INFORMATION TECHNOLOGY SPECIALIST (INFOSEC) Government - Halethorpe, MD at Geebo

INFORMATION TECHNOLOGY SPECIALIST (INFOSEC)

As an INFORMATION TECHNOLOGY SPECIALIST (INFOSEC) you will be responsible for the following duties:
Planning, coordinating, and controlling the cyber security, information assurance, sensitive unclassified information and information systems security training programs, products, and services throughout development and delivery. Providing training, products and services addressing all aspects of DoD cyber security and information assurance security program to include information systems security, information systems vulnerability assessment, information systems certification and accreditation, physical security, personnel security, cybersecurity, and other multiple security programs as they relate to cyber security and information assurance security. Designing, developing, implementing and evaluating new or modified training courses and products based upon DoD Information Assurance program requirements. Coordinating and presenting Cyber security and Information Assurance security training via resident, mobile or technically delivery courses at worldwide location to students throughout the DoD, DCSA, other Federal agencies, and industry. Perform as part of Command Cybersecurity Readiness Inspection or Cybersecurity Controlled Unclassified Information Assessment team The experience described in your resume will be evaluated and screened from the Office of Personnel Management's (OPMs) basic qualifications requirements. See:
https:
//www.opm.gov/policy-data-oversight/classification-qualifications/general-schedule-qualification-standards/2200/information-technology-it-management-series-2210-alternative-a/ for OPM qualification standards, competencies and specialized experience needed to perform the duties of the position as described in the MAJOR DUTIES and QUALIFICATIONS sections of this announcement by 09/04/2019 Applicant must have directly applicable experience that demonstrates the possession of the knowledge, skills, abilities and competencies necessary for immediate success in the position. Qualifying experience may have been acquired in any public or private sector job, and will typically be demonstrated by working at, or immediately below the level of the job being advertised, for a year or more. The previous work experience must clearly demonstrate the application of the particular competencies/knowledge, skills, and abilities necessary to successfully perform the duties of the position. Specialized experience required for this position is:
Developing, implementing and evaluating training programs for security professionals; using knowledge of the DoD's certification and accreditation process; responding to training needs analyses; working as an authoritative consultant and provider of training for DoD and the National Industrial Security Program; utilizing advanced knowledge of cybersecurity and information assurance to create instructional materials; developing orientation workshops for other training specialists; establishing innovative approaches to meeting training objectives. Specifically you will be evaluated on the following competencies:
1. Cybersecurity 2. IT Policy and Planning 3. Technical Competence 4. Oral Communication 5. Writing 6. Technology Awareness Please review the Required Supporting Documents Link at:
http:
//www.dla.mil/Portals/104/Documents/Careers/downloads/FourthEstateRequiredSupportingDocumentation.pdf?ver=2019-02-08-123333-753
  • Department:
    2210 Information Technology Management
  • Salary Range:
    $99,172 to $128,920 per year

Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.