Start Here Blog
SUPERVISORY IT CYBERSECURITY SPECIALIST (INFOSEC) Apply
Position ID: 8X-DCIPS-12903584-178019-LZ
City: Lackland AFB, Texas
Date Posted: 2026-03-16
Expiration Time: 2026-03-23
Job Type:
Job Category: Information Technology Management
Salary: 148275 - 192764 PA

Job Summary

Click on "Learn more about this agency" button below for IMPORTANT additional information. The primary purpose of this position is: To serve as Technical Advisor to the Commander, 833d Cyberspace Operations Squadron (833 COS). Oversees and manages the execution of cyberspace policies, missions, and functions.

Job Description

This is a GG-14 position in the Defense Civilian Intelligence Personnel System (DCIPS). The GG-14 duties for the "Supervision/Management" work category are at the "Senior" work level and are equivalent to those at the GS-14 level. The selectee's salary will be set within the grade equivalent to a GS/GG grade based on the selectee's qualifications in relation to the job. BASIC REQUIREMENTS: For all positions individuals must have IT-related experience demonstrating each of the four competencies listed below. The employing agency is responsible for identifying the specific level of proficiency required for each competency at each grade level based on the requirements of the position being filled. Attention to Detail - Is thorough when performing work and conscientious about attending to detail. Customer Service - Works with clients and customers (that is, any individuals who use or receive the services or products that your work unit produces, including the general public, individuals who work in the agency, other agencies, or organizations outside the Government) to assess their needs, provide information or assistance, resolve their problems, or satisfy their expectations; knows about available products and services; is committed to providing quality products and services. Oral Communication - Expresses information (for example, ideas or facts) to individuals or groups effectively, taking into account the audience and nature of the information (for example, technical, sensitive, controversial); makes clear and convincing oral presentations; listens to others, attends to nonverbal cues, and responds appropriately. Problem Solving - Identifies problems; determines accuracy and relevance of information; uses sound judgment to generate and evaluate alternatives, and to make recommendations. NOTE: IN ADDITION TO MEETING THE BASIC REQUIREMENTS ABOVE APPLICANT MUST ALSO MEET THE QUALIFICATION REQUIREMENTS LISTED BELOW. EXPERIENCE REQUIRED: Your resume must reflect quality level experience which demonstrates the possession of the knowledge and skill in application of concepts, and practices in two or more areas: cyberspace security, computer programming, computer operating systems (Windows, UNIX), malware forensics; threat analysis, artificial intelligence/machine learning; cyber incident handling/response, penetration testing, and software/malware reverse engineering; knowledge of the application of Information Assurance (IA), Mission Assurance (MA) and threat hunting technologies and techniques, analysis of computer systems, operating systems, network communication protocols, computer and network architectures and virtual machine (VM) technology; ability to analyze and correlate data in order to distinguish evidence of attacks or intrusions from normal activity; knowledge of IA and MA technologies such as COMSEC, COMPUSEC, EMSEC, and OPSEC, computer systems, digital communications systems, network protocols, and computer architectures; and computer security penetration tools and techniques; and knowledge and skill in one or more of computer operating systems (Unix, Windows, etc.) enterprise services, file systems, security, configuration and analysis; network operations and security including netflows, protocols, PCAP, etc.; computer programming and scripting; and malware identification and analysis; and system forensics. KNOWLEDGE, SKILLS AND ABILITIES (KSAs): Your qualifications will be evaluated on the basis of your level of knowledge, skills, abilities and/or competencies in the following areas: 1. Advanced knowledge of and skill in application of the concepts, and practices in two or more of the following areas: cyberspace security, computer programming, networking, computer operating systems (Windows, UNIX), malware forensics; threat analysis, operations research, artificial intelligence/machine learning; cyber incident handling and response, penetration testing, software/malware reverse engineering. the application of Information Assurance (IA), Mission Assurance (MA) and threat hunting technologies and techniques, analysis of computer systems, operating systems, network communication protocols, computer and network architectures and virtual machine (VM) technology; ability to analyze and correlate data in order to distinguish evidence of attacks or intrusions from normal activity. 2. Knowledge of IT management information systems requirements and application software development techniques required to oversee projects of considerable difficulty and with little specificity regarding approach to be followed. 3. Knowledge of agency, AF, DoD and national-level doctrine, regulations, policies, guidelines, requirements, and initiatives related to assigned program(s) and/or project(s). 4. Knowledge of government contracting procedures, legal requirements, and contract personnel oversight to including rating and reporting performance. 5. Skill, judgment, resourcefulness, originality, and ability to foresee the impact of changing technology and in applying analytical and evaluative techniques to identify, investigate, and resolve complex issues or problems. 6. Skill in establishing and maintaining effective relationships, negotiating complex issues, and resolving conflicts based on mature judgment, experience, and recognized professional standing. OTHER SIGNIFICANT FACTS: Position is designated special-sensitive and incumbent must be able to obtain and retain a TOP SECRET (TS) clearance with access to Sensitive Compartmented Information (SCI). A counter-intelligence polygraph will be required. This position has been designated by the Air Force as a Testing Designated Position (TDP) under the Air Force Civilian Drug Demand Reduction Program. Employee must pass initial and periodic short notice drug testing. The employee may be required to work other than normal duty hours, which may include evenings, weekends, and/or holidays. The employed may be required to travel to CONUS and OCONUS locations, to include austere locations. Information Assurance Certification is a condition of employment. This position includes information assurance (IA) work as a paramount duty requirement. IA Technician Level III is required IAW the USCYBERCOM CPT JQR for this position (Cyber Threat Analyst, Host Analyst, Network Analyst). Compliance with Cyber Mission Force (CMF) training specified in the USCYBERCOM Cyber Mission Forces Training and Readiness Manual; and applicable higher headquarters guidance memoranda for Cyber-Crew Training, Standardization Expert knowledge of COMSEC, COMPUSEC, EMSEC, and OPSEC, computer systems, digital communications systems, network protocols, and computer architectures; and computer security penetration tools and techniques is highly desired.

This website (onlinedealersauctions.com) has no direct relationship with any candidate or employer. Anyone can use this website for free. Job seekers are not allowed to apply directly to the recruiters through this website. Our purpose is to show the positions available and provide information provided by the recruiters. If you have questions about any of the positions on this site, please contact the recruiter directly.