Developing Your Cybersecurity Career: Resources for Students by Michael Erbschloe - HTML preview

PLEASE NOTE: This is an HTML preview only and some elements such as links or page numbers may be incorrect.
Download the book in PDF, ePub, Kindle for a complete version.

 

Advance Technology Security Specialist-Law Enforcement

Salary Range $62,712.00 to $109,592.00 Salary varies depending on location

Duties The Advanced Technology Security Specialist (LE) candidate will conduct facility security assessments, enforcement and intelligence reporting and technical analysis of building systems technology.

  • Conducts assessments ((technical (evaluation of technology) and non-technical (evaluation of people and operations)) of threats and vulnerabilities, determines deviations from acceptable configurations, enterprise or local policy, assesses the level of risk, and develops and/or recommends appropriate mitigation countermeasures in operational and non-operational situations for facility technology.
  • Identifies and verify hardware, application software, network, and system security postures are implemented as stated, document deviations, and recommend required actions to correct those deviations.
  • Analyzes threat information from multiple sources, disciplines, and agencies across the Intelligence Community. Synthesizes and places intelligence information in context; draws insights about the possible implications/application to federal facilities and associated systems.
  • Maintain an inventory of critical infrastructure operators' building/security technology vendors, integrators and other associated partners to ensure effective coordination of cyber security issues of systems in federally-owned and leased space.
  • Monitor external data sources (e.g., cybersecurity defense vendor sites, Computer Emergency Response Teams, Security Focus) to maintain the currency of cybersecurity defense threat condition and determine which security issues may have an impact upon building and security technologies/networks. Correlate incident data/intelligence to identify specific vulnerabilities and make recommendations that enable expeditious remediation.
  • Advise senior management and federal officials on risk levels and cybersecurity posture of systems evaluated or assigned.
  • Provide technical documents, incident reports, and findings from computer examinations, summaries, and other situational awareness information to higher headquarters.
  • Establish relationships between the incident response team(s) and other groups, both internal (e.g., legal department) and external (e.g., state and local law enforcement agencies and task forces, and vendors)
  • Develop(s) an investigative plan(s) to investigate alleged crime(s), violation, or suspicious activity utilizing computers and the Internet

MINIMUM QUALIFICATION REQUIREMENTS GS-11:

A. You qualify for this position at the GS-11 level because You have at least one full year of specialized experience comparable in scope and responsibility to the GS-09 level in the Federal service (obtained in either the public or private sectors). This experience must include activities such as:

  • Conducting assessments ((technical (evaluation of technology) and non-technical (evaluation of people and operations)) of threats and vulnerabilities, identifying deviations from acceptable configurations, enterprise or local policies, assessing the level of risk, and developing and/or recommending appropriate mitigation countermeasures in operational and non-operational situations for building and security technology;
  • Identifying and verifying hardware, application software, network, and system security postures implemented as stated, documenting deviations, and recommending required actions to correct those deviations.;
  • Analyzing threat information from multiple sources, disciplines, and agencies and places intelligence information in context; draws insights about the possible implications/application to federal facilities and associated systems and;
  • Supported cyber incident response and/or security and criminal investigations. OR

B. You qualify for this position at the GS-11 level because You have completed a Ph.D. or equivalent doctoral degree or three full years of progressively higher-level graduate education (54 semester units or the number of units your school uses to describe two graduate years of academic study) from an accredited college or university in a program that provided the knowledge, skills and abilities to do the work of this position. OR.

C. You qualify for this position at the GS-11 level because You have a combination of the graduate level education and specialized experience as described in "A" and "B" above which can be combined to meet 100 percent of the requirement. If your education is currently described in quarter hours, convert the quarter hours into semester hours by multiplying the quarter hours by the fraction 2/3rds. To calculate the percentage of qualifying graduate education, first take the number of semester hours or equivalent earned towards a graduate degree, in excess of 36 semester hours, and divide by 18 semester hours or equivalent. Then take number the number of months experience and divide by 12 months. Add the percentages together. The total must equal at least 100 percent to qualify using this option.

Certifications: Network +, Security+, and Certified Ethical Hacker certifications are desired, but not required. Employees will be required to obtain at least one certification within the first year of employment.

For any college courses, graduate work, research, thesis or other nondescript courses listed on your transcript (such as "Independent Research"), your resume or attachment memorandum from an academic professor must indicate how each course fulfills the specific education requirement (i.e., state number of semester hours credited, topic of study, grade earned).

For any college courses, graduate work, research, thesis or other nondescript courses listed on your transcript (such as "Independent Research"), your resume or attachment memorandum from an academic professor must indicate how each course fulfills the specific education requirement (i.e., state number of semester hours credited, topic of study, grade earned).