IT Cybersecurity Specialist, GS-2210-14 (DH-RF) Government - Idaho Falls, ID at Geebo

IT Cybersecurity Specialist, GS-2210-14 (DH-RF)

Perform technical assessments of Industrial Control Systems (ICS) to include Supervisory Control and Data Acquisition systems (SCADA), Physical Access Control Systems (PACS) and Building Automation Systems (BAS).Develop and implement best practice recommendations for ICS network architectures and firewall, router and switch configurations.Analyze and interpret National Institutes of Science and Technology (NIST) security controls and develop technical implementation guidance.Develop and implement Continuous Diagnostics & Mitigation (CDM) strategies for ICS. Specialized
Experience:
All applicants must possess one year of specialized experience equivalent in difficulty and complexity to at least the GS-13 level in the Federal Government. To meet specialized experience, your resume must describe experience that demonstrates the particular knowledge, skills, and abilities as defined below:
GS-14:
Experience conducting ICS technical assessments at critical infrastructure facilities. Experience with a variety of CDM tools (Bro, Snort, Splunk Nessus, SecurityOnion, Metasploit, Volatility, DumpIt, Bigfix, etc.). Experience with ICS architectures, components (Programmable Logic Controllers (PLC), Remote Terminal Units (RTU), relays, sensors, switches) and protocols (Modbus, Profibus, Common Industrial Protocol etc.). Experience designing network architectures, configuring firewalls, routers and switches and analyzing network traffic.
  • Department:
    2210 Information Technology Management
  • Salary Range:
    $104,821 to $136,271 per year

Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.