Information Technology Specialist
: Job Details :


Information Technology Specialist

Air Force

Location: all cities,MA, USA

Date: 2024-10-02T20:14:18Z

Job Description:
Air Force Nuclear Weapons Center (AFNWC) is currently seeking a full-time Information Technology (IT) Specialist N09839001M to work in the Operations Division (NCO), of the NC3 Integration Directorate at Hanscom AFB, MA.This position is in pay band NH-2210-03 which has a typical 2024 salary range of $98,240 - $151,870 (locality pay included).Recruitment incentives and relocation expenses are authorized on a case-by-case basis.DUTIES: The primary purpose of this position is to serve as the head Information Technology (IT) Specialist managing the IT functions supporting the NC3 directorate. As the head of this incredible team, you will lead and directly collaborate with a wide range of stakeholders across the base, AFNWC, DoD, and industry to ensure all IT systems and networks are supporting directorate personnel across the Air Force. More specifically, you will plan, organize, and/or direct cyber, IT, COMSEC, and information/knowledge management (IM) activities which comply with legal, regulatory, and AF/DoD-directed requirements and meet mission and customer needs. You will be supporting the activities of DoD funded acquisition efforts for the division to provide the world's most leading-edge technologies available to the warfighter and ensure the surety of America's nuclear arsenal abroad. Responsibilities include some travel.Candidates should have demonstrated experience in working effectively with multiple levels within DoD, as well as the ability to communicate effectively and willingness to make presentations in small groups and technical interchange sessions.SKILLS: • Experience related to the DoD Cyber-workforce specialty areas below:o Systems Requirements Planner (641) - Consults with customers to evaluate functional requirements and translate functional requirements into technical solutions.o Product Support Manager (803) - Manages the package of support functions required to field and maintain the readiness and operational capability of systems and components.o Knowledge Manager (431) - Responsible for the management and administration of processes and tools that enable the organization to identify, document, and access intellectual capital and information content.• Experience with military IT operations at the base level – network, systems, computers, software, voice, COMSEC management and maintenance. Ability to execute updates, new architecture rollouts, planning & execution of new capabilities, planning & execution of upgrades/replacementsSPECIALTY AREAS (Not All-Inclusive):• OVERSEE & GOVERN: Provide leadership, management, direction, or development and advocacy so the organization may effectively conduct cybersecurity work.o IT Program/Project Management: Apply knowledge of data, information, processes, organizational interactions, skills, and analytical expertise, as well as systems, networks, and info exchange capabilities to manage IT projects and operations. Provide direct support for customer community that use IT, apply IT-related laws and policies, and provide IT-related guidance.o Cybersecurity Management: Oversee the cybersecurity program of an info system or network, including managing info security implications within the organization, specific program, or other area of responsibility, to include strategic, personnel, infrastructure, requirements, policy enforcement, emergency planning, security awareness, and other resources.o Strategic Planning and Policy: Develop policies and plan/advocate for changes in policy that support organizational cyberspace initiatives or required changes/enhancements.o Supervise & Manage: Supervise Government IT Specialists and manage IT team for the organization. Assigns work to employees, establishing performance standards, evaluating performance, assigning performance ratings, and providing effective feedback for employees. Plans work to be accomplished by subordinates, sets, and adjusts short-term priorities, and prepares schedules for completion of work.• OPERATE & MAINTAIN: Provide the support, administration, and maintenance necessary to ensure effective and efficient IT system performance and security.o Data Administration: Support and plan the development and administration of data management systems that allow for the storage, query, protection, and utilization of data.o Network Services: Coordinate with base networking support to install, configure, test, operate, maintain, and manage networks and their firewalls, including hardware (e.g., hubs, bridges, switches, multiplexers, routers, cables, proxy servers, and protective distributor systems) and software that permit the sharing and transmission of all spectrum transmissions of info to support the security of both info/systems.o Systems Administration: Install, configure, troubleshoot, and maintain server configurations (hardware and software) to ensure their confidentiality, integrity, and availability. Manage accounts, firewalls, and patches. o Systems Analysis: Study an organization's current computer systems and procedures, and design info systems solutions to help the organization operate more securely, efficiently, and effectively. • PROTECT & DEFEND: Identify, analyze, and mitigate threats to internal IT systems and/or networks.o Cyber Defense Analysis: Use defensive measures and info collected from a variety of sources to identify, analyze, and report events that occur or might occur within the network to protect info, IT systems, and networks from threats.o Cyber Defense Infrastructure Support: Test, implement, deploy, maintain, review, and administer the infrastructure hardware and software that are required to effectively manage the computer network defense service provider network and resources. Monitor network to actively remediate unauthorized activities.o Incident Response: Respond to crises or urgent situations within the pertinent domain to mitigate immediate and potential threats. Use mitigation, preparedness, and response and recovery approaches, as needed, to maximize survival of life, preservation of property, and info security. Investigate and analyze all relevant response activities.o Vulnerability Assessment & Management: Conduct assessments of threats and vulnerabilities; determine deviations from acceptable configurations, enterprise, or local policy; assess the level of risk; and develop and/or recommend appropriate mitigation countermeasures in operational and nonoperational situations.• SECURELY PROVISION: Conceptualize, design, procure, and/or build secure IT systems, with responsibility for aspects of system and/or network development.o Risk Management: Oversee, evaluate, and support the documentation, validation, assessment, and authorization processes necessary to assure that existing and new IT systems meet the organization's cybersecurity and risk requirements. Ensure appropriate treatment of risk, compliance, and assurance from internal and external perspectives.o Software Development: Develop and write/code new (or modify existing) specialized utility programs following software assurance best practices.o Systems Requirements Planning: Consult with customers to gather and evaluate functional requirements and translate them into technical solutions. Provide guidance on applicability of IT systems to meet mission needs.o Test and Evaluation: Develop and conduct tests of systems to evaluate compliance with specifications/requirements by applying principles and methods for cost-effective planning, evaluation, verification, and validation of technical, functional, and performance characteristics (including interoperability) of systems or elements of systems incorporating IT.ADDITIONAL REQUIREMENTS OF THE POSITION (Not All-Inclusive):• U.S. CITIZENSHIP IS REQUIRED. • Required to handle and safeguard sensitive and/or classified information in accordance with regulations to reduce potential compromise; employee must obtain and maintain a TS-SCI security clearance. • Employee is required to meet the appropriate qualifications for the specific position being filled, per Department of Defense (DoD) Manual 8140.03 dated 15 Feb 2023, Cyberspace Workforce Qualification and Management Program.o This is a DoD Cyber Workforce position and is assigned the following Cyber Work Role Codes and Proficiency Levels: 641 (Systems Requirements Planner) (Intermediate Level) 803 (Product Support Manager) (Intermediate Level) 431 (Knowledge Manager) (Intermediate Level)• Review the required Knowledge, Skills, Abilities, and Tasks (KSATs) for the Cyber Work Role, at • Work may occasionally require travel away from the normal duty station on military or commercial aircraft.• The employee may be required to work other than normal duty hours, which may include evenings, weekends, and/or holidays.• Overtime and/or emergency overtime may be required.• A computer related technical degree or comparable education and experience are desired.• This is a drug testing designated position. The incumbent is subject to pre‐employment drug testing as a condition of employment, and participation in random drug testing while assigned to the position.• Candidates should have experience in executing analytical studies of complex systems with strong ability to gather, assemble, analyze, and interpret data and results to provide support to decision makers.HOW TO APPLY:When applying, please use Microsoft Edge or Google Chrome. Click the apply button to complete an application and upload resume (PDF or Word Document) and/or additional documents (Transcripts, certifications, Veterans Docs (DD214), SF-50).To receive additional information about current and future job openings with AFCS via email notification, please register at www.Afciviliancareers.com and sign up to “Get Career Updates.”Equal Opportunity Employer. U.S. citizenship required. Must be of legal working age
Apply Now!

Similar Jobs (0)