INFORMATION SPECIALIST (SYSADMIN/INFOSEC)
United States Fleet Forces Command
Posted: March 13, 2026 (0 days ago)
This job was posted recently. Fresh listings typically have less competition.
United States Fleet Forces Command
Department of the Navy
Location
Salary
$128,204 - $175,215
per year
Type
Full-Time
More IT & Technology jobs →Closes
Base salary range: $147,649 - $221,900
Typical requirements: Executive-level leadership experience. Senior executive qualifications required.
Note: Actual salary includes locality pay (15-40%+ depending on location).
This job involves protecting computer systems from cyber threats by analyzing intrusions, handling incidents in real time, and reporting on security issues for the Navy's Fleet Forces Command in San Diego.
It's ideal for experienced IT professionals who enjoy solving complex security problems and communicating technical details clearly.
A good fit would be someone with hands-on background in cybersecurity who can work under pressure to keep networks safe.
This is a public notice flyer to notify interested applicants of anticipated vacancies. Applications will not be accepted through this flyer.
Interested applicants must follow the directions in the "How to Apply" section of this flyer to be considered. There may or may not be actual vacancies filled from this flyer.
Notice of Result letters will not be sent to applicants who respond to this flyer.
Applicants must have directly applicable experience that demonstrates the possession of knowledge, skills, abilities, and competencies necessary for immediate success in the position.
Qualifying experience may have been acquired in any public or private sector job, but will clearly demonstrate past experience in the application of the particular competencies or knowledge, skills and abilities necessary to successfully perform the duties of the position.
Such experience is typically in or directly relates to the work of the position to be filled. You must have IT-related experience demonstrating each of the four competencies listed below: 1.
Attention to Detail - Is thorough when performing work and conscientious about attending to detail.
Examples of experience demonstrating this competency include: Performing real-time cyber defense incident handling (e.g., forensic collections, intrusion correlation and tracking, threat analysis, and direct system remediation) tasks.
2.
Customer Service - Works with clients and customers (that is, any individuals who use or receive the services or products that your work unit produces, including the general public, individuals who work in the agency, other agencies, or organizations outside the Government) to assess their needs, provide information or assistance, resolve their problems, or satisfy their expectations; knows about available products and services; is committed to providing quality products and services.
Experience demonstrating this competency include: Conducting analysis of log files, evidence, and other information to determine best methods for identifying the perpetrator(s) of a network intrusion.
3.
Oral Communication - Expresses information (for example, ideas or facts) to individuals or groups effectively, taking into account the audience and nature of the information (for example, technical, sensitive, controversial); makes clear and convincing oral presentations; listens to others, attends to nonverbal cues, and responds appropriately.
Examples of experience demonstrating this competency include: Writing and publishing after action reviews, and providing technical summary of findings. 4.
Problem Solving - Identifies problems; determines accuracy and relevance of information; uses sound judgment to generate and evaluate alternatives, and to make recommendations.
Examples of experience demonstrating this competency include: Validating intrusion detection system (IDS) alerts against network traffic using packet analysis tools.
In addition to my experience demonstrating the four competencies above, I have qualifying experience such as: -Experience collecting and analyzing intrusion artifacts (e.g., source code, malware, and system configuration) and use discovered data to enable mitigation of potential cyber defense incidents within the enterprise.
-Experience correlating incident data and performing cyber defense reporting. -Experience capturing and analyzing malicious network traffic using network monitoring tools.
-Experience analyzing anomalous code as malicious or benign. This position is within the Work Category PROFESSIONAL at Work Level SENIOR, Series and Grade GG-2210-13.
Experience refers to paid and unpaid experience, including volunteer work done through National Service programs (e.g., professional, philanthropic, religious, spiritual, community, student, social).
Volunteer work helps build critical competencies, knowledge, and skills and can provide valuable training and experience that translates directly to paid employment. Major Duties:
Check your resume before applying to catch common mistakes