IT SPECIALIST (INFOSEC) Government - Colchester, VT at Geebo

IT SPECIALIST (INFOSEC)

Receives and reviews written guidance from a variety of Department of Defense (DoD), federal and state investigative and enforcement agencies and interprets for impact in the state. Enforces established policy and guidance for all Information Assurance Systems Officers throughout the state. Enforces the state information assurance and accreditation policy.--Directs actions required to prevent and/or correct information assurance deficiencies and violations. Exercises authority for denial of computer access and coordinates re-establishment of service. Assures compliance with security policy for external connections to the state network and assures compliance with the national and state policies. Works with the System Security Manager to develop procedures to protect information in the state networks. Monitors external connections to other state, territorial, or federal network domains as necessary. Identifies and reports violations of system security. Administers firewalls and intrusion detection systems (IDS) and monitors unauthorized access. Implements virus protection plan. Evaluates the effectiveness of systems, devices, procedures, and methods used to safeguard information in computer accessible media and ensures correction of all state deficiencies on systems containing applicable security technologies.--Reviews/tests/updates continuity of operations plans (COOPS) and Security SOP's and actively participates in accreditation/re-accredidation processes. Extensive knowledge of security required for Network Operating Systems (NOS) in the state and the impact they have on data flow and capabilities. This may include but is not limited to, Windows NT, Windows 2000, UNIX (NETBIOS over TCP/IP and TCP/IP), and NOVELL (IPX / SPX). Extensive knowledge of the critical systems within the state and ability to prioritize protection of these and respond to new requirements in the IT architecture. Thorough knowledge and sufficient skill to conduct effective security reviews of present systems and networks and to recommend revised or new measures based upon accreditation reviews or new equipment fielding requirements. Sufficient knowledge to evaluate various authentication technologies and recommend purchase of hardware, software, or both to meet security requirements. Implementation includes adequate administration and oversight of the program. PERFORMS OTHER DUTIES AS ASSIGNED. Military Grades:
ARMY:
Warrant Officer W1-W3 or Enlisted E1-E8 AIR:
Enlisted only up to E8. Compatible Military Assignments:
ARMY:
WMOS:
255A/255N/255S or ECMF:
25 AIR:
3D0X1, 3D0X2, 3D0X3 GENERAL
Experience:
Must possess experience, education or training that has provided a basic knowledge of data processing functions and general management principles that enabled understanding of the stages required to automate a work process; Experience may have been gained in work such as computer operator or assistant, computer sales representative, program analyst, or other positions that required the use or adaptation of computer programs and systems. SPECIALIZED EXPERIENCE GS-09:
Each applicant must have 24 months:
Experience education, or training in analysis of the interrelationship of pertinent components of the system. Experience planning the sequence of actions necessary to accomplish the assignment. Experience scheduling the sequence of programs to be processed by computers where alternatives had to be weighed with a view to production efficiency. SPECIALIZED EXPERIENCE GS-11:
Must have a minimum of 36 months:
Experience, education, or training that approaches techniques and requirements appropriate to an assigned computer applications area or computer specialty area in an organization. Experience planning the sequence of actions necessary to accomplish the assignment where this entailed coordination with others outside the organizational unit and development of project controls. Experience that required adaptations of guidelines or precedents to meet the needs of the assignment. Experience preparing documentation on cost/benefit studies where is involved summarizing the material and organizing it in a logical fashion. OTHER REQUIREMENTS:
-Open to all members of the Vermont Army National Guard and all members of the Vermont Air National Guard only. -Must possess a Top Secret security clearance OR must be eligible to be awarded a Top Secret security clearance. -Industry certification in Security
or equivalent certification desired. -Must obtain Special Experience Identifier (SEI) 264, Information Assurance-Technical Level I (IAT I), or higher IAW DoD 8570.01M, Federal Information Security Management Act of 2002, Clinger Cohen Act of 1996. -Compliance with IT Workforce Training requirements must be met within 6 months of hire. Please be advised:
1. Specialized experience will be used to determine qualifications for the announced position. 2. An applicant's RESUME must provide, in detail, how they meet the specialized experience listed. 3. It must be documented with from (mm/yy) and to (mm/yy) dates and description of the specialized experience. 4. If education or a degree is required as part of the Specialized Experience, you must include transcripts. DO NOT copy the specialized experience qualifications word for word and place into your resume; you must describe your personal experience as it pertains to each statement.
  • Department:
    2210 Information Technology Management
  • Salary Range:
    $59,315 to $84,682 per year

Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.