Information Technology Specialist (INFOSEC)

Washington, DC

Applications have closed

U.S. Securities & Exchange Commission

View company page

The position is in SEC's Office of Information Technology's Cybersecurity Analysis Branch. If selected, you will join a well-respected team that is responsible for providing assurance that SEC IT systems are protected against potential IT threats and vulnerabilities, and ensuring compliance with federal mandates and legislation, including the Federal Information Security Modernization Act (FISMA).

This position is located in Washington, DC.

Duties

Typical duties of this position include:

  • Leading an analytical team's response to complex and/or high visibility incidents.
  • Effectively communicating with senior leadership about complex technical findings from investigations into anomalies and/or complex incidents in an enterprise environment.
  • Automating analytical tasks related to network defense and incident response.
  • Performing historical and near real-time network traffic and log analysis.
  • Ensuring that the Security Operations Center follows relevant policy and guidance while leading an incident response, such as the US-CERT Federal Incident Notification Guidelines, NIST SP 800-61, and CISA's Cybersecurity Incident Response Playbook.
  • Preparing detailed analytical reports on complex and/or high visibility incidents in an enterprise environment.
  • Monitoring emerging cyber threat intelligence that could potentially impact or influence the how the Security Operations Center performs network defense and incident response.

Requirements

Conditions of Employment

  • You must be a US Citizen.
  • Application procedures are specific to this vacancy announcement. Please read all the instructions carefully. Failure to follow the instructions may result in you not being considered for this position.
  • Supplementary vacancies may be filled in addition to the number stated in this announcement.
  • This position has promotion potential to the SK-14.
  • PROBATIONARY PERIOD: This appointment may require completion of a one-year probationary period.
  • SECURITY CLEARANCE: Entrance on duty is contingent upon completion of a pre-employment security investigation. Favorable results on a Background Investigation may be a condition of employment or selection to another position.
  • DRUG TESTING: This position may be subjected to drug testing requirements.
  • PERMANENT CHANGE OF STATION (PCS): Moving/Relocation expenses are not authorized.
  • DIRECT DEPOSIT: All Federal employees are required to have Federal salary payments made by direct deposit to a financial institution of their choosing.
  • This position is in the collective bargaining unit.
  • Due to COVID-19, the SEC is currently in an optional telework posture. This position is eligible to request telework in accordance with the SEC 's telework policy.

Qualifications

All qualification requirements must be met by the closing date of this announcement.

Qualifying experience may be obtained in the private or public sector. Experience refers to paid and unpaid experience, including volunteer work done through National Service programs (e.g., Peace Corps, AmeriCorps) and other organizations (e.g., professional; philanthropic; religious; spiritual; community, student, social). Volunteer work helps build critical competencies, knowledge, and skills and can provide valuable training and experience that translates directly to paid employment. You will receive credit for all qualifying experience, including volunteer experience.

BASIC REQUIREMENT: Applicants must possess IT related experience demonstrating each of the four competencies: reviewing work to ensure it is in line with established standards or to identify deficiencies (Attention to Detail); collaborating with stakeholders to make progress towards a common goal (Customer service); explaining technical information orally to non-technical audiences (Oral Communication); and evaluating alternatives to recommend solutions to hardware or software problems (Problem Solving).

MINIMUM QUALIFICATION REQUIREMENT: In addition to meeting the basic requirement, applicants must also meet the minimum qualification requirement SK-14: Applicant must have at least one year of specialized experience equivalent to the GS/SK-13 level:
1) writing detailed analytical reports on information system compromises and/or data breaches in an enterprise environment;
2) providing junior analysts with guidance in implementation of appropriate incident handling procedures for the purpose of the capture and retention of relevant incident response artifacts;
3) communicating effectively with internal and external stakeholders, during an incident, in order to coordinate incident response and ensure a common operational view;
4) performing historical and near real-time network traffic and log analysis;
5) performing static and dynamic analysis of suspect websites, documents, binaries, or other artifacts; AND
6) automating analytical tasks related to network defense and incident response.

Tags: CISA Clearance Compliance FISMA Incident response Log analysis Monitoring NIST Security Clearance Threat intelligence Vulnerabilities

Region: North America
Country: United States
Job stats:  574  36  1

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.