relocation incentive may be authorized.

This position is not telework eligible.

Job Summary Continuation
As a senior analyst, and lead within the Security Operations Center (SOC), provides technical direction, guidance, and oversight of the Defensive Cyber Operations (DCO) Infrastructure. The SOC focuses on incidents and alerts that affect assets' security posture, and protecting intellectual property. The incumbent is responsible for the supervision of the SOC Analysts, whose tasks are to focus on intelligent adversaries, and solve the most challenging problems and technical challenges that emerge to assure SOC's continuing ability to leverage all available personnel assets and tools to conduct the mission and address real-time cyber contingencies. As the lead analyst, provide authoritative analytical, technical, and operational advice to the DCO Director and command leadership to guide and facilitate their executive-level operational decision-making.

How you will be evaluated

You will be evaluated for this job based on how well you meet the qualifications above.

In order to qualify for this position, your resume must provide sufficient experience and/or education, knowledge, skills, and abilities to perform the duties of the specific position for which you are being considered. Your resume is the key means we have for evaluating your skills, knowledge, and abilities as they relate to this position. Therefore, we encourage you to be clear and specific when describing your experience.

As vacancies occur, the Human Resources Office will review your resume to ensure you meet the hiring eligibility and qualification requirements listed in this flyer. You will be rated based on the information provided in your resume, along with your supporting documentation.

If selected, you may be required to provide additional supporting documentation.

If after reviewing your resume and supporting documentation, a determination is made that you inflated your qualifications and/or experience, you may be found ineligible/not qualified.

Please follow all instructions carefully. Errors or omissions may affect your rating or consideration for employment.

All qualification requirements must be met before being considered for any vacancies.

Your session is about to expire!

Your USAJOBS session will expire due to inactivity in 8 minutes. Any unsaved data will be lost if you allow the session to expire. Click the button below to continue your session.