IT SPECIALIST (INFOSEC) (Title 32) Government - Draper, UT at Geebo

IT SPECIALIST (INFOSEC) (Title 32)

As a IT SPECIALIST (INFOSEC) (Title 32), GS-2210-11, you will:
This is not an all-inclusive list Receives and reviews written guidance from a variety of Department of Defense (DoD), federal and state investigative and enforcement agencies and interprets for impact in the state. Enforces established policy and guidance for all Information Assurance Systems Officers throughout the state. Enforces the state information assurance and accreditation policy. Directs actions required to prevent and/or correct information assurance deficiencies and violations. Exercises authority for denial of computer access and coordinates re-establishment of service. Assures compliance with security policy for external connections to the state network and assures compliance with the national and state policies. Administers firewalls and intrusion detection systems (IDS) and monitors unauthorized access. virus protection plan. Evaluates the effectiveness of systems, devices, procedures, and methods used to safeguard information in computer accessible media and ensures correction of all state deficiencies on systems containing applicable security technologies. Reviews/tests/updates continuity of operations plans (COOPS) and Security SOP's and actively participates in accreditation/reaccredidation processes. Your resume must have complete information:
Please ensure your resume accurately reflects the duties and responsibilities under each position you have held with each employer. In describing your experience, please be clear and specific. If your resume does not provide enough information regarding your work history for us to make a creditable qualification determination, your application package may be rendered disqualified and you will no longer be considered for this position. Do not copy the job description or your military MOS/AFSC/job duty description as your job duties. If you do this on your resume you will be rendered disqualified for the vacancy. Job duties should be related to the duties listed on the job announcement. It is your responsibility to make sure your resume states complete information for each job entry (beginning and ending dates of employment stated as MM/YYYY; and total hours worked per week). GENERAL
Experience:
Experience, education or training that has provided a basic knowledge of data processing functions and general management principles that enabled the applicant to understand the stages required to automate a work process. Experience may have been gained in work such as computer operator or assistant, computer sales representative, program analyst, or other positions that required the use or adaptation of computer programs and systems. SPECIALIZED
Experience:
Do you have 36 months experience, education, or training that approaches techniques and requirements appropriate to an assigned computer applications area or computer specialty area in an organization. Experience planning the sequence of actions necessary to accomplish the assignment where this entailed coordination with others outside the organizational unit and development of project controls. Experience that required adaptations of guidelines or precedents to meet the needs of the assignment. Experience preparing documentation on cost/benefit studies where is involved summarizing the material and organizing it in a logical fashion.
  • Department:
    2210 Information Technology Management
  • Salary Range:
    $65,141 to $84,682 per year

Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.