IT Specialist (INFOSEC), GS-2210-15 MP Government - Alexandria, VA at Geebo

IT Specialist (INFOSEC), GS-2210-15 MP

The position serves as an Information Technology Specialist responsible for managing IT security projects and operations to protect the integrity and confidentiality of systems, networks, and data. Specifically:
IT Security Program Leadership:
Responsible for the overall management and program direction of the DIS IT Security Program, including long range planning, budget development, and prioritization and scheduling of program activities. Prepares, implements, and evaluates comprehensive management plans and actions with the objective to identify solutions or improvements to IT security measures and controls throughout the Foundation. Serves as senior expert and consultant to top agency management officials to advise on integrating IT programs with other programs of equivalent scope and complexity. IT Security Operations:
Recommends enhancements, software and controls, and policy and procedures for various computer systems to ensure appropriate levels of security. Participates in network and systems design to ensure implementation of appropriate security policies. Develops and reviews plans for proposed or new systems to ensure the presence of adequate planning for information security and other controls. Approves security specifications for applications or infrastructure components. Ensures that standard security procedures and protocols governing network operations are in place, fully support the security integrity of the network and comply with applicable security directives. IT Security Policy:
Provides leadership in developing and formulating agency-wide IT security policies and procedures to ensure agency systems' reliability and accessibility and to prevent, defend against, and mitigate unauthorized access to networks, systems, and data. Assists DIS managers and agency IT system owners in conducting risk and vulnerability assessments for planned and installed systems and in developing system security plans, contingency plans, and disaster recovery procedures. Analyzes regulatory and policy documents, new legislation, and Federal programs for potential impacts to the NSF IT Security program and associated processes. Provides Representation for NSF IT Security Program:
Serves as a key consultant and authority to top agency management and other IT experts throughout the agency or in other agencies on a variety of situations and issues that involve applying or adapting new concepts or practices that are developed by the employee or result from the employee's leadership on security matters. Works with DIS management and internal stakeholders within the Foundation to assure that operating policies meet needs and facilitate mission accomplishment. Competencies:
Technical Problem Solving Project Management Security Information Assurance Applicants must have IT-related experience (which may be may be obtained by paid or unpaid experience and/or completion of specific, intensive training (for example, IT certification), as appropriate) demonstrating each of the four competencies listed below:
1. Attention to Detail - Is thorough when performing work and conscientious about attending to detail. 2. Customer Service - Works with clients and customers (that is, any individuals who use or receive the services or products that your work unit produces, including the general public, individuals who work in the agency, other agencies, or organizations outside the Government) to assess their needs, provide information or assistance, resolve their problems, or satisfy their expectations; knows about available products and services; is committed to providing quality products and services. 3. Oral Communication - Expresses information (for example, ideas or facts) to individuals or groups effectively, taking into account the audience and nature of the information (for example, technical, sensitive, controversial); makes clear and convincing oral presentations; listens to others, attends to nonverbal cues, and responds appropriately. 4. Problem Solving- Identifies problems; determines accuracy and relevance of information; uses sound judgment to generate and evaluate alternatives, and to make recommendations. In addition to the competencies, applicants must meet the specialized experience listed below:
To qualify at the GS-15 level, you must have 1 year of specialized experience equivalent to the GS-14 level in federal service. Examples of specialized experience includes:
work that involves responsibility for ensuring the confidentiality, integrity, and availability of systems, networks, and data through the planning, analysis, development, implementation, maintenance, and enhancement of information systems security programs, policies, procedures, and tools. In addition to meeting the competencies and the specialized experience requirements described above, this position has a selective factor(s). Selective Factors are special qualification requirements, in addition to the minimum requirements, that are essential in successfully performing the duties of this job.Selective Factors:
All candidates must have demonstrated experience (1) applying Federal Information Technology (IT) security requirements, guidelines, and cybersecurity methods to IT programs and systems; (2) managing organizational efforts to ensure the agency develops and maintains an effective IT security program; (3) monitoring compliance of cybersecurity protection requirements across IT programs; and (4) performing security assessments of agency information systems, infrastructure components, and services to identify vulnerabilities, risks, and protection requirements.
  • Department:
    2210 Information Technology Management
  • Salary Range:
    $142,701 to $170,800 per year

Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.