Skip to main content
U.S. flag
Back to results

Cybersecurity Senior Specialist #5317

Legislative Branch
Senate
This job announcement has closed

Summary

The Senate Sergeant at Arms is seeking a Cybersecurity Senior Specialist. The complete vacancy announcement and application can be found on the United States Senate Career Page at https://sen.gov/J5NY. This vacancy announcement closes at 7pm EST on the closing date. Late applications will not be accepted.

Overview

Help
Job closed
Open & closing dates
05/15/2023 to 05/30/2023
Salary
$98,000 to - $146,992 per year
Pay scale & grade
AD 10
Location
1 vacancy in the following location:
Washington DC, DC
Few vacancies
Telework eligible
Yes—as determined by the agency policy.
Travel Required
Not required - N/A
Relocation expenses reimbursed
NoThe Senate Sergeant at Arms does not pay for relocation expenses.
Appointment type
Permanent
Work schedule
Full-time
Service
Excepted
Promotion potential
10
Supervisory status
No
Security clearance
Not Required
Drug test
No
Announcement number
req129
Control number
725793000

Duties

Help

Responds to potential localized or widespread security events; uses various reports to help track and isolate user access problems and potential security incidents; creates daily situational reports while manning and supporting the Cyber Security Operations Center. Coordinates and performs automated vulnerability assessments; advises Senate office staff on effective remediation techniques. Coordinates and performs the critical security patch evaluation and certification process for supported Microsoft and non-Microsoft software. Promotes cybersecurity awareness and assists with developing security awareness materials; provides security reviews for Senate Office Cybersecurity operational environments; and assists in providing security training and awareness briefings. Assesses the impact of new cybersecurity threats and identifies and evaluates vulnerabilities within new technology and changes to Senate IT infrastructure. Researches, evaluates, tests, and recommends cybersecurity solutions and controls. Develops, implements, and maintains scripts and other automated tools to identify indicators of intrusion activity and to support effective cybersecurity workflow processes. Performs cybersecurity systems administration tasks and services for Senate employees and vendor maintenance access. Updates management as required on Cybersecurity related issues.

Requirements

Help

Conditions of employment

  • For conditions of employment and citizenship requirements, please visit the job announcement on the United States Senate Career Page at https://sen.gov/J5NY

Qualifications

Work requires a Bachelor’s Degree in computer science, telecommunications, or a related field, and three to five years of progressively responsible experience within a Certified Information Systems Security Professional (CISSP)-type environment or any equivalent combination of education and experience that provides the following knowledge, skills and abilities:

  • Understanding of computer operating systems, applications, and networking; understanding of key principles of information protection; knowledge of data security and access control systems, encryption, firewalls, network- and host-based security technologies and processes.
  • Working knowledge of TCP/IP communications protocols and standards.
  • Ability to identify potential security breaches and implement action plans in conjunction with diverse groups of stakeholders.
  • Ability to interface with individuals at all levels of the organization in a dynamic, fast-paced environment.
  • Ability to communicate functional issues and solutions effectively, both orally and in writing, to individuals possessing a broad range of functional knowledge, skills, and abilities.
  • Ability to re-focus work activities rapidly in response to changing requirements and priorities.
  • Ability to handle sensitive information.
  • Proficiency with office productivity tools including, but not limited to, spreadsheets, word processors, databases, and presentation software.
  • Proficiency with one or more scripting language and/or integrated development environments.

Physical Demands and Working Environment

Work is essentially sedentary with occasional walking, standing, and bending; occasional lifting and carrying desktop computers, computer components, and/or packages of software media. Work is conducted in common office environments and security operations centers. Occasional evening and weekend work may be required to resolve problems, handle incidents, participate in Continuity of Operations (COOP) exercises, or assist SAA staff in meeting critical deadlines. Expected to work unusual and perhaps unexpected hours during a COOP event.

Additional Examples of Work:


• Develop methods to monitor and measure risk, compliance, and assurance efforts.
• Provide ongoing optimization and problem-solving support.
• Provide recommendations for possible improvements and upgrades.
• Review or conduct audits of information technology (IT) programs and projects
• Update deployable cyber defense audit toolkit (e.g., specialized cyber defense software and hardware) to support cyber defense audit missions
• Update applicable cybersecurity policies, regulations, and compliance documents
• Support implementing recommendations regarding the selection of cost-effective security controls to
mitigate risk (e.g., protection of information, systems and processes)
• Contribute to information security risk assessment
• Contribute to testing of cybersecurity developed applications and/or systems
• Contribute to technical (evaluation of technology) and nontechnical (evaluation of people and operations) risk and vulnerability assessments of relevant technology focus areas (e.g., local computing
environment, network and infrastructure, enclave boundary, etc.)
• Senior contributor to audit reports that identify technical and procedural findings, and provide recommended remediation strategies/solutions
• Contribute to analysis of log files, evidence, and other information to determine best methods for identifying the perpetrator(s) of a network intrusion or other crimes
• Support team Lead as required in conducting cybersecurity Audit reviews
• Contribute to development of procedures and test fail-over for system operations transfer to an alternate site based on system availability requirements
• Contribute to documentation of original condition of digital and/or associated evidence (e.g., via digital photographs, written reports, hash function checking)
• Provide technical leadership employing information technology (IT) systems and digital storage media to solve, investigate, and/or prosecute cybercrimes and fraud committed against people and property
• Support systems security operations and maintenance activities are properly documented and updated as necessary
• Contribute to integration and implementation of Cross-Domain Solutions (CDS) in a secure
environment
• Senior contributor to identification and/or determination of whether a security incident is indicative of a violation of law that requires specific legal action
• Senior contributor identifying digital evidence for examination and analysis in such a way as to avoid
unintentional alteration.
• Senior contributor implementing system security measures in accordance with established procedures to ensure confidentiality, integrity, availability, authentication, and non-repudiation

Knowledge, Skills and Abilities:


• Ability to support the design of valid and reliable assessments
• Ability to evaluate organization's risk tolerance and/or risk management approach
• Skill in contributing to application vulnerability assessments
• Skill in identifying gaps in technical delivery capabilities
• Skill in identifying measures or indicators of system performance and the actions needed to improve or correct performance, relative to the goals of the system
• Strong skill in reviewing logs to identify evidence of past intrusions
• Knowledge of penetration testing tools and techniques
• Knowledge of the use of social engineering techniques. (e.g., phishing, baiting, tailgating, etc.)
• Skill in using network analysis tools to identify vulnerabilities. (e.g., fuzzing, nmap, etc.)
• Skill to develop insights about the context of an organization’s threat environment
• Knowledge of advancements in information privacy technologies to ensure organizational adaptation and compliance
• Knowledge of cybersecurity and privacy principles and organizational requirements (relevant to
confidentiality, integrity, availability, authentication, non-repudiation)
• Knowledge of network traffic analysis methods.
• Knowledge of how traffic flows across the network (e.g., Transmission Control Protocol [TCP] and Internet Protocol [IP], Open System Interconnection Model [OSI], Information Technology Infrastructure Library, current version [ITIL])
• Knowledge of packet-level analysis.
• Knowledge of network security architecture concepts including topology, protocols, components, and
principles (e.g., application of defense-in-depth)
• Knowledge of basic system, network, and OS hardening techniques.
• Knowledge of test procedures, principles, and methodologies (e.g., Capabilities and Maturity Model
Integration (CMMI)).
• Knowledge of transmission records (e.g., Bluetooth, Radio Frequency Identification (RFID), Infrared Networking (IR), Wireless Fidelity (Wi-Fi). paging, Voice over Internet Protocol (VoIP)), and jamming techniques that enable transmission of undesirable information, or prevent installed systems from operating correctly.
• Knowledge of Intrusion Detection System (IDS)/Intrusion Prevention System (IPS) tools and applications.
• Knowledge of network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services.
• Knowledge of network traffic analysis (tools, methodologies, processes).
• Knowledge of scripting languages

Education

This position requires that the applicant obtain and maintain an applicable U.S. Government security clearance. Applicants must be U.S. citizens in order for the SAA to submit your application for a security clearance. For education requirements please see Minimum Qualifications.

Additional information

The Sergeant at Arms is an equal opportunity employer in accordance with the requirements of Senate rules, regulations, and applicable Federal Laws. This agency provides reasonable accommodations to applicants with disabilities. If you need a reasonable accommodation for any part of the application and hiring process, please notify the agency. Decisions to grant reasonable accommodations will be determined on a case-by-case basis. Please email SAAHRMedical@saa.senate.gov with “Applicant Accommodation” in the subject line. No moving, relocation or pre-employment travel expenses will be paid for this position, or while in application for this position.

How you will be evaluated

You will be evaluated for this job based on how well you meet the qualifications above.

Your application will be evaluated by a panel on the quality and extent of your total accomplishments, experience, and education. Highly qualified candidates may be interviewed and a reference check conducted.

Your session is about to expire!

Your USAJOBS session will expire due to inactivity in 8 minutes. Any unsaved data will be lost if you allow the session to expire. Click the button below to continue your session.