It Specialist (Entarch)
- Location:
- Multiple Locations
- Requires Relocation:
- Yes
- Start Date:
- 13/12/2024
- End Date:
- 17/12/2024
- Offering Type:
- Permanent
- Hiring Paths:
- The public
- Service Type:
- Excepted
- Travel Percentage:
- Occasional travel
About Defense Counterintelligence and Security Agency
Mission Statement The Defense Counterintelligence and Security Agency (DCSA) is a separate Agency of the Department of Defense (DoD) under the direction, authority, and control of the Under Secretary of Defense for Intelligence and Security (USD (I&S). The mission of the DCSA is as follows: -Deliver efficient and effective background investigations, adjudications and continuous vetting to safeguard the integrity and trustworthiness of an agile federal and contractor workforce, and preserve military readiness and warfighting capabilities -Identify and neutralize foreign intelligence threats to the USG’s trusted workforce and critical technologies -Develop and articulate holistic threat picture of risk posed by foreign intelligence entities and hostile insiders, enabling the USG to strengthen our security posture, continuously protect against the evolving threat, and enable action agencies to more effectively counter adversaries -Contribute meaningful analysis to the Intelligence Community (IC)-Manage the National Industrial Security Program (NISP) on behalf of the Secretary of Defense by clearing industrial facilities, personnel, and associated IT systems -Identify and defeat threats presented to critical technologies and through the supply chain -Provide education, training, research, and security awareness to DoD, other federal government organizations, and industry -Execute enterprise management responsibilities for DoD Security and Insider Threat Programs.
Job summary
DCSA's PEO (National Background Investigation Services (NBIS)) is looking for non-supervisory Information Technology Specialist (ENTARCH). The incumbent will provide support, guidance and expertise in various Information Technology (IT) functions. Performs a variety of duties that involve knowledge of a wide variety of IT applications, environments, and methods. Visit www.dcsa.mil - America's Gatekeeper!
Major duties
The Office Under Secretary of Defense for Intelligence and Security established a Targeted Local Market Supplement (TLMS) for certain Science, Technology, Engineering, Mathematics, and Cyber positions within the Defense Civilian Intelligence Personnel System. Eligibility for the TLMS is based on cyber work roles within certain occupational series and on the work performed. This vacancy is designated as a STEM and/or Cyber position and pay for the incumbent will be based on the STEM and Cyber Pay Table. As a IT SPECIALIST (ENTARCH) you will be responsible for the following duties: Responsible for the cybersecurity of a program, organization, system, or enclave. Designs enterprise and systems security throughout the development lifecycle; translates technology and environmental conditions (e.g., law and regulation) into security designs and processes. Manages and identifies program high-level technical specifications, which may include application design, cloud computing strategy and adoption, and integration of software applications into a functioning system to meet requirements. Leads necessary compliance activities (e.g., ensure system security configuration guidelines are followed, compliance monitoring occurs). Applies advanced skills to ensure that cybersecurity requirements are integrated into the continuity planning for that system and/or organization(s). - Applies advanced skills in determining how a security system should work (including its resilience and dependability capabilities) and how changes in conditions, operations, or the environment will affect these outcomes. Leads development of a system security context, a preliminary system security CONOPS, and define baseline system security requirements in accordance with applicable cybersecurity requirements. Leads development of security architectures and designs to determine the adequacy of security design and architecture proposed or provided in response to requirements contained in acquisition documents. Leads development/integration of cybersecurity designs for systems and networks with multilevel security requirements or requirements for the processing of multiple classification levels of data primarily applicable to government organizations (e.g., UNCLASSIFIED, SECRET, and TOP SECRET).Applies advanced knowledge of cybersecurity principles and network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense in-depth). Applies advanced knowledge of cloud computing service models Software as Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS). Applies advanced knowledge of cloud computing deployment models in private, public, and hybrid environments and the difference between on-premises and off.
Qualification
The experience described in your resume will be evaluated and screened from the Office of Personnel Management's (OPMs) basic qualifications requirements. See: GS-2210: Information Technology Management Series of OPM qualification standards, competencies and specialized experience needed to perform the duties of the position as described in the MAJOR DUTIES and QUALIFICATIONS sections of this announcement by 12/17/2024 Applicant must have directly applicable experience that demonstrates the possession of the knowledge, skills, abilities and competencies necessary for immediate success in the position. Qualifying experience may have been acquired in any public or private sector job, but will clearly demonstrate past experience in the application of the particular competencies/knowledge, skills and abilities necessary to successfully perform the duties of the position. You must have specialized experience sufficient to demonstrate that you have acquired all the competencies necessary to perform at a level equivalent in difficulty, responsibility, and complexity to the next lower grade GS/GG 12 in the Federal service and are prepared to take on greater responsibility. Generally, this would include one year or more of such specialized experience. Specialized experience for this position includes expertise in: the DoD Risk Management Framework (RMF) or industry equivalent; management of information technology (IT) security goals and objectives to mitigate program risk; evaluation of IT engineering and development efforts to ensure baseline security safeguards are appropriately incorporated; supervision of program level Information System Security Officers (ISSOs) and Engineers (ISSEs); determination of security relevancy and impact of programmatic and technological changes; IT data source security management; risk assessment; IT system cybersecurity strategy planning and implementation; DoD Zero Trust Strategy; cybersecurity resource allocation; and mitigation of audit findings. Specifically you will be evaluated on the following competencies: 1. Information Assurance; Knowledge of methods and procedures to protect information systems and data by ensuring their availability, authentication, confidentiality, and integrity. 2. Problem Solving-Identifies problems; determines accuracy and relevance of information; uses sound judgment to generate and evaluate alternatives, and to make recommendations. 3. Cyber security- Support protection of the confidentiality, integrity, non-repudiation, and availability of systems, networks, and data through planning, analysis, development, penetration testing, access control, implementation, maintenance, and enhancement of information security systems, programs, policies, procedures, and tools. 4. Customer Service- Works with clients and customers (that is, any individuals who use or receive the services or products that your work unit produces, including the general public, individuals who work in the agency, other agencies, or organizations outside the Government) to assess their needs, provide information or assistance, resolve their problems, or satisfy their expectations; knows about available products and services; is committed to providing quality products and services.
Education
Substitution of education may not be used in lieu of specialized experience for this grade level.
Evaluations
Read the job opportunity carefully to make sure you have included all required contact information. Include dates, hours, level of experience and examples for each work experience For each work experience you list, make sure you include: Start and end dates (including the month and year). The number of hours you worked per week. The level and amount of experience-for instance, whether you served as a project manager or a team member helps to illustrate your level of experience. Examples of relevant experiences and accomplishments that prove you can perform the tasks at the level required for the job as stated in the job announcement. Your experience needs to address every required qualification. If your resume does not clearly outline details for each position as noted, you may be deemed "not referred" for this position. Once the application process is complete, your resume and supporting documentation will be used to determine whether you meet the job qualifications listed on this announcement. If you are minimally qualified for this job, your resume and supporting documentation will be compared to your responses on the Occupational Questionnaire. If you rate yourself higher than is supported by your application materials, your responses may be adjusted and/or you may be excluded from consideration for this job If you are found to be among the top candidates, you will be referred to the selecting official for employment consideration.