Information Technology Cybersecurity Specialist Government - Albany, OR at Geebo

Information Technology Cybersecurity Specialist

As an Information Technology Cybersecurity Specialist at the full performance level, you will:
Review and interpret security mandates, guidelines and policies for application and impact to network and security architecture, operations, and projects. Assist with the resolution of security/network issues to recover information/assets related to breaches. Implements information security requirements and ensures contractor compliance. Develop long-term security plans or roadmaps in accordance with federally mandated security requirements. Review existing or proposed networks systems. Conduct special studies and analysis, providing security planning. Provide technical guidance on a variety of security appliances and system problems relative to current operations and future requirements; determine procedural changes required to implement new technology and the feasibility of adapting existing equipment and facilities to technological improvements in security systems. Review requests for additions or changes to existing security systems for impact analysis and compliance with government security requirements. Lead technical projects, create and monitor schedules, direct and evaluate deliverables, determine readiness for production implementation, manage testing phases and production deployments. Formulate and communicate a variety of major cybersecurity policies, practices, techniques, and procedures that guide cybersecurity work. SPECIALIZED EXPERIENCE REQUIREMENTS Applicants must have IT-related experience demonstrating each of the four competencies listed below:
Attention to Detail - Is thorough when performing work and conscientious about attending to detail. Customer Service - Works with clients and customers (that is, any individuals who use or receive the services or productions that your work unit produces, including the general public, individuals who work in the agency, other agencies, or organizations outside the Government) to assess their needs, provide information or assistance, resolve their problems, or satisfy their expectations, know about available products and services; is committed to providing quality products and services. Oral Communication - Expresses information (for example, ideas, or facts) to individuals or groups effectively, taking into account the audience and nature of the information (for example, technical, sensitive, controversial); make clear and convincing oral presentations; listens to others, attends to nonverbal cues, and responds appropriately. Problem Solving - Identifies problems; determines accuracy and relevance of information; uses sound judgment to generate and evaluate alternatives, and to make recommendations. In addition to the competency requirements above, a qualified candidate's online application must demonstrate at least one year of specialized experience equivalent to the next lower grade level in the Federal Service.GS-13:
A qualified candidate's online application and resume must demonstrate at least one year of specialized experience equivalent to the GS-12 grade level in the Federal service. Specialized experience for this position is defined as:
Participating in audit reviews, vulnerability and/or risk assessments, security tests and evaluations, and other accreditation activities in order to ensure systems are fully accredited and comply with all applicable security standards; Monitoring systems compliance with IT security standards and regulations. GS-14:
A qualified candidate's online application and resume must demonstrate at least one year of specialized experience equivalent to the GS-13 grade level in the Federal service. Specialized experience for this position is defined as:
Participating in audit reviews, vulnerability and/or risk assessments, security tests and evaluations, and other accreditation activities in order to ensure systems are fully accredited and comply with all applicable security standards; Monitoring systems compliance with IT security standards and regulations; Developing and/or implementing security plans, policies and/or procedures. Your application and resume should demonstrate that you possess the following knowledge, skills and abilities (KSAs). Do not provide a separate narrative written statement. Rather, you must describe in your application how your past work experience demonstrates that you possess the KSAs identified below. Cite specific examples of employment or experience contained in your resume and describe how this experience has prepared you to successfully perform the duties of this position. DO NOT write see resume in your application! Mastery skill in designing and implementing security controls at the appropriate Open Systems Interconnection model (OSI model) level to ensure effective and efficient use of NETL resources for secure communications. Mastery knowledge specifically related to or equivalent to a CISCO Certified Network Professional that demonstrates fundamental network design expertise focused on advanced addressing and routing protocols, WANs, services virtualization, and integration strategies for multi-layered Enterprise architectures. Mastery knowledge of design, implementation, configuration and support of Next Generation firewall technology equivalent to Palo Alto Networks Certified Network Security Engineer (PCNSE) certification and skill in determining near and long-term impact to the infrastructure services. Knowledge of Federal information technology certification and accreditation requirements, processes and controls as outlined in NIST 800-53 and DISA STIG to successfully implement security best practice to ensure the confidentiality, integrity, and availability of NETL's information technology systems. Knowledge of information technology resources, systems, applications and management principles to effectively analyze systems security strengths and weaknesses to identify appropriate security controls to implement. Ability to evaluate, implement and utilize appropriate tools and techniques for conducting data collection/logging and forensic capabilities across network infrastructure components. Skill in evaluating mandates and guidelines for applicability to the technical environment and in evaluating and elevating risks or issues as necessary. Experience refers to paid and unpaid experience. Examples of qualifying unpaid experience may include:
volunteer work done through National Service programs (such as Peace Corps and AmeriCorps); as well as work for other community-based philanthropic and social organizations. Volunteer work helps build critical competencies, knowledge, and skills; and can provide valuable training and experience that translates directly to paid employment. You will receive credit for all qualifying experience, including volunteer experience.CTAP/ICTAP candidates:
To be considered well qualified you must meet all of the requirements as described in this section.You must meet all qualifications and eligibility requirements by the closing date of this announcement.

  • Department:
    2210 Information Technology Management

  • Salary Range:
    $88,704 to $145,059 per year


Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.