Developing Your Cybersecurity Career: Resources for Students by Michael Erbschloe - HTML preview

PLEASE NOTE: This is an HTML preview only and some elements such as links or page numbers may be incorrect.
Download the book in PDF, ePub, Kindle for a complete version.

 

IT Specialist (INFOSEC)

Salary Range: $92,145.00 to $141,555.00

Duties, As an IT Specialist (INFOSEC) duties include, but are not limited to, the following:

  • Provide program/project management support for information technology (IT) and/or cybersecurity related programs and/or projects, to include examining strategic direction for program initiatives and activities, personnel, infrastructure, policy enforcement, emergency planning, IT and/or cybersecurity awareness, and/or other resources
  • Consult with customers to evaluate functional requirements; coordinate with systems architects, as needed, to provide oversight in the development of design solutions; define project scope and objectives based on customer requirements.
  • Research and identify available technologies and standards to meet customer requirements; identify functional-and security-related features to find opportunities for new capability developments to exploit or mitigate cyberspace vulnerabilities.
  • Support the design and development of secure interface specifications between interconnected systems; design, develop, integrate, and update system security measures (including polices and requirements) that provide confidentiality, integrity, availability authentication, and non-repudiation; develop architectures or system components consistent with technical specifications.

To qualify for the IT Specialist (INFOSEC) position you must meet the following qualifications requirement:

For the GS-13 level:

Have information technology related experience demonstrating each of the four require competencies Attention to Detail-review new systems or networks to implement appropriate security measures; Customer Service- work closely with customers to evaluate and provide insight on system requirements; Oral Communication-communicate the importance of IT security clearly throughout the organization to maintain standards; and Problem Solving- identify software designs for potential security risks.

AND

Have at least one full year of specialized experience comparable in scope and responsibility to the GS-12 level in the Federal service (obtained in either the public or private sectors). This experience must include activities such as: 1) managing cyber security projects to ensure that developed solutions meet customer requirements; 2) identifying information technology security program implications of new technologies or technology upgrades; 3) developing and documenting requirements, capabilities and constraints for system design procedures and processes; and 4) analyzing design constraints, trade-offs, and detailed system and security designs to identify necessary lifecycle support and providing recommended courses of action.

For the GS-14 level:

Have information technology related experience demonstrating each of the four require competencies Attention to Detail-conduct security system evaluation and audits to implement appropriate security measures; Customer Service- consult with customers to evaluate and provide oversight on system functional requirements; Oral Communication-communicate IT/cybersecurity policies and principals at all levels of the organization; and Problem Solving- identify security  risks and recommending solutions to optimize IT and/or cybersecurity initiatives.

AND

Have at least one full year of specialized experience comparable in scope and responsibility to the GS-13 level in the Federal service (obtained in either the public or private sectors). This experience must include activities such as: 1) providing program management oversight for cybersecurity projects to ensure that developed solutions meet customer requirements.; 2) identifying information technology security program implications of new technologies or technology upgrades and recommending appropriate courses of action; 3) developing and documenting requirements, capabilities, and constraints for system design procedures and processes; and 4) analyzing design constraints, trade-off, and detailed system and security designs to identify necessary lifecycle support and providing recommended courses of action.

In addition to the above requirements you MUST also meet the following requirements of the Selective Placement Factor (SPF):

  • Knowledge of IT/cybersecurity program management and project management principles and techniques.
  • Knowledge of IT/cybersecurity systems engineering principles.

Education is not a suitable substitute at this grade level.