Fresh Listing

Posted: February 25, 2026 (0 days ago)

This job was posted recently. Fresh listings typically have less competition.

IT SPECIALIST (INFOSEC/NETWORK) (TITLE 5)

Air National Guard Units

Department of the Air Force

Fresh

Location

Salary

$102,203 - $132,870

per year

Closes

GS-11 Pay Grade

Base salary range: $62,107 - $80,737

Typical requirements: 1 year specialized experience at GS-10. Ph.D. or equivalent doctoral degree, or 3 years graduate study.

Note: Actual salary includes locality pay (15-40%+ depending on location).

Job Description

Summary

This job involves leading technical efforts to protect military computer networks and data from cyber threats, including assessing vulnerabilities and implementing security measures for the Air National Guard.

It's a hands-on role focused on ensuring systems stay secure and reliable.

A good fit would be someone with strong IT security experience, especially in networks, who enjoys problem-solving in a team environment and has a background in defense or government tech.

Key Requirements

  • At least 1 year of specialized experience equivalent to GS-11 level in IT security or network operations
  • Thorough knowledge of DoD information systems security programs, policies, and procedures
  • Expertise in network systems design, development, testing, installation, operation, and maintenance
  • Skill in applying IT security principles, methods, and tools to evaluate and implement protections
  • Knowledge of hardware, software, operating systems, firewalls, and diagnostic tools for troubleshooting complex issues
  • Experience in project management, including coordinating teams for vulnerability assessments
  • Ability to perform systems analysis, configuration management, and assess network vulnerabilities

Full Job Description

This position is part of the 147th Attack Wing located on Ellington Field in Houston, TX.

The purpose of this position is to serve as a Computer Network Operations (CNO) Technical Expert, ensuring the confidentiality, integrity, and availability of information systems, networks and data through the enhancement of Department of Defense (DoD) information systems security programs, policies, procedures and tools.

Texas is one of 9 states with NO state income tax. In describing your experience in your resume, please be clear and specific. Assumptions regarding your experience will not be made.

To be considered for qualification, your resume must include relevant experience with beginning and ending dates of employment/experience reflecting the following: Specialized Experience Required At least 1-year specialized experience equivalent to at least the next lower grade (GS-11).

In addition to the OPM IORs (Alternative A) specialized experience examples, specialized experience includes experience, education, or training that approaches techniques and requirements appropriate to an assigned computer applications area or computer specialty area in an organization.

Experience planning the sequence of actions necessary to accomplish the assignment where this entailed coordination with others outside the organizational unit and development of project controls.

Experience that required adaptations of guidelines or precedents to meet the needs of the assignment.

Experience preparing documentation on cost/benefit studies where is involved summarizing the material and organizing it in a logical fashion.

Thorough knowledge of the mission, objectives, terminology, and management practices in the activity, the agency and the department to recognize probable areas of interaction and to serve as a technical expert in systems/network security.

Knowledge of project management principles and methods sufficient to assign and provide expert technical direction to team members concerning their role in vulnerability assessments.

Thorough knowledge of network systems design, development, testing, installation, operating, management, and maintenance concepts and methods to provide and protect network services.

-Knowledge of, and skill in applying IT security principles and methods and of IT security products and services sufficient to evaluate and recommend the acquisition of, implement, and disseminate IT security tools, procedures, and practices to protect information assets.

Extensive knowledge of information technology methods and information protection techniques and procedures.

This includes government and Commercial Off The Shelf (COTS) technology using industry standards and an ability to understand the capabilities and limitations of software, utility programs, network management systems and programming.

Knowledge of hardware, software, and operating systems; systems configuration and integration; maintenance, upgrades, and modifications.

Extensive knowledge and skill in applying applicable policies, standards, directives, and operations manuals to perform systems analysis, evaluate approaches, offer advice, define alternative approaches, and coordinate requirements regarding the merits of proposed applications.

Extensive knowledge of hardware, software, network operations functions, firewalls, packet switching communications protocols, and diagnostic tools to analyze difficult and complex system problems and provides resolutions.

Knowledge of systems analysis, configuration management, and computer equipment requirements related to networks to assess vulnerabilities.

Skill in evaluating innovative approaches in formulation of programs or systems specifications. Major Duties:

As a IT SPECIALIST (INFOSEC/NETWORK) (TITLE 5) with the Texas National Guard, your duties will include, but will not be limited to: Performs as the Team Technical Lead during vulnerability assessments of DoD information systems.

Utilizes knowledge of systems security principles and concepts, of new Information Technology (IT) security developments, and of the infrastructure protection environment to select appropriate tools to be used by team members.

Provides assistance to owners of assessed systems by providing recommendations pertaining to implementing security programs designed to anticipate, assess, and minimize system vulnerabilities, to correct deficiencies discovered, and to apply new IT security concepts.

Briefs commanders and network administrators on the purpose and findings of the assessment, and prepares reports on the findings.

Assists in developing security solutions to correct deficiencies that cannot be fixed with existing solutions.

Performs information operations that protect and defend (or assess the capability to protect and defend) information and information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation.

This includes providing for restoration of information systems by incorporating protection, detection, and reaction capabilities.

Conducts risk and vulnerability assessments of DoD information systems to identify associated vulnerabilities, risks and protection needs. Performs OPFOR and other operational tasking.

Operates fixed and deployed communications-computer systems.

Performs activities such as configuring and monitoring hardware and software for system operation, processing and control of data flow, and client-server multi-user system support including network management or administration.

Evaluates and assesses vulnerabilities of customer network and application server hardware, operating system software, and peripheral network equipment such as routers, bridges, switches, attached cabling system, network interface cards, modems, multiplexers, and concentrators.

Conducts evaluations to ensure compliance with applicable standards. Ensures system backups are performed to ensure expedient restoration of the database for the respective network equipment.

Evaluates effectiveness of customer network firewalls.

Conducts analyses of network usage, hardware and software capabilities, ineffective practices or procedures, equipment shortcomings, and other relevant factors.

Recommends methods and procedures and coordinates corrective action to optimize utilization of present equipment.

Uses benchmarks, performance measurement, and evaluation data, in conjunction with vulnerability assessment techniques.

Develops recommendations or proposals involving a variety of specialized systems and improved operational efficiency.

Exercises authority and oversight of the squadron's digital training range(s), a suite of servers, routers, switches, hubs and other devices which can be configured with a variety of different operating systems in various versions, and with pre-programmed vulnerabilities, to be used in Computer Network Operations (CNO) training.

Consults with subordinates, supervisors, specialists, vendors, and sister IO squadrons to procure and maintain training range devices that realistically emulate Air Force networks and are flexibly re-configurable to emulate the network(s) of a specific Air Force base as needed to prepare for vulnerability assessment missions.

Performs analysis and design of automated and manual systems related to the network. Provides data for intrusion detection analysis. Determines applicability of established methods.

Examines and evaluates alternative means of satisfying user requirements. Suggests technically feasible approaches and makes recommendations regarding the most effective countermeasures.

Performs analysis and design of automated and manual systems related to the network. Provides data for intrusion detection analysis. Determines applicability of established methods.

Provides technical advice to users. Examines and evaluates alternative means of satisfying user requirements.

Suggests technically feasible approaches and makes recommendations regarding the most effective countermeasures.

Notes: When something can't be done due to security concerns it is the ISSO's responsibility to suggest an alternative.

The ISSO will need to be very familiar with network security as well as log analysis. The ISSO is considered the technical SME for the ISSM and for the ISO.

The Commander and the ISSM rely heavily on the ISSO to educate leadership on the importance of the security posture. It is the ISSO's role as apart of the IA shop to have full oversight over CIA.

Check your resume before applying to catch common mistakes

Browse Similar Jobs

Posted on USAJOBS: 2/25/2026 | Added to FreshGovJobs: 2/25/2026

Source: USAJOBS | ID: TX-12832387-T5