Information Technology Specialist (InfoSec)
- City, State:
- San Antonio, TX
- Location/Base:
- Ft. Sam Houston, TX
- Level:
- Mid-Level
- Pay Plan-Grade:
- DO-02
- Pay Range (without Locality):
- DO-02: $74,734 - $117,351
- Technology Directorate/Mission Organization:
- 711
- Office Symbol:
- 711 HPW/RHDO
- Job Overview:
This announcement will be accepting candidate submissions until 4 September 2025. Resumes must be in DD/MMM/YYYY format.
The Bioeffects Division (711 HPW/RHD) of the 711th Human Performance Wing within the Air Force Research Laboratory seeks to hire a mid-level, DO/DR-02, Information Technology Specialist (InfoSec) in San Antonio, TX.
This position supports information assurance and other critical functions within Bioeffects Division which focuses on enabling maximum safe exploitation of the electromagnetic spectrum for national defense.
Position Duties include, but are not limited to:
- Serve as Information Systems Security Manager and/or Information Assurance Manager for the Bioeffects Division's cybersecurity systems and enclave.
- Plans, organizes and manages 711/RHD Information Assurance Program activities to ensure compliance with legal and regulatory requirements and meet customer needs at a geographically separated unit (GSU).
- Maintains and improves the site’s overall information assurance posture in accordance with all DoD regulations and the National Industrial Security Program Operating Manual Supplement.
- Manages the following interrelated information assurance programs to ensure compliance with legal and regulatory requirements and fulfillment of customer needs: Information Security, Computer Security, Communications Security and Automated Information System Security Program.
- Leads, coordinates, communicates, integrates and is accountable for the overall success of the program, ensuring alignment with critical agency priorities.
- Implements and advises on information technology security policies and procedures to ensure protection of information transmitted within 711 HPW/RHD on the Joint Base San Antonio/Fort Sam Houston installation and from the installation using Local Area Networks, Wide Area Networks, the World Wide Web, or other communications modes.
- Utilizes current and future multi-level security products collectively to provide data integrity, confidentiality, authentication, non-repudiation, and access control of Local Area Network.
- Work pertains to the administration of all systems, including a myriad of associated hardware platforms, software applications and numerous interfaces included in the Local Area Network. Performs other duties as assigned.
- Develops cyberspace plans, strategy and policy to support and align with organizational cyberspace missions and initiatives.
- Performs services as systems administrator: Serves as a systems administrator responsible for planning, coordinating, modifying, implementing, and troubleshooting to meet customer needs.
- Performs other duties as assigned.
Member must be able to cultivate a professional and respectful environment of cooperation and must be willing to listen and consider the views of others. Member must also be willing and able to seek opportunities for collaboration with personnel from other functional units (finance, contracting, etc.) and other technical areas of an organization to accomplish work-related activities.
- Eligible for a Referral Bonus?:
- No
- Required Qualifications:
- Appointment Type: Permanent
- United States Citizens
- Males must be registered for Selective Service, see www.sss.gov
- Incentives may/may not be authorized.
- This position requires possession of or the ability to obtain a Top-Secret security clearance.
- This is a Testing Designated Position. The incumbent may be subject to pre-employment drug testing as a condition of employment, and participation in random drug testing.
- This position may require travel.
- This position is an Acquisition Professional Development Program (APDP) position requiring Tier 2 (Practitioner) Non-Critical certification in Engineering and Technical Management (N). Selectee will have 5 years to complete certification requirements and must have 4 years of experience to become fully certified.
- SPECIALIZED EXPERIENCE: Applicants must have at least one (1) year or 52 weeks of specialized experience at the next lower grade of position being advertised, or equivalent in other pay systems.
- Applicants must also meet the Basic Qualification requirements for the series. To view the Individual Occupational Requirements for the position, click on the following links:
- Desired Qualifications:
1. Certifications:
- Required Certifications: CompTIA Security+, CISSP and/or CISM
- Desired Certifications, but not necessary: CGRC/CAP, SSCP
2. Experience:
- Experience in developing/researching/implementing policies and procedures to ensure information systems reliability and accessibility and to prevent and defend against unauthorized access to systems, networks, and data;
- Experience in serving as, assisting the, or assuming responsibilities of an Information Systems Security Manager (ISSM);
- Strong track record in conducting risk and vulnerability assessments of planned and installed information systems to identify vulnerabilities, risks, and protection needs;
- Expertise with maintaining/assisting with a cybersecurity program that includes cybersecurity architecture, requirements, objectives and policies, cybersecurity personnel, and cybersecurity processes and procedures.
3. Skills and Competencies:
- Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).
- Knowledge of computer networking concepts and protocols, and network security methodologies.
- Knowledge of current industry methods for evaluating, implementing, and disseminating information technology (IT) security assessment, monitoring, detection, and remediation tools and procedures utilizing standards-based concepts and capabilities.
- Skill in determining how an IT security system should work (including its resilience and dependability capabilities) and how changes in conditions, operations, or the environment will affect these outcomes.
- Ensure plans of actions and milestones or remediation plans are in place for vulnerabilities identified during risk assessments, audits, inspections, etc.
- Continuously validate the organization’s compliance with policies/guidelines/procedures/regulations/laws.
- Oversee policy standards and implementation strategies to ensure procedures and guidelines comply with cybersecurity policies.
- Additional Information:
When uploading documents, please utilize the naming convention listed below:
Resume: Req No_67565 Last Name_First Name_Resume
Transcripts: Req No_67565_Last Name_First Name_Transcripts
Acceptable file types: .doc,.docx,.pdf
(Requisition No.67565)