This job originated on www.usajobs.gov. For the full announcement and to apply, visit www.usajobs.gov/job/726229700. Only resumes submitted according to the instructions on the job announcement listed at www.usajobs.gov will be considered.
The Senate Sergeant at Arms is seeking a Cybersecurity Specialist. The complete vacancy announcement and application can be found on the United States Senate Career Page at https://sen.gov/J5NY. This vacancy announcement closes at 7pm EST on the closing date. Late applications will not be accepted.
05/16/2023 to 05/31/2023
$90,159 - $135,232 per year
AD 09
1 vacancy in the following location:
Yes—as determined by the agency policy.
Not required - N/A
No The Senate Sergeant at Arms does not pay for relocation expenses.
Permanent
Full-time
Excepted
9
No
No
req133
726229700
Provides functional and/or technical skills for the assigned cybersecurity unit. Supports the unit’s work effort as required in preparing materials for collaborating with other sections, divisions, departments, and vendors to gather and disseminate information. Contributes to the unit’s work effort as required in preparing analysis and materials for providing expert level support in the assigned area of cybersecurity to SAA IT security branch staff, other SAA technical staff, SAA procurement staff, and other division or departments; and for identifying and resolving critical and complex issues in the assigned unit. Supports the unit’s work effort as directed in providing leadership to the unit’s project teams and contractors. Work includes helping to develop plans, assignments, and coordination of work efforts. Supports the unit’s work effort to develop governing policies, standards and procedures.
Work requires an Associate’s Degree, or greater, in computer science, telecommunications, or a related technical field, and one to two years of experience within a CISSP-type environment or any equivalent combination of education and experience that provides the following knowledge, skills and abilities:
Physical Demands and Working Environment
Work requires extended periods of confined sitting and hand-eye coordination working with computers. Expected to work unusual and perhaps unexpected hours during a Continuity of Operations.
Additional Examples of Work:
• Contribute technical support to enterprise-wide cyber defense technicians to resolve cyber defense incidents
• Assist with implementation of updating defense tools’ rules and signatures (e.g., intrusion detection/protection systems, antivirus, and content blacklists, etc.) for specialized cyber defense applications
• Analyze log files from a variety of sources (e.g., individual host logs, network traffic logs, firewall logs, and intrusion detection system [IDS] logs) to identify possible threats to network security
• Assist with the triage cyber defense incidents, including determining scope, urgency, and potential impact, identifying the specific vulnerability, and making recommendations that enable expeditious remediation
• Assist with trend analysis and reporting to ensure quality of cyber defense.
• Assist with modifications or adjustments to technical platform, processes, environment, etc., based on cybersecurity capability assessments (Blue Team, Read Team, audits, etc.)
• Assist with development of cyber defense techniques, guidance, and reports on incident findings to appropriate constituencies
• Assist with collection of intrusion artifacts (e.g., source code, malware, Trojans) and use discovered data to enable mitigation of potential cyber defense incidents within the enterprise
Knowledge, Skills and Abilities:
• Knowledge of cybersecurity and privacy principles
• Knowledge of cyber threats and vulnerabilities
• Knowledge of authentication, authorization, and access control methods
• Knowledge of vulnerability information dissemination sources (e.g., alerts, advisories, errata, and bulletins)
• Knowledge of incident categories, incident responses, and timelines for responses
• Knowledge of intrusion detection methodologies and techniques for detecting host and network-based intrusions
• Knowledge of what constitutes a network attack and a network attack's relationship to both threats and vulnerabilities
• Knowledge of Insider Threat investigations, reporting, investigative tools and laws/regulations
• Knowledge of adversarial tactics, techniques, and procedures
• Knowledge of collection management processes, capabilities, and limitations
• Knowledge of different classes of attacks (e.g., passive, active, insider, close-in, distribution attacks)
• Knowledge of applicable laws, statutes (e.g., in Titles 10, 18, 32, 50 in U.S. Code), Presidential Directives, executive branch guidelines, and/or administrative/criminal legal guidelines and procedures
• Knowledge of cyber-attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks)
• Knowledge of encryption methodologies
• Knowledge of signature implementation impact for viruses, malware, and attacks
• Knowledge of cloud service models and how those models can limit incident response
• Knowledge of malware analysis concepts and methodologies
• Knowledge of packet-level analysis using appropriate tools (e.g., Wireshark, tcpdump)
• Knowledge of Intrusion Detection System (IDS)/Intrusion Prevention System (IPS) tools and applications
• Knowledge of penetration testing principles, tools, and techniques
• Knowledge of intrusion detection and prevention system tools and applications
• Knowledge of common adversary capabilities, tactics, techniques, and procedures in assigned area of responsibility
• Knowledge of general attack stages
• Skill in determining how a security system should work (including its resilience and dependability capabilities) and how changes in conditions, operations, or the environment will affect these outcomes
• Skill in preserving evidence integrity according to standard operating procedures or national standards
• Skill in using incident handling methodologies
• Skill in conducting investigations and developing comprehensive reports
• Skill in collecting data from a variety of cyber defense resources
• Skill in securing network communications
• Skill in recognizing and categorizing types of vulnerabilities and associated attacks
• Skill in protecting a network against malware. (e.g., NIPS, anti-malware, restrict/prevent external devices, spam filters)
• Ability to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation)
• Ability to apply techniques for detecting host and network-based intrusions using intrusion detection technologies
• Ability to interpret the information collected by network tools (e.g. Nslookup, Ping, and Traceroute
This position requires that the applicant obtain and maintain an applicable U.S. Government security clearance. Applicants must be U.S. citizens in order for the SAA to submit your application for a security clearance. For education requirements please see Minimum Qualifications.
The Sergeant at Arms is an equal opportunity employer in accordance with the requirements of Senate rules, regulations, and applicable Federal Laws. This agency provides reasonable accommodations to applicants with disabilities. If you need a reasonable accommodation for any part of the application and hiring process, please notify the agency. Decisions to grant reasonable accommodations will be determined on a case-by-case basis. Please email SAAHRMedical@saa.senate.gov with “Applicant Accommodation” in the subject line. No moving, relocation or pre-employment travel expenses will be paid for this position, or while in application for this position.
A career with the U.S. government provides employees with a comprehensive benefits package. As a federal employee, you and your family will have access to a range of benefits that are designed to make your federal career very rewarding. Opens in a new windowLearn more about federal benefits.
Eligibility for benefits depends on the type of position you hold and whether your position is full-time, part-time or intermittent. Contact the hiring agency for more information on the specific benefits offered.
You will be evaluated for this job based on how well you meet the qualifications above.
Your application will be evaluated by a panel on the quality and extent of your total accomplishments, experience, and education. Highly qualified candidates may be interviewed and a reference check conducted.
A career with the U.S. government provides employees with a comprehensive benefits package. As a federal employee, you and your family will have access to a range of benefits that are designed to make your federal career very rewarding. Opens in a new windowLearn more about federal benefits.
Eligibility for benefits depends on the type of position you hold and whether your position is full-time, part-time or intermittent. Contact the hiring agency for more information on the specific benefits offered.
As a new or existing federal employee, you and your family may have access to a range of benefits. Your benefits depend on the type of position you have - whether you're a permanent, part-time, temporary or an intermittent employee. You may be eligible for the following benefits, however, check with your agency to make sure you're eligible under their policies.
You may be required to serve a probationary period. Subject to background/security investigation.
Education must be accredited by an accrediting institution recognized by the U.S. Department of Education in order for it to be credited towards qualifications. Therefore, provide only the attendance and/or degrees from schools accredited by accrediting institutions recognized by the U.S. Department of Education.
Failure to provide all of the required information as stated in this vacancy announcement may result in an ineligible rating or may affect the overall rating.
https://sen.gov/J5NY All applicants must use the link above and follow instructions. DO NOT submit any paper application materials or resumes via U.S. Postal Mail or in person. All applicants MUST use the online employment application.
Qualified candidates will be contacted directly.
The Federal hiring process is set up to be fair and transparent. Please read the following guidance.
You may be required to serve a probationary period. Subject to background/security investigation.
Education must be accredited by an accrediting institution recognized by the U.S. Department of Education in order for it to be credited towards qualifications. Therefore, provide only the attendance and/or degrees from schools accredited by accrediting institutions recognized by the U.S. Department of Education.
Failure to provide all of the required information as stated in this vacancy announcement may result in an ineligible rating or may affect the overall rating.
https://sen.gov/J5NY All applicants must use the link above and follow instructions. DO NOT submit any paper application materials or resumes via U.S. Postal Mail or in person. All applicants MUST use the online employment application.
Qualified candidates will be contacted directly.
The Federal hiring process is set up to be fair and transparent. Please read the following guidance.
This job originated on www.usajobs.gov. For the full announcement and to apply, visit www.usajobs.gov/job/726229700. Only resumes submitted according to the instructions on the job announcement listed at www.usajobs.gov will be considered.