HonorHer Jobs

HonorHer

Job Information

Administrative Office of the U.S. Courts Supervisory Information Technology Specialist (Security) in Washington, District Of Columbia

Summary This position is located within the Information Technology Security Office (ITSO). As an IT Specialist (Security) within ITSO, the incumbent is a recognized IT security and strategic intelligence expert within the federal government with a strong background in cyber threat intelligence, strategic intelligence, and the intelligence planning process. Responsibilities The incumbent of this position will collaborate across government and industry to support the federal judiciary and leverage national resources, the intelligence community, and private industry to defend against potential cyberattacks. The incumbent will function as the Cyber Threat Intelligence (CTI) Team Lead and will be responsible for promoting, developing, and updating threat profiles associated with the United States Federal Courts. The CTI Lead will lead and assist with the development of priority intelligence requirements, associated collection plans, and the development of relevant and actionable threat intelligence. Duties of the position include, but are not limited to: Performing a full range of supervisory responsibilities for the CTI federal staff in meeting the team's responsibilities. Leading a team of federal and contract professionals in providing tactical, operational, and strategic intelligence services to the federal judiciary. Leading projects for intelligence development or emerging cyber threat related that requires coordination with multiple groups of civilian, military, and contract personnel. Developing and maintaining team procedures for daily tasks to ensure compliance with the appropriate judiciary policies. Monitoring, researching, and developing products and briefings on cyber threats to the judiciary's critical assets to enable customers to develop new procedures and mitigation strategies in response to evolving threats. Interpreting and assessing intelligence reports and other information to identify trends, linkages, and draw conclusions based on current and past cyber threat intelligence, and cyber incidents and attacks to advance ITSO's understanding of cyber threats to the judiciary and to inform the development of new standards and procedures. Applying intelligence and analytic processes, standards, and tradecraft to perform and enhance analyses and identification of emerging cyber adversary tactics and threats to the judiciary. Developing, maintaining, and updating judiciary intelligence requirements and collection plans. Developing technical gap analyses for collection plans. Developing finished cyber intelligence products that include timely technical assessments and recommendations. Constructing link analysis graphs. Developing mitigation strategies as required. Developing and reviewing Threat Intelligence Reports. Facilitating technical exchange meetings with partner government agencies and private industry. Serving as the Contract Officer Representative (COR) for CTI tools, systems, and contractor support. Providing weekly activity reports and contract monitoring reports as required. Serving as a subject matter expert on cyber threats to the judiciary. Advising and consulting stakeholders on the application of cyber intelligence to identify risks and/or enable mitigation strategies. Coordinating and collaborating with federal, state, and local government partners and commercial vendors. Ensuring a high-level of customer satisfaction. Developing key performance metrics to measure and track CTI's operational effectiveness and efficiency. Training and developing other cybersecurity and intelligence professionals within the federal judiciary on intelligence development, analytics, and collection techniques in accordance with industry standards, e.g., NIST Special Publication 800-181. Performing the tasks and meeting the skills, knowledge and abilities as described in NIST Special Publication 800-181 National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce, NIST Special Publication 800-30 Risk Management Guide for IT Systems, NIST Special Publication 800-53 Recommended Security Controls for Federal Systems and Organizations, and NIST Special Publication 800-137 Information Security Continuous Monitoring for Federal Information Systems and Organizations. Requirements Conditions of Employment CONDITIONS OF EMPLOYMENT All information is subject to verification. Applicants are advised that false answers or omissions of information on application materials or inability to meet the following conditions may be grounds for non-selection, withdrawal of an offer of employment, or dismissal after being employed. Selection for this position is contingent upon completion of OF-306, Declaration of Federal Employment during the pre-employment process and proof of U.S. citizenship for competitive status positions or conversion to a competitive status position with the AO. If non-citizens are considered for hire into a temporary or any other position with non-competitive status or when it is confirmed by the AO Human Resources Office there are no qualified U.S. citizens for a competitive status position (unless prohibited by a law or statue), non-citizens must provide proof of authorization to work in the U.S. and proof of entitlement to receive compensation. Additional information on the employment of non-citizens can be found at USAJOBS Help Center | Employment of non-citizens/. For a list of documents that may be used to provide proof of citizenship or authorization to work in the United States, please refer to Form I-9, Employment Eligibility Verification. All new AO employees will be required to complete an FBI fingerprint-based national criminal database and records check and pass a public trust suitability check. New employees to the AO will be required to successfully pass the E-Verify employment verification check. To learn more about E-Verify, including your rights/responsibilities, visit https://www.e-verify.gov/. All new AO employees are required to identify a financial institution for direct deposit of pay before appointment. You will be required to serve a trial period if selected for a first-time appointment to the Federal government, transferring from another Federal agency, or serving as a first-time supervisor. Failure to successfully complete the trial period may result in termination of employment. If appointed to a temporary position, management may have the discretion of converting the position to permanent depending upon funding and staffing allocation. Qualifications Applicants must have demonstrated experience as listed below. This requirement is according to the AO Classification, Compensation, and Recruitment Systems which include interpretive guidance and reference to the OPM Operating Manual for Qualification Standards for General Schedule Positions. Specialized Experience: Applicants must have at least one full year (52 weeks) of specialized experience which is in or directly related to the line of work of this position. Specialized experience is demonstrated experience in ALL of the following: Extensive knowledge of Advanced Persistent Threats (APT) tactics, techniques, and procedures; Understanding of possible attack activities such as network probing/scanning, DDOS, malicious code activity, etc.; Understanding of basic networking protocols such as TCP/IP, DNS, HTTP; and Understanding of basic adversary attack methodologies. Desired but not required: The ideal candidate will possess at least one of the following IT Security certifications: Certified Information Systems Security Professional (CISSP) Certified Information Security Manager (CISM) Certified Ethical Hacker (CEH) Similar cybersecurity certification listed on my resume Education This position does not require education to qualify. Additional Information The AO is an Equal Opportunity Employer.

DirectEmployers