ITSPEC (NETWORK) (Title 32)
Air National Guard Units
Posted: January 21, 2026 (15 days ago)
This job has been posted for 2-4 weeks. Consider applying soon if interested.
Air National Guard Units
Department of the Air Force
Location
Arkansas
Salary
$89,508 - $116,362
per year
Type
Full Time
More IT & Technology jobs →Closes
This job involves leading and executing cybersecurity operations to protect military computer networks and systems from threats, including planning missions, analyzing vulnerabilities, and coordinating teams in cyberspace environments.
It suits experienced IT professionals with a military background who enjoy high-stakes problem-solving and staying ahead of digital risks.
National Guard membership is essential, making it ideal for those committed to part-time service in the Air National Guard.
THIS IS A NATIONAL GUARD TITLE 32 EXCEPTED SERVICE POSITION.
This National Guard position is for a ITSPEC (INFOSEC/NETWORK) (Title 32), Position Description Number D2338000 and is part of the AR ANG 223 COS, National Guard.
NATIONAL GUARD MEMBERSHIP IS REQURED- If you are not currently a member of any military service (Brach/Status), please provide a letter stating intent to join.
GENERAL EXPERIENCE: Work in this series includes managing, supervising, leading, administering, developing, delivering, and supporting information technology (IT) systems and services.
This series covers only those positions for which the paramount requirement is knowledge of IT principles, concepts, and methods, e.g., data storage, software applications, networking.
SPECIALIZED EXPERIENCE: Must be a qualified Host Analyst or Network Analyst on the Cyberspace Vulnerability Assessment Hunt (CVA/H) Weapon System.
1-year specialized experience equivalent to at least the next lower grade.
In addition to the OPM IORs (Alternative A) specialized experience examples, specialized experience includes experience, education, or training that approaches techniques and requirements appropriate to an assigned computer applications area or computer specialty area in an organization.
Experience planning the sequence of actions necessary to accomplish the assignment where this entailed coordination with others outside the organizational unit and development of project controls.
Experience that required adaptations of guidelines or precedents to meet the needs of the assignment.
Experience preparing documentation on cost/benefit studies where is involved summarizing the material and organizing it in a logical fashion. Major Duties:
1. Prepares for, maintains currency for, and executes an advanced role in Cyberspace Operations.
Utilizes knowledge of systems security principles and concepts of emerging Information Technology (IT) security developments, and of the infrastructure protection environment to select appropriate tools to be used by team members.
Establishes methodology and determines best techniques to secure computer systems and to protect cyber key terrain from exploitation of information within these systems and/or to achieve other tasked objectives in cyberspace.
Leverages knowledge of multiple entities with a stake in current operations to plan and build appropriate courses of action and training scenarios.
Functions in at least one of the following advanced roles: a. Cyberspace Crew Lead. Develops tactical objectives and/or tactical taskings for a team of Cyberspace Operators.
Serves as the liaison between assigned team and other teams or external entities. b. Cyberspace Operations Analyst. Directs tactical execution for a team of Cyberspace Operators.
Develops tactical approach and synchronizes actions of multiple qualified operators in order to achieve objectives. c. Operations Planner/Scheduler.
Represents the unit's capability, availability, and interests at high-level Operational Planning Team (OPT) meetings to define the mission, environment, enemy, effects, capabilities, overall plan, phasing, operational agreements and contingencies needed to conduct the operation or exercise.
Develops a tactical plan for assigned missions and exercises.
Works as a member of the mission leadership element to translate operational objectives into tactical objectives comprised of specific tactical tasks.
Develops Measures of Effectiveness and Measures of Performance to be used in the assessment of the mission's or exercises success.
Prepares and coordinates operator, resource, facilities and equipment schedules in coordination with unit and flight commanders in order to ensure training, currency, and mission timelines and objectives are met.
d. Industrial Control Systems (ICS) Cyberspace Operator. Assesses and evaluates vulnerabilities and/or adversary activity in ICS enclaves.
Detects, characterizes, and resolves insecurities in ICS networks.
Reviews and analyzes ICS network traffic, configurations, and operating procedures and provides recommendations to improve system security posture. 2.
Prepares Unit Training Assembly, Annual Training and currency training events for Mission Ready Cyberspace Operators to optimize training time available.
Ensures training for each event has been prepared and is ready. Monitors assigned military members' go-no-go readiness status and ensures deficiencies are recognized.
Works with scheduling section to provide opportunities for assigned members to maintain full mission readiness.
Coordinates with maintenance section to ensure all assigned equipment is in good working condition and ready for each training and mission event. 3.
Conducts extensive research of new vulnerabilities and insecurities discovered in operating systems, application software, infrastructure and boundary protection devices.
Investigates, analyzes, and develops methods that could be used to exploit these vulnerabilities.
Conducts testing on training range to validate findings and to develop and refine methods and procedures to mitigate vulnerabilities.
Coordinates research and findings with the Cyberspace Weapons Officer for inclusion in unit and cyberspace community tactics, techniques, and procedures. 4.
Conducts extensive research of tools currently being used to attack or gain unauthorized access to information networks.
Analyzes and tests these tools on training range to determine effectiveness, stability, and scope of the tools.
Recommends and refines tools for use on Cyberspace Weapon System to provide the customer with the best possible evaluation of their security posture. 5. Performs other duties as assigned.
Check your resume before applying to catch common mistakes