About the Position: This position is in the Defense Civilian Intelligence Personnel System (DCIPS). Employees occupying DCIPS positions are in the Excepted Service and must adhere to U.S. Code, Title 10, as well as Department of Defense Instruction 1400.25. Serves as a Senior Certified Remote Operator (RO) in one of the 780th MI BDE’s subordinate BN’s or Detachments using advanced software applications for network navigation, data collection, forensic analysis, and other Cyberspace Operations.
For more details on elgibility, requirements, and evaluation. Please click “Apply Now”, which will take you to the US Gov job platform.
Job Grade: 13
Total Openings: 1
Conduct offensive Computer Network Operations (CNO) and network reconnaissance and vulnerability analyses of system networks.
Assist with integrating Cyberspace Operations capabilities into operations/exercises design and integrating/synchronizing Cyber-related effects.
Conduct open source data collection via various online tools and tests and evaluates locally developed tools for operational use.
Provide and maintain draft documentation for Cyberspace Operations and Computer Network Operations tactics, techniques, and procedures as inputs to training programs.
Coordinate with Cyber Specialists and attend meetings and working groups to support Cyber planning operations and goals.
Mentor developmental and Basic Certified Interactive On-Net (ION) operators and serve on assessment panels for selection of ION candidates.
Who May Apply: Only applicants who meet one of the employment authority categories below are eligible to apply for this job. You will be asked to identify which category or categories you meet, and to provide documents which prove you meet the category or categories you selected. See Proof of Eligibility for an extensive list of document requirements for all employment authorities. 10-Point Other Veterans? Rating 30 Percent or More Disabled Veterans 5-Point Veterans’ Preference Current Army Defense Civilian Intelligence Personnel System (DCIPS) Employee Current Department of Army Civilian Employees Current Department of Defense (DOD) Civilian Employee (non-Army) Current DoD Defense Civilian Intelligence Personnel System (DCIPS) Employee (non-Army) Defense Civilian Intelligence Personnel System (DCIPS) Interchange Agreement Disabled Veteran w/ a Service-Connected Disability, More than 10%, Less than 30% Non-Department of Defense (DoD) Transfer Prior Federal Service Employee United States Citizen Applying to a DCIPS Position Army DCIPS positions apply Veteran’s Preference to preference eligible candidates as defined by Section 2108 of Title 5 U.S.C., in accordance with the procedures provided in DoD Instruction 1400.25, Volume 2005, DCIPS Employment and Placement. In order to qualify, you must meet the experience requirements described below. Experience refers to paid and unpaid experience, including volunteer work done through National Service programs (e.g., Peace Corps, AmeriCorps) and other organizations (e.g., professional; philanthropic; religious; spiritual; community; student; social). You will receive credit for all qualifying experience, including volunteer experience. Your resume must clearly describe your relevant experience. To qualify based on your experience, your resume must describe at least one (1) year of experience equivalent to at least the GG-12 grade level which prepared you to do the work in this job. Specialized experience is defined as experience with Computer Network Exploitation (CNE) Operations or network reconnaissance and vulnerability analyses of other systems with purpose of identifying potential points of strength and vulnerability among segments of a network map. This definition of specialized experience is typical of work performed at the next lower grade/level in the federal service (GG/GS-12). Desired Experience/Training: Completion of FORGE/Remote Interactive Operator Training (RIOT) and certification at the Basic Level USCYBER-COM/ARCYBER Job Qualification Record (JQR) is desired. Other desired experiences include advanced knowledge of physical computer components and or architectures, including the functions of various components and peripherals, basic programming concepts, assembly codes, TCP/IP, the OSI models, underlying network protocols, security hardware, and software options including the network artifacts they induce and their effects on exploitation, encryption algorithms, tools, network constructions, topology, and administration. Additional Examples of Desired Professional Certifications/Coursework: CYBR3422 – Remote Operator Course (ROC) CNOQC CYBR3450 – Remote Operator Course (ROC) Operations CYBR3460 – Remote Operator Course (ROC) Evaluations CYBR3550 – Advanced Windows Operations Course (AWOC) CYBR3560 – Advanced Unix Operations Course (AUOC) CYBR3420 – Remote Interactive Operators Training Course (RIOT) Senior Army Cyber Operator (SACO) Offensive Security Certified Professional (OSCP) Offensive Security Certified Expert (OSCE) SANS SEC560 – Network Penetration Testing and Ethical Hacking SANS SEC660 – Advanced Penetration Testing, Exploit Writing, and Ethical Hacking GIAC Python Code (CPYC) PLEASE ENSURE YOUR RESUME REFLECTS ANY DESIRED EXPERIENCE AND/OR TRAINING WHICH HAS BEEN COMPLETED. Progressively responsible experience is that which has included intelligence-related research, analysis, collections and /or operations. This experience should have included intelligence analysis and/or production, intelligence collection and/or operations, counterintelligence, or threat support directly related to the position to be filled. This experience should demonstrate: Knowledge of intelligence processes, cycle and organizations; Knowledge of and/or ability to use research tools such as library holdings, photographs, statistics, graphics and maps; Knowledge of the systems, procedures and methods of analyzing, compiling, reporting and disseminating intelligence data; and/or Knowledge of organization(s) for and methods of collecting and analyzing intelligence data. You will be evaluated on the basis of your level of competency in the following areas: Communications Cyberspace Operations Data Collection and Analysis