Information Technology Specialist Government - Germantown, MD at Geebo

Information Technology Specialist

As a GS-2210-14 Information Technology Specialist (INFOSEC), you will:
Oversee the security incident response program and the SOC program and manages the review, update, applicability, veracity of program specific plans, process and policies. Provide independent information technology guidance, services, advice and recommendations to leadership for security incident response and SOC activities. Oversee Incident Response activities (including forensic analysis) and oversee data events (PII spills, classified data spills (CDS)). Serve as the Risk Manager and Risk Assessor for the EITS Enterprise and Cloud service and manages the EITS Site Security Operations Center (SOC). BASIC REQUIREMENTS Applicants must have IT-related experience demonstrating each of the four competencies listed below:
Attention to Detail- Is thorough when performing work and conscientious about attending to detail. Customer Service- Works with clients and customers (that is, any individuals who use or receive the services or products that your work unit produces, including the general public, individuals who work in the agency, other agencies, or organizations outside the Government) to assess their needs, provide information or assistance, resolve their problems, or satisfy their expectations; knows about available products and services; is committed to providing quality products and services. Oral Communication- Expresses information (for example, ideas or facts) to individuals or groups effectively, taking into account the audience and nature of the information (for example, technical, sensitive, controversial); makes clear and convincing oral presentations; listens to others, attends to nonverbal cues, and responds appropriately. Problem Solving- Identifies problems; determines accuracy and relevance of information; uses sound judgment to generate and evaluate alternatives, and to make recommendations. In addition to the competency requirements above, a qualified candidate's online application must demonstrate at least one year of specialized experience equivalent to the GS-13 grade level in the Federal service. SPECIALIZED EXPERIENCE REQUIREMENTS:
Specialized Experience is experience that equipped the applicant with the particular knowledge, skills, and abilities (KSA's) to perform successfully the duties of the position, and that is typically in or related to the position to be filled. A qualified candidate's online application and resume must demonstrate at least one year of specialized experience equivalent to the GS-13 grade level in the Federal service. Specialized experience for this position is defined as:
Providing recommendations on all matters relating to system security controls to mitigate vulnerabilities and threats to information systems. Identifying and evaluating future and emerging technologies to coordinate IT security matters including monitoring of system components to include vulnerability scan result reviews, audit log reviews, and account management as relates to cybersecurity monitoring. Identifying and writing specifications to meet IT security requirements at the application, database, or operating system server level. Developing policies and procedures to ensure information systems reliability and accessibility and to prevent and defend against unauthorized access to systems, applications, and data. Your application and resume should demonstrate that you possess the following knowledge, skills and abilities (KSAs). Do not provide a separate narrative written statement. Rather, you must describe in your application how your past work experience demonstrates that you possess the KSAs identified below. Cite specific examples of employment or experience contained in your resume and describe how this experience has prepared you to successfully perform the duties of this position. DO NOT write see resume in your application! Knowledge of Federal IT security guidance, policies, and procedures with expertise in the full range of complex areas of Information Management, systems, and technologies to constantly improve the performance of security assurance throughout the program. Knowledge of cybersecurity techniques, tactics, processes, theories and principles. Knowledge of governing laws, regulations and implementation of cybersecurity safeguards. Ability to advise senior managers on potential cybersecurity emerging safeguards. Knowledge of NIST special publications and federal cyber governance, policy. Skill and knowledge of the interrelationships of multiple IT disciplines and approaches and information systems security principles and concepts. Skill in Cloud monitoring of IaaS, PaaS, SaaS; as well as container technology. Knowledge of poly-cloud security monitoring and CASB log notification, alerts, analysis. Experience refers to paid and unpaid experience. Examples of qualifying unpaid experience may include:
volunteer work done through National Service programs (such as Peace Corps and AmeriCorps); as well as work for other community-based philanthropic and social organizations. Volunteer work helps build critical competencies, knowledge, and skills; and can provide valuable training and experience that translates directly to paid employment. You will receive credit for all qualifying experience, including volunteer experience.CTAP/ICTAP candidates:
To be considered well qualified you must meet all of the requirements as described in this section.You must meet all qualifications and eligibility requirements by the closing date of this announcement.
  • Department:
    2210 Information Technology Management
  • Salary Range:
    $121,316 to $157,709 per year

Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.