Demo

US Cyber Command IT CYBERSECURITY SPECIALIST

U.S. Army Cyber Command
Annapolis, MD Full Time
POSTED ON 2/13/2025
AVAILABLE BEFORE 5/5/2025

Organization

U.S. Cyber Command

Duty Location

FORT MEADE, ANNE ARUNDEL, MD

Major Duties

1 : Red Team / OPFOR Community Coordination / Working Group Participation : As assigned, exercises delegated authority to participate in negotiations on the behalf of the Directorate and Command as an actively participating member of DoD, U.S. Government (USG), and other (professional community, academic, and industry) working groups, tasked to investigate and make recommendations on Red Team issues of broad interest and concern to the cyberspace program community. Vigorously represents the interests and concerns of the Command / DoD and ensures consideration of DoD-unique or high-priority issues in the establishment of broad-based regulations, policies and standards involved in implementing new Adversary Emulation concepts and methods within DoD. In this same manner, collaborates with colleagues within the DoD cyberspace community to advise on Adversary Emulation methodology, tools and general lessons learned pioneered by this team, which also serve as models for other DoD program elements. Participates in continuing efforts in a manner consistent with established formats and quality standards to capture, document, and catalog work products and other intellectual capital in forms suitable for the Command’s knowledge base. ​

35%) ​

2 : Adversary Emulation Capabilities Implementation : Works collaboratively with cyberspace SMEs (e.g., cyber operations planners, TTP developers) to define and document exercise objectives, define the scenarios and conditions to be simulated using Red Team methodology and tools, and document / communicate the roles and responsibilities of all participants. In particular, contributes Adversary Emulation expertise to make recommendations as to how these capabilities can be most effectively applied to support the mission. Works through iterative efforts to collaborate with exercise planners and other participants to tailor Adversary Emulation / Opposing Forces (OPFOR) capabilities and provide a virtual threat landscape that enables computerized simulations of threat actor TTPs and countermeasures, including the ability to “tweak” variables to explore and assess outcomes of changes in parameters associated with alternative courses of action. During the course of exercises, as required by the emergence of unforeseen events, makes adjustments to parameters to support additional iterations as necessary to further explore promising approaches or to isolate the source of apparent anomalies, such as findings that reflect adequate training and exercise setup, but are still not within standards. Works with other cyberspace SMEs in analysis of exercise assessments. Facilitates capture and documentation of lessons learned by exercise evaluators. Advises participants in assessing data to determine what and how results have been influenced by exercise parameters. Contributes to and validates conclusions documented in exercise reports before they are disseminated to the chain of command and other participants. As needed, participates in out briefings to provide insights into exercise findings and make recommendations for indicated courses of action. ​

35%) ​

3 : Adversary Emulation Requirements Analysis, and Capabilities Development & Implementation : Exercises initiative and employs a variety of means (formal and informal discussions with colleagues through the DoD community, participation in working groups) to maintain current and comprehensive knowledge of the DoD cyberspace program landscape, including current and projected requirements and priorities. Makes use of this detailed and current understanding of the challenges faced by cyber elements at all levels of the DoD program to propose (for the Division Chief’s consideration and approval) efforts on issues with potential to yield maximum payback, including program issues that are especially difficult to simulate in actual operations, making them attractive candidates for Adversary Emulation applications to better inform the various training audiences of realistic attack vectors faced while on operations. Conducts comprehensive research and evaluation of Red Team concepts, facilitating technologies, and automated tools. Uses these analyses is to identify Commercial Off the Shelf (COTS) and Government Off the Shelf (GOTS) items, which can serve as a platform for the development of cyberspace-specific Adversary Emulation applications. (Use of these COTS / GOTS products is preferred to development of proprietary products because it enables economic efficiencies and speeds the delivery of tools to the cyberspace community.) Documents and communicates project objectives, quality standards, deadlines, budgets, and relative priority of efforts. Draws on technical expertise and broad knowledge of cyberspace operations to facilitate discussions among SMEs as needed to resolve conflicting opinions about key issues. Obtains access to additional specialized SME assets as needed to facilitate full investigation of issues on which SMEs cannot reach common ground, and / or makes authoritative decisions on such technical issues when resolution cannot be otherwise achieved. Provides technical insights to support implementation of Adversary product development plans (TTP development, or C2 infrastructure deployment). Works through iterative testing of Red Team style products to ensure achievement of performance specifications, including those of cyberspace design features built in to ensure security and integrity with measures of effectiveness. ​

30%) ​

Performs other duties as assigne d.

Qualifications / Specialized Experience

GG-09 - Specialized experience would be demonstrated by analyze computer and network security principles to monitor and evaluate system compliance with IT security requirements, recognize security breaches, conduct network assessments and security event analysis, and perform remote diagnostics and troubleshooting of network systems, computers, servers, and data communication equipment. Administer cybersecurity standards to evaluate the effectiveness of security measures for protecting automated systems and sensitive data, and to develop, implement, coordinate, and review security plans, policies, and procedures. ​

GG-11 - Specialized experience would be demonstrated by monitoring security breaches, conduct network assessments, and analyze security events. Perform remote diagnostics and troubleshooting of network systems, computers, servers, and data communication equipment and software. Collaborate with exercise planners, customize Adversary Emulation capabilities, create virtual threat landscapes, and adjust variables to test different outcomes. ​

GG-12 - Specialized experience would be demonstrated by monitoring security breaches, conducts network assessments, and analyzes security events. Perform remote diagnostics and troubleshooting of network systems, computers, servers, and data communication equipment and software. Evaluate and review the effectiveness of security measures using cybersecurity standards to protect automated systems and sensitive data, and develop and implement security plans, policies, and procedures. ​

GG-13 - Specialized experience would be demonstrated by representing the organization in negotiations and working groups to address issues and implement new Adversary Emulation methods. Collaborates with SMEs to define and document exercise objectives, scenarios, and conditions using methodology and tools. Collaborate with exercise planners to tailor Adversary Emulation capabilities, create virtual threat landscapes, and adjust variables to test different outcomes.

Conditions of Employment

Appointment may be subject to a suitability or fitness determination, as determined by a completed background investigation. ​

Three-year trial / probationary period may be required. ​

May be recalled to duty, may be required to work other than normal duty hours, which may include evenings, weekends, and / or holidays, and may be required to work overtime. ​

Work may occasionally require travel away from the normal duty station on military and / or commercial aircraft. ​

The employee must be able to obtain and maintain a TOP SECRET SCI clearance as a condition of employment and must complete a counterintelligence scope polygraph exam. ​

This position is a testing designated position (TDP) in accordance with (IAW) Drug Free Federal Workplace Program. As a precondition and continuing condition of employment, the incumbent of this position must, IAW Chapter 5, section II, paragraphs 5-8b and 5-8c(4) of AR 600-85 (The Army Substance Abuse Program) and DA PAM 600-85 (Army Substance Abuse Program Civilian Services), Chapter 3, paragraphs 3-2e and f agree to submit urinalysis testing on a recurring basis. The incumbent is required to sign a DA Form 5019 (Condition of Employment for Certain Positions Identified as Critical Under the DA, Drug Free Federal Workplace Program. ​

The incumbent must meet NSA personnel security requirements outlined in NSA / CSS Policy 5-1. ​

TDY will be required up to 35% of the time. Incumbent may be required to travel by military and / or commercial aircraft in the performance of assigned tasks. ​

Additional Information

If you are a current federal career / career-conditional employee, you will be placed on an excepted appointment. ​

Male applicants born after December 31, 1959, must complete a Pre-Employment Certification Statement for Selective Service Registration. ​

You will be required to provide proof of U.S. Citizenship. ​

Telework eligible : Yes ​

Permanent Change of Station (PCS) allowances may be authorized, subject to the provisions of the Joint Travel Regulations and an agency determination that a PCS move is in the Government Interest. ​

Relocation or recruitment incentives may be authorized. ​

Student loan repayment, advanced leave accrual, and advanced in-hire rate may be authorized. ​

Appointment type : Permanent ​

Work schedule : Full- time ​

Promotion potential : Yes ​

Supervisory status : No ​

This position is in the Professional Work Category at the Full Performance Work Level within the CES Occupational Structure. ​

This position is a DoD Cyber Excepted Service (CES) personnel system position in the Excepted Service under 10 U.S.C. 1599f. ​

The United States government does not discriminate in employment based on race, color, religion, sex (including pregnancy and gender identity), national origin, political affiliation, sexual orientation, marital status, disability, genetic information, age, membership in an employee organization, retaliation, parental status, military service or other non- merit factor. ​

DoD Components with CES positions apply Veterans’ Preference to preference eligible candidates, as defined by Section 2108 of Title 5 U.S.C, in accordance with the procedures provided in DoD Instruction 1400.25, Volume 3005, “CES Employment and Placement.” If you are a veteran claiming veterans' preference, as defined by Section 2108 of Title 5 U.S.C., you must submit documents verifying your eligibility with your application package. ​

A review of your application package will be used to determine whether you meet the qualifications requirements listed for this position.

Statement of Excepted Service- This position is a DoD Cyber Excepted Service (CES) personnel system position in the Excepted Service under 10 U.S.C. 1599f.

  • This position is a DoD Cyber Excepted Service (CES) personnel system position in the Excepted Service under 10 U.S.C. 1599

CES Veteran's Preference- DoD Components with CES positions apply Veterans’ Preference to preference eligible candidates, as defined by Section 2108 of Title 5 U.S.C, in accordance with the procedures provided in DoD Instruction 1400.25, Volume 3005, “CES Employment and Placement.” If you are a veteran claiming veterans' preference, as defined by Section 2108 of Title 5 U.S.C., you must submit documents verifying your eligibility with your application package.

  • DoD Components with CES positions apply Veterans’ Preference to preference eligible candidates, as defined by Section 2108 of Title 5 U.S.C, in accordance with the procedures provided in DoD Instruction 1400.25, Volume 3005, “CES Employment and Placement.” If you are a veteran claiming veterans' preference, as defined by Section 2108 of Title 5 U.S.C., you must submit documents verifying your eligibility with your application package.
  • Equal Opportunity Employer - The United States government does not discriminate in employment based on race, color, religion, sex (including pregnancy and gender identity), national origin, political affiliation, sexual orientation, marital status, disability, genetic information, age, membership in an employee organization, retaliation, parental status, military service or other non-merit factor.

    The United States government does not discriminate in employment based on race, color, religion, sex (including pregnancy and gender identity), national origin, political affiliation, sexual orientation, marital status, disability, genetic information, age, membership in an employee organization, retaliation, parental status, military service or other non-merit factor

    Compensation :

    68,405-$153,354 per year

    Salary : $68,405 - $153,354

    If your compensation planning software is too rigid to deploy winning incentive strategies, it’s time to find an adaptable solution. Compensation Planning
    Enhance your organization's compensation strategy with salary data sets that HR and team managers can use to pay your staff right. Surveys & Data Sets

    What is the career path for a US Cyber Command IT CYBERSECURITY SPECIALIST?

    Sign up to receive alerts about other jobs on the US Cyber Command IT CYBERSECURITY SPECIALIST career path by checking the boxes next to the positions that interest you.
    Income Estimation: 
    $99,793 - $130,112
    Income Estimation: 
    $125,027 - $157,872
    Income Estimation: 
    $149,432 - $188,965
    Income Estimation: 
    $179,455 - $227,077
    Income Estimation: 
    $163,631 - $209,073
    Income Estimation: 
    $192,911 - $256,346
    Income Estimation: 
    $99,793 - $130,112
    Income Estimation: 
    $125,027 - $157,872
    Income Estimation: 
    $125,027 - $157,872
    Income Estimation: 
    $149,432 - $188,965
    View Core, Job Family, and Industry Job Skills and Competency Data for more than 15,000 Job Titles Skills Library

    Job openings at U.S. Army Cyber Command

    U.S. Army Cyber Command
    Hired Organization Address Honolulu, HI Full Time
    Duties Serves as a Network Administrator in the Network Branch (NB) for the 30th Signal Battalion. Operates and maintain...
    U.S. Army Cyber Command
    Hired Organization Address Columbia, SC Full Time
    Summary About the Position : This position is a DOD Cyber Excepted Service (CES) personnel system position in the Except...
    U.S. Army Cyber Command
    Hired Organization Address Annapolis, MD Full Time
    Organization U.S. Army Cyber Command Duty Location FORT MEADE, ANNE ARUNDEL, MD Major Duties The U.S. Army Cyber Protect...
    U.S. Army Cyber Command
    Hired Organization Address Richmond, GA Full Time
    Organization U.S. Army Cyber Command Duty Location Fort Eisenhower, Richmond, Ga Major Duties The U.S. Army Cyber Protec...

    Not the job you're looking for? Here are some other US Cyber Command IT CYBERSECURITY SPECIALIST jobs in the Annapolis, MD area that may be a better fit.

    US Cyber Command Logistics Management Specialist

    U.S. Army Cyber Command, Annapolis, MD

    AI Assistant is available now!

    Feel free to start your new journey!