Sign in
Post Jobs


Full Time

Website U.S. Marine Corps

ADDITIONAL QUALIFYING ITEMS: Knowledge of new and emerging information technology (IT) and cybersecurity technologies. Knowledge of capabilities and applications of network equipment including hubs, routers, switches, bridges, servers, transmission media, and related hardware. Knowledge of network access, identity, and access management (e.g., public key infrastructure [PKI]). Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). Knowledge of system life cycle management principles, including software security and usability. Skill in applying the systems engineering process. Knowledge of network design processes, to include understanding of security objectives, operational objectives, and tradeoffs. Knowledge of cybersecurity principles. Knowledge of integrating the organization’s goals and objectives into the architecture. Knowledge of information technology (IT) security principles and methods (e.g., firewalls, demilitarized zones, encryption). Knowledge of cybersecurity principles used to manage risks related to the use, processing, storage, and transmission of information or data. Knowledge of local area and wide area networking principles and concepts including bandwidth management. Knowledge of measures or indicators of system performance and availability. Knowledge of remote access technology concepts. Knowledge of cyber threats and vulnerabilities. Knowledge of specific operational impacts of cybersecurity lapses. Knowledge of key telecommunications concepts (e.g., Routing Algorithms, Fiber Optics Systems Link Budgeting, Add/Drop Multiplexers). Knowledge of server administration and systems engineering theories, concepts, and methods. Knowledge of Virtual Private Network (VPN) security. Skill in analyzing network traffic capacity and performance characteristics. Skill in implementing and testing network infrastructure contingency and recovery plans. Skill in establishing a routing schema. Skill in implementing, maintaining, and improving established network security practices. Skill in installing, configuring, and troubleshooting LAN and WAN components such as routers, hubs, and switches. Skill in using network management tools to analyze network traffic patterns (e.g., simple network management protocol). Knowledge of mobile communications architecture. Knowledge of operations security. Knowledge of operating system structures and internals (e.g., process management, directory structure, installed applications). Knowledge of basic concepts, terminology, and operations of a wide range of communications media (computer and telephone networks, satellite, fiber, wireless). Knowledge of configuration management techniques. Knowledge of key concepts in security management (e.g., Release Management, Patch Management). Ability to operate common network tools (e.g., ping, traceroute, nslookup). Knowledge of industry standard security models. Develop data management capabilities (e.g., cloud based, centralized cryptographic key management) to include support to the mobile workforce. Skill in applying and incorporating information technologies into proposed solutions. Skill in creating and utilizing mathematical or statistical models. Knowledge of web filtering technologies. Ability to conduct vulnerability scans and recognize vulnerabilities in security systems. Knowledge of circuit analysis. Knowledge of covert communication techniques. Ability to prepare and present briefings. Knowledge of engineering concepts as applied to computer architecture and associated computer hardware/software. Knowledge of various types of computer architectures. Knowledge of system fault tolerance methodologies. Knowledge of how system components are installed, integrated, and optimized. Knowledge of industry-standard and organizationally accepted analysis principles and methods. Knowledge of multi-level/security cross domain solutions. Skill in the use of design methods. This position is within the Work Category SUPERVISION/MANAGEMENT at Work Level SENIOR, Series and Grade GG-2210-14 Additional qualification information can be found from the following Office of Personnel Management website: Experience refers to paid and unpaid experience, including volunteer work done through National Service programs (e.g., professional, philanthropic, religious, spiritual, community, student, social). Volunteer work helps build critical competencies, knowledge, and skills and can provide valuable training and experience that translates directly to paid employment. *POSITION DUTIES/RESPONSIBILITIES: Serves as the JMOC Bluespace Operations Lead 35% The incumbent serves as the focal point to oversee the program and planning efforts ensuring maximum support and integration of full spectrum cyber operations. Applies a broad and expert knowledge of command, control, communications and computer, cyber operations, information assurance and technical aspects of information technology mission and knowledge of DoD IT information assurance policies. The incumbent will be tasked with ensuring the integrity, and availability of systems, networks, and data through the planning, analysis, development, implementation, maintenance, and enhancement of information systems security programs, policies, procedures, and tools. Performs as the subject matter expert with knowledge of networking and network security monitoring to enable cybersecurity operations. The incumbent may be tasked as a representative of the JMOC amongst DoD Information Networks (DODIN), Combatant Command (CCMD) or service working groups and should possess knowledge across any of several Cyber mission areas, including inspection, operations support, threat mitigation, counter-infiltration, and threat emulation. Possess the capacity to perform the cyber role of Network Infrastructure Specialist and perform a range of cyber tasks supporting the organization’s mission. Technical and Analytical Expertise 35% The incumbent will be tasked to provide a unique blend of analytical, operational, and technical expertise to manage missions effectively and skilled in applying new cybersecurity developments and applications. The incumbent will manage and resolves the interrelationships of multiple cybersecurity specialties and disciplines. Ensures the integration of cyber programs and services. Develops solutions to integration/interoperability; manages assigned projects; communicates complex technical requirements to non-technical personnel, and prepares and presents briefings to senior management officials on complex/controversial issues. The work involves analyzing various challenging situations, establishing criteria, assessing cyber network defenses’ effectiveness, and investigating multiple unusual conditions, problems, or issues to propose technical solutions. The work affects a wide range of activities and affects the activities of other Cyber organizations. The incumbent applies a wide range of experience in Network Operations, Information Assurance and Cyber Defense Strategy, operations, and procedures to resolve unique organizational, geographic, or mission-related security issues not covered by national policies or directives. Work includes a range of concepts, principles, and practices in service, joint and interagency doctrine, and skill in applying this knowledge to plan and carry out difficult and complex work assignments; comprehensive and detailed understanding of cyberspace network operations, and skill in applying this knowledge to the development of new methods, approaches, or procedures while performing multiple functions. Supervisory and/or Managerial Responsibilities 30% Supervises a group of employees performing work at the GG-14 or equivalent level. Provides administrative/technical supervision necessary for accomplishing the work of the unit. Performs other duties as assigned.

To apply for this job please visit

You can apply to this job and others using your online resume. Click the link below to submit your online resume and email your application to this employer.

Share on