Skip to main content
U.S. flag
Back to results

SUPERVISORY IT CYBERSECURITY SPECIALIST (INFOSEC)

Department of the Army
Army National Guard Units
J6
This job announcement has closed

Summary

THIS IS A NATIONAL GUARD TITLE 5 EXCEPTED SERVICE POSITION.

This National Guard position is for a SUPERVISORY IT CYBERSECURITY SPECIALIST (INFOSEC), Position Description Number T57103000 and is part of the KS Joint Forces Headquarters, National Guard.

Overview

Help
Hiring complete
Open & closing dates
07/19/2024 to 08/02/2024
Salary
$105,029 to - $136,541 per year
Pay scale & grade
GS 13
Location
1 vacancy in the following location:
Topeka, KS
1 vacancy
Remote job
No
Telework eligible
Yes—as determined by the agency policy.
Travel Required
Occasional travel - You may be expected to travel for this position.
Relocation expenses reimbursed
No
Appointment type
Permanent - SELECTED APPLICANT WILL BRING THEIR TENURE WITH THEM. APPOINTMENT TYPE WILL VARY.
Work schedule
Full-time
Service
Excepted
Promotion potential
None
Supervisory status
Yes
Security clearance
Top Secret
Drug test
Yes
Position sensitivity and risk
Critical-Sensitive (CS)/High Risk
Announcement number
KS-12486851-AR-24-306
Control number
800799400

This job is open to

Help

Clarification from the agency

Current on-board indefinite or permanent federal employees or technicians within the J6. This includes AGRs with reemployment rights within this unit. -To verify your eligibility, you must submit a copy of your most recent Notification of Personnel Action, Standard Form 50 (SF 50) reflecting your Tenure in Block 24 (1, 2, or 3).

Duties

Help

A SUPERVISORY IT CYBERSECURITY SPECIALIST, GS-2210-13, serves as the principle advisor to the CIO and the respective staff on the latest industry and technological projections as they pertain to Cyber Security/Information Security for the network enclave infrastructure. Develops policies for organization deployed throughout the headquarters. Must anticipate the effects of new emerging technology and develop policies to control it to prevent security violations. Duties include oversight of ATCTS and accreditation of all systems IAW with all command, Army, JS and DOD security directives, policies and procedures. Ensures that all elements
are in compliance with guidance concerning accreditation of automated information systems, risk management, control of computer viruses, and other similar issues. Ensures that a wide variety of security incidents are investigated and reported IAW with all command, Army, NGB and DOD security directives, policies and procedures to include computer viruses and sanitation of highly classified information from organization.

Provides executive leadership, guidance, and direction to ensure acquisition, development, and retention of a professional, highly capable workforce to accomplish assigned missions. Provides supervision in the daily operations for security activities for the enclave. Coordinates the work of team members to ensure that short-term and long-term goals and objectives are met. Directs, manages, and monitors a system of internal controls that ensure effective and appropriate use of resources.

Establishes performance standards and evaluates employee performance. Reviews and recommends approval of candidates for promotions and recognition. Reviews and approves: workplans to be accomplished by subordinates; priorities and schedules for completion of work; sets broad objectives; monitors subordinate employees' performance in providing IT services; reviews accomplishments; and takes appropriate action of correction when deficiencies are noted. Gives advice, counsels, or instructs individual employees, on both work and administrative matters. Develops and evaluates performance standards; recommends and approves awards; hears and resolves group employee grievances or serious employee complaints. Reviews and makes decisions on serious disciplinary actions involving employees and makes decisions on work problems presented by subordinates. Initiates recognition and disciplinary actions for personnel. Identifies and arranges for appropriate training and development opportunities. Determines and approves training needs and establishes formal training plans.

Collaborates with other supervisors and managers within the directorate to negotiate, decide on, or coordinate work-related changes affecting their operations. Advises their supervisor with broader and higher responsibilities on problems involving the relationship of the work of the cybersecurity teams to broader programs, and its impact on IT Services. Serves as a technical advisor to management. Participates as a member and advisor on special committees and special projects designed to study methods to enhance the use of IT throughout the Command. Participates in developing strategic plans for enhancement of the system environment, developing functional and technical requirements for acquisitions, conducting cost-benefit analyses, feasibility studies, and related activities. Maintains liaison with manufacturers and vendors, professional organizations, and counterparts at other commands/installations and services regarding available products and state-of-the-art technologies and advancements. Develops strategies to incorporate into the organization's inventory such technologies and advancements found to be compatible with user requirements, taking into consideration any affect these technologies and techniques will have on existing architecture and infrastructure. Participates in plans for acquisition and implementation of new equipment, including development of contract documentation. May serve as the contractor's liaison/consultant, providing technical advice and support throughout the acquisition, installation, and maintenance stages. Plans and schedules the installation of new or modified hardware, operating systems, and software applications. Considers factors such as compatibility, conversion or implementation costs, and impact on existing equipment. Directs testing of vendor-provided software. Advises staff on issues pertaining to operating systems and hardware status.

Performs other duties as assigned.

Requirements

Help

Conditions of employment

  • Federal employment suitability as determined by a background investigation.
  • May be required to successfully complete a probationary period.
  • Participation in direct deposit is mandatory.
  • Must obtain and maintain a TOP SECRET clearance level.
  • All certifications are required within 6 months of employment.
  • Incumbent must complete appropriate training and obtain required certifications IAW DoDI 8140, DOD 8570.01M or applicable governing document(s) for Cyber workforce as an IA Manager Level 3.

Qualifications

GENERAL EXPERIENCE: Must have IT-related experience demonstrating each of the four competencies listed below:

  1. Attention to Detail - Is thorough when performing work and conscientious about attending to detail.
  2. Customer Service - Works with clients and customers (that is, any individuals who use or receive the services or products that your work unit produces, including the general public, individuals who work in the agency, other agencies, or organizations outside the Government) to assess their needs, provide information or assistance, resolve their problems, or satisfy their expectations; knows about available products and services; is committed to providing quality products and services.
  3. Oral Communication - Expresses information (for example, ideas or facts) to individuals or groups effectively, taking into account the audience and nature of the information (for example, technical, sensitive, controversial); makes clear and convincing oral presentations; listens to others, attends to nonverbal cues, and responds appropriately.
  4. Problem Solving - Identifies problems; determines accuracy and relevance of information; uses sound judgment to generate and evaluate alternatives, and to make recommendations.

SPECIALIZED EXPERIENCE: Must have one year of specialized experience at the GS-12 level or equivalent. Specialized experience is experience that has equipped the applicant with the following competencies/knowledge, skills, and abilities:
Working the cyber program's standardization and evaluation programs.
Skilled in weapon systems, crew positions, and developing policies used to assess Cyberspace Operator mission readiness.
Experiences included coordinating with MAJCOMs, Numbered Air Forces, Group Standardization and Evaluation, and active-duty counterparts to validate that the unit's evaluation program reflected AF standards and metrics.
Experienced in developing procedures used to assess an operator's currency and readiness to perform contingency and training missions.
Skilled in identifying performance trends and knowledgeable in applying remediation to improve operator performance.
Assess and document a Cyberspace Operator's evaluations and qualifications.
Capabilities to write clear directions for the Crew Information Files that provide timely operational requirements for operators to read before they are cleared to conduct missions.
Knowledgeable of published cyber operation regulations.
Experienced in analyzing, evaluating and examining Cyberspace Operators in order to determine their proficiency levels as required to operate cyberspace weapon systems and meet the of particular crew positions' standards and special mission profiles.
Skilled in conducting scheduled and unscheduled positional, written and supplemental evaluations and examinations.
Experiences included performing cyberspace operations that protected and defended (or assessed the capability to protect and defend) information and information systems that ensured availability, integrity, authentication, confidentiality, and non-repudiation.
Capabilities included information systems mission assurance by incorporating protection, detection, and reaction capabilities.
Experienced in conducting risk and vulnerability assessments of DoD information systems that identified vulnerabilities, risks and protection needs. Provided technical assessments and subject-matter expertise that improved mission and system defenses.
Comprehensive knowledge and understanding of information technology, cyberspace operations, and the unit's tasked missions to develop and monitor unit policies and procedures.
Experienced in delivering assessed changes to higher-level policies, standards, directives or operations manuals that provided impacts on unit plans, policies, programs or operations.
Experiences in the cyber program regulations, procedures, policies, and guidelines.
Skilled in presenting formal and informal briefing and written reports in regard to the Cyberspace program mission readiness.
Skilled in conducting and assessing on-line and classroom training that resulted in effective and efficient training environments.
Experiences included recommendations to senior leaders to adopt new concepts, criteria, and standards for inclusion in cyberspace operations training programs.

Education

This job does not have an education qualification requirement.

Additional information

If you are a male applicant who was born after 12/31/1959 and are required to register under the Military Selective Service Act, the Defense Authorization Act of 1986 requires that you be registered or you are not eligible for appointment in this agency (Register | Selective Service System : Selective Service System (sss.gov)).

Work Schedule: This position works on a 5/4/9 compressed work schedule that consists of a 5 day workweek, then a 4 day workweek ( 8 nine-hour days and 1 eight-hour day and an SDO, Scheduled Day Off) to complete the 80 hour pay period. Work schedule is subject to change based on mission requirements.
Telework: ELIGIBLE FOR SITUATIONAL TELEWORK ONLY, INCLUDING EMERGENCY AND PRESCRIBED "UNSCHEDULED TELEWORK"

ADDITIONAL CONDITIONS OF EMPLOYMENT:

  • Position is designated as OM-ADM-001 within the Defense Cybersecurity Workforce as guided by NIST SP 800-181; National Initiative for Cybersecurity Education, Cybersecurity Workforce Framework. Which establishes the Tasks, Skills, Knowledge and Abilities expected of this position. (https://www.nist.gov/itl/applied-cybersecurity/nice/nice-framework-resource-center).
  • This position is designated as Essential Personnel and may be subject to duty in preparation for, or in response to, a state emergency or disaster declaration. This designation will not exceed 14 calendar days per year unless otherwise approved in advance by the TAG.

How you will be evaluated

You will be evaluated for this job based on how well you meet the qualifications above.

PLEASE BE CLEAR AND SPECIFIC WHEN DESCRIBING YOUR EXPERIENCE. WE WILL NOT MAKE ASSUMPTIONS REGARDING YOUR EXPERIENCE.

Once the announcement has closed, your resume and supporting documentation will be used to determine if you meet the qualifications listed on this announcement. If you are minimally qualified, your resume and supporting documentation will be compared to your responses on the assessment questionnaire to determine your level of experience. If you rate yourself higher than is supported by your application package, your responses may be adjusted and/or you may be excluded from consideration for this position. If you are found to be among the top qualified candidates, you will be referred to the selecting official for employment consideration.

Your session is about to expire!

Your USAJOBS session will expire due to inactivity in 8 minutes. Any unsaved data will be lost if you allow the session to expire. Click the button below to continue your session.