Created at: October 18, 2025 00:16
Company: Defense Logistics Agency
Location: Philadelphia, PA, 19019
Job Description:
See below for important information regarding this job. Position will be filled at any of the locations listed below. Site specific salary information as follows: Battle Creek, MI: $88,621 - $115,213 Columbus, OH: $92,475 - $120,222 Dayton, OH: $91,922- $119,504 Fort Belvoir, VA: $101,401- $131,826 New Cumberland, PA: $101,401- $131,826 Ogden, UT: $88,621 - $115,213 Philadelphia, PA: $97,653- $126,955 Richmond, VA: $92,573- $120,350
To qualify for an IT Specialist (INFOSEC) your resume and supporting documentation must support: A. Specialized Experience: One year of specialized experience that equipped you with the particular competencies to successfully perform the duties of the position, and is directly in or related to this position. To qualify at the GS-12 level, applicants must possess one year of specialized experience equivalent to the GS-11 level or equivalent under other pay systems in the Federal service, military or private sector. Applicants must meet eligibility requirements including time-in-grade (General Schedule (GS) positions only), time-after-competitive appointment, minimum qualifications, and any other regulatory requirements by the cut-off/closing date of the announcement. Creditable specialized experience includes: Coordinates the implementation of security programs across IT platforms. Applies IT concepts, principals, methods, and practices sufficient to advise on and devise solutions on a broad range of IT issues. Applies IT architecture principals, standards, trends in technology, industry best practices, and design and functioning of information systems having impact on multiple agency programs. Experience refers to paid and unpaid experience, including volunteer work done through National Service programs (e.g., Peace Corps, AmeriCorps) and other organizations (e.g., professional, philanthropic, religious, spiritual, community, student, social). Volunteer work helps build critical competencies, knowledge, and skills and can provide valuable training and experience that translates directly to paid employment. You will receive credit for all qualifying experience, including volunteer experience.
Ensures that the highly varied telecommunications/network hardware and software components, with diverse capabilities and limitations, operate in a secure environment while supporting DLA business processes.
Make technical judgements of the system's compliance in both technical and non-technical security features, system features and other safeguards.
Conduct risk assessments and advise the applicable stakeholders on potential impact of threats and vulnerabilities to the system.
Manages the Enterprise continuous monitoring vulnerability management program inclusive of vendor vulnerabilities and Security Technical Implementation Guidelines (STIGS).
Performs vulnerability management scanning and compliance validation.
Plans, develops, and implements procedures for reporting and investigating violations and non-compliance breakdowns in IT security safeguards.