Job Summary ASSIGNMENT DESCRIPTION: Cybersecurity Management Officers ensure that Agency information systems comply with applicable standards and guidelines. They provide oversight of documentation, validation, accreditation, and authorization processes necessary for the implementation, operation, and maintenance of information technology systems. They ensure appropriate managerial responses for associated risk, compliance, and assurance from mission, security, and cost perspectives. These officers manage the strategic, personnel, infrastructure, policy enforcement, and emergency planning implications of information security for the organization, a specific program, or other area of responsibility.
Additional Job Information ADDITIONAL INFORMATION: The Desktop Environment (DTE) is a centralized, commonly deployed IT service that provides connected users an experience of unparalleled mission integration and unified benefits. These services include everything from secure email and phone services, mobile access capabilities, chat options, print and directory services, to collaborative applications and much more. The DTE Integrated Program Office (IPO) provides a common desktop (DTE) to DIA, NGA and selected partners, contributing to efficiencies for both agencies, delivering improved and secure user experience, and enhancing the ability of DTE users to collaborative and share information. The Information Systems Security Manager (ISSM), DTE IPO is responsible for ensuring that the appropriate management and operational security posture is maintained for DTE services on the Common Operating Environment (COE) domain. This position will provide oversight and management of the DTE certification and accreditation process to secure and gain accreditation of the DTE Services. This position will ensure completion of the documentation, validation, accreditation, and authorization processes and analysis necessary to assure that new information technology systems meet all applicable Information Assurance and security laws, regulations, guidelines and standards. This position will ensure the appropriate treatment of risk, compliance, and assurance from mission, security, and cost Additional Application Requirement: You may be asked to complete one or more assessments in addition to the application you submit on this website as part of your application to NGA. These assessments may include but are not limited to: 1) Online questionnaires or assessments that require you to describe your job-related knowledge, skills, abilities, or other characteristics that are aligned with the mandatory and desirable qualifications of this job posting. The information you provide in the application you submit must support the response you provide to this questionnaire. You will receive an email to describe any additional assessments required. Please monitor your emails and complete any required assessments as soon as possible.
Mandatory Qualifications MANDATORY QUALIFICATION CRITERIA: For this particular job, applicants must meet all competencies reflected under the Mandatory Qualification Criteria to include education (if required). Online applications must demonstrate qualification by providing specific examples and associated results, in response to the announcement's mandatory criteria specified in this vacancy announcement: 1. Experience with Risk Management Framework (RMF), and accreditation and authorization practices, as applied and validated within system constructs. 2. Demonstrated work experience in computer science/cyber security-related field, and with the use and operation of security tools for accreditation documentation, auditing, monitoring and scanning (i.e. XACTA, MAS, HBSS). 3. Proven ability to recommend highly complex risk mitigation strategies. EDUCATION REQUIREMENT: A. Education: Bachelor's degree from an accredited college or university in Computer Information Systems, Computer Science, Engineering, Information Science, Information Systems, Information Systems Management, Information Technology, Mathematics, Operations Research, Statistics, Technology Management, or degree that provided a minimum of 24 semester hours in one or more of the fields identified above and required the development or adaptation of applications, systems, or networks. -OR- B. Combination of Education and Experience: A minimum of 24 semester (36 quarter) hours of coursework in any area listed in option A, plus experience in IT policy development and implementation, IT standards development and implementation, IT project/program management, IT operations, or a related area that demonstrates the ability to successfully perform the duties associated with this work. As a rule, every 30 semester (45 quarter) hours of coursework is equivalent to one year of experience. Candidates should show that their combination of education and experience totals 4 years. -OR- C. Experience: A minimum of 4 years of experience in IT policy development and implementation, IT standards development and implementation, IT project/program management, IT operations, or a related area that demonstrates the ability to successfully perform the duties associated with this work. -AND- LICENSES/CERTIFICATIONS: Information Assurance Management I (IAM I) certification must be obtained within 6 months. -AND- Relevant Competencies: IT-related experience demonstrating each of the four competencies: Attention to Detail, Customer Service, Oral Communication, and Problem Solving.
Highly Desired Qualifications QUALIFICATION CRITERIA: In addition to the mandatory qualifications, experience in the following is desired: 1. Experience conducting assessments related to threats and vulnerabilities for potential deviations from determined configurations or established guidelines, and recommending mitigation countermeasures. 2. Demonstrated competency deal with, and reduce ambiguity and uncertainty. Able to advance projects with changing priorities, ill-defined requirements and multiple dependencies. Flexibility, comfort with change, and a corporate focus are essential. 3. Experience comprehending and developing complex correspondence, influential strategic products and documents of record. Communicating clear and concise technical information to internal and external high-level officials. Addressing potentially controversial topics in an objective and skillful manner. 4. Experience working with IC and DoD partners, IT infrastructure, client server computing and architecture systems. 5. Possess an active TS/SCI Clearance.
Additional Job Requirements You must be able to obtain and retain a Top Secret security clearance with access to Sensitive Compartmented Information. In addition, you are subject to a Counterintelligence Polygraph examination in order to maintain access to Top Secret information. All employees are subject to a periodic examination on a random basis in order to determine continued eligibility. Refusal to take the examination may result in denial of access to Top Secret information, SAP, and/or unescorted access to SCIFs. Employees with SCI access and who are under NGA cognizance are required to submit a Security Financial Disclosure Report, SF-714, on an annual basis in order to determine continued eligibility. Failure to comply may negatively impact continued access to Top Secret information, Information Systems, SAP, and/or unescorted access to SCIFs.
Pay, Benefits, & Work Schedule PROMOTION OPPORTUNITY: Promotion opportunities allow applicants at all band levels to be considered. Qualifications for NGA positions do not include specific time-in-band requirements. NGA will emphasize quality of experience, rather than duration, and assess how the quality of the experience demonstrates possession of the knowledge, skills, abilities, and competencies necessary for successful job performance in the NGA occupational structure. Band 04 $102,663 - $157,709 PERMANENT CHANGE IN STATION: PCS expenses are not authorized. Pay is only part of the compensation you will earn working for the Federal Government. We offer a broad array of benefits programs and family friendly flexibilities to meet the needs of you and your family. For more information on the array of benefits programs, please visit
Cover Letter Applicants are not required to submit a cover letter. The entire cover letter cannot exceed the specified limits provided in the Cover Letter field (3,000 characters). Pages exceeding this limit will not be considered. The cover letter is recommended but is not required for employment consideration with the National Geospatial-Intelligence Agency. Applicants should place their narrative information in the Cover Letter / Other Professional Details field.
Who may apply External Applicants Only
How to apply Application submission involves applying using the Intelligence Community's Applicant Gateway on-line application process. ONLY ELECTRONIC SUBMISSIONS WILL BE ACCEPTED.
How will I be evaluated? APPLICANT EVALUATION PROCESS: Applicants will be evaluated for this job opportunity in three stages: 1) All applicants will be evaluated using the Mandatory Qualification Criteria, 2) Qualified applicants will then be evaluated by an expert or panel of experts using a combination of qualification criteria to determine the best-qualified candidates, 3) Best-qualified applicants may then be further evaluated through an interview process. Military retiree applicants, if selected, may be impacted by the 180-day appointment restrictions of DODI 1402.01. HD personnel will provide additional information if applicable. Applicants are encouraged to carefully review the Assignment Description, Additional Information Provided By the Selecting Official..... click apply for full job details
Associated topics: chief program officer, cpo, manage, manager, management, monitor, product manager, project manager, relationship manager, task