What are the responsibilities and job description for the IT SPECIALIST position at U.S. Army Cyber Command?
Major Duties
Who May Apply: Army CES positions apply Veteran's Preference to preference eligible candidates, as defined by Section 2108 of Title 5 U.S.C., in accordance with the procedures provided in DoD Instruction 1400.25, Volume 3005, "CES Employment and Placement". If you are a veteran claiming veterans' preference, as defined by Section 2108 of Title 5 U.S.C., you must submit documents verifying your eligibility with your application package. In order to qualify, you must meet the education and/or experience requirements described below. Experience refers to paid and unpaid experience, including volunteer work done through National Service programs (e.g., Peace Corps, AmeriCorps) and other organizations (e.g., professional; philanthropic; religious; spiritual; community; student; social). You will receive credit for all qualifying experience, including volunteer experience. Your resume must clearly describe your relevant experience; if qualifying based on education, your transcripts will be required as part of your application. Additional information about transcripts is in this document. To qualify based on your experience, your resume must describe at least one year specialized experience that demonstrates the possession of knowledge, skills, abilities, and competencies necessary for immediate success in the position. Such experience is typically in or directly related to the work of the position to be filled. To qualify based on your experience, your resume must clearly describe the following quality experience: GG-07: assisting in conducting risk and vulnerability assessments of planned and installed information systems to identify vulnerabilities, risks, and protection needs; or assisting in conducting systems security evaluations, audits, and reviews; or assisting in assessing security events to determine impact and implementing corrective actions. GG-09: assisting in the remediation of vulnerabilities found on the network during scanning; applying patches or windows updates on workstations, laptops or servers; installing hardware, operating systems or software for an organization, and providing guidance and instruction to personnel on how to properly respond and correct security violations/vulnerabilities. GG-11: developing, interpreting, evaluating, and/or implementing cyber procedures and documentation; establishing operational framework for security programs; and recognizing security breaches and taking appropriate action to identify and perform analysis to enable timely and appropriate response to events. BASIC REQUIREMENTS (1) Attention to Detail - Is thorough when performing work and conscientious about attending to detail. Examples of IT-related experience demonstrating this competency include: completing work independently that rarely requires editing or review by others. (2) Customer Service - Works with clients and customers (that is, any individuals who use or receive the services or products that your work unit produces, including the general public, individuals who work in the agency, other agencies, or organizations outside the Government) to assess their needs, provide information or assistance, resolve their problems, or satisfy their expectations; knows about available products and services; is committed to providing quality products and services. Examples of IT-related experience demonstrating this competency include: resolving simple and routine problems, questions, or complaints and providing support and guidance to customers on non-routine issues; serving as a primary resource for customers, requesting assistance with complex issues when necessary; and participating in meetings and providing advice to customers in own area of expertise. (3) Oral Communication - Expresses information (for example, ideas or facts) to individuals or groups effectively, taking into account the audience and nature of the information (for example, technical, sensitive, controversial); makes clear and convincing oral presentations; listens to others, attends to nonverbal cues, and responds appropriately. Examples of IT-related experience demonstrating this competency include: expressing facts and ideas in a clear, concise, convincing, and organized manner; clearly conveying moderately complex ideas, concepts, and information to customers; exhibiting active listening by demonstrating understanding of audience comments and/or questions. (4) Problem Solving - Identifies problems; determines accuracy and relevance of information; uses sound judgment to generate and evaluate alternatives, and to make recommendations. Examples of IT-related experience demonstrating this competency include: identifying and solving problems by gathering and applying information from a variety of materials or sources that provide several alternatives; recognizing and taking action to address non-routine problems; soliciting feedback from multiple stakeholders to understand an issue or problem and accurately assess its root causes and potential solutions; seeking supervisory review where appropriate. Please see "Education" section for more information on qualifications/education substitution.
- Responsible for assisting with the assessment of the security posture of classified and unclassified IS using a variety of automated tools.
- Responsible for assessing the security posture of classified and unclassified IS with respect to Anti-Virus (AV) protection using a variety of automated tools.
- Responsible for remediating identified vulnerabilities on classified and unclassified ISs by using automated tools to distribute required system updates.
- Collect audit and usage data and prepares reports for senior-management.
- Responsible for performing assignments related to risk assessments, program planning, monitoring, and/or coordination of the systems life cycle functions.
- Assignment involve providing specialized services or accomplishing projects which require application of a variety of techniques and methods to determine the best approach.
- Responsible for forensics analysis resulting from cybersecurity violations, unexplained IS performance anomalies and incidents, and classified data spills.
Who May Apply: Army CES positions apply Veteran's Preference to preference eligible candidates, as defined by Section 2108 of Title 5 U.S.C., in accordance with the procedures provided in DoD Instruction 1400.25, Volume 3005, "CES Employment and Placement". If you are a veteran claiming veterans' preference, as defined by Section 2108 of Title 5 U.S.C., you must submit documents verifying your eligibility with your application package. In order to qualify, you must meet the education and/or experience requirements described below. Experience refers to paid and unpaid experience, including volunteer work done through National Service programs (e.g., Peace Corps, AmeriCorps) and other organizations (e.g., professional; philanthropic; religious; spiritual; community; student; social). You will receive credit for all qualifying experience, including volunteer experience. Your resume must clearly describe your relevant experience; if qualifying based on education, your transcripts will be required as part of your application. Additional information about transcripts is in this document. To qualify based on your experience, your resume must describe at least one year specialized experience that demonstrates the possession of knowledge, skills, abilities, and competencies necessary for immediate success in the position. Such experience is typically in or directly related to the work of the position to be filled. To qualify based on your experience, your resume must clearly describe the following quality experience: GG-07: assisting in conducting risk and vulnerability assessments of planned and installed information systems to identify vulnerabilities, risks, and protection needs; or assisting in conducting systems security evaluations, audits, and reviews; or assisting in assessing security events to determine impact and implementing corrective actions. GG-09: assisting in the remediation of vulnerabilities found on the network during scanning; applying patches or windows updates on workstations, laptops or servers; installing hardware, operating systems or software for an organization, and providing guidance and instruction to personnel on how to properly respond and correct security violations/vulnerabilities. GG-11: developing, interpreting, evaluating, and/or implementing cyber procedures and documentation; establishing operational framework for security programs; and recognizing security breaches and taking appropriate action to identify and perform analysis to enable timely and appropriate response to events. BASIC REQUIREMENTS (1) Attention to Detail - Is thorough when performing work and conscientious about attending to detail. Examples of IT-related experience demonstrating this competency include: completing work independently that rarely requires editing or review by others. (2) Customer Service - Works with clients and customers (that is, any individuals who use or receive the services or products that your work unit produces, including the general public, individuals who work in the agency, other agencies, or organizations outside the Government) to assess their needs, provide information or assistance, resolve their problems, or satisfy their expectations; knows about available products and services; is committed to providing quality products and services. Examples of IT-related experience demonstrating this competency include: resolving simple and routine problems, questions, or complaints and providing support and guidance to customers on non-routine issues; serving as a primary resource for customers, requesting assistance with complex issues when necessary; and participating in meetings and providing advice to customers in own area of expertise. (3) Oral Communication - Expresses information (for example, ideas or facts) to individuals or groups effectively, taking into account the audience and nature of the information (for example, technical, sensitive, controversial); makes clear and convincing oral presentations; listens to others, attends to nonverbal cues, and responds appropriately. Examples of IT-related experience demonstrating this competency include: expressing facts and ideas in a clear, concise, convincing, and organized manner; clearly conveying moderately complex ideas, concepts, and information to customers; exhibiting active listening by demonstrating understanding of audience comments and/or questions. (4) Problem Solving - Identifies problems; determines accuracy and relevance of information; uses sound judgment to generate and evaluate alternatives, and to make recommendations. Examples of IT-related experience demonstrating this competency include: identifying and solving problems by gathering and applying information from a variety of materials or sources that provide several alternatives; recognizing and taking action to address non-routine problems; soliciting feedback from multiple stakeholders to understand an issue or problem and accurately assess its root causes and potential solutions; seeking supervisory review where appropriate. Please see "Education" section for more information on qualifications/education substitution.
IT Project Management Specialist
Donato Technologies, Inc. -
Memphis, TN
IT Cyber Security Specialist
EV.Careers -
Stanton, TN
IT Support Specialist (JN24-61IT)
Town of Collierville Government -
Collierville, TN