INFORMATION TECHNOLOGY SPECIALIST (INFOSEC)
Air Combat Command - Department of the Air Force
In order to qualify, you must meet the requirements described in the Office of Personnel Management (OPM) Qualification Standards for General Schedule Positions, Information Technology (IT) Management Series, GS-2210 (Alternate A). https://www.opm.gov/policy-data-oversight/classification-qualifications/general-schedule-qualification-standards/2200/information-technology-it-management-series-2210-alternative-a/??? Experience: Must have IT-related experience demonstrating each of the four competencies listed below: Attention to Detail, Customer Service, Oral Communication, and Problem Solving AND one year of specialized experience at the next lower grade GS-12 (or equivalent in other pay systems) which includes application of a full range of IT principles, concepts, practices, products and services, and methods sufficient to develop and coordinate security policies, standards and techniques for protecting computer systems from viruses, data tampering, and unauthorized system entry. Skill to develop and utilize appropriate data collection techniques and design, build and use models and simulation techniques. Ability to articulate and negotiate very complex and sensitive issues with officials of diverse perspectives and often with different or opposing views while maintain good working relations. FEDERAL TIME-IN-GRADE (TIG) REQUIREMENT FOR GENERAL SCHEDULE (GS) POSITIONS: Merit promotion applicants must meet applicable time-in-grade requirements to be considered eligible. One year at the GS-12 level is required to meet the time-in-grade requirements for the GS-13 level. TIG applies if you are in a current GS position or held a GS position within the previous 52 weeks. NOTE: Applicants applying as VEOA candidates who are current GS civil service employees or are prior GS civil service employees within the past 52 weeks must also meet time-in-grade requirements. KNOWLEDGE, SKILLS AND ABILITIES (KSAs): Your qualifications will be evaluated on the basis of your level of knowledge, skills, abilities and/or competencies in the following areas: Mastery level knowledge of the principles, methods and tools for planning, developing, coordinating, scheduling, implementing, and managing cybersecurity projects and resources including identifying and managing requirements, identifying and managing risks, prioritizing work according to agency information assurance goals, and quantifying tangible and intangible benefits through cost/risk/benefit analysis. Expert professional knowledge of quantitative techniques and methods used to conceptualize, develop, adapt, modify and apply new models to resolve the most difficult problems and to achieve support for alternative solutions within the scientific community. Knowledge of National, DoD, and Air Force regulations, organization structure and functions, precedents, procedures, practices and standards that apply to cybersecurity operations relevant to test & evaluation, tactics development, Electronic Warfare (EW) system reprogramming, advanced programs, and classified network operations. Advanced knowledge and skill of private sector C4 systems, data scientist Big Data analytics, machine learning, AI, cognitive science, programs, operations, strategies, resources and information processes, and weapons systems. Includes operations research analysis techniques and mastery of scientific and analytical capabilities. Advanced skill in articulating and negotiating very complex and sensitive issues with officials of diverse perspectives and often with different or opposing views while maintain good working relations. Expert Ability to negotiate and defend findings and gain executive support for new program concepts. Ability to plan, organize, direct and lead the functions and staff and/or study team tasked to originate new ideas, projects and methodologies. Skill in leadership, decision making, problem solving, developing effective interpersonal relationships, and team building. Skill in leading advanced study teams composed of industry, government, and academic experts; originate new ideas, projects, and methodologies; and execute projects and/or studies within established financial and/or time constraints. Knowledge of a broad range of IT security vulnerabilities sufficient to assess and advice on risks and vulnerability from a variety of sources (E.g., espionage, disruption of services, destructive programs/applications, insider threats) and procedures and methods for protection of systems and applications. Knowledge of assessment and authorization, network operations, systems testing and evaluation, and performance management mthods sufficient to evaluate and ensure standards are met and to advise on new or revised security measures and countermeasures based on the results of assessment review. Knowledge of a full range of IT principles, concepts, practices, productes and services, and methods sufficient to develop and coordinate security policies, standards and technqiues for protecting computer systems from virsuses, data tampering, and unauthorizes system entry. Skill to develop and utilize appropriate dta colection techniques and design, build and use models and simulation techniques. PART-TIME OR UNPAID EXPERIENCE: Credit will be given for appropriate unpaid and or part-time work. You must clearly identify the duties and responsibilities in each position held and the total number of hours per week. VOLUNTEER WORK EXPERIENCE: Refers to paid and unpaid experience, including volunteer work done through National Service Programs (i.e., Peace Corps, AmeriCorps) and other organizations (e.g., professional; philanthropic; religious; spiritual; community; student and social). Volunteer work helps build critical competencies, knowledge and skills that can provide valuable training and experience that translates directly to paid employment. You will receive credit for all qualifying experience, including volunteer experience.
Click on “Learn more about this agency” button below to view Eligibilities being considered and other IMPORTANT information. The primary purpose of this position is to serve as a senior systems administrator and security specialist with responsibility for planning and coordinating the installation, testing, modifying, upgrading, operation, troubleshooting, and maintenance of hardware/software systems, and providing oversight and management for specia access programs (SAPs).