Summary About the Position: This position is a DOD Cyber Excepted Service (CES) personnel system position in the Excepted Service under 10 USC 1599f. Employees occupying CES positions are in the Excepted Service and must adhere to U.S. Code, Title 10, as well as Department of Defense Instruction 1400.25. This position is located at the . Responsibilities Leads, directs, and synchronizes all cyber risk management and compliance actions, cyber threat analysis, and intelligence operations in support of defensive cyber operations. Orchestrates daily tasks and objectives with assigned contract support staff. Works with the contract Technical Monitor (TM) and Responsible Officer (RO) on all issues/concerns for assigned contract personnel. Directs, coordinates, and synchronizes information security continuous monitoring (ISCM), Risk Management Framework (RMF), Defense Information Assurance Security Accreditation Working Group (DSAWG). Directs, coordinates, and synchronizes insider threat investigations, attack sensing and warning (ASW), vulnerability and penetration assessments, forensics and malware analysis, defensive cyber infrastructure, and all cyber incident handling. Provides appropriate defense in depth by utilizing network access tools, deploying disaster planning techniques, data recovery, immediate incident response, log auditing and network intrusion protection. Monitors final products for compliance with Department of Army (DA), DOD, Federal regulations, and any CIO/G-6 Command standards/directives. High level of knowledge required to maintain and setup configuration of firewall, IDS, and any other intrusion detection system required to maintain Automated Data Processing (ADP) and network security. Provides technical support to the theater on security of DoD information systems in accordance with DoD, DA, and Theater policies. Develops software security tools as needed to monitor and analyze unauthorized activity on classified and unclassified systems and networks. Designs and programs system software routines as required to provide audit trails of activity against sensitive data files or that ensure access to data through remote terminals is property controlled. Provides network operation, administration, and management of a variety of systems and infrastructure equipment in support of the Wireless security program. Provides additional support to ensure the proper security posture is maintained on the classified network. Requirements Conditions of Employment Qualifications Who May Apply: Only applicants who meet one of the employment authority categories below are eligible to apply for this job. You will be asked to identify which category or categories you meet, and to provide documents which prove you meet the category or categories you selected. See Proof of Eligibility for an extensive list of document requirements for all employment authorities. Current Army Cyber Excepted Service (CES) Employee Current Army Defense Civilian Intelligence Personnel System (DCIPS) Employee Current Civilian Employees of the Organization Applying to Cyber Excepted Service (CES) Positions Current Department of Army Civilian Employees Current DoD Cyber Excepted Service (CES) Employee (non-Army) Current Permanent DoD Civilian Employee (non-Army) Applying to Cyber Excepted Service Positions Non-Department of Defense (DoD) Transfer Applying to Cyber Excepted Service Positions Army CES positions apply Veteran's Preference to preference eligible candidates, as defined by Section 2108 of Title 5 U.S.C., in accordance with the procedures provided in DoD Instruction 1400.25, Volume 3005, "CES Employment and Placement". If you are a veteran claiming veterans' preference, as defined by Section 2108 of Title 5 U.S.C., you must submit documents verifying your eligibility with your application package. In order to qualify, you must meet the experience requirements described below. Experience refers to paid and unpaid experience, including volunteer work done through National Service programs (e.g., Peace Corps, AmeriCorps) and other organizations (e.g., professional; philanthropic; religious; spiritual; community; student; social). You will receive credit for all qualifying experience, including volunteer experience. Your resume must clearly describe your relevant experience; if qualifying based on education, your transcripts will be required as part of your application. Additional information about transcripts is in this document. To qualify based on your experience, your resume must describe one year of specialized experience that demonstrates the possession of knowledge, skills, abilities, and competencies necessary for immediate success in the position. Such experience is typically in or directly related to the work of the position to be filled. To qualify based on your experience, your resume must clearly describe the following quality experience: Advising on cybersecurity compliance of classified and unclassified networks and systems; reporting on endpoint and network compliance with information assurance vulnerability management program; overseeing and evaluating process related activities that facilitate monitoring, tracking, analyzing, and reporting of IT operational activities. The specialized experience must include, or be supplemented by, information technology related experience (paid or unpaid experience and/or completion of specific, intensive training, as appropriate) which demonstrates each of the four competencies, as defined: (1) Attention to Detail - Is thorough when performing work and conscientious about attending to detail. Examples of IT-related experience demonstrating this competency include: completing thorough and accurate work independently, even in the most difficult or stressful situations; occasionally reviewing work completed by others. (2) Customer Service - Works with clients and customers (that is, any individuals who use or receive the services or products that your work unit produces, including the general public, individuals who work in the agency, other agencies, or organizations outside the Government) to assess their needs, provide information or assistance, resolve their problems, or satisfy their expectations; knows about available products and services; is committed to providing quality products and services. Examples of IT-related experience demonstrating this competency include: resolving routine and non-routine problems, questions, or complaints; developing and maintaining strong, mutually supportive working relationships with customers; conducting evaluation of support to determine quality of services and customer satisfaction, and recommending procedural changes based on customer need or changes in policy and/or regulation. (3) Oral Communication - Expresses information (for example, ideas or facts) to individuals or groups effectively, taking into account the audience and nature of the information (for example, technical, sensitive, controversial); makes clear and convincing oral presentations; listens to others, attends to nonverbal cues, and responds appropriately. Examples of IT-related experience demonstrating this competency include: convincingly conveying complex information to customers; presenting thoughts that are well-organized and demonstrating confidence in the facts and ideas; adjusting style when working with individuals with different levels of understanding; using various methods to explain and convey information. (4) Problem Solving - Identifies problems; determines accuracy and relevance of information; uses sound judgment to generate and evaluate alternatives, and to make recommendations. Examples of IT-related experience demonstrating this competency include: solving complex or sensitive problems by developing and proposing strategic alternatives; identifying possible conflicts and shared benefits; helping team anticipate problems and identifying and evaluating potential sources of information; providing feedback and coaching to others to help solve problems; engaging appropriate stakeholders when developing solutions in order to understand and incorporate multiple perspectives and needs; evaluating the effectiveness of decisions and adjusting future decisions as appropriate. Education Some federal jobs allow you to substitute your education for the required experience in order to qualify. For this job, you must meet the qualification requirement using experience alone--no substitution of education for experience is permitted. Additional Information If you are a current federal career/career-conditional employee, you will be placed on an excepted appointment. This position is in the Professional Category at the Full Performance Work Level within the CES Occupational Structure. Male applicants born after December 31, 1959, must complete a Pre-Employment Certification Statement for Selective Service Registration. You will be required to provide proof of U.S. Citizenship. Direct Deposit of Pay is required. Must be able to obtain and maintain a Secret security clearance. Selection is subject to restrictions resulting from Department of Defense referral system for displaced employees. If you have retired from federal service and you are interested in employment as a reemployed annuitant, see the information in the Reemployed Annuitant information sheet. This is an Information Technology Management Career Field position. TERM: This announcement is for a Cyber Term position. Permanent employees who apply, are selected for, and ultimately accept this position will be converted to a Cyber Term appointment. Term positions in CES may be extended up to a maximum of five years. This position may be converted to permanent without further competition after completion of three years of continuous service in this position. Multiple positions may be filled from this announcement. Salary includes applicable locality pay or Local Market Supplement. Payment of Permanent Change of Station (PCS) costs is not authorized, based on a determination that a PCS move is not in the Government interest. Recruitment or relocation incentives MAY be authorized for highly qualified candidates.
S:CLZNC-CLZSOUTHEAST