Information Technology Specialist (InfoSpec)
San Antonio, TXJoin our team of science and engineering professionals in providing world-class leadership in materials and manufacturing for the US Air Force!DO-02: $74,734 - $117,351Job Overview
-
OPEN TO CURRENT AFRL CIVILIAN EMPLOYEES ONLY.
This announcement will be accepting candidate submissions until 16 January 2026. Resumes must be in DD/MMM/YYYY format.
The Bioeffects Division (711 HPW/RHD) of the 711th Human Performance Wing within the Air Force Research Laboratory seeks to hire a mid-level, DO-02, Information Technology Specialist (InfoSec) in San Antonio, TX.
This position supports security and information assurance and other critical functions within the Bioeffects Division (RHD).
Key Responsibilities:
- Serve as Information Systems Security Manager and/or Information Assurance Manager for the Bioeffects Division's cybersecurity systems and enclave.
- Plans, organizes, and manages 711/RHD Information Assurance Program activities to ensure compliance with legal and regulatory requirements and meet customer needs at a geographically separated unit (GSU).
- Maintains and improves the site’s overall information assurance posture in accordance with all DoD regulations and the National Industrial Security Program Operating Manual Supplement.
- Manages the following interrelated information assurance programs to ensure compliance with legal and regulatory requirements and fulfillment of customer needs: Information Security, Computer Security, Communications Security and Automated Information System Security Program.
- Leads, coordinates, communicates, integrates and is accountable for the overall success of the program, ensuring alignment with critical agency priorities.
- Implements and advises on information technology security policies and procedures to ensure protection of information transmitted within 711 HPW/RHD on the Joint Base San Antonio/Fort Sam Houston installation and from the installation using Local Area Networks, Wide Area Networks, the World Wide Web, or other communications modes.
- Utilizes current and future multi-level security products collectively to provide data integrity, confidentiality, authentication, non-repudiation, and access control of Local Area Network.
- Work pertains to the administration of all systems, including a myriad of associated hardware platforms, software applications and numerous interfaces included in the Local Area Network.
- Performs other duties as assigned.
- Develops cyberspace plans, strategy, and policy to support and align with organizational cyberspace missions and initiatives.
- Performs services as systems administrator: Serves as a systems administrator responsible for planning, coordinating, modifying, implementing, and troubleshooting to meet customer needs.
- Performs other duties as assigned.
Professional Development Opportunities: This position provides unique exposure to grow as an Information Assurance professional by empowering them to enhance their skills and knowledge. Also as a geographically separated unit (GSU) that operates as a base level enclave, this position allows for developing skillsets normally reserved for a full base-level unit.
Why This Role Matters: This role supports cutting-edge research with the electromagnetic spectrum, enabling the maximum safety exploitation of directed energy for the US and allies.
Application Process: We strongly prefer to fill this position internally to leverage existing knowledge of our directorate and portfolio.
Telework
Yes, this position is eligible for situational telework; as determined by agency policy
Eligible for a Referral Bonus?
No
Required Qualifications
- Appointment Type: Permanent
- United States Citizens
- Males must be registered for Selective Service, see www.sss.gov
- Incentives may/may not be authorized.
- This position requires possession of or the ability to obtain a Top-Secret security clearance.
- This is a Testing Designated Position. The incumbent may be subject to pre-employment drug testing as a condition of employment, and participation in random drug testing.
- This position may require travel.
- This position is an Acquisition Professional Development Program (APDP) position requiring Tier 2 (Practitioner) Non-Critical certification in Engineering and Technical Management (N).
- Selectee will have 5 years to complete certification requirements and must have 4 years of experience to become fully certified.
SPECIALIZED EXPERIENCE:
- Applicants must have at least one (1) year or 52 weeks of specialized experience at the next lower grade of position being advertised, or equivalent in other pay systems.
- Applicants must also meet the Basic Qualification requirements for the series.
To view the Individual Occupational Requirements for the position, click on the following links:
Desired Qualifications
-
1. Certifications:
- Required Certifications: CompTIA Security+, CISSP and/or CISM
- Desired Certifications, but not necessary: CGRC/CAP, SSCP
2. Experience:
- Experience in developing/researching/implementing policies and procedures to ensure information systems reliability and accessibility and to prevent and defend against unauthorized access to systems, networks, and data;
- Experience in serving as, assisting the, or assuming responsibilities of an Information Systems Security Manager (ISSM);
- Strong track record in conducting risk and vulnerability assessments of planned and installed information systems to identify vulnerabilities, risks, and protection needs;
- Expertise with maintaining/assisting with a cybersecurity program that includes cybersecurity architecture, requirements, objectives and policies, cybersecurity personnel, and cybersecurity processes and procedures.
3. Skills and Competencies:
- Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).
- Knowledge of computer networking concepts and protocols, and network security methodologies.
- Knowledge of current industry methods for evaluating, implementing, and disseminating information technology (IT) security assessment, monitoring, detection, and remediation tools and procedures utilizing standards-based concepts and capabilities.
- Skill in determining how an IT security system should work (including its resilience and dependability capabilities) and how changes in conditions, operations, or the environment will affect these outcomes.
- Ensure plans of actions and milestones or remediation plans are in place for vulnerabilities identified during risk assessments, audits, inspections, etc.
- Continuously validate the organization’s compliance with policies/guidelines/procedures/regulations/laws.
- Oversee policy standards and implementation strategies to ensure procedures and guidelines comply with cybersecurity policies.
Series
2210