TITLE 5 IT SPECIALIST (CUSTSPT) GS-2210-11

Created at: December 17, 2025 00:28

Company: Air National Guard Units

Location: Martinsburg, WV, 25401

Job Description:

TYPE OF APPOINTMENT: NATIONAL GUARD TITLE 5 EXCEPTED SERVICE POSITION WEST VIRGINIA AIR NATIONAL GUARD 167th AIR WING, MARTINSBURG, WV SELECTING SUPERVISOR & DUTY LOCATION: Christopher Thomas, 167th AW, Martinsburg, WV This is not a bargaining position. Please read the entire announcement, as important/legal guidance is throughout. To view the entire announcement, hit the print button. Please see Required Documents tab for important information.
YOU MUST FULLY SUBSTANTIATE IN YOUR OWN WORDS THAT YOU MEET THE REQUIREMENTS LISTED BELOW. WHEN EXPLAINING MINIMUM REQUIREMENTS AND SPECIALIZED EXPERIENCE YOU MUST GIVE EXAMPLES. DO NOT COPY FROM THE VACANCY ANNOUNCEMENT OR THE POSITION DESCRIPTION. EXPLAIN IT IN YOUR OWN WORDS AND GIVE EXAMPLES TO BE CONSIDERED FOR THIS VACANCY. GENERAL EXPERIENCE: All series personnel must be certified at the next higher level before being eligible for that level and must have a minimum of one year on-the-job experience in the grade immediately below the next higher level. An applicant must have a validated understanding of the basic principles and concepts of the occupational series and grade. SPECIALIZED EXPERIENCE: Must have at least 12 months of experiences as a Defense Personnel Cyberspace Operations CPT-ICS Team Member and performed cyberspace operations that protected and defended (or assessed the capability to protect and defend) information and information systems by ensuring their availability, authentication, confidentiality, integrity and non-repudiation. Experienced in mission assurance of information systems by incorporating protection, detection, and reaction capabilities. Competent in conducting risk and vulnerability assessments of DoD information systems to identify associated vulnerabilities, risks and protection needs. Experiences included working with in-garrison and deployed cyberspace weapon systems. Competent in configuring and monitoring hardware and software for systems operation, processing and control of data flow, and client-server multi-user system support, including network management or administration. Experiences must include two or more of the following business tasks: Evaluating and assessing vulnerabilities of customer network and application server hardware, operating systems, and peripheral network equipment, such as routers, bridges, switches, attached cabling system, network interface cards, modems, multiplexers, and concentrators. Experienced in searching and illuminating advanced persistent threats in DOD Cyber systems and protects priority DOD missions for a specified duration. Skilled in performing analysis and design of automated and manual systems related to the network. Identified and provided data for intrusion detection analysis. Experienced in replicating tactics, techniques, and procedures of specific cyber threats as appropriate to evaluate cyber defenses and prepare DOD defensive cyber operations; and assessed postures and processes from an outside perspective. Conducted cyber key terrain analysis and mission oriented mapping that identified cyber dependencies in mission owner network. Skilled in developing courses-of-action for risk mitigation and mission defense into written plans that integrated team capabilities. Experiences included work accomplished to prepare and coordinate operators, resources, facilities and equipment schedules, in coordination with unit and flight commanders, in order to ensure training, currency, and mission timelines and objectives were met. Experiences may include the assessment and evaluation of mission vulnerabilities and/or adversary activity in ICS enclaves. Experienced in detecting, characterizing, and resolving insecurities in ICS networks. Experienced in conducting reviews and analyzing ICS network traffic, configurations, and operating procedures and provided methods to improve system security posture. Experienced in the Air Force currency and additional national-level requirements to execute US Cyber Command's Defend-the-Nation priority. Skilled in presenting formal and informal briefing and written reports in regard to the Cyber program mission readiness. Competent in preparing Unit Training Assembly, Annual Training and currency training events for Mission Ready Cyberspace Operators to optimize training times. Knowledgeable on unit military members' go-or-no-go readiness status and skilled to recognize deficiencies. Experiences included providing opportunities for assigned members to maintain full mission readiness. Experienced in coordinating with the unit's maintenance section to ensure all assigned equipment is in good working condition and ready for each training and mission event. Competent in consulting with Wing supervisors, Drill Status Guardsmen, specialists, vendors, and sister Cyberspace Operations Units that resulted in procuring and maintaining the range devices and software that provided realistic mission networks training in order to prepare for Cyber Protection and Industrial Control System defense missions.
Position Description #: T5906P01 This position is located at an in the Air National Guard (ANG) wing, Mission Support Group, Base Communications Unit. Performs other duties as assigned. MAJOR DUTIES: 1. Manages the assigned IT/communications environment with privileged access at the network level for the Wing, Geographically Separated Units (GSU), and Tenants. Plans, coordinates, installs, and continuously analyzes system design, hardware and software. Develops, recommends, and installs solutions and upgrades to ensure availability, integrity, efficiency, and reliability of all components of the assigned system. 2. Provides customer technical assistance and support for all users. Provides ongoing technical support to customers to ensure proper functional use of equipment and programs and to preclude undue interruptions to IT and communications services. 3. Conducts feasibility studies to identify and analyze system failures and analyzes data to determine if trends exist which forecast the need for future replacement or modification of system hardware and software. 5. Assists in providing metrics, and Key Performance Indicators (KPIs) to leadership in an effort to analyze and identify trends with client machines / peripherals. 6. Performs analysis of supplied vulnerability reports in order to provide impact analysis, and patching schedules to client devices.


See details

Back to jobs