Washington, DC, 20080, USA
4 days ago
Information Technology Specialist (Security)
Summary This position is located within the Information Technology Security Office (ITSO). As an IT Specialist (Security) within ITSO, the incumbent is a recognized IT security and cyber threat intelligence expert within the federal government with a strong background in the intelligence planning cycle and cyber exercises process. Responsibilities The IT Specialist (Security) is a recognized IT security and cyber threat intelligence expert within the federal government with a strong background in the intelligence planning cycle and cyber exercises. The incumbent will collaborate across government and industry to support the federal judiciary and leverage national resources and the intelligence community to defend against potential cyberattacks. In addition, the IT Specialist (Security) will serve as a strategic intelligence team lead and is responsible for promoting, developing, and updating threat profiles associated with the United States Federal Courts. The specialist will assist in the development of priority intelligence requirements (PIRs), associated collection plans, and the development of relevant and actionable threat intelligence. Duties may include, but are not limited to, the following: Analyzing operational cyber data for the purpose of identifying potential future adversarial actions. Applying intelligence and analytic processes, standards, and tradecraft to perform and enhance analyses and identification of emerging cyber adversary tactics and threats to the judiciary. Developing cyber intelligence products that include timely technical assessments and recommendations. Developing, coordinating, and executing cyber exercises across multiple partner agencies. Assisting in developing and maintaining cyber threat intelligence collection plans. Applying expert knowledge about judiciary-specific critical assets to a wide variety of threat scenarios. Monitoring, researching, and developing products and briefings on cyber threats to the judiciary's critical assets to enable customers to develop new procedures and mitigation strategies in response to evolving threats. Facilitating technical exchange meetings with partner government agencies. Developing Threat Intelligence Reports (TIRs). Monitoring, researching, and developing products and briefings on cyber threats to the judiciary's critical assets to enable customers to develop new procedures and mitigation strategies in response to evolving threats. Providing weekly status report production and review. Serving as a subject matter expert on cyber threats to the judiciary. Performing the tasks and meeting the skills, knowledge and abilities as described in NIST Special Publication 800-181 National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce, NIST Special Publication 800-30 Risk Management Guide for IT Systems, NIST Special Publication 800-53 Recommended Security Controls for Federal Systems and Organizations, and NIST Special Publication 800-137 Information Security Continuous Monitoring for Federal Information Systems and Organizations. Training and developing other cybersecurity and intelligence professionals within the federal judiciary on intelligence development, analytics, Requirements Conditions of Employment CONDITIONS OF EMPLOYMENT All information is subject to verification. Applicants are advised that false answers or omissions of information on application materials or inability to meet the following conditions may be grounds for non-selection, withdrawal of an offer of employment, or dismissal after being employed. Selection for this position is contingent upon completion of OF-306, Declaration of Federal Employment during the pre-employment process and proof of U.S. citizenship for competitive status positions or conversion to a competitive status position with the AO. If non-citizens are considered for hire into a temporary or any other position with non-competitive status or when it is confirmed by the AO Human Resources Office there are no qualified U.S. citizens for a competitive status position (unless prohibited by a law or statue), non-citizens must provide proof of authorization to work in the U.S. and proof of entitlement to receive compensation. Additional information on the employment of non-citizens can be found at USAJOBS Help Center | Employment of non-citizens/. For a list of documents that may be used to provide proof of citizenship or authorization to work in the United States, please refer to Form I-9, Employment Eligibility Verification. All new AO employees will be required to complete an FBI fingerprint-based national criminal database and records check and pass a public trust suitability check. New employees to the AO will be required to successfully pass the E-Verify employment verification check. To learn more about E-Verify, including your rights/responsibilities, visit https://www.e-verify.gov/. All new AO employees are required to identify a financial institution for direct deposit of pay before appointment. You will be required to serve a trial period if selected for a first-time appointment to the Federal government, transferring from another Federal agency, or serving as a first-time supervisor. Failure to successfully complete the trial period may result in termination of employment. If appointed to a temporary position, management may have the discretion of converting the position to permanent depending upon funding and staffing allocation. Qualifications Applicants must have demonstrated experience as listed below. This requirement is according to the AO Classification, Compensation, and Recruitment Systems which include interpretive guidance and reference to the OPM Operating Manual for Qualification Standards for General Schedule Positions. Specialized Experience: Applicants must have at least one full year (52 weeks) of specialized experience which is in or directly related to the line of work of this position. Specialized experience is demonstrated experience providing cyber threat intelligence to protect an organization against potential cyberattacks. Desired, but not required: Applicants with one or more of the following certifications are highly desireable: Certified Information Systems Security Professional (CISSP) Certified Information Security Manager (CISM) Certified Ethical Hacker (CEH) Similar cybersecurity certification Education This position does not require education to qualify. Additional Information The AO is an Equal Opportunity Employer.
Confirm your E-mail: Send Email