Supervisory IT Specialist (Network/Custspt)- DIRECT HIRE AUTHORITY
Department of the Air Force - Agency Wide - Department of the Air Force
For additional information on direct hire opportunities with the Air Force please click here. In order to qualify, you must meet the specialized experience requirements described in the Office of Personnel Management (OPM) Qualification Standards for General Schedule Positions, Information Technology (IT) Management Series 2210 positions located here. SPECIALIZED EXPERIENCE: Applicants must have at least one (1) year of specialized experience at the next lower broadband NH-02 or equivalent to the next lower grade GS-11 in the Federal Service. Specialized experience: supports oversight of the 704 TG cybersecurity program to include architecture, requirements, policies, processes, and procedures. Maintains appropriate foundational knowledge of cybersecurity best practices and risk management proportional to the criticality of information stored or processed on Information Systems under their purview. Basic Requirements: This standard allows eligibility through meeting either the requirements specified in the section titled Education or the requirements specified in the section titled Experience. Education: All academic degrees and coursework must be from accredited or pre-accredited institutions Undergraduate or Graduate Education: Degree in computer science, engineering, information science, information systems management, mathematics, operations research, statistics, or technology management or degree that provided a minimum of 24 semester hours in one or more of the fields identified above and required the development or adaptation of applications, systems or networks. OR Experience must be IT related; the experience may be demonstrated by paid or unpaid experience and/or completion of specific, intensive training (for example, IT certification), as appropriate GS-5 through GS-15 (or equivalent): For all positions individuals must have IT-related experience demonstrating each of the four competencies listed below. The employing agency is responsible for identifying the specific level of proficiency required for each competency at each grade level based on the requirements of the position being filled. 1. Attention to Detail – Is thorough when performing work and conscientious about attending to detail. 2. Customer Service – Works with clients and customers (that is, any individuals who use or receive the services or products that your work unit produces, including the general public, individuals who work in the agency, other agencies, or organizations outside the Government) to assess their needs, provide information or assistance, resolve their problems, or satisfy their expectations; knows about available products and services; is committed to providing quality products and services. 3. Oral Communication – Expresses information (for example, ideas or facts) to individuals or groups effectively, taking into account the audience and nature of the information (for example, technical, sensitive, controversial); makes clear and convincing oral presentations; listens to others, attends to nonverbal cues, and responds appropriately. 4. Problem Solving – Identifies problems; determines accuracy and relevance of information; uses sound judgment to generate and evaluate alternatives, and to make recommendations. Desired Skills: – Three (3) years Cyber-vulnerability mitigation desired. – Three (3) years Cybersecurity compliance and assessment desired. – Three (3) years Cybersecurity Risk Management Framework desired. Knowledge, Skills and Abilities: Expert knowledge of the principles, methods, and techniques of cyber, Information Technology (IT) assessment, planning, management, monitoring, and evaluation as well as knowledge of the principles, methods, or tools for developing, scheduling, coordinating, managing cyber, IT, or IM projects and resources, monitoring and inspecting costs, work, and contractor performance. Knowledge of the principles, methods, and tools for the coordinated management of cyber, IT, or IM programs to include providing oversight of multiple projects, integrating dependent schedules and deliverables, and related activities such as life cycle management and program governance. Ability to develop and interpret policies, procedures, and strategies governing the planning and delivery of services. Skill in applying new developments to previously unsolvable problems. Knowledge of the principles and methods to identify, analyze, specify, design, and manage functional and infrastructure requirements; includes translating functional requirements into technical requirements used for logical design or alternative technologies or approaches. Ability to research and analyze external products to determine their potential for meeting mission requirements and business needs. Knowledge of concepts, practices, and leadership techniques used to identify, engage, influence and monitor relationships with individuals and groups connected to cyber, IT, or IM work/development efforts. Includes those who are actively involved, those who exert influence over the process and its results, and those who have a vested interest in the outcome. Ability to provide expert technical advice, guidance, and recommendations to management and other technical specialists on critical cyber, IT, or IM issues as well as ability to work effectively with customers to assess their requirements then provide information, expertise, and assistance to satisfy those needs. Knowledge of methods of leadership and supervision to hold others accountable for measurable high-quality, timely, and cost-effective results. Ability to determine objectives, make sound, well-informed, and objective decisions, set priorities, cause change, and accomplish organizational goals. Skill in leading productive teams and work centers. Ability to plan, organize, and direct the functions of a unit and lead, mentor, motivate, and appraise subordinate staff.
To find additional information on “What Is DHA” and to view and/or apply to current DHA opportunities listed on Air Force Civilian Services “Direct Hire Job Board”, please click here. In this position you will serve as the Information Systems Security Manager (ISSM). Functions as the primary point of contact on all matters (technical and otherwise) involving the security of one or more enclaves, systems, or applications.