Skip to main content
U.S. flag
Back to results
 

IT SPECIALIST (INFOSEC/NETWORK) (TITLE 5)

Department of the Air Force
Air National Guard Units

Summary

This position is part of the 147th Attack Wing located on Ellington Field in Houston, TX. The purpose of this position is to serve as a Computer Network Operations (CNO) Technical Expert, ensuring the confidentiality, integrity, and availability of information systems, networks and data through the enhancement of Department of Defense (DoD) information systems security programs, policies, procedures and tools.

Texas is one of 9 states with NO state income tax.

Overview

Help
Accepting applications
Open & closing dates
02/25/2026 to 03/25/2026
Salary
$102,203 to - $132,870 per year
Pay scale & grade
GS 12
Location
1 vacancy in the following location:
Ellington AFB, TX
1 vacancy
Remote job
No
Telework eligible
No
Travel Required
Not required
Relocation expenses reimbursed
No
Appointment type
Permanent
Work schedule
Full-time
Service
Excepted
Promotion potential
None
Supervisory status
No
Security clearance
Top Secret
Drug test
No
Position sensitivity and risk
Special-Sensitive (SS)/High Risk
Trust determination process
Financial disclosure
No
Bargaining unit status
No
Announcement number
TX-12832387-T5
Control number
858729200

Duties

Help

As a IT SPECIALIST (INFOSEC/NETWORK) (TITLE 5) with the Texas National Guard, your duties will include, but will not be limited to:

  • Performs as the Team Technical Lead during vulnerability assessments of DoD information systems. Utilizes knowledge of systems security principles and concepts, of new Information Technology (IT) security developments, and of the infrastructure protection environment to select appropriate tools to be used by team members. Provides assistance to owners of assessed systems by providing recommendations pertaining to implementing security programs designed to anticipate, assess, and minimize system vulnerabilities, to correct deficiencies discovered, and to apply new IT security concepts. Briefs commanders and network administrators on the purpose and findings of the assessment, and prepares reports on the findings. Assists in developing security solutions to correct deficiencies that cannot be fixed with existing solutions.
  • Performs information operations that protect and defend (or assess the capability to protect and defend) information and information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation. This includes providing for restoration of information systems by incorporating protection, detection, and reaction capabilities. Conducts risk and vulnerability assessments of DoD information systems to identify associated vulnerabilities, risks and protection needs. Performs OPFOR and other operational tasking. Operates fixed and deployed communications-computer systems. Performs activities such as configuring and monitoring hardware and software for system operation, processing and control of data flow, and client-server multi-user system support including network management or administration. Evaluates and assesses vulnerabilities of customer network and application server hardware, operating system software, and peripheral network equipment such as routers, bridges, switches, attached cabling system, network interface cards, modems, multiplexers, and concentrators. Conducts evaluations to ensure compliance with applicable standards. Ensures system backups are performed to ensure expedient restoration of the database for the respective network equipment. Evaluates effectiveness of customer network firewalls.
  • Conducts analyses of network usage, hardware and software capabilities, ineffective practices or procedures, equipment shortcomings, and other relevant factors. Recommends methods and procedures and coordinates corrective action to optimize utilization of present equipment. Uses benchmarks, performance measurement, and evaluation data, in conjunction with vulnerability assessment techniques. Develops recommendations or proposals involving a variety of specialized systems and improved operational efficiency. Exercises authority and oversight of the squadron's digital training range(s), a suite of servers, routers, switches, hubs and other devices which can be configured with a variety of different operating systems in various versions, and with pre-programmed vulnerabilities, to be used in Computer Network Operations (CNO) training.
  • Consults with subordinates, supervisors, specialists, vendors, and sister IO squadrons to procure and maintain training range devices that realistically emulate Air Force networks and are flexibly re-configurable to emulate the network(s) of a specific Air Force base as needed to prepare for vulnerability assessment missions. Performs analysis and design of automated and manual systems related to the network. Provides data for intrusion detection analysis. Determines applicability of established methods. Examines and evaluates alternative means of satisfying user requirements. Suggests technically feasible approaches and makes recommendations regarding the most effective countermeasures.
  • Performs analysis and design of automated and manual systems related to the network. Provides data for intrusion detection analysis. Determines applicability of established methods. Provides technical advice to users. Examines and evaluates alternative means of satisfying user requirements. Suggests technically feasible approaches and makes recommendations regarding the most effective countermeasures.
Notes:
  • When something can't be done due to security concerns it is the ISSO's responsibility to suggest an alternative.
  • The ISSO will need to be very familiar with network security as well as log analysis.
  • The ISSO is considered the technical SME for the ISSM and for the ISO. The Commander and the ISSM rely heavily on the ISSO to educate leadership on the importance of the security posture.
  • It is the ISSO's role as apart of the IA shop to have full oversight over CIA.

Requirements

Help

Conditions of employment

Appointment Factor(s): This is a Title 5 Excepted Service position.

Areas of Consideration: Nationwide Excepted. This includes:

  • All currently employed full-time permanent, indefinite and temporary personnel of the Texas Army/Air National Guard.
  • All current members of the Texas Army/Air National Guard
  • US citizens, US nationals or individuals who owe allegiance to the United States
Incentives: Acceptance of a military Federal technician position may result in termination and / or repayment of military incentives. Please check your contract and contact your servicing Education Services (Incentives) office or the Recruiting/Retention office.

Remarks:
  • The Texas National Guard is an Equal Opportunity employer.
  • Cyber Security Codes: 802, 511, 531
  • Direct deposit is mandatory.
  • Must be able to obtain and maintain a top secret security clearance of the within 12 months of appointment.
  • Applicants who meet one of the DoD Priority Placement Program categories below are eligible to apply with this preference.
  • Trial period required (see remarks)
  • This is a Non-Bargaining Unit position.
  • This position conducts information assurance functions. The incumbent shall comply with the requirements of the certification program and will be required to obtain and maintain certification. Certification requirements are outlined in DoD Instruction 8570.01-M
  • Work may require access to classified information.
  • The incumbent of this position description must have, at a minimum, a completed National Agency Check (NAC) prior to position assignment.
  • Irregular and overtime (compensatory) hours may be required to support operational requirements or contingencies.
  • The employee may be required to travel in military and/or commercial aircraft to perform temporary duty assignments.

Qualifications

In describing your experience in your resume, please be clear and specific. Assumptions regarding your experience will not be made. To be considered for qualification, your resume must include relevant experience with beginning and ending dates of employment/experience reflecting the following:

Specialized Experience Required

At least 1-year specialized experience equivalent to at least the next lower grade (GS-11). In addition to the OPM IORs (Alternative A) specialized experience examples, specialized experience includes experience, education, or training that approaches techniques and requirements appropriate to an assigned computer applications area or computer specialty area in an organization. Experience planning the sequence of actions necessary to accomplish the assignment where this entailed coordination with others outside the organizational unit and development of project controls. Experience that required adaptations of guidelines or precedents to meet the needs of the assignment. Experience preparing documentation on cost/benefit studies where is involved summarizing the material and organizing it in a logical fashion. Thorough knowledge of the mission, objectives, terminology, and management practices in the activity, the agency and the department to recognize probable areas of interaction and to serve as a technical expert in systems/network security. Knowledge of project management principles and methods sufficient to assign and provide expert technical direction to team members concerning their role in vulnerability assessments. Thorough knowledge of network systems design, development, testing, installation, operating, management, and maintenance concepts and methods to provide and protect network services. -Knowledge of, and skill in applying IT security principles and methods and of IT security products and services sufficient to evaluate and recommend the acquisition of, implement, and disseminate IT security tools, procedures, and practices to protect information assets. Extensive knowledge of information technology methods and information protection techniques and procedures. This includes government and Commercial Off The Shelf (COTS) technology using industry standards and an ability to understand the capabilities and limitations of software, utility programs, network management systems and programming. Knowledge of hardware, software, and operating systems; systems configuration and integration; maintenance, upgrades, and modifications. Extensive knowledge and skill in applying applicable policies, standards, directives, and operations manuals to perform systems analysis, evaluate approaches, offer advice, define alternative approaches, and coordinate requirements regarding the merits of proposed applications. Extensive knowledge of hardware, software, network operations functions, firewalls, packet switching communications protocols, and diagnostic tools to analyze difficult and complex system problems and provides resolutions. Knowledge of systems analysis, configuration management, and computer equipment requirements related to networks to assess vulnerabilities. Skill in evaluating innovative approaches in formulation of programs or systems specifications.

Additional information

Trial Period:

As a condition of employment, you will be required to serve a 1- 2 trial period during which we will evaluate your fitness and whether your continued employment advances the public interest. In determining if your employment advances the public interest, we may consider:

- your performance and conduct;

- the needs and interests of the agency;

- whether your continued employment would advance organizational goals of the agency or the Government; and

- whether your continued employment would advance the efficiency of the Federal service.

Upon completion of your trial period your employment will be terminated unless you receive certification, in writing, that your continued employment advances the public interest.

Candidates should be committed to improving the efficiency of the Federal government, passionate about the ideals of our American republic, and committed to upholding the rule of law and the United States Constitution.

How you will be evaluated

You will be evaluated for this job based on how well you meet the qualifications above.

You will be evaluated based on how well you meet the qualifications listed in this vacancy announcement. Your qualifications will be evaluated based on your application materials (e.g., resume, supporting documents), your responses on the application questionnaire, and your responses to all assessments required for this position. You will be assessed on the following competencies (knowledge, skills, abilities, and other characteristics): Information Assurance

The resume/documents you submit must support your responses to the online questionnaire. If your application contradicts or does not support your questionnaire responses, you will receive a rating of "not qualified" or "insufficient information" and you will not receive further consideration for this job. Your application package (resume, supporting documents, and responses to the questionnaire) will be used to determine your eligibility, qualifications, and quality ranking for this position. Please follow all instructions carefully. Errors or omissions may affect your rating or consideration for employment. APPRAISALS/AWARDS: Hiring Managers use objective methods and consider previous performance appraisals and awards in the selection process. Current Federal Civilian employees should list any relevant performance related rating and/or awards in your resume. BASIS OF RATING: The assessments for this job will also measure

  • Knowledge, Skills and Abilities (KSA) as listed under Qualifications are based on the extent to which the quality, depth, and complexity of your experience and education relate to the qualification requirements.

Your application will be rated in the appropriate numeric value group and ranked according to preference eligibility and non-preference eligibility. Veterans' preference points, as prescribed, are added to each veteran applicant's final numeric value score. All qualified preference eligibles are placed ahead of non-preference eligibles Veteran's Preference is considered where applicable. To be considered for this position, you must complete all required steps in the process. In addition to the application and application questionnaire, this position requires an online assessment. The online assessment measures critical general competencies required to perform the job. Overstating your qualifications and/or experience in your application materials or application questionnaire may result in your removal from consideration. Cheating on the assessment may also result in your removal from consideration.

Your session is about to expire!

Your USAJOBS session will expire due to inactivity in 8 minutes. Any unsaved data will be lost if you allow the session to expire. Click the button below to continue your session.