Computer Systems Security Manager - Entry to Experienced Level (Texas and Maryland Locations) Virtual Hiring Event Customer Service & Call Center - Augusta, GA at Geebo

Computer Systems Security Manager - Entry to Experienced Level (Texas and Maryland Locations) Virtual Hiring Event

4.
1 Full-time 1 day ago Full Job Description Responsibilities The need to maintain our core Computer Science group is vital to provide the technical capabilities necessary to successfully execute NSA's mission.
The increased complexity of supporting NSA's mission requires world class researchers, programmers, and developers who operate in teams in areas such as software engineering, information technology infrastructure, high performance computing, data science, architectures, computer security, and networking in order to design and develop advanced tools, techniques, and systems.
Computer Systems Security Managers (CSSMs) at the NSA play a vital role in maintaining the confidentiality, availability, and integrity of the Agency computing infrastructure.
As a CSSM at the NSA, your responsibilities may include:
- Supporting a program, organization, system, or enclave - Reviewing investigative processing of security incidents - Developing or interpreting computer security policies - Overseeing, evaluating and supporting the security authorization process - Providing leadership, management and direction of cybersecurity activities - Advising senior leadership (e.
g.
, Chief Information Security Officer CISO , Authorizing Official AO ) on risk levels, and changes affecting the organization's cybersecurity posture - Advising senior leadership of information security programs, policies, processes, systems, and mission elements Job Summary NSA is in search of Computer Science professionals to solve complex problems, test innovative approaches and research new solutions to storing, manipulating, and presenting information.
Apply your computer science expertise to projects that seek to create new standards for the transformation of information.
If you want to develop technologies and tools and be a part of cutting edge innovations; join our team of experts! Help protect national security interests as part of the world's most advanced team of computer science professionals! Qualifications The qualifications listed are the minimum acceptable to be considered for the position.
This position has a Cyberspace Workforce Improvement Program (CWIP) requirement.
Candidates accepted to fill this position may be required to obtain a DoD 8570.
01-M approved certification within six (6) months of assignment.
Interested parties currently pursuing certification are also encouraged to apply.
Additional requirements may be placed against the selectee, based on requirements defined within DoD 8140.
01 and DoD 8570.
01-M Information Assurance Workforce Improvement Program.
Degree must be in Computer Science (CS) or related field (e.
g.
, Engineering, Mathematics).
Degrees in Information Technology, Information Systems, Information Security, Networking (Systems Administration), and Cybersecurity may be considered relevant if the programs contain, at minimum, a concentration of courses in the following foundational CS areas:
algorithms; computer architecture (not network architecture); programming methodologies and languages; data structures; logic and computation; and upper-level mathematics.
Relevant experience must be in one or more of the following:
design/development of computer or information systems to include engineering hardware and/or software over their lifecycle (i.
e.
, requirements analysis, design, implementation, testing, integration, deployment/installation, and maintenance), programming, computer systems research, reverse engineering, or computer/network security.
Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis course) will be considered towards the relevant experience requirement (i.
e.
, 24-week JCAC course will count as 6 months of experience).
Cybersecurity Certifications (e.
g.
, NET+, Security+, Certified Information System Security Professional (CISSP), and Certification Accreditation Professional (CAP) may count as a total of 1 year of experience.
ENTRY/DEVELOPMENTAL Entry is with a Bachelor's degree and no experience.
An Associate's degree plus 2 years of relevant experience may be considered for individuals with in-depth experience that is clearly related to the position.
FULL PERFORMANCE Entry is with a Bachelor's degree plus 3 years of relevant experience or a Master's degree plus 1 year of relevant experience or a Doctoral degree and no experience.
An Associate's degree plus 5 years of relevant experience may be considered for individuals with in-depth experience that is clearly related to the position.
SENIOR Entry is with a Bachelor's degree plus 6 years of relevant experience or a Master's degree plus 4 years of relevant experience or a Doctoral degree plus 2 years of relevant experience.
An Associate's degree plus 8 years of relevant experience may be considered for individuals with in-depth experience that is clearly related to the position.
Competencies The ideal candidate is someone with a desire for experiential learning and strong problem-solving, analytic and interpersonal skills who is:
- Able to work effectively across several different functional areas in a collaborative environment - Able to communicate effectively (both orally and written), individually and in teams - Well-organized and able to handle multiple assignments - Willing to take the initiative - Willing to be innovative to achieve success Knowledge and experience in one or more of the following is desired:
- Applying confidentiality, integrity, and availability principles - Computer systems and networking operations, concepts and protocols - Creating security processes for Agency Infrastructure Systems, adhering to standard agency security policies - Applying cybersecurity and privacy laws, regulations, policies, and ethics - Cyber threat and vulnerability mitigation - Incident response - Information assurance best practices - Risk management processes (e.
g.
, methods for assessing and mitigating risk) - System and network protocols (especially TCP/IP, VOIP, wireless protocols) - System and network security methodologies - Vulnerability scanning and analysis Pay, Benefits, & Work Schedule Salary offers are based on candidates' education level and years of experience relevant to the position and also take into account information provided by the hiring manager/organization regarding the work level for the position.
Salary ranges vary by location and work level.
This position is hiring for Maryland and Texas.
Salary Range:
$77,745 - $172,075 (Entry/Developmental, Full Performance, Senior Levels) Typical work schedule is Monday - Friday, with basic 8 hour/day work requirements.
How to apply U.
S.
Citizenship is required for all applicants.
NSA is an equal opportunity employer and abides by applicable employment laws and regulations.
All applicants and employees are subject to random drug testing in accordance with Executive Order 12564.
Employment is contingent upon successful completion of a security background investigation and polygraph.
Due to time sensitive communications regarding your application, please ensure your spam filters are configured to accept email from noreply@intelligencecareers.
gov.
Please review the job posting thoroughly to ensure you meet the described qualifications and are aware of all associated requirements.
To apply for this position, please click the 'Apply' button located at the top right of this posting.
After completing the application for the first time, or reviewing previously entered information, and clicking the 'Submit' button, you will receive a confirmation email.
We encourage you to apply as soon as possible, as job postings could close earlier than the closing date due to sufficient number of applicants, or the position is no longer available.
You may be asked a series of questions depending on the position you apply for.
Your responses will be used as part of the application screening process and will assist in determining your eligibility for the position.
Be sure to showcase within your resume those experiences relevant to this position.
Failure to provide the required information or providing inaccurate information will result in your application not being considered for this position.
Only those applicants who meet all position qualifications, may be contacted to begin employment processing.
Please remain diligent in monitoring email and your SPAM folder.
Reasonable accommodations may be provided to applicants with disabilities during the application and hiring process where appropriate.
Please visit our Diversity link for more information.
This position is a Defense Civilian Intelligence Personnel System (DCIPS) position in the Excepted Service under 10 U.
S.
C.
1601.
DoD Components with DCIPS positions apply Veterans' Preference to eligible candidates as defined by Section 2108 of Title 5 USC, in accordance with the procedures provided in DoD Instruction 1400.
25, Volume 2005, DCIPS Employment and Placement.
If you are a veteran claiming veterans' preference, as defined by Section 2108 of Title 5 U.
S.
C.
, you may be asked to submit documents verifying your eligibility.
DCIPS Disclaimer The National Security Agency (NSA) is part of the DoD Intelligence Community Defense Civilian Intelligence Personnel System (DCIPS).
All positions in the NSA are in the Excepted Services under 10 United States Codes (USC) 1601 appointment authority.
Technical requirements You are registering for an upcoming Adobe Connect information session regarding Cyber Careers at the National Security Agency through Yello, a contact management tool.
You will need access to the internet as well as access to audio/video.
You will receive an email with a URL to register for the event.
Please know that you are not only registering for the Adobe session but also providing NSA your contact information so the agency can reach out to you in the future about possible opportunities.
After this session, if you would like to STOP future NSA contact, please OPT-OUT of future communition with the link that is provided in the Adobe session follow up email.
Please note interviews will not be conducted during this session.
Preferred dress code Business (business suit, tie) What is a virtual hiring event? Virtual hiring events are a great way for employers and jobseekers to connect, even if they aren't in the same physical location.
Hiring is a human process, and they would like to talk with you online (either through chat, on the phone, or video) to see if you're a fit!.
Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.