Overview
On Site
Full Time
Skills
Information Security
Management
PASS
DoD
Military
Security Clearance
Reporting
Random Testing
Public Sector
Research
Policies and Procedures
Accessibility
ISSM
Information Systems
Cyber Security
HR Management
Training
DirectShow
DS
Computer Science
Science
Mathematics
Operations Research
Statistics
IT Management
Job Details
Duties
Requirements Conditions of Employment
1) Developing/Researching/Implementing policies and procedures to ensure information systems reliability and accessibility and to prevent and defend against unauthorized access to systems, networks, and data;
2) Serving as, assisting the, or assuming responsibilities of a Information Systems Security Manager (ISSM);
3) Conducting risk and vulnerability assessments of planned and installed information systems to identify vulnerabilities, risks, and protection needs;
4) Maintaining/assisting with a cybersecurity program that includes cybersecurity architecture, requirements, objectives and policies, cybersecurity personnel, and cybersecurity processes and procedures.
Additional qualification information can be found from the following Office of Personnel Management website:
Experience refers to paid and unpaid experience, including volunteer work done through National Service programs (e.g., professional, philanthropic, religious, spiritual, community, student, social). Volunteer work helps build critical competencies, knowledge, and skills and can provide valuable training and experience that translates directly to paid employment.
Education
The following education may be substituted in lieu of specialized experience:
DS-03 (GS-09): Master's degree or equivalent graduate degree or 2 full years of progressively higher level graduate education leading to a master's degree or equivalent graduate degree.
DS-04 (GS-11): Ph.D. or equivalent doctoral degree or 3 full years of progressively higher level graduate education leading to a Ph.D. or equivalent doctoral degree.
DS-05 (GS-12): Not applicable.
Graduate Education: Degree in computer science, engineering, information science, information systems management, mathematics, operations research, statistics, or technology management or degree that provided a minimum of 24 semester hours in one or more of the fields identified above and required the development or adaptation of applications, systems or networks.
- You will assist, assume responsibilities of (as needed), or serve as a Information Systems Security Officer (ISSO).
- You will ensure the confidentiality, integrity, and availability of systems, networks, and data through the planning, analysis, development, implementation, maintenance, and enhancement of information systems security programs, policies, and tools.
Requirements Conditions of Employment
- Must be determined suitable for federal employment.
- Must participate in the direct deposit pay program.
- New employees to the Department of the Navy will be required to successfully pass the E-Verify employment verification check. To learn more about E-Verify, including your rights and responsibilities, visit e-verify.gov
- Within the Department of Defense (DoD), the appointment of retired military members within 180 days immediately following retirement date to a civilian position is subject to the provisions of 5 United States Code 3326.
- Males born after 12-31-59 must be registered for Selective Service.
- You will be required to obtain and maintain an interim and/or final security clearance prior to entrance on duty. Failure to obtain and maintain the required level of clearance may result in the withdrawal of a job offer or removal.
- This is a Cyberspace Workforce position, work role code 722, proficiency level Basic the incumbent is required to obtain and maintain qualifications in DoDM 8140.03 Cyber Workforce Qualification and Department of Navy policies.
- Successful completion of a pre-employment drug test (including marijuana) is required. A tentative offer of employment will be rescinded if you fail to report to the drug test appointment or fail the test. You will be subject to random testing.
1) Developing/Researching/Implementing policies and procedures to ensure information systems reliability and accessibility and to prevent and defend against unauthorized access to systems, networks, and data;
2) Serving as, assisting the, or assuming responsibilities of a Information Systems Security Manager (ISSM);
3) Conducting risk and vulnerability assessments of planned and installed information systems to identify vulnerabilities, risks, and protection needs;
4) Maintaining/assisting with a cybersecurity program that includes cybersecurity architecture, requirements, objectives and policies, cybersecurity personnel, and cybersecurity processes and procedures.
Additional qualification information can be found from the following Office of Personnel Management website:
Experience refers to paid and unpaid experience, including volunteer work done through National Service programs (e.g., professional, philanthropic, religious, spiritual, community, student, social). Volunteer work helps build critical competencies, knowledge, and skills and can provide valuable training and experience that translates directly to paid employment.
Education
The following education may be substituted in lieu of specialized experience:
DS-03 (GS-09): Master's degree or equivalent graduate degree or 2 full years of progressively higher level graduate education leading to a master's degree or equivalent graduate degree.
DS-04 (GS-11): Ph.D. or equivalent doctoral degree or 3 full years of progressively higher level graduate education leading to a Ph.D. or equivalent doctoral degree.
DS-05 (GS-12): Not applicable.
Graduate Education: Degree in computer science, engineering, information science, information systems management, mathematics, operations research, statistics, or technology management or degree that provided a minimum of 24 semester hours in one or more of the fields identified above and required the development or adaptation of applications, systems or networks.
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.