This job board retrieves part of its jobs from: Toronto Jobs | Emplois Montréal | IT Jobs Canada

The hottest job offers in the state of Virgina

To post a job, login or create an account |  Post a Job

Cybersecurity Service Provider

National Geospatial Intelligence Agency

This is a Full-time position in Quantico, VA posted September 23, 2021.

Job SummaryASSIGNMENT DESCRIPTION: Cybersecurity Service Providers protect, monitor, analyze, detect, and respond to unauthorized activity associated with NGA computer networks.

They collect information and data to identify, analyze, and report events and incidents that may impact the network.

They respond to crises or urgent situations and support the mitigation of immediate and potential threats.

They also perform audit assessments of systems and networks to identify deviations from acceptable configurations and policy.Additional Job InformationADDITIONAL INFORMATION: The National Geospatial-Intelligence Agency (NGA) serves as the world leader in providing timely, relevant, accurate and actionable geospatial intelligence (GEOINT).

NGA’s civilian, military and contract personnel evaluate imagery, maps, charts, multiple layers of foundation data
– such as terrain, elevation and gravity
– and the full spectrum of visible and invisible light in order to help users visualize what is happening at a particular place and time.

Our intelligence officers go beyond describing ‘what, where and when’ to revealing ‘how and why.’ our work enables decision advantage for our policymakers, warfighters, intelligence professionals and first responders.

NGA uses a flexible, high mobility career model.

Individuals are hired for their overall skills within a specialty such as Cybersecurity Service Provider, and then placed in various positions throughout the agency once they complete the clearance process.

Although currently advertised as a supervisory, permanent, telework-eligible job posting with occasional travel, it is unknown which specific positions will be available after applicants complete the selection and clearance process.

Because of this, aspects of the job such as travel, supervisory, telework, etc may change, depending on specific positions available at that time.

It is also possible that applicants could be hired into a position with specific aspects and then change positions after serving for a period of time in that assignment.

Applicants who have completed the clearance process receive final documentation about the nature of the specific position before they make the final commitment to join NGA.The Vulnerability Technician position under the Cybersecurity Management Officer work role resides within CIO-T and IT Services Directorate, TS, Cybersecurity Office, TST, Information Technology and Monitoring Division.

This position is responsible for conducting assessments of threats and vulnerabilities; determining deviations from acceptable configurations, enterprise or local policy, assessing the level of risk, and developing and/or recommending appropriate mitigation countermeasures in operational and nonoperational situations.

The VM technician ensures Information Technology (IT) cyber security vulnerabilities are effectively executed in order to mitigate and prevent attacks against NGA Information Technology Services.

Vulnerability Technicians conduct comprehensive assessments and continuous monitoring of operational and technical controls levied against or inherited by an information system (IS) to determine the overall effectiveness of the controls.

These officers recognize potential security violations, report incidents, in an attempt to mitigate any adverse impact.

Technicians execute daily work for the IAVA function, collaborate on day to day activities with government and contractor staff, ensuring Workflow Diagrams, Standard Operating Procedures, Work Instructions, appropriate policies and documents are developed and remain current.

Communicate issues/concerns to the applicable program managers and senior executives.1.

Coordinate computer security incident response activities against threats to include, but not be limited to: viruses, worms, Trojan horses, other malicious code, system security breaches, and cyber-terrorist attacks.2.

Inform the Intelligence Community (IC) of priority intelligence requirements (PIR) and indications and warning requirements for potential attacks against DoD information systems and computer networks.3.

Provide DoD-wide situational awareness and attack sensing and warning through fusion, analysis and coordinated information flows.Additional Application Requirement: You may be asked to complete one or more assessments in addition to the application you submit on this website as part of your application to NGA.

These assessments may include but are not limited to:1) Online questionnaires or assessments that require you to describe your job-related knowledge, skills(U) , abilities, or other characteristics that are aligned with the mandatory and desirable qualifications of this job posting.

The information you provide in the application you submit must support the response you provide to this questionnaire.You will receive an email to describe any additional assessments required.

Please monitor your emails and complete any required assessments as soon as possible.Mandatory QualificationsMANDATORY QUALIFICATION CRITERIA: For this particular job, applicants must meet all competencies reflected under the Mandatory Qualification Criteria to include education (if required).

Online applications must demonstrate qualification by providing specific examples and associated results, in response to the announcement’s mandatory criteria specified in this vacancy announcement:1.

Demonstrated experience with developing and/or applying cybersecurity principles, policies, practices, standards, or controls Security Controls2.

Ability to conduct analysis to determine unauthorized activity; elevates issue to appropriate stakeholders.3.

Demonstrated experience with managing routine projects, allocating tasks and coordinating resources to ensure that projects are completed within defined constraints.4.

Demonstrated ability to comprehensively identify, quantify, qualify and estimate the degree of vulnerabilities.EDUCATION REQUIREMENT: A.

Education: Bachelor’s degree from an accredited college or university in Computer Information Systems, Computer Science, Cybersecurity, Electrical Engineering, Information Assurance, Information Science, Information Systems, Information Systems Management, Information Technology, Mathematics, Operations Research, Physics, Statistics, Technology Management, or degree that provided a minimum of 24 semester hours in one or more of the fields identified above and required the development or adaptation of applications, systems, or networks.

– B.

Combination of Education and Experience: A minimum of 24 semester (36 quarter) hours of coursework in any area listed in option A, plus experience in cyber-analytics, computer forensics, incident response, or a related area that demonstrates the ability to successfully perform the duties associated with this work.

As a rule, every 30 semester (45 quarter) hours of coursework is equivalent to one year of experience.

Candidates should show that their combination of education and experience totals 4 years.

– C.

Experience: A minimum of 4 years of experience in cyber-analytics, computer forensics, incident response, or a related area that demonstrates the ability to successfully perform the duties associated with this work.

– LICENSES/CERTIFICATIONS: Computer Network Defense Service Provider certifications (e.g., CND-A, CND-IS, CND-IR, CND-AU) and Information Assurance Management (IAM) or Information Assurance Technical (IAT) Level 1 certification must be obtained within 6 months.

– Relevant Competencies: IT-related experience demonstrating each of the four competencies: Attention to Detail, Customer Service, Oral Communication, and Problem Solving.Highly Desired QualificationsQUALIFICATION CRITERIA: In addition to the mandatory qualifications, experience in the following is desired:1.

Knowledge of Vulnerability Disclosure Program (VDP), Knowledge of Cybersecurity Information Assurance Vulnerability Management (IAVM) Compliance Knowledge Cybersecurity.Additional Job RequirementsYou must be able to obtain and retain a Top Secret security clearance with access to Sensitive Compartmented Information.

In addition, you are subject to a Counterintelligence Polygraph examination in order to maintain access to Top Secret information.

All employees are subject to a periodic examination on a random basis in order to determine continued eligibility.

Refusal to take the examination may result in denial of access to Top Secret information, SAP, and/or unescorted access to SCIFs.Employees with SCI access and who are under NGA cognizance are required to submit a Security Financial Disclosure Report, SF-714, on an annual basis in order to determine continued eligibility.

Failure to comply may negatively impact continued access to Top Secret information, Information Systems, SAP, and/or unescorted access to SCIFs.Pay, Benefits, & Work SchedulePROMOTION OPPORTUNITY: Promotion opportunities allow applicants at all band levels to be considered.

Qualifications for NGA positions do not include specific time-in-band requirements.

NGA will emphasize quality of experience, rather than duration, and assess how the quality of the experience demonstrates possession of the knowledge, skills, abilities, and competencies necessary for successful job performance in the NGA occupational structure.Band 03 $72,750
– $134,798PERMANENT CHANGE IN STATION: PCS expenses are not authorized.Pay is only part of the compensation you will earn working for the Federal Government.

We offer a broad array of benefits programs and family friendly flexibilities to meet the needs of you and your family.For more information on the array of benefits programs, please visit LetterApplicants are not required to submit a cover letter.

The entire cover letter cannot exceed the specified limits provided in the Cover Letter field (3,000 characters).

Pages exc