SUPERVISORY IT CYBERSECURITY SPECIALIST (INFOSEC) (Title 5)
Air National Guard Units
Posted: January 13, 2026 (1 day ago)
This job was posted recently. Fresh listings typically have less competition.
Air National Guard Units
Department of the Air Force
Location
Des Moines, Iowa
Salary
$89,341 - $116,148
per year
Type
Full Time
More IT & Technology jobs →Closes
This job involves serving as an expert in IT cybersecurity for the Air National Guard, focusing on protecting sensitive information systems, ensuring compliance with security rules, and assessing risks to networks and equipment.
A good fit would be someone with hands-on experience in IT security who can lead teams, handle classified data, and work in a military environment in Iowa.
It's ideal for current Guard members passionate about safeguarding government tech from threats.
IOWA AIR NATIONAL GUARD - TITLE 32 EXCEPTED SERVICE POSITION This position is open to current on-board Title 5 and Title 32 employees of the 132d Wing, Des Moines, Iowa Air National Guard.
Military membership is required. LOCATION: 132d Wing, Des Moines, Iowa In describing your experience, please be clear and specific. We will not make assumptions regarding your experience.
Applicants who do not fully address the minimum/specialized experience needed for the position in their resume will not be referred for consideration.
MINIMUM REQUIREMENTS: Experience managing, supervising, leading, administering, developing, delivering, and supporting information technology (IT) systems and services.
This series covers only those positions for which the paramount requirement is knowledge of IT principles, concepts, and methods, e.g., data storage, software applications, networking.
SPECIALIZED EXPERIENCE REQUIREMENTS: GS-2210-12: Must have experience in the following: 1-year specialized experience equivalent to at least the next lower grade.
Experience, education, or training that approaches techniques and requirements appropriate to an assigned computer applications area or computer specialty area in an organization.
Experience planning the sequence of actions necessary to accomplish the assignment where this entailed coordination with others outside the organizational unit and development of project controls.
Experience that required adaptations of guidelines or precedents to meet the needs of the assignment.
Experience preparing documentation on cost/benefit studies where is involved summarizing the material and organizing it in a logical fashion Major Duties:
As a IT CYBERSECURITY SPECIALIST (INFOSEC), GS-2210-12 your duties are below. 1.
Serves as a technical expert and focal point for Information Technology (IT) security and information assurance policies, planning, programs, initiatives, certification and accreditation.
Provides advice and assistance regarding security aspects of processing, storage, retrieval, transmission, and access of classified and unclassified information.
Administers and monitors installation compliance with all applicable DoD, USAF, National Guard Bureau (NGB) and Air National Guard (ANG) Information Assurance regulations and policies.
Administers and maintains the organization certification & accreditation process for assigned SCIF(s) using the Risk Management Framework (RMF), and coordinates, compiles and maintains all certification & accreditation documentation for appropriate accreditation authorities.
Reviews and implements local policies regarding system access, network rights, and physical access to systems and equipment.
Conducts risk and vulnerability assessments of DoD classified information systems to identify associated vulnerabilities, risks and protection needs.
Leads or serves as a member of the configuration control board for applicable installation facilities/networks (35%) Evaluates and assesses vulnerabilities of classified network and application server hardware, operating system software, and peripheral network equipment such as routers, bridges, switches, attached cabling system, network interface cards, modems, multiplexers, and concentrators.
Updates hardware and software architecture databases to reflect installations, turn-ins, and changes in reportable software.
Provides input to the ANG Continuity of Operation Plan (COOP) procedures for system disaster recovery. COOP recovery includes reestablishment of systems at multiple sites and locations.
Conducts evaluations to ensure compliance with applicable standards. Ensures system backups are performed to ensure expedient restoration of respective network equipment.
(25%) Reviews national, DOD and other policies, program proposals, operational and strategic plans, and identifies issues requiring tier two actions or inputs.
Based on these reviews, provides technical recommendations for changes to the security posture to the Wing Information System Security Manager (ISSM).
Prepares and presents applicable briefings and reports to high-level managers.
Advises the Wing ISSM and Group/Squadron Commander on the impact of tier two level Information Assurance (IA) and Computer Network Defense (CND) policy on squadron group/squadron activities.
Implements audit measures to ensure activity compliance with regulatory requirements. Participates in inspections and surveys of computer system.
Incumbent makes recommendations to the Wing ISSM on the approval of various computer operations based on security guidelines.
When feasible, provides alternatives to the Wing ISSM and Group/Squadron Commanderto meet security requirements based on the unique needs of the organization and mission requirements.
Develops guidance papers on security issues affecting classified systems, enclaves, and applications.
(15%) Analyzes equipment and software reliability and suitability for vulnerability assessment utilization.
Conducts analyses of classified network usage, hardware and software capabilities, ineffective practices or procedures, equipment shortcomings, and other relevant factors.
Recommends methods and procedures and coordinates corrective action to optimize utilization of present equipment.
Uses benchmarks, performance measurement, and evaluation data, in conjunction with vulnerability assessment techniques.
Develops recommendations or proposals involving a variety of specialized systems to improve operational efficiency.
(15%) Determines, develops, and ensures cooperation and coordination with related IA/CND program efforts.
Incumbent must analyze the vulnerabilities and weaknesses of existing computer security programs that could benefit from group training and translate those needs into training and education media for the ISSM.
Designs and delivers to the Group/Squadron Commander tailored programs of instruction to reduce risks, increase the level of computer security awareness, and improve the security posture for the automated systems and activities.
(10%) Performs other duties as assigned. D2792000
Check your resume before applying to catch common mistakes