Developing Your Cybersecurity Career: Resources for Students by Michael Erbschloe - HTML preview

PLEASE NOTE: This is an HTML preview only and some elements such as links or page numbers may be incorrect.
Download the book in PDF, ePub, Kindle for a complete version.

 

Information Technology Specialist (Infosec/Network)

ADVANCED CYBER OPERATOR

Salary Range $71,012.00 to $92,316.00

Duties:

  • Prepares for, maintains currency for, and executes an advanced role in Cyberspace Operations. Utilizes knowledge of systems security principles and concepts of emerging Information Technology (IT) security developments, and of the infrastructure protection environment to select appropriate tools to be used by team members.
  • Establishes methodology and determines best techniques to secure computer systems and to protect cyber key terrain from exploitation of information within these systems and/or to achieve other tasked objectives in cyberspace.
  • Leverages knowledge of multiple entities with a stake in current operations to plan and build appropriate courses of action and training scenarios. Functions in at least one of the following advanced roles:

Cyberspace Crew Commander. Develops tactical objectives and/or tactical taskings for a team of Cyberspace Operators. Serves as the liaison between assigned team and other teams or external entities.

Cyberspace Operations Controller. Directs tactical execution for a team of Cyberspace Operators. Develops tactical approach and synchronizes actions of multiple qualified operators in order to achieve objectives.

Operations Planner/Scheduler:

  • Represents the unit's capability, availability, and interests at high-level Operational Planning Team (OPT) meetings to define the mission, environment, enemy, effects, capabilities, overall plan, phasing, operational agreements and contingencies needed to conduct the operation or exercise.
  • Develops a tactical plan for assigned missions and exercises.
  • Works as a member of the mission leadership element to translate operational objectives into tactical objectives comprised of specific tactical tasks.
  • Develops Measures of Effectiveness and Measures of Performance to be used in the assessment of the mission's or exercises success.
  • Prepares and coordinates operator, resource, facilities and equipment schedules in coordination with unit and flight commanders in order to ensure training, currency, and mission timelines and objectives are met.

Industrial Control Systems (ICS) Cyberspace Operator. Assesses and evaluates vulnerabilities and/or adversary activity in ICS enclaves. Detects, characterizes, and resolves insecurities in ICS networks. Reviews and analyzes ICS network traffic, configurations, and operating procedures and provides recommendations to improve system security posture.

National Mission Team Cyberspace Operator:

  • Maintains both Air Force currency and additional national-level requirements to execute U.S. Cyber Command's Defend-the-Nation priority.
  • Prepares Unit Training Assembly, Annual Training and currency training events for Mission Ready Cyberspace Operators to optimize training time available.
  • Ensures training for each event has been prepared and is ready.
  • Monitors assigned military members' go-no-go readiness status and ensures deficiencies are recognized.
  • Works with scheduling section to provide opportunities for assigned members to maintain full mission readiness.
  • Coordinates with maintenance section to ensure all assigned equipment is in good working condition and ready for each training and mission event. 
  • Conducts extensive research of new vulnerabilities and insecurities discovered in operating systems, application software, and infrastructure and boundary protection devices.
  • Investigates, analyzes, and develops methods that could be used to exploit these vulnerabilities.
  • Conducts testing on training range to validate findings and to develop and refine methods and procedures to mitigate vulnerabilities.
  • Coordinates research and findings with the Cyberspace Weapons Officer for inclusion in unit and cyberspace community tactics, techniques, and procedures.
  • Conducts extensive research of tools currently being used to attack or gain unauthorized access to information networks.
  • Analyzes and tests these tools on training range to determine effectiveness, stability, and scope of the tools.
  • Recommends and refines tools for use on Cyberspace Weapon System to provide the customer with the best possible evaluation of their security posture.

BASIC QUALIFICATION REQUIREMENTS:

  • Skilled in collecting and analyzing data effectively, efficiently, and accurately
  • Ability to plan, direct, and coordinate difficult and complex programs
  • Ability to develop, apply, and adjust cyber program plans to attain agency objectives
  • Ability to select, develop, and supervise a subordinate staff
  • Ability to establish and maintain effective working relationships, not only with subordinate staff, but with all levels of key management officials, the latter particularly requiring the exercise of tact, ingenuity, and resourcefulness
  • Ability to make oral and written presentations in a clear and concise manner
  • Ability to apply a high level of sound and independent judgment in the solution of cyber program problems and cyber mission requirements
  • A broad knowledge of and ability to utilize principles, methods, techniques, and systems
  • Ability to write proper English in reports and presentation formats
  • Ability to communicate clearly and effectively
  • Skilled in training, mentoring, and problem solving; and,
  • Skilled in applying procedures and directives by reading and interpreting program materials.

SPECIALIZED EXPERIENCE: Resume must show 24 months specialized experience working the cyber program's standardization and evaluation program, to include performing, managing, supervising, leading, mentoring, and/or training the following Information Technology Management and Cyberspace Program requirements:

  • Communications Security Management - Knowledge of the principles, policies, and procedures involved in ensuring the security of communications serves and data; and knowledge in maintaining the communications environment on which it resides.
  • Compliance - Knowledge of procedures for assessing, evaluation, and monitoring programs or projects for compliance with Federal laws, instructions, manuals, regulations, policies, and guidance. 
  • Computer Network Defense - Knowledge of defensive measures to detect, respond and protect information, information systems, and networks from threats.
  • Configuration Management - Knowledge of the principles and methods for planning or managing the implementation, update, or integration of information systems components.
  • Information Assurance - Knowledge of methods and procedures to protect information systems and data by ensuring their availability, authentication, confidentiality, and integrity. 
  • Information Systems Security Certification - Knowledge of the principles, methods, and tools for evaluating information systems security features against a set of specified security requirements. Includes developing security certification and accreditation plans and procedures, documenting deficiencies, reporting corrective actions, and recommending changes to improve the security of information systems. 
  • Information Systems and Network Security - Knowledge of methods, tools, and procedures including development of information security plans, to prevent information systems vulnerabilities, and provide or restore security of information systems and network services. 
  • Operating Systems - Knowledge of computer network, desktop, and mainframe operating systems and their applications; and
  • Security Awareness - Knowledge of the laws, regulations, and guidelines related to securing personnel, facilities, and information, to include the requirements for handling, transporting, and protecting classified information and proper reporting of security incidents.

EDUCATIONAL REQUIREMENTS: 

Dependent on the education requirements for award of the position's compatible military skill (AFSC), an undergraduate degree in Computer and Information Sciences and Support Services from an accredited college/university is desired. Completion of higher education courses in Computer Engineering; Engineering Physics/Applied Physics; Industrial Engineering; Electromechanical Engineering; Electrical, Electronics and Communications; Computer Technology/Computer Systems Technology; Cyber/Electronics Operations and Warfare; Mathematics and Computer Science; Accounting and Computer Science; Computational Science; Management Information Systems and Mathematics; or, courses in business, English composition, computer software, and keyboarding is desired. A graduate degree in Computer and Information Sciences and Support Services is optimum.