Logo
Virginia Staffing

Supvy IT Cybersecurity Specialist (INFOSEC)

Virginia Staffing, Alexandria, Virginia, us, 22350

Save Job

Cybersecurity Operations And Response Division Director

This position is located in Cybersecurity Operations and Response Division (CORD). The CORD plays a pivotal role in safeguarding the organization against cyber threats. We ensure the resilience and security of USPTO digital assets. The incumbent serves as the Division Director, CORD. Responsibilities: Supervising and managing a highly technical staff of Information Technology Cybersecurity Specialists responsible for a wide variety of duties connected with the maintenance, design, and implementation of current, new, and emerging security programs designed to anticipate, assess, and minimize system vulnerability, e.g., intrusion prevention, forensics, computer incident response, security device management, and access authentication programs. Participating in special projects and initiatives requiring collaboration and engagement at a leadership level and implementing assigned projects that require senior management involvement across business units within the division or other USPTO offices. Representing the Chief Information Security Officer (CISO) and the Office of the Chief Information Security Officer (OCISO) within and outside the agency and is fully authorized to communicate the Division's vision, strategy, policies, and priorities. Planning, directing, and managing and supporting Cybersecurity Operations and Response activities. Requirements: You must meet the United States Office of Personnel Management's (OPM) qualification requirements (including specialized experience and/or educational requirements) for the advertised position. You must meet all eligibility and qualifications requirements by the closing date of the job announcement. OPM Qualifications Standards are available at Information Technology (IT) Management Series 2210 (Alternative A). Specialized Experience: Experience overseeing a large IT organization demonstrating strategic planning, operational management, and resource optimization. Experience providing expert technical knowledge in security operations by monitoring, detecting, and responding to cybersecurity incidents and conducting threat intelligence/risk analysis. Experience conducting forensic and vulnerability management by identifying, assessing, and mitigating vulnerabilities to prevent potential exploits and breaches. Experience in developing and deploying secure technological solutions that are compliant with organizational and regulatory policies. OR experience in directing multidisciplinary teams, conducting performance evaluations, developing staff through training programs, and managing disciplinary actions. Basic Requirement: Competencies: The specialized experience must include, or be supplemented by, information technology related experience (paid or unpaid experience and/or completion of specific, intensive training, as appropriate) which demonstrates each of the four competencies, as defined: Attention to Detail - Is thorough when performing work and conscientious about attending to detail. Customer Service - Works with clients and customers (that is, any individuals who use or receive the services or products that your work unit produces, including the general public, individuals who work in the agency, other agencies, or organizations outside the Government) to assess their needs, provide information or assistance, resolve their problems, or satisfy their expectations; knows about available products and services; is committed to providing quality products and services. Oral Communication - Expresses information (for example, ideas or facts) to individuals or groups effectively, taking into account the audience and nature of the information (for example, technical, sensitive, controversial); makes clear and convincing oral presentations; listens to others, attends to nonverbal cues, and responds appropriately. Problem Solving - Identifies problems; determines accuracy and relevance of information; uses sound judgment to generate and evaluate alternatives, and to make recommendations. Condition of Employment: Incumbent must have one of the following certificates within 120 days from entry on duty (EOD): ISC2 Certified Authorization Professional (CAP); ISC2 Certified Information System Security Professional (CISSP); ISACA Certified Information Security Manager (CISM); GIAC Information Security Fundamentals (GISF); GIAC Security Leadership Certification (GSLC). Enhanced Security Requirement: Sensitivity Level is Special Sensitive. The incumbent of this position will require a Top Secret Sensitive Compartmented Information clearance to be able to attend Top Secret briefings with other Department of Commerce and Department of Homeland Security entities to assess cyber threats and vulnerabilities that are Top Secret SCI in nature. Background Investigation - If selected for this position, you may be required to complete a Declaration for Federal Employment (OF-306), which includes a fingerprint and credit check, to determine your suitability for Federal employment and to authorize a background investigation. The USPTO participates in E-Verify. For more information on E-Verify, please visit the Department of Homeland Security Website. Supervisory Probationary Period-If selected, you may be required to complete an initial one-year supervisory probationary period. All Federal employees are required to have Federal salary payments made by direct deposit to a financial institution of their choice. Relocation Expenses are not authorized and will not be paid. CTAP and ICTAP candidates will be eligible for selection priority if it is determined that they have exceeded the minimum qualifications for the position by attaining at least a "well qualified" rating of 85 out of 100. Information about CTAP and ICTAP eligibility is on the Office of Personnel Management's Career Transition Resources website at: OPM CTAP/ICTAP.