Position Description



Top of FormBottom of FormNATIONAL GUARD POSITION DESCRIPTION? PD#: NGD175P0000Sequence#: VARIESReplaces PD#: IT SPEC (INFOSEC)GS-2210-11POSITION LOCATION: ?Servicing CPAC: NATIONAL GUARD BUREAUAgency: VARIESInstallation:?VARIESArmy Command: VARIESRegion: NATIONAL GUARDCommand Code: VARIES?POSITION CLASSIFICATION STANDARDS USED IN CLASSIFYING/GRADING POSITION:Citation 1: OPM JFS FOR ADMIN WORK IN INFOR TECH GRP, GS-2200, MAY 2011Citation 2: JFS ADMIN WORK IN INFOR TEC GRP, GS-2210, DTD MAY 2011Supervisory Certification: I certify that this is an accurate statement of the major duties and responsibilities of this position and its organizational relationships, and that the position is necessary to carry out Government functions for which I am responsible. This certification is made with the knowledge that this information is to be used for statutory purposes relating to appointment and payment of public funds, and that false or misleading statements may constitute violations of such statutes or their implementing regulations. ?Supervisor Name: ?Reviewed Date: Classification Review: This position has been classified/graded as required by Title 5, U.S. Code in conformance with standard published by the U.S. Office of Personnel Management or if no published standards apply directly, consistently with the most applicable published standards. ?Reviewed By: ROGER M PARRISH, NG-J1-TNCYVONNE M. HOWARD, CLASSIFICATIONReviewed Date: 06/15/200605/24/2016POSITION INFORMATION:Cyber Workforce: Cert Type/Level Required 1: VARIESCert Type/Level Required 2: VARIESCert Type/Level Required 3: VARIESFLSA: EXEMPTFLSA Worksheet: EXEMPTFLSA Appeal: NOBus Code: VARIESDCIPS PD: NOMission Category: Work Category: Work Level: Acquisition Position: NO CAP: Career Category: Career Level: Functional Code: Interdisciplinary: NOSupervisor Status: VARIESPD Status: VERIFIED DCA Override: NOCONDITION OF EMPLOYMENT:Drug Test Required: VARIES ? Financial Management Certification: VARIES Position Designation: VARIESPosition Sensitivity: VARIESSecurity Access: VARIESEmergency Essential: ??Requires Access to Firearms: VARIESPersonnel Reliability Position: VARIESInformation Assurance: NInfluenza Vaccination: Financial Disclosure: NO ? Enterprise Position: VARIESPOSITION ASSIGNMENT:Competitive Area: VARIESCompetitive Level: VARIESCareer Program: VARIESCareer Ladder PD: NOTarget Grade/FPL: Career Pos 1: ?Career Pos 2: ?Career Pos 3: ?Career Pos 4: ?Career Pos 5: ?Career Pos 6: ?POSITION DUTIES:PD released as part of CRA 06-1032 - Information Operations (IO) SquadronFull position title: IT Specialist (INFOSEC/NETWORK)Organizational Title: CNO Team Techniciana. INTRODUCTION:This position is located in an Information Cyberspace Operations (IO) Squadron. The purpose of this position is to serve as Computer Network Operations (CNO) Team Technician, ensuring the confidentiality, integrity, and availability of information systems, networks and data through the enhancement of Department of Defense (DoD) information systems security programs, policies, procedures and tools. Enhancement of information systems security programs, procedures, and tools are specifically accomplished by conducting vulnerability assessments and Opposing Force (OPFOR) tasking of planned and installed information systems and ensuring all protection needs are met. b. DUTIES AND RESPONSIBILITIES:(1) Performs information operations that protect and defend (or assess the capability to protect and defend) information and information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation. This includes providing for restoration of information systems by incorporating protection, detection, and reaction capabilities. Conducts risk and vulnerability assessments of DoD information systems to identify associated vulnerabilities, risks and protection needs. Performs vulnerability assessments, OPFOR, and other operational tasking. Operates fixed and deployed communications-computer systems. Performs activities such as configuring and monitoring hardware and software for systems operation, processing and control of data flow, and client-server multi-user system support, including network management or administration. Performs microcomputer fault isolation and restoration actions. (2) Evaluates and assesses vulnerabilities of customer network and application server hardware, operating system software, and peripheral network equipment such as routers, bridges, switches, attached cabling system, network interface cards, modems, multiplexers, and concentrators. Conducts evaluations to ensure compliance with applicable standards. Ensures system backups are performed to ensure expedient restoration of the database for the respective network equipment. Evaluate effectiveness of customer network firewalls. (3) Analyzes equipment and software reliability and suitability for vulnerability assessment utilization. Conducts analyses of network usage, hardware and software capabilities, ineffective practices or procedures, equipment shortcomings, and other relevant factors. Recommends methods and procedures and coordinates corrective action to optimize utilization of present equipment. Uses benchmarks, performance measurement, and evaluation data, in conjunction with vulnerability assessment techniques. Develops recommendations or proposals involving a variety of specialized systems and to improve operational efficiency. (4) Assists with oversight and maintenance of the squadron’s digital training range(s), a suite of servers, routers, switches, hubs and other devices which can be configured with a variety of different operating systems in various versions, and with pre-programmed vulnerabilities, to be used in Computer Network Operations (CNO) training. (5) Consults with subordinates, supervisors, specialists, vendors, and sister IO squadrons to procure and maintain training range devices that realistically emulate Air Force networks and are flexibly re-configurable to emulate the network(s) of a specific Air Force base as needed to prepare for vulnerability assessment missions. (6) Performs analysis and design of automated and manual systems related to the network. Provides data for intrusion detection analysis. Determines applicability of established methods. Provides technical advice to users. Examines and evaluates alternative means of satisfying user requirements. Suggests technically feasible approaches and makes recommendations regarding the most effective countermeasures. (7) Performs other duties as assigned. c. FACTOR DISCUSSION:Factor 1 - Knowledge Required by the Position: --Thorough knowledge of the mission, objectives, terminology, and management practices in the activity, the agency, and the department to recognize probable areas of interaction. --Thorough knowledge of network systems design, development, testing, installation, operating, management, and maintenance concepts and methods to provide and protect network services. --Extensive knowledge of information technology methods, and information protection techniques, and procedures. This includes government and Commercial Off The Shelf (COTS) technology using industry standards and an ability to understand the capabilities and limitations of software, utility programs, network management systems and programming. --Knowledge of hardware, software and operating systems, systems configuration and integration; maintenance, upgrades, and modifications. --Extensive knowledge and skill in applying applicable policies, standards, directives, and operations manuals to perform systems analysis, evaluate approaches, offer advice, define alternative approaches, and coordinate requirements regarding the merits of proposed applications. --Extensive knowledge of hardware, software, network operations functions, firewalls, packet switching communications protocols, and diagnostic tools to analyze difficult and complex system problems and provide resolutions. --Knowledge of systems analysis, configuration management, and computer equipment requirements related to networks to assess vulnerabilities. Skill in evaluating innovative approaches in formulation of programs or systems specifications. Factor 2 - Supervisory Controls: The supervisor provides general guidance and objectives, as to scope and priorities of projects in the assigned area. The incumbent serves as a specialist regarding information protection operations. Plans, organizes, and carries out assignments, coordinates work with others, determines the approach and methodology to be used, and keeps the supervisor apprised of potential problems. Advises the supervisor regarding approaches having potential policy impact. Completed work is reviewed from an overall standpoint in terms of feasibility, compatibility with other work, or effectiveness in meeting requirements or achieving expected results. Channels required information to higher headquarters. Factor 3 – Guidelines: Guidelines primarily consist of a wide variety of commercial, Federal, DoD, and agency regulations, policies, standards, and objectives of a general nature. Utilizes initiative and judgment in adapting and designing approaches to the assigned projects within existing and future architecture. Judgment is required to select, interpret, and modify established approaches by testing and evaluating. Factor 4 – Complexity: Work involves familiarity with numerous computer operating systems, firewalls, intrusion detection software, and information protection techniques. Work involves independent accomplishment of an integration of a various dissimilar computer and automated processes and methodologies in the automation of overall work processes for the customer. Defines the problem, determines appropriate process avenues from many different options, designs a solution, and tests the system. Uses a variety of techniques and methods to evaluate alternatives. Assessment of situations is complicated by conflicting requirements requiring analysis to determine the applicability of established methods. Technical approaches must often be tested and projections made. Analyzes tools used to gain unauthorized access to information networks. Gives consideration to probable areas of future change in systems design, equipment layout, and other factors affecting decisions. Considers, evaluates, and coordinates with other functions and/or organization to accomplish tasks, due to the complexity of the network and number of interacting systems, general guidelines, changes, modifications, or integration affecting numerous facets of neighboring systems Factor 5 - Scope and Effect: Work involves formulating recommendations, analyzing a variety of unusual problems, questions, or conditions associated with networks and related systems. Work affects a wide range of DoD customers using information network systems. Factor 6 - Personal Contacts & Factor 7 – Purpose of Contacts Personal contacts include other analysts and system administrators, and functional area users in other organizations within the activity organization and in other organizations within ANG or other DoD organizations. Contacts often take place with computer personnel of other agencies, representatives of professional associations, equipment or system software vendors, and contractors. Contacts are often in unstructured settings. The purpose of contacts is to gather information, educate, influence, motivate and guide users on work efforts to resolve their problems and make presentations to supported users and other ADP personnel to persuade them to use certain specific technical methods and procedures in order to insure compliance with applicable policies and regulations. Negotiation and persuasion skills are required to overcome resistance to recommendations. Factor 8 - Physical Demands: The work requires some physical exertion and recurring activities such as bending, crouching, stooping, stretching, reaching, and lifting of moderately heavy objects such as boxes of project files, computer hardware, and equipment. Factor 9 - Work Environment: The work is performed in a typical office setting. Special safety precautions are not required. d. OTHER SIGNIFICANT FACTS: Must meet and maintain applicable training standards and certifications determined by the unit to be essential to the position.Fair Labor Standards Act (FLSA) Determination = (EXEMPT) ? 1. Availability Pay Exemption - (e.g., Criminal Investigators, U.S. Customs and Border Protection pilots who are also Law Enforcement Officers). ?2. Foreign Exemption - (Note: Puerto Rico and certain other locations do not qualify for this exemption – See 5 CFR 551.104 for a list of Nonexempt areas.) ?3. Executive Exemption: ????a. Exercises appropriate management responsibility (primary duty) over a recognized organizational unit with a continuing function, AND ????b. Customarily and regularly directs 2 or more employees, AND ????c. Has the authority to make or recommend hiring, firing, or other status-change decisions, when such recommendations have particular weight. Note: Shared supervision or “matrix management” responsibility for a project team does not meet the above criteria. Limited “assistant manager” functions or “acting in the absence” of the manager does not meet the above criteria. ?4. Professional Exemption: ????a. Professional work (primary duty) ????b. Learned Professional, (See 5 CFR, 551.208 ) (Registered Nurses, Dental Hygienists, Physician’s Assistants, Medical Technologists, Teachers, Attorneys, Physicians, Dentists, Podiatrists, Optometrists, Engineers, Architects, and Accountants at the independent level as just some of the typical examples of exempt professionals). Or ????c. Creative Professional, (See 5 CFR, 551.209 ) (The primary duty requires invention and originality in a recognized artistic field (music, writing, etc.) and does not typically include newspapers or other media or work subject to control by the organization are just some examples of Creative Professionals). Or ????d. Computer Employee, (See 5 CFR, 551.210 ) ( must meet salary test and perform such duties as system analysis, program/system design, or program/system testing, documentation, and modification). Computer manufacture or repair is excluded (non-exempt work). ?5. Administrative Exemption: ????a. Primary duty consistent with 5 CFR 551 (e.g.; non-manual work directly related to the management or general business operations of the employer or its customers), AND job duties require exercise of discretion & independent judgment. ? FLSA Conclusion: ? Exempt ? Non Exempt FLSA Comments/Explanations: Computer EmployeeCONDITIONS OF EMPLOYMENT & NOTES:POSITION EVALUATION:A. Title, Series and Grade: Information Technology Specialist IT Specialist (INFOSEC/NETWORK), GS-2210-11B. References: USOPM Job Family PCS for Administrative Work in the Information Technology Group, GS-2200, GS-2210 Series, May 2001. C. Background: This description was developed for use in an Information Warfare Aggressor Squadron (IWAS). The new description is being established as an Information Operations (IO) national position description. D. Pay Plan, Series, Title, and Grade Determination: 1. Pay Plan: The paramount requirement of the position determines the pay plan. A position falls under the General Schedule (GS) pay plan when the primary duties and responsibilities of the position are identified as requiring knowledge or experience that is administrative, clerical, scientific, artistic, or technical in nature. The primary duties of this position require knowledge in the area of information technology. Such knowledge is associated with administrative and technical responsibilities and therefore meets the requirements of the GS pay plan. 2. Series: The duties and responsibilities of the position match the series definition in the GS-2210 series. This series includes positions involved in the development, delivery, management, and support of information technology systems and services. This includes managing, analyzing, and maintaining security of data and computer systems. 3. Title: Information Technology Specialist is the title for all non-supervisory positions in this series. DoD Titling Instructions for GS-2210 positions requires the usage of the basic title of IT Specialist for all non-supervisory positions in the GS-2210 occupation. DoD Titling Instructions also require the use of the appropriate specialty area parenthetical. A parenthetical title of “INFOSEC” is added to denote specialization in work that involves ensuring confidentiality, integrity, and availability of systems, networks, and data through the planning, analysis, development, implementation, maintenance and enhancement of information systems security programs, policies, procedures and tools. In addition, since the position is testing the vulnerability of computer networks, the parenthetical title of “NETWORK” is also added to the title. The appropriate title for this position is IT Specialist (INFOSEC/NETWORK).4. Grade: GS-11. See attached Factor Evaluation System (FES) Position Evaluation Statement. E. Conclusion: Information Technology Specialist IT Specialist (INFOSEC/NETWORK), GS-2210-11.CLASSIFIER: Roger M. Parrish, NGB-J1-TNC Date: 15 Jun 06FACTOR EVALUATION SYSTEMPOSITION EVALUATION STATEMENTFACTOR FL PTS REMARKS1. Knowledge Required by the Position 1-7 1250 See Analysis Below2. Supervisory Controls 2-4 450 “ “ “3. Guidelines 3-3 275 “ “ “4. Complexity 4-4 225 “ “ “5. Scope and Effect 5-4 225 “ “ “6. Personal Contacts & 7. Purpose of Contacts 3C 180 “ “ “8. Physical Demands 8-1 5 “ “ “9. Work Environment 9-1 5 “ “ “TOTAL POINTS ASSIGNED: 2615 GRADE: GS-11Factor 1 – Knowledge Required by the Position: FL 1-7 1250 pointsExceeds Level 1-6 wherein the position requires performance of routine and recurring assignments in the specialty area. Fully meets Level 1-7 involving carrying out difficult and complex assignments and providing advice and guidance on a wide range of IT issues. The subject position requires thorough knowledge of network systems design, development, testing and installation, thorough knowledge of mission objectives/practices, extensive knowledge of information protection techniques and procedures, knowledge of systems analysis, configuration management, and equipment requirements relating to networks to assess vulnerabilities. Factor 2 – Supervisory Controls: FL 2-4 450 pointsFully meets FL 2-4 of the standard. According to the standard that level is appropriate when overall objectives and available resources are outlined by the supervisor and the employee and supervisor, in consultation, discuss possible timeframes, scope of assignment, and possible approaches. The most appropriate approach is determined by the employee and the employee frequently interprets regulations on his/her own. This meets Level 2-4 for Supervisory Controls under which the incumbent operates. Factor 3 – Guidelines: FL 3-3 275 pointsGuidelines utilized by the incumbent consist of a wide variety of commercial, Federal, DoD, agency regulations, policies, standards, and objectives that are general in nature. Initiative and judgment are required in adapting and or designing the best approaches and in selecting, interpreting, and modifying established approaches. This parallels Level 3-3 of the standard. Factor 4 – Complexity: FL 4-4 225 pointsThis position involves working with numerous computer operating systems, firewalls, and intrusion detection software and information protection techniques. It involves independent accomplishment of an integration of various dissimilar computer and automated processes and methodologies and requires designing solutions and methods to test the systems. There is extensive analysis involved in performing the duties. The position requires working on a number of interacting systems to evaluate the vulnerability. This fully meets the intent of Level 4-4 wherein duties involve a variety or work involving many different and unrelated processes wherein the employee decides what needs to be done by evaluating unusual circumstances, and utilizes different approaches in dealing with incomplete and conflicting data. Factor 5 – Scope and Effect: FL 5-4 225 pointsMeets Level 5-4. The standards identifies work at this level as involving establishing criteria, formulating projects, assessing program effectiveness, and investigating/analyzing a variety of unusual conditions, problems, or issues. Also, the work affects a wide range of agency activities or the activities of other organizations. This position in involved in analyzing a variety of unusual problems and conditions associated with networks and related systems and the work affects a range of DoD customers using information network systems. The confidentiality and integrity of these systems is ensured through the assessments. Factor 6 – Personal Contacts &Factor 7 – Purpose of Contacts: Matrix 3C 180 pointsPersonal Contacts: Contacts are as described at Level 3 of the standard (i.e., with individuals from outside the agency, and with agency officials several managerial levels removed from the employee. These contacts take place in moderately as well as in unstructured settings. Purpose of Contacts: Meets Level C. That level describes the situation where influence is required to persuade employees and managers to accept and implement findings and recommendations and resistance may be encountered. The employee must be skillful in approaching these contacts to achieve the desired effect. This position is involved in presenting findings regarding compromise of systems and he/she is required to persuade others to change methods and procedures relative to protection of systems to comply with policies and regulations. Those worked with will often feel the changes are not required and much tact and diplomacy is required to obtain changes required. Factor 8 – Physical Demands: FL 8-1 5 pointsThe standard only describes one level: 8-1, wherein light items may be carried but the work does not require any special physical effort. This position requires bending, crouching, stooping, stretching, reaching and lifting of moderately heavy objects. This physical demand is somewhat more than described in Level 8-1. Credit is given at Level 8-1. Although an argument could be made for crediting Level 8-2, such additional credit would have no impact on the grade allocation of the position. Factor 9 – Work Environment: FL 9-1 5 pointsWork is performed in a typical office setting having adequate lighting, heating, and ventilation. It involves everyday risks typical of the office setting requiring normal safety precautions. Level 9-1 is credited. FINAL CLASSIFICATION: IT Specialist (INFOSEC/NETWORK), GS-2210-11CLASSIFIER: Roger M. Parrish, NGB-J1-TNC Date: 15 Jun 06 ................
................

In order to avoid copyright disputes, this page is only a partial summary.

Google Online Preview   Download