OneMain Financial Jobs

Job Information

Air Combat Command INFORMATION TECHNOLOGY SPECIALIST (INFOSEC) in Nellis AFB, Nevada

Summary Click on "Learn more about this agency" button below to view Eligibilities being considered and other IMPORTANT information. The primary purpose of this position is to serve as a senior systems administrator and security specialist responsible for planning and coordinating the installation, testing, modifying, upgrading, operation, and maintenance of hardware/software systems, as well as provide oversight and management of multiple security disciplines in support special access programs (SAPs). Responsibilities Functions as Information Systems Security Manager (ISSM) & Cybersecurity subject matter expert responsible for advising higher headquarters, wing leadership, organizations, and squadron personnel on all aspects of SAP IT projects. Performs studies and establishes plan of action for improving the efficiency of information technology applications and services as the unit cybersecurity manager. As an expert/senior specialist ISSM, communicates assignments for the day-to-day operation of a SAP Cybersecurity Team consisting of military, civilian, and contractor IT security specialists while overseeing cybersecurity programs. Troubleshoots complex security problems and provides advice and support in a manner that minimizes interruptions in the ability to carry out business activities. As an expert, develops SAP cybersecurity policies, plans, operating instructions, and procedures based on accurate interpretation of National, DoD, and Air Force policy applicable to test & evaluation operations, tactics development, advanced programs, and classified network operations. Performs services as a senior systems administrator. Requirements Conditions of Employment Qualifications Learn More About This Agency: The mission of the United States Air Force is: To fly, fight, and win...Airpower anytime, anywhere. To achieve that mission, the Air Force has a vision of Global Vigilance, Global Reach and Global Power. That vision orbits around three core competencies: Developing Airmen, Technology-to-Warfighting and Integrating Operations. Core competencies and distinctive capabilities are based on a shared commitment to three core values -- integrity first, service before self, and excellence in all we do. Click here to view the AF Civilian Employment Eligibility Guide: AF DCIPS Interchange AF Internal Employee Cyber Interagency Transfer Authority (CITA) DoD Transfer (Excluding Air Force) EO 13473 Appointment of Certain Military Spouses Interagency Career Transition Assistance Plan Land Management Employee Military Spouse Preference Non-AF DCIPS Interchange PPP DoD Military Reserve (MR) and National Guard (NG) Technicians PPP DoD Retained Grade Preference Eligible PPP Mil Res (MR) and Nat Guard (NG) Pref Eligible Technician Receiving Disability Retirement Veterans Employment Opportunities Act Qualifications: In order to qualify, you must meet the requirements described in the Office of Personnel Management (OPM) Qualification Standards for General Schedule Positions, Information Technology (IT) Management Series, GS-2210 (Alternate A). https://www.opm.gov/policy-data-oversight/classification-qualifications/general-schedule-qualification-standards/2200/information-technology-it-management-series-2210-alternative-a/ EXPERIENCE: Must have IT-related experience demonstrating each of the following four competencies: Attention to Detail, Customer Service, Oral Communication, Problem Solving AND have at least one (1) year of specialized experience at the next lower grade level (GS-12) or equivalent in other pay systems. Examples of specialized experience includes: Directing cybersecurity projects and resources by planning, coordinating, scheduling, and implementing strategies that manage requirements and risks, prioritize information assurance goals, and quantify benefits through comprehensive cost/risk/benefit analysis; analyzing a broad range of IT security risks and vulnerabilities (e.g., espionage, service disruption, destructive programs, and insider threats) to determine optimal protection procedures for systems and applications; evaluating network operations, systems testing, and performance management methods during assessment and authorization processes to ensure standards are met and/or recommend revised security measures; and establishing comprehensive security policies, standards, and techniques based on IT principles to protect computer systems against viruses, data tampering, and unauthorized entry. FEDERAL TIME-IN-GRADE (TIG) REQUIREMENT FOR GENERAL SCHEDULE (GS) POSITIONS: Merit promotion applicants must meet applicable time-in-grade requirements to be considered eligible. One year at the GS-12 level is required to meet the time-in-grade requirements for the GS-13 level. TIG applies if you are in a current GS position or held a GS position within the previous 52 weeks. NOTE: Applicants applying as VEOA candidates who are current GS civil service employees or are prior GS civil service employees within the past 52 weeks must also meet time-in-grade requirements. KNOWLEDGE, SKILLS AND ABILITIES (KSAs): Your qualifications will be evaluated on the basis of your level of knowledge, skills, abilities and/or competencies in the following areas: Mastery level knowledge of the principles, methods and tools for planning, developing, coordinating, scheduling, implementing, and managing cybersecurity projects and resources including: identifying and managing requirements, identifying and managing risks, prioritizing work according to agency information assurance goals, and quantifying tangible and intangible benefits through cost/risk/benefit analysis. Expert professional knowledge of quantitative techniques and methods used to conceptualize, develop, adapt, modify and apply new models to resolve the most difficult problems and to achieve support for alternative solutions within the scientific community. Knowledge of National, DoD, and Air Force regulations, organization structure and functions, precedents, procedures, practices and standards that apply to cybersecurity operations relevant to test & evaluation, tactics development, Electronic Warfare (EW) system reprogramming, advanced programs, and classified network operations. Advanced knowledge and skill of private sector C4 systems, data, scientist Big Data analytics, machine learning, AI, cognitive science, programs, operations, strategies, resource and information processes, and weapons systems. Includes operations research analysis techniques and mastery of scientific and analytical capabilities. Advanced skill in articulating and negotiating very complex and sensitive issues with officials of diverse perspectives and often with different or opposing views while maintaining good working relations. Expert ability to negotiate and defend findings and gain executive support for new program concepts. Ability to plan, organize, direct and lead the functions and staff and/or study team tasked to originate new ideas, projects and methodologies. Skill in leadership, decision making, problem solving, developing effective interpersonal relationships, and team building. Skill in leading advanced study teams composed of industry, government, and academic experts; originate new ideas, projects, and methodologies; and execute projects and/or studies within established financial and/or time constraints. Knowledge of a broad range of IT security vulnerabilities sufficient to assess and advise on risks and vulnerability from a variety of sources ( e.g., espionage, disruption of services, destructive programs/applications, insider threats) and procedures and methods for protection of systems and applications. Knowledge of assessment and authorization, network operations, systems testing and evaluation, and performance management methods sufficient to evaluate and ensure standards are met and to advise on new or revised security measures and countermeasures based on the results of assessment review. Knowledge of a full range of IT principles, concepts, practices, products and services, and methods sufficient to develop and coordinate security policies, standards and techniques for protecting computer systems from viruses, data tampering, and unauthorized system entry. Skill to develop and utilize appropriate data collection techniques and design, build and use models and simulation techniques. PART-TIME OR UNPAID EXPERIENCE: Credit will be given for appropriate unpaid and or part-time work. You must clearly identify the duties and responsibilities in each position held and the total number of hours per week. VOLUNTEER WORK EXPERIENCE: Refers to paid and unpaid experience, including volunteer work done through National Service Programs (i.e., Peace Corps, AmeriCorps) and other organizations (e.g., professional; philanthropic; religious; spiritual; community; student and social). Volunteer work helps build critical competencies, knowledge and skills that can provide valuable training and experience that translates directly to paid employment. You will receive credit for all qualifying experience, including volunteer experience. Education Additional Information Interagency Career Transition Assistance Program (ICTAP): For information on how to apply as an ICTAP eligible click here. To be well-qualified and exercise selection priority for this vacancy, displaced Federal employees must be rated well qualified or above for this position. You must submit a copy of the agency notice, your most recent performance rating, and your most recent SF-50 noting position, grade level, and duty location. Employed Annuitants (Reemployed Annuitants): Applicants in receipt of an annuity based on civilian employment in the Federal Service are subject to the DoD Policy on The Employment of Annuitants. Click here for more information. 120-Day Register: This announcement may result in a 120-day register that may be used to fill like vacancies for 120 days after the closing date. Applicants may be referred for consideration as vacancies occur. Military Spouse Preference (MSP) Eligible: MSP applicants, if determined best qualified, must be selected and placed at the highest grade for which they applied. You must include a completed copy of the DD Form 3145-4, Military Spouse PPP Self-Certification Checklist dated within 30 days along with the documents identified on the checklist to verify your eligibility for MSP. Click here to obtain/download a copy of the DD Form 3145-4, Military Spouse PPP Self-Certification Checklist. Priority Placement Program (PPP) Applicant Eligible: PPP Applicants, if determined well qualified and selected, will be placed at the at the full performance level. You must include the applicable completed copy of the PPP Self-Certification Checklist dated within 30 days along with the documents identified on the checklist to verify your eligibility as a PPP Applicant. Click here to obtain/download a copy of the applicable PPP Self-Certification Checklist (DD3145-1 through DD3145-4, select the appropriate checklist for your claimed preference). To determine the applicable PPP Self-Certification Checklist required to substantiate the eligibilities you are claiming, refer to the AF Civilian Employment Eligibility Guide located in the Required Documents section of this vacancy announcement. Direct Deposit: All federal employees are required to have direct deposit. Disabled veteran leave is available to a Federal employee hired on/after 5 Nov 2016, who is a veteran with a service-connected disability rating of 30% or more. For more information, click here. If you have questions regarding this announcement and have hearing or speech difficulties click here.

DirectEmployers