Skip to main content
U.S. flag
Back to results

Information Technology Cybersecurity Specialist (INFOSEC)

Department of the Navy
Commander, Navy Installations
CNIC Headquarters N94
This job announcement has closed

Summary

This position is assigned to the Nonappropriated Fund (NAF) Information Technology (IT) Branch (N946); Fleet and Family Readiness Support Services (N94); Commander, Navy Installations Command (CNIC); Millington, TN. The position is responsible for the cybersecurity of a program, organization, system, or enclave through the planning, analysis, development, implementation, maintenance, and enhancement of information systems security programs, policies, procedures, and tools.

Overview

Help
Hiring complete
Open & closing dates
12/06/2023 to 12/20/2023
Salary
$70,000 to - $95,000 per year
Pay scale & grade
NF 4
Location
2 vacancies in the following location:
Millington, TN
Remote job
No
Telework eligible
Yes—as determined by the agency policy.
Travel Required
25% or less - You may be expected to travel for this position.
Relocation expenses reimbursed
Yes—You may qualify for reimbursement of relocation expenses in accordance with agency policy.
Appointment type
Permanent
Work schedule
Full-time
Service
Competitive
Promotion potential
4
Supervisory status
No
Security clearance
Not Required
Drug test
No
Position sensitivity and risk
Noncritical-Sensitive (NCS)/Moderate Risk
Trust determination process
Announcement number
24-12232786
Control number
764444400

Duties

Help

In order to qualify for this position, resumes must provide sufficient experience and/or education, knowledge, skills, and ability to perform the duties of the position. Applicant resumes are the key means for evaluating skills, knowledge, and abilities as they relate to this position therefore, applicants are encouraged to be clear and specific when describing experience.

Duties include but are not limited to:

  • Develops policies and procedures to ensure information systems reliability and accessibility and to prevent and defend against unauthorized access to systems, networks, and data.
  • Prepares and maintains information systems assurance and accreditation materials.
  • Assesses threats to and vulnerabilities of computer systems to develop a security risk profile.
  • Collects and maintains data needed to meet system cybersecurity reporting.
  • Develops methods to monitor and measure risk, compliance, and assurance efforts.
  • Ensures cybersecurity-enabled products or other compensating security control technologies reduce identified risk to an acceptable level.
  • Tracks audit findings and recommendations to ensure appropriate mitigation actions are taken.
  • Provides technical expertise in overall risk management practices, continuous monitoring, and improvements to the security posture of the enterprise.
  • Develops policies and procedures to ensure compliance with the Federal Risk and Authorization Management Program (FedRAMP) and Department of Defense FedRAMP+ Cloud Computing data security requirements.
  • Coordinates and conducts systems security evaluations, audits, and reviews.
  • Ensures the rigorous application of information security/information assurance policies, principles, and practices in the delivery of all IT services.

Requirements

Help

Conditions of employment

  • Must successfully pass the E-Verify employment verification check. Any discrepancies must be resolved as a condition of employment.
  • Must pass all applicable records and background check.
  • Participation in Direct Deposit/Electronic Fund Transfer within the first 30 days of employment is required.

Qualifications

Resumes must include information which demonstrates experience and knowledge, skills, and ability (KSAs) as they relate to this position. Applicants are encouraged to be clear and specific when describing their experience level and KSAs.

4-year course of study leading to a bachelor's degree in Cyber Security, Information Assurance, Computer Science, Computer Engineering, Information Technology, Information Systems Management, Business Administration.
OR A degree that provided a minimum of 24 semester hours in one or more of the fields identified above and required the development or adaptation of applications, systems or networks. OR Three years' specialized cybersecurity experience.
  • Knowledge of cybersecurity and privacy principles used to manage risks related to the use, processing, storage, and transmission of information or data.
  • Knowledge of Risk Management Framework requirements.
  • Knowledge of information systems security principles and concepts.
  • Knowledge of security assessment and authorization processes.
  • Knowledge of Federal information systems security protocols sufficient to develop, implement, and coordinate activities designed to protect and restore systems.
  • Skill in the interpretation of IT policies, standards, and guidelines.
  • Skill in the maintenance of systems or network accreditation.
  • Skill in the integration of information systems security with other security disciplines.
  • Skill in analyzing/evaluating data and preparing reports.
  • Ability to coordinate and/or collaborate on security activities.
  • Ability to analyze and recommend resolution of complex issues affecting the specialty area.
  • Ability to provide technical advice to personnel at all levels within CNIC enterprise.
  • Ability to communicate effectively both orally and in writing.

Education

If qualifying all or in-part based on education, proof of education MUST be submitted at time of application in order to be considered.

4-year course of study leading to a bachelor's degree in Cyber Security, Information Assurance, Computer Science, Computer Engineering, Information Technology, Information Systems Management, Business Administration.
OR
A degree that provided a minimum of 24 semester hours in one or more of the fields identified above and required the development or adaptation of applications, systems or networks.
OR
Three years' specialized cybersecurity experience.

Examples of specialized cybersecurity experience include: managing and implementing Risk Management Framework; designation as Information System Security Manager; reviewing and documenting Cloud Computing strategy and security controls; analyzing security strategies to select the best approach or practice; overseeing risk management practices, continuous monitoring, and improvements to the security posture; and applying cybersecurity principles, concepts and methods.

Additional information

Salary is dependent on experience and/or education.

Some positions have special requirements. Selectee may be required to complete a one (1) year probationary period.
Participation in Direct Deposit/Electronic Fund Transfer within the first 30 days of employment is required. We utilize E-Verify to confirm selectee's eligibility to work in the United States. Salary is dependent on experience and/or education.

This announcement may be used to fill additional vacancies within 60 days of issuance of selection certificate. For positions requiring travel more than twice per year, selectee may be required to obtain and maintain in good standing a Government-issued Travel Card for official government travel purposes.

Executive Order 12564 requires a Federal workplace free of illegal drugs. According to the Executive Order, all Federal employees are required to remain drug free throughout their employment. Commander, Navy Installations Command is a Drug-Free Federal Workplace. The use of illegal drugs will not be tolerated, and use of or intoxication by illegal drugs will result in penalties up to and including removal from Federal Service.

How you will be evaluated

You will be evaluated for this job based on how well you meet the qualifications above.

All resumes will be reviewed to determine if they meet the hiring eligibility and qualification requirements listed in this announcement, and will be rated based on the information provided in the resume to determine the level of knowledge, skills and abilities (KSAs) related to the job requirements. Using the qualifications of the position, a predetermined rating criterion of KSAs will be used for each resume. Best qualified applicants will be referred to the hiring manager. The selecting official may choose to conduct interviews.

Your session is about to expire!

Your USAJOBS session will expire due to inactivity in 8 minutes. Any unsaved data will be lost if you allow the session to expire. Click the button below to continue your session.