IT Security Specialist Job at United States Senate Sergeant at Arms

United States Senate Sergeant at Arms Washington, DC 20510

$90,159 - $135,232 a year

Cybersecurity Specialist #5347
Pay Band: SAA-9 - $90159-$135232
Remote Work Status: Remote / FLSA Status: Exempt
Posting Date Range: 5/16/2023-5/30/2023

This vacancy announcement closes at 7pm EST. Late applications will not be accepted.

Job Description
This is professional work supporting the mission of a specific cybersecurity team to protect centralized and distributed information systems, applications, and data. The incumbent will have responsibility for competently contributing to the proper implementation of the team’s adopted standards and practices. This position is responsible for supporting the execution and coordination of mission essential services. Work is performed under the general supervision of a Supervisor.

Examples of Work
Provides functional and/or technical skills for the assigned cybersecurity unit. Supports the unit’s work effort as required in preparing materials for collaborating with other sections, divisions, departments, and vendors to gather and disseminate information. Contributes to the unit’s work effort as required in preparing analysis and materials for providing expert level support in the assigned area of cybersecurity to SAA IT security branch staff, other SAA technical staff, SAA procurement staff, and other division or departments; and for identifying and resolving critical and complex issues in the assigned unit. Supports the unit’s work effort as directed in providing leadership to the unit’s project teams and contractors. Work includes helping to develop plans, assignments, and coordination of work efforts. Supports the unit’s work effort to develop governing policies, standards and procedures.

Minimum Qualifications

Work requires an Associate’s Degree, or greater, in computer science, telecommunications, or a related technical field, and one to two years of experience within a CISSP-type environment or any equivalent combination of education and experience that provides the following knowledge, skills and abilities:

  • Knowledge with a variety of concepts, practices and procedures used by the assigned cybersecurity unit.
  • Knowledge of current technologies and/or tools in use by the assigned unit Skill in critical thinking to identify strengths, weaknesses, alternative solutions, conclusions and approaches to unit problems.
  • Skill in making processes more efficient.
  • Ability to logically analyze systems and/or processes in use by the assigned unit.
  • Ability to support unit work effort in setting team goals, plans, and monitoring projects.
  • General command of applicable standards and processes.
  • Ability in oral communication skills.

Physical Demands and Working Environment

Work requires extended periods of confined sitting and hand-eye coordination working with computers. Expected to work unusual and perhaps unexpected hours during a Continuity of Operations.

Additional Examples of Work:

  • Contribute technical support to enterprise-wide cyber defense technicians to resolve cyber defense incidents
  • Assist with implementation of updating defense tools’ rules and signatures (e.g., intrusion detection/protection systems, antivirus, and content blacklists, etc.) for specialized cyber defense applications
  • Analyze log files from a variety of sources (e.g., individual host logs, network traffic logs, firewall logs, and intrusion detection system [IDS] logs) to identify possible threats to network security
  • Assist with the triage cyber defense incidents, including determining scope, urgency, and potential impact, identifying the specific vulnerability, and making recommendations that enable expeditious remediation
  • Assist with trend analysis and reporting to ensure quality of cyber defense.
  • Assist with modifications or adjustments to technical platform, processes, environment, etc., based on cybersecurity capability assessments (Blue Team, Read Team, audits, etc.)
  • Assist with development of cyber defense techniques, guidance, and reports on incident findings to appropriate constituencies
  • Assist with collection of intrusion artifacts (e.g., source code, malware, Trojans) and use discovered data to enable mitigation of potential cyber defense incidents within the enterprise

Knowledge, Skills and Abilities:

  • Knowledge of cybersecurity and privacy principles
  • Knowledge of cyber threats and vulnerabilities
  • Knowledge of authentication, authorization, and access control methods
  • Knowledge of vulnerability information dissemination sources (e.g., alerts, advisories, errata, and bulletins)
  • Knowledge of incident categories, incident responses, and timelines for responses
  • Knowledge of intrusion detection methodologies and techniques for detecting host and network-based intrusions
  • Knowledge of what constitutes a network attack and a network attack's relationship to both threats and vulnerabilities
  • Knowledge of Insider Threat investigations, reporting, investigative tools and laws/regulations
  • Knowledge of adversarial tactics, techniques, and procedures
  • Knowledge of collection management processes, capabilities, and limitations
  • Knowledge of different classes of attacks (e.g., passive, active, insider, close-in, distribution attacks)
  • Knowledge of applicable laws, statutes (e.g., in Titles 10, 18, 32, 50 in U.S. Code), Presidential Directives, executive branch guidelines, and/or administrative/criminal legal guidelines and procedures
  • Knowledge of cyber-attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks)
  • Knowledge of encryption methodologies
  • Knowledge of signature implementation impact for viruses, malware, and attacks
  • Knowledge of cloud service models and how those models can limit incident response. Knowledge of malware analysis concepts and methodologies
  • Knowledge of packet-level analysis using appropriate tools (e.g., Wireshark, tcpdump)
  • Knowledge of Intrusion Detection System (IDS)/Intrusion Prevention System (IPS) tools and applications
  • Knowledge of penetration testing principles, tools, and techniques
  • Knowledge of intrusion detection and prevention system tools and applications
  • Knowledge of common adversary capabilities, tactics, techniques, and procedures in assigned area of responsibility
  • Knowledge of general attack stages
  • Skill in determining how a security system should work (including its resilience and dependability capabilities) and how changes in conditions, operations, or the environment will affect these outcomes
  • Skill in preserving evidence integrity according to standard operating procedures or national standards
  • Skill in using incident handling methodologies
  • Skill in conducting investigations and developing comprehensive reports
  • Skill in collecting data from a variety of cyber defense resources
  • Skill in securing network communications
  • Skill in recognizing and categorizing types of vulnerabilities and associated attacks
  • Skill in protecting a network against malware. (e.g., NIPS, anti-malware, restrict/prevent external devices, spam filters)
  • Ability to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation)
  • Ability to apply techniques for detecting host and network-based intrusions using intrusion detection technologies
  • Ability to interpret the information collected by network tools (e.g. Nslookup, Ping, and Traceroute

Licenses, Certification and Other Requirements
This position requires that the applicant obtain and maintain an applicable U.S. Government security clearance. Applicants must be U.S. citizens in order for the SAA to submit your application for a security clearance. For education requirements please see Minimum Qualifications.

Job Type: Full-time

Pay: $90,159.00 - $135,232.00 per year

Benefits:

  • 401(k)
  • Dental insurance
  • Flexible schedule
  • Health insurance
  • Paid time off
  • Vision insurance

Schedule:

  • 8 hour shift
  • Day shift
  • Holidays
  • Monday to Friday
  • Night shift
  • Weekend availability

Work Location: In person




Please Note :
www.bankofmontserrat.ms is the go-to platform for job seekers looking for the best job postings from around the web. With a focus on quality, the platform guarantees that all job postings are from reliable sources and are up-to-date. It also offers a variety of tools to help users find the perfect job for them, such as searching by location and filtering by industry. Furthermore, www.bankofmontserrat.ms provides helpful resources like resume tips and career advice to give job seekers an edge in their search. With its commitment to quality and user-friendliness, Site.com is the ideal place to find your next job.