Washington, DC, 20080, USA
15 days ago
Supervisory Information Technology Specialist (Security)
Summary This position is located within the Security Operations Division of the Information Technology Security Office (ITSO). The incumbent will function as the Incident Response Branch (IRB) Chief and will be responsible for preparation, analysis containment, eradication, recovery, and post incident activity associated with enterprise cyber security incident. Responsibilities The incumbent of this position leads the incident response activities of the Security Operations Center and leverages digital forensics, malware analysis and other Tier 3 investigative and response capabilities to analyze, contain and eradicate cyber threats affecting the Federal Judiciary. The IRB Chief is the incident commander that directs and allocates resources and staff to respond to any security incidents, and liaises with law enforcement, court units and other AO program offices to obtain the appropriate support and expertise to eliminate threats. The candidate will provide subject matter expertise and operational support to the Security Operation Center's 24/7 continuous monitoring and incident response operations and facilitate the implementation of Defensive Cyber Operations - Internal Defensive Measures (DCO-IDM) as necessary to contain and remove malicious threats, as well as assist impacted organizations with recovery to full operational status. Duties of the position include, but are not limited to: Directing the day-to-day operations of an incident response team consisting of federal and contract resources. Functioning as an incident commander for enterprise security incidents. Determining and objectively validating incident impact based on availability, observed activity, location of activity, and sensitivity of data. Directing the preparation, testing, and execution of incident response (IR) playbooks. Identifying the scope of forensic investigations, ensuring appropriate reporting and documentation. Participating in the development of executive summaries of security incidents, and briefs to executives and customers. Developing performance work statements for IR service contracts. Defining, surveilling, monitoring, and reporting on acceptable quality levels of contracted support vendors. Functioning as a Contracting Officer Representative (COR) II for service contracts. Identifying the unique requirements associated with cloud-based IR for applications developed and maintained by third parties. Defining security monitoring use cases in collaboration with stakeholders. Engaging stakeholders in review of the Judiciary Security Operations Center (JSOC) Incident Response Plan. Developing and conducting tabletop IR exercises. Directing After-Action Reporting and Analysis for each major security incident. Recruiting and developing a diverse base of IR professionals. Developing technical webinars that advance and share technical knowledge exchange with other teams in the Security Operations Division Providing monthly summaries of incidents, including metrics and trending to enable proactive hunt and tuning of cyber tools. Defining and forecasting the hardware and software needs of the branch. Making recommendations for improving threat detection efficacy. Operating with exceptional customer focus with attention to detail and bias for action. Managing competing priorities in dynamic, fast-paced enterprise environment. Performing Supervisory functions for a team of government personnel. Requirements Conditions of Employment CONDITIONS OF EMPLOYMENT All information is subject to verification. Applicants are advised that false answers or omissions of information on application materials or inability to meet the following conditions may be grounds for non-selection, withdrawal of an offer of employment, or dismissal after being employed. Selection for this position is contingent upon completion of OF-306, Declaration of Federal Employment during the pre-employment process and proof of U.S. citizenship for competitive status positions or conversion to a competitive status position with the AO. If non-citizens are considered for hire into a temporary or any other position with non-competitive status or when it is confirmed by the AO Human Resources Office there are no qualified U.S. citizens for a competitive status position (unless prohibited by a law or statue), non-citizens must provide proof of authorization to work in the U.S. and proof of entitlement to receive compensation. Additional information on the employment of non-citizens can be found at USAJOBS Help Center | Employment of non-citizens/. For a list of documents that may be used to provide proof of citizenship or authorization to work in the United States, please refer to Form I-9, Employment Eligibility Verification. All new AO employees will be required to complete an FBI fingerprint-based national criminal database and records check and pass a public trust suitability check. New employees to the AO will be required to successfully pass the E-Verify employment verification check. To learn more about E-Verify, including your rights/responsibilities, visit https://www.e-verify.gov/. All new AO employees are required to identify a financial institution for direct deposit of pay before appointment. You will be required to serve a trial period if selected for a first-time appointment to the Federal government, transferring from another Federal agency, or serving as a first-time supervisor. Failure to successfully complete the trial period may result in termination of employment. If appointed to a temporary position, management may have the discretion of converting the position to permanent depending upon funding and staffing allocation. Qualifications Applicants must have demonstrated experience as listed below. This requirement is according to the AO Classification, Compensation, and Recruitment Systems which include interpretive guidance and reference to the OPM Operating Manual for Qualification Standards for General Schedule Positions. Specialized Experience: Applicants must have at least one full year (52 weeks) of specialized experience which is in or directly related to the line of work of this position. Specialized experience is demonstrated hands on experience leading threat detection and incident response activities to detect and remove potentially malicious cyber actors from organizational IT environments. Desired, but not required: Applicants with the following certificates are highly desirable: Offensive Security Certified Professional (OSCP) GIAC Reverse Engineering Malware (GREM) GIAC Exploit Researcher and Advanced Penetration Tester (GXPN) Education This position does not require education to qualify. Additional Information The AO is an Equal Opportunity Employer.
Confirm your E-mail: Send Email