Vacancy Announcement

Similar documents
Vacancy Announcement

Vacancy Announcement

Vacancy Announcement

Vacancy Announcement

Vacancy Announcement

Vacancy Announcement

Vacancy Announcement

Vacancy Announcement

Nationwide Job Opportunity ANG Active Guard/Reserve AGR Vacancy

Supply Chain Risk Management

UNITED STATES ARMY INTELLIGENCE AND SECURITY COMMAND

City of Coquitlam. Request for Expressions of Interest RFEI No Workforce Scheduling Software

LAS VIRGENES MUNICIPAL WATER DISTRICT 4232 Las Virgenes Road, Calabasas, California 91302

Salary Commensurate with Education and Experience

NORWIN SCHOOL DISTRICT JOB DESCRIPTION. Coordinator of Educational Technology

Request for Proposal NYISO SGIG DBA RFP #: 12-7 NYISO DOE Smart Grid Investment Grant - Database Administrator Issued: February 2, 2012

INTERNAL/EXTERNAL JOB OPPORTUNITY Second Posting July 9 th, 2018

POSITION AVAILABLE: Full Time Case Manager (40 hrs) PCN#: CM01 EXCELLENT BENEFITS PACKAGE

COUNTY OF LOS ANGELES INTERNAL SERVICES DEPARTMENT OPEN COMPETITIVE JOB OPPORTUNITY

1. Assists assigned team with the coordination of health care activities and/or health

Klamath Tribal Health & Family Services 3949 South 6 th Street Klamath Falls, OR 97603

Klamath Tribal Health & Family Services 3949 South 6 th Street Klamath Falls, OR 97603

JOINT INTERAGENCY TASK FORCE SOUTH JOB FAIR ANNOUCEMENT

For some years, the automation of hospital administrative

Web Site Version. Follow-up of Recommendations

Security Risk Analysis

NOTICE OF PRIVACY PRACTICES

Department of Defense INSTRUCTION. SUBJECT: Security of Unclassified DoD Information on Non-DoD Information Systems

The State of US Voting System Security DEFCON Voting Machine Hacking Village July 2017

LOS ANGELES COUNTY SHERIFF S DEPARTMENT REQUEST FOR INFORMATION RFI NUMBER 652 SH ONLINE TRAFFIC REPORTS (OLTR)

Suffolk COUNTY COMMUNITY COLLEGE PROCUREMENT POLICY

Miami-Dade County, Florida Emergency Operations Center (EOC) Continuity of Operations Plan (COOP) Template

CYBER ATTACK SCENARIO

UNITED STATES ARMY INTELLIGENCE AND SECURITY COMMAND

Request for Proposal (RFP) (P ) PeopleSoft FSCM and HCM 9.2 Upgrade Project

Date: April 6, 2018 SUBJECT: REQUEST FOR QUALIFICATIONS. RFQ # Business Analyst Services

STATE BOARD FOR TECHNICAL AND COMPREHENSIVE EDUCATION PROCEDURE

San Bernardino Community College District. Chief of Police. Summary Description

SMARTCare Site Job Descriptions Site Physician Lead (Champion)

JOINT INTERAGENCY TASK FORCE SOUTH

BH/DS Clinician I #02130 City of Virginia Beach Job Description Date of Last Revision:

Department of Defense INSTRUCTION. Protection of Mission Critical Functions to Achieve Trusted Systems and Networks (TSN)

octo TELEWORK POLICY IV. POLICY Policy Number: OCT Effective Date: February 23, 2016 I. PURPOSE Ill. SCOPE

United States Department of the Interior BUREAU OF INDIAN EDUCATION Red Rock Day School P.O. Drawer 2007 Red Valley, Arizona 86544

UNITED STATES ARMY INTELLIGENCE AND SECURITY COMMAND

$63, to $118, / Per Year OPEN PERIOD: Tuesday, November 24, 2015 to Tuesday, December 8, 2015

POSITION DESCRIPTION

Service Description: Cisco Managed Services for Application Centric Infrastructure (ACI)

PLEASE REVIEW THE FOLLOWING PAGES IN THIS DOCUMENT FOR DETAILS AND APPLICABLE QUALIFICATIONS REGARDING THE REFERENCED POSITIONS.

Klamath Tribal Health & Family Services 3949 South 6 th Street Klamath Falls, OR 97603

2018 ABOS Part II Oral Examination

Department of Defense DIRECTIVE

Overview. Overview 01:55 PM 09/06/2017

MUST SUBMIT STATE APPLICATION PD 107

Request for Information and Qualifications RFIQ No Facility Asset Management Consulting Services

DEPARTMENT OF THE NAVY CYBERSPACE INFORMATION TECHNOLOGY AND CYBERSECURITY WORKFORCE MANAGEMENT AND QUALIFICATION

Minutes Board of Trustees

Community Development Project Manager Big Sky Economic Development (BSED)

TRICARE Prime Remote Program

Chapter 9 Legal Aspects of Health Information Management

JOINT INTERAGENCY TASK FORCE SOUTH JOB FAIR ANNOUCEMENT

Rapid Innovation Fund (RIF) Program

FLORIDA ATLANTIC UNIVERSITY ALTERNATIVE WORK ARRANGEMENTS

LAS VEGAS - CLARK COUNTY LIBRARY DISTRICT

EUROPEAN EXTERNAL ACTION SERVICE

North Hawaii Community Hospital Volunteer Services Application

City of La Palma Agenda Item No. 12

EUROPEAN EXTERNAL ACTION SERVICE

Department of Defense DIRECTIVE

Conditions of Employment This position is a member of the Management Personnel Plan and serves at the pleasure of the President.

DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON DC

APPLICATION FOR THE E911 RURAL COUNTY GRANT PROGRAM

Supervisor s Position No New Quality Improvement Lead Director Professional Standards

Summary of AV START Act (S.1885)

Lifecycle Models for Survivable Systems

Request for Proposals Emergency Response Plan, Training and Vulnerability Assessment

INSTRUMENTATION TECHNICIAN I/II/III

Internship Program. Application Submission completed form to: Monica Mitry Membership and Volunteer Coordinator

IT Managed Services Provider

REQUEST FOR PROPOSALS (RFP) Information Technology Services

Inspector General. Summary of Internal Control Issues Over the. Peace Corps. Financial Reporting. Office of. Background FISCAL YEAR 2017

JOINT INTERAGENCY TASK FORCE SOUTH JOB FAIR ANNOUCEMENT

POSITION DESCRIPTION

INSIDER THREATS. DOD Should Strengthen Management and Guidance to Protect Classified Information and Systems

MERIT PROMOTION PROGRAM CIVILIAN HUMAN RESOURCES OFFICE UNIT CAMP SMEDLEY D. BUTLER

VCU Health System PatientKeeper Connect. Request Instructions

Position No. Job Title Supervisor s Position Fin. Code. Department Division/Region Community Location

UNITED STATES ARMY INTELLIGENCE AND SECURITY COMMAND

Job Description JOB PURPOSE KEY JOB FUNCTIONS

Programmer. Request for Contracted Services

POSITION DESCRIPTION North Dakota University System. PART A - Identification, Duties/Responsibilities, and Task Inventory. 2.

PRIVACY IMPACT ASSESSMENT (PIA) For the

UNITED STATES ARMY INTELLIGENCE AND SECURITY COMMAND

Highlights of DoD Industry Information Day on the DFARS Cyber Rule

MERIT PROMOTION PROGRAM CIVILIAN HUMAN RESOURCES OFFICE UNIT CAMP SMEDLEY D. BUTLER

July 06, 2012 Executive Order -- Assignment of National Security and Emergency Preparedness Communications Functions EXECUTIVE ORDER

January 3, 2011 MEMORANDUM FOR THE HEADS OF EXECUTIVE DEPARTMENTS AND AGENCIES

WEST VIRGINIA HIGHER EDUCATION POLICY COMMISSION REQUEST FOR PROPOSALS VERIFICATION AND DOCUMENT MANAGEMENT SERVICES RFP #19007.

UCLA HEALTH SYSTEM CODE OF CONDUCT

REPORT ON COST ESTIMATES FOR SECURITY CLASSIFICATION ACTIVITIES FOR 2005

Transcription:

Vacancy Announcement ***When applying for this position, refer to "POSITION # 5345" on your application package.*** POSITION: Cybersecurity Senior Specialist (#5345) DEPARTMENT: Cybersecurity / Systems Support Branch / Host REQUIREMENTS: See attached Position Description SALARY RANGE: $84,840 - $127,252 CONTACT: U.S. Senate Sergeant at Arms, Human Resources Senate Hart Building SH-142 Washington, DC 20510 Phone: (202) 224-2889 Fax: (202) 228-2965 Email: resumes@saa.senate.gov POSTING DATE: Tuesday, August 07, 2018 DEADLINE FOR APPLICATIONS: Tuesday, August 14, 2018 All applicants must submit a U.S. Senate Sergeant at Arms Application for Employment with a cover letter and current resume to the Human Resources Department.

VETERANS EMPLOYMENT OPPORTUNITY ACT Hiring for this position is governed by the Veterans Employment Opportunity Act of 1998 ( VEOA ), as made applicable by the Congressional Accountability Act of 1995 ( CAA ). Pursuant to the VEOA, qualified applicants who are not current employees of the Office of the Senate Sergeant at Arms and who are disabled or who have served on active duty in the Armed Forces during certain specified time periods or in certain military designated campaigns ( veterans ) may be eligible to receive a preference over non-veterans in hiring decisions. Family members of veterans may also be eligible to receive a veterans preference if the veteran cannot claim his or her veterans preference. To be eligible for a veterans preference, applicants must meet all of the requirements set forth in the VEOA and applicable regulations. Those eligibility requirements are summarized in the Application for Veterans Preference, which is available at www.senate.gov/saaemployment. If claiming a veterans preference, an applicant must indicate that he/she is preference eligible on the application or resume and must submit a completed copy of the Application for Veterans Preference along with the supporting documentation specified on that form. If the Office of the Senate Sergeant at Arms does not receive the Application for Veterans Preference and supporting documentation by the closing date, the applicant s claim for a veterans preference may be denied. Applicants may obtain a copy of the Office s Veterans Preference In Appointments policy by submitting a written request to resumes@saa.senate.gov. Individuals who are entitled to a veterans preference are invited to self-identify voluntarily. This information is intended solely for use in connection with the obligations and efforts of the Office of the Senate Sergeant at Arms to provide veterans preference to preference-eligible applicants in accordance with the VEOA. An applicant s status as a disabled veteran and any information regarding an applicant s disability, including the applicant s medical condition and history, will be kept confidential and will be collected, maintained and used in accordance with the Americans with Disabilities Act of 1990, as made applicable by section 102(a)(3) of the CAA, 2 U.S.C. 1302(a)(3). An applicant who declines to self-identify as a disabled veteran and/or to provide information and documentation regarding his/her disabled veteran s status will not be subjected to an adverse employment action, but the individual may be ruled ineligible for a veterans preference.

OFFICE OF THE SERGEANT AT ARMS AND DOORKEEPER UNITED STATES SENATE CYBERSECURITY SENIOR SPECIALIST NATURE OF WORK This is professional work coordinating, implementing and maintaining technologies and processes to protect the confidentiality, integrity, and availability of Senate information systems. Work includes promoting system cybersecurity to safeguard information systems from unauthorized access, use, disclosure, or tampering. Incumbent utilizes all the security tools available to prevent system compromise and detect, react and respond to indicators of intrusion activity in the Senate s data/voice networks. Work also involves working closely with other Sergeant at Arms (SAA) departments and the Senate user community to define security requirements, cybersecurity plans to address disaster recovery, recommend mitigation strategies, and encourage adoption of best practices. Work is performed under the direction of a Cybersecurity Supervisor and is peer-reviewed for accuracy and effectiveness. EXAMPLES OF WORK (This list is not absolute or restrictive, but indicates approximate duties and responsibilities which may be redefined pursuant to operational needs.) Responds to potential localized or widespread security events; uses various reports to help track and isolate user access problems and potential security incidents; creates daily situational reports while manning and supporting the Cyber Security Operations Center. Coordinates and performs automated vulnerability assessments; advises Senate office staff on effective remediation techniques. Coordinates and performs the critical security patch evaluation and certification process for supported Microsoft and non-microsoft software. Promotes cybersecurity awareness and assists with developing security awareness materials; provides security reviews for Senate Office Cybersecurity operational environments; and assists in providing security training and awareness briefings. Assesses the impact of new cybersecurity threats and identifies and evaluates vulnerabilities within new technology and changes to Senate IT infrastructure. Researches, evaluates, tests, and recommends cybersecurity solutions and controls. Develops, implements, and maintains scripts and other automated tools to identify indicators of intrusion activity and to support effective cybersecurity workflow processes. PAGE 1 OF 3 The statements contained herein reflect general details necessary to describe the principal functions of this class, knowledge and skill typically required and the physical demands and working conditions, but should not be considered an all-inclusive listing of work requirements. REVISED: 3/7/2018 CODE: XXXX

OFFICE OF THE SERGEANT AT ARMS AND DOORKEEPER UNITED STATES SENATE Performs cybersecurity systems administration tasks and services for Senate employees and vendor maintenance access. Updates management as required on Cybersecurity related issues. PHYSICAL DEMANDS AND WORKING ENVIRONMENT Work is essentially sedentary with occasional walking, standing, and bending; occasional lifting and carrying desktop computers, computer components, and/or packages of software media. Work is conducted in common office environments and security operations centers. Occasional evening and weekend work may be required to resolve problems, handle incidents, participate in Continuity of Operations (COOP) exercises, or assist SAA staff in meeting critical deadlines. Expected to work unusual and perhaps unexpected hours during a COOP event. MINIMUM QUALIFICATIONS Work requires a Bachelor s Degree in computer science, telecommunications, or a related field, and three to five years of progressively responsible experience within a Certified Information Systems Security Professional (CISSP)-type environment or any equivalent combination of education and experience that provides the following knowledge, skills and abilities: Understanding of computer operating systems, applications, and networking; understanding of key principles of information protection; knowledge of data security and access control systems, encryption, firewalls, network- and host-based security technologies and processes. Working knowledge of TCP/IP communications protocols and standards. Ability to identify potential security breaches and implement action plans in conjunction with diverse groups of stakeholders. Ability to interface with individuals at all levels of the organization in a dynamic, fast-paced environment. Ability to communicate functional issues and solutions effectively, both orally and in writing, to individuals possessing a broad range of functional knowledge, skills, and abilities. Ability to re-focus work activities rapidly in response to changing requirements and priorities. Ability to handle sensitive information. Proficiency with office productivity tools including, but not limited to, spreadsheets, word processors, databases, and presentation software. Proficiency with one or more scripting language and/or integrated development environments. PAGE 2 OF 3 The statements contained herein reflect general details necessary to describe the principal functions of this class, knowledge and skill typically required and the physical demands and working conditions, but should not be considered an all-inclusive listing of work requirements. CODE: 7514 REVISED: 3/22/2018

OFFICE OF THE SERGEANT AT ARMS AND DOORKEEPER UNITED STATES SENATE LICENSES, CERTIFICATION AND OTHER REQUIREMENTS Ability to obtain and maintain a security clearance. PAGE 3 OF 3 The statements contained herein reflect general details necessary to describe the principal functions of this class, knowledge and skill typically required and the physical demands and working conditions, but should not be considered an all-inclusive listing of work requirements. REVISED: 3/22/2018 CODE: 7514

Systems Support Branch Systems (Host) Examples of Work: Cybersecurity Senior Specialist Addendum Translate functional requirements into technical solutions Build, install, configure, and test dedicated cyber defense hardware Check system hardware availability, functionality, integrity, and efficiency Employ secure configuration management processes Manage accounts, network rights, and access to systems and equipment Plan, execute, and verify data redundancy and system recovery procedures Develop and document systems administration standard operating procedures Analyze internal operational architecture, tools, and procedures for ways to improve performance Assist in identifying, prioritizing, and coordinating the protection of critical cyber defense infrastructure and key resources Identify information technology (IT) security program implications of new technologies or technology upgrades Identify potential conflicts with implementation of any cyber defense tools (e.g., tool and signature testing and optimization) Review service performance reports identifying any significant issues and variances, initiating, where necessary, corrective actions and ensuring that all outstanding issues are followed up Provide advice on project costs, design concepts, or design changes Participate in the acquisition process as necessary, following appropriate supply chain risk management practices Provide input to the Risk Management Framework process activities and related documentation (e.g., system lifecycle support plans, concept of operations, operational procedures, etc.) Knowledge, Skills and Abilities: Knowledge of the type and frequency of routine hardware maintenance Knowledge of principles and methods for integrating system components Knowledge of performance tuning tools and techniques Knowledge of the enterprise information technology (IT) architecture Knowledge of risk management processes (e.g., methods for assessing and mitigating risk) Knowledge of business continuity and disaster recovery continuity of operations plans Knowledge of access authentication methods Knowledge of resource management principles and techniques Knowledge of system life cycle management principles, including software security and usability Skill in identifying possible causes of degradation of system performance or availability and initiating actions needed to mitigate this degradation Ability to identify critical infrastructure systems with information communication technology that were designed without system security considerations Skill in interfacing with customers