Fresh Listing

Posted: March 9, 2026 (4 days ago)

This job was posted recently. Fresh listings typically have less competition.

IT SPECIALIST (INFOSEC) (Title 5)

Air National Guard Units

Department of the Air Force

Fresh

Salary

$68,545 - $117,307

per year

Closes

Job Description

Summary

This job involves leading a team to test and secure computer systems for the Air National Guard by identifying weaknesses and suggesting fixes to protect sensitive information.

It's a technical role focused on cybersecurity in a military context, based in Des Moines, Iowa, and doesn't require military membership.

A good fit would be someone with hands-on experience in IT security, problem-solving skills, and the ability to guide others in technical assessments.

Key Requirements

  • One year of specialized experience equivalent to GS-9 (for GS-11) or GS-11 (for GS-12) in IT operations, including handling data storage, scheduling computer processing, and programming
  • Knowledge of systems security principles, IT security developments, and infrastructure protection
  • Experience in vulnerability assessments, selecting tools, and establishing methodologies to penetrate and exploit computer systems
  • Ability to direct teams during assessments to identify vulnerabilities from configurations, patches, or errors
  • Proficiency in at least one programming language and translating logical steps into code
  • Skills in analyzing system components, planning action sequences, and preparing documentation like cost/benefit studies
  • Experience coordinating with others outside the unit and adapting guidelines to meet assignment needs

Full Job Description

IOWA AIR NATIONAL GUARD - TITLE 5 EXCEPTED SERVICE POSITION This is a Title 5 Excepted Service position. Military membership is not required, and Veteran's Preference applies.

LOCATION: 132d Wing, Des Moines, Iowa In describing your experience, please be clear and specific. We will not make assumptions regarding your experience.

Applicants who do not fully address the minimum/specialized experience needed for the position in their resume will not be referred for consideration.

MINIMUM EXPERIENCE: Experience, education, and/or training that has provided a basic knowledge of data processing functions and general management principles that enabled the applicant to understand the stages required to automate a work process.

Experience may have been gained in work such as computer operator or assistant, computer sales representative, program analyst, or other positions that required the use or adaptation of computer programs and systems.

SPECIALIZED EXPERIENCE: GS 2210 9/11/12 - Applicant must have the following experience: GS-09: 1-year specialized experience equivalent to at least the next lower grade.

Experience, education, or training receiving, maintaining, and issuing data storage media for computer operations. Experience in scheduling the use of computer time for program processing.

Experience collecting and sequentially staging input media with associated program instructions for processing. Experience in at least one programming language.

Translating detailed logical steps developed by others into language codes that computers accept where this required understanding of procedures and limitations appropriate to use of a programming language.

Experience interviewing subject-matter personnel to get facts regarding work processes and synthesizing the resulting data into charts showing information flow.

Experience in analysis of the interrelationship of pertinent components of the system. Experience planning the sequence of actions necessary to accomplish the assignment.

Experience scheduling the sequence of programs to be processed by computers where alternatives had to be weighed with a view to production efficiency.

GS-11: 1-year specialized experience equivalent to at least the next lower grade.

Experience, education, or training that approaches techniques and requirements appropriate to an assigned computer applications area or computer specialty area in an organization.

Experience planning the sequence of actions necessary to accomplish the assignment where this entailed coordination with others outside the organizational unit and development of project controls.

Experience that required adaptations of guidelines or precedents to meet the needs of the assignment.

Experience preparing documentation on cost/benefit studies where is involved summarizing the material and organizing it in a logical fashion.

GS-12: 1-year specialized experience equivalent to at least the next lower grade.

Experience that has equipped the applicant with the particular competencies/knowledge, skills, and abilities to successfully perform the duties of the position and is typically in or related to the work of the position to be filled.

Major Duties:

As a IT SPECIALIST (INFOSEC) (Title 5), GS-2210-9/11/12, you will perform the following duties. Performs as the Team Technical Lead during vulnerability assessments of DoD information systems.

Utilizes knowledge of systems security principles and concepts, of new Information Technology (IT) security developments, and of the infrastructure protection environment to select appropriate tools to be used by team members.

Establishes methodology, and determines best techniques to penetrate computer systems and exploit information within these systems.

Directs the team during actual assessments to find vulnerabilities due to improper configurations, missing or improperly applied patches, or procedural errors.

Provides assistance to owners of assessed systems by providing recommendations pertaining to implementing security programs designed to anticipate, assess, and minimize system vulnerabilities, to correct deficiencies discovered, and to apply new IT security concepts.

Briefs commanders and network administrators on the purpose and findings of the assessment, and prepares reports on the findings.

Assists in developing security solutions to correct deficiencies that cannot be fixed with existing solutions.

Conducts extensive research of new vulnerabilities discovered in operating systems, application software, infrastructure and firewalls.

Investigates, analyses, and develops methods that could be used to exploit those vulnerabilities.

Conducts testing on training range to validate findings and to develop and refine methods and procedures to mitigate vulnerabilities.Conducts extensive research of tools currently being used to attack or gain unauthorized access to information networks.

Analyzes and tests these tools on training range to determine effectiveness, stability, and scope of the tools.

Modifies and refines tools for use in vulnerability assessments to provide the customer with the best possible evaluation of their security posture.

Performs information operations that protect and defend (or assess the capability to protect and defend) information and information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation.

This includes providing for restoration of information systems by incorporating protection, detection, and reaction capabilities.

Conducts risk and vulnerability assessments of DoD information systems to identify associated vulnerabilities, risks and protection needs. Performs OPFOR and other operational tasking.

Operates fixed and deployed communications-computer systems.

Performs activities such as configuring and monitoring hardware and software for system operation, processing and control of data flow, and client-server multi-user system support including network management or administration.

Performs microcomputer fault isolation and restoration actions. Analyzes equipment and software reliability and suitability for vulnerability assessment utilization.

Conducts analyses of network usage, hardware and software capabilities, ineffective practices or procedures, equipment shortcomings, and other relevant factors.

Recommends methods and procedures and coordinates corrective action to optimize utilization of present equipment.

Uses benchmarks, performance measurement, and evaluation data, in conjunction with vulnerability assessment techniques.

Develops recommendations or proposals involving a variety of specialized systems and improved operational efficiency.

Exercises authority and oversight of the squadron's digital training range(s), a suite of servers, routers, switches, hubs and other devices which can be configured with a variety of different operating systems in various versions, and with pre-programmed vulnerabilities, to be used in Computer Network Operations (CNO) training.

Consults with subordinates, supervisors, specialists, vendors, and sister IO squadrons to procure and maintain training range devices that realistically emulate Air Force networks and are flexibly re-configurable to emulate the network(s) of a specific Air Force base as needed to prepare for vulnerability assessment missions.

Performs analysis and design of automated and manual systems related to the network. Provides data for intrusion detection analysis. Determines applicability of established methods.

Provides technical advice to users. Examines and evaluates alternative means of satisfying user requirements.

Suggests technically feasible approaches and makes recommendations regarding the most effective countermeasures.

Performs other duties as assigned to include Special Security Office (SSO) and assistant program support for facilities. T5821400

Check your resume before applying to catch common mistakes

Browse Similar Jobs

Posted on USAJOBS: 3/9/2026 | Added to FreshGovJobs: 3/10/2026

Source: USAJOBS | ID: IA-12904843-AF-26-111