Top of Form

Bottom of Form

/ NATIONAL GUARD POSITION DESCRIPTION
PD#: NGD175P0000
/ Sequence#: VARIES
/ Replaces PD#:

IT SPEC (INFOSEC)

GS-2210-11
POSITION LOCATION:
Servicing CPAC: NATIONAL GUARD BUREAU / Agency: VARIES
Installation:VARIES / Army Command: VARIES
Region: NATIONAL GUARD / Command Code: VARIES
POSITION CLASSIFICATION STANDARDS USED IN CLASSIFYING/GRADING POSITION:
Citation 1: OPM JFS FOR ADMIN WORK IN INFOR TECH GRP, GS-2200, MAY 2011
Citation 2: JFS ADMIN WORK IN INFOR TEC GRP, GS-2210, DTD MAY 2011
Supervisory Certification: I certify that this is an accurate statement of the major duties and responsibilities of this position and its organizational relationships, and that the position is necessary to carry out Government functions for which I am responsible. This certification is made with the knowledge that this information is to be used for statutory purposes relating to appointment and payment of public funds, and that false or misleading statements may constitute violations of such statutes or their implementing regulations.
Supervisor Name: / Reviewed Date:
Classification Review: This position has been classified/graded as required by Title 5, U.S. Code in conformance with standard published by the U.S. Office of Personnel Management or if no published standards apply directly, consistently with the most applicable published standards.
Reviewed By: ROGER M PARRISH, NG-J1-TNCYVONNE M. HOWARD, CLASSIFICATION / Reviewed Date: 06/15/200605/24/2016
POSITION INFORMATION:
Cyber Workforce:
  • Cert Type/Level Required 1: VARIES
  • Cert Type/Level Required 2: VARIES
  • Cert Type/Level Required 3: VARIES

FLSA: EXEMPT
FLSA Worksheet: EXEMPT
FLSA Appeal: NO
Bus Code: VARIES
DCIPS PD: NO
  • Mission Category:
  • Work Category:
  • Work Level:

Acquisition Position: NO
  • CAP:
  • Career Category:
  • Career Level:

Functional Code:
Interdisciplinary: NO
Supervisor Status: VARIES
PD Status: VERIFIED
DCA Override: NO
/ CONDITION OF EMPLOYMENT:
Drug Test Required: VARIES
Financial Management Certification: VARIES
Position Designation: VARIES
Position Sensitivity: VARIES
Security Access: VARIES
Emergency Essential:
Requires Access to Firearms: VARIES
Personnel Reliability Position: VARIES
Information Assurance: N
Influenza Vaccination:
Financial Disclosure: NO
Enterprise Position: VARIES
/ POSITION ASSIGNMENT:
Competitive Area: VARIES
Competitive Level: VARIES
Career Program: VARIES
Career Ladder PD: NO
Target Grade/FPL:
Career Pos 1:
Career Pos 2:
Career Pos 3:
Career Pos 4:
Career Pos 5:
Career Pos 6:
POSITION DUTIES:
PD released as part of CRA 06-1032 - Information Operations (IO) Squadron
Full position title: IT Specialist (INFOSEC/NETWORK)
Organizational Title: CNO Team Technician
a. INTRODUCTION:
This position is located in an Information Cyberspace Operations (IO) Squadron. The purpose of this position is to serve as Computer Network Operations (CNO) Team Technician, ensuring the confidentiality, integrity, and availability of information systems, networks and data through the enhancement of Department of Defense (DoD) information systems security programs, policies, procedures and tools. Enhancement of information systems security programs, procedures, and tools are specifically accomplished by conducting vulnerability assessments and Opposing Force (OPFOR) tasking of planned and installed information systems and ensuring all protection needs are met.
b. DUTIES AND RESPONSIBILITIES:
(1) Performs information operations that protect and defend (or assess the capability to protect and defend) information and information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation. This includes providing for restoration of information systems by incorporating protection, detection, and reaction capabilities. Conducts risk and vulnerability assessments of DoD information systems to identify associated vulnerabilities, risks and protection needs. Performs vulnerability assessments, OPFOR, and other operational tasking. Operates fixed and deployed communications-computer systems. Performs activities such as configuring and monitoring hardware and software for systems operation, processing and control of data flow, and client-server multi-user system support, including network management or administration. Performs microcomputer fault isolation and restoration actions.
(2) Evaluates and assesses vulnerabilities of customer network and application server hardware, operating system software, and peripheral network equipment such as routers, bridges, switches, attached cabling system, network interface cards, modems, multiplexers, and concentrators. Conducts evaluations to ensure compliance with applicable standards. Ensures system backups are performed to ensure expedient restoration of the database for the respective network equipment. Evaluate effectiveness of customer network firewalls.
(3) Analyzes equipment and software reliability and suitability for vulnerability assessment utilization. Conducts analyses of network usage, hardware and software capabilities, ineffective practices or procedures, equipment shortcomings, and other relevant factors. Recommends methods and procedures and coordinates corrective action to optimize utilization of present equipment. Uses benchmarks, performance measurement, and evaluation data, in conjunction with vulnerability assessment techniques. Develops recommendations or proposals involving a variety of specialized systems and to improve operational efficiency.
(4) Assists with oversight and maintenance of the squadron’s digital training range(s), a suite of servers, routers, switches, hubs and other devices which can be configured with a variety of different operating systems in various versions, and with pre-programmed vulnerabilities, to be used in Computer Network Operations (CNO) training.
(5) Consults with subordinates, supervisors, specialists, vendors, and sister IO squadrons to procure and maintain training range devices that realistically emulate Air Force networks and are flexibly re-configurable to emulate the network(s) of a specific Air Force base as needed to prepare for vulnerability assessment missions.
(6) Performs analysis and design of automated and manual systems related to the network. Provides data for intrusion detection analysis. Determines applicability of established methods. Provides technical advice to users. Examines and evaluates alternative means of satisfying user requirements. Suggests technically feasible approaches and makes recommendations regarding the most effective countermeasures.
(7) Performs other duties as assigned.
c. FACTOR DISCUSSION:
Factor 1 - Knowledge Required by the Position:
--Thorough knowledge of the mission, objectives, terminology, and management practices in the activity, the agency, and the department to recognize probable areas of interaction.
--Thorough knowledge of network systems design, development, testing, installation, operating, management, and maintenance concepts and methods to provide and protect network services.
--Extensive knowledge of information technology methods, and information protection techniques, and procedures. This includes government and Commercial Off The Shelf (COTS) technology using industry standards and an ability to understand the capabilities and limitations of software, utility programs, network management systems and programming.
--Knowledge of hardware, software and operating systems, systems configuration and integration; maintenance, upgrades, and modifications.
--Extensive knowledge and skill in applying applicable policies, standards, directives, and operations manuals to perform systems analysis, evaluate approaches, offer advice, define alternative approaches, and coordinate requirements regarding the merits of proposed applications.
--Extensive knowledge of hardware, software, network operations functions, firewalls, packet switching communications protocols, and diagnostic tools to analyze difficult and complex system problems and provide resolutions.
--Knowledge of systems analysis, configuration management, and computer equipment requirements related to networks to assess vulnerabilities. Skill in evaluating innovative approaches in formulation of programs or systems specifications.
Factor 2 - Supervisory Controls:
The supervisor provides general guidance and objectives, as to scope and priorities of projects in the assigned area. The incumbent serves as a specialist regarding information protection operations. Plans, organizes, and carries out assignments, coordinates work with others, determines the approach and methodology to be used, and keeps the supervisor apprised of potential problems. Advises the supervisor regarding approaches having potential policy impact. Completed work is reviewed from an overall standpoint in terms of feasibility, compatibility with other work, or effectiveness in meeting requirements or achieving expected results. Channels required information to higher headquarters.
Factor 3 – Guidelines:
Guidelines primarily consist of a wide variety of commercial, Federal, DoD, and agency regulations, policies, standards, and objectives of a general nature. Utilizes initiative and judgment in adapting and designing approaches to the assigned projects within existing and future architecture. Judgment is required to select, interpret, and modify established approaches by testing and evaluating.
Factor 4 – Complexity:
Work involves familiarity with numerous computer operating systems, firewalls, intrusion detection software, and information protection techniques. Work involves independent accomplishment of an integration of a various dissimilar computer and automated processes and methodologies in the automation of overall work processes for the customer. Defines the problem, determines appropriate process avenues from many different options, designs a solution, and tests the system. Uses a variety of techniques and methods to evaluate alternatives. Assessment of situations is complicated by conflicting requirements requiring analysis to determine the applicability of established methods. Technical approaches must often be tested and projections made. Analyzes tools used to gain unauthorized access to information networks. Gives consideration to probable areas of future change in systems design, equipment layout, and other factors affecting decisions. Considers, evaluates, and coordinates with other functions and/or organization to accomplish tasks, due to the complexity of the network and number of interacting systems, general guidelines, changes, modifications, or integration affecting numerous facets of neighboring systems
Factor 5 - Scope and Effect:
Work involves formulating recommendations, analyzing a variety of unusual problems, questions, or conditions associated with networks and related systems. Work affects a wide range of DoD customers using information network systems.
Factor 6 - Personal Contacts &
Factor 7 – Purpose of Contacts
Personal contacts include other analysts and system administrators, and functional area users in other organizations within the activity organization and in other organizations within ANG or other DoD organizations. Contacts often take place with computer personnel of other agencies, representatives of professional associations, equipment or system software vendors, and contractors. Contacts are often in unstructured settings.
The purpose of contacts is to gather information, educate, influence, motivate and guide users on work efforts to resolve their problems and make presentations to supported users and other ADP personnel to persuade them to use certain specific technical methods and procedures in order to insure compliance with applicable policies and regulations. Negotiation and persuasion skills are required to overcome resistance to recommendations.
Factor 8 - Physical Demands:
The work requires some physical exertion and recurring activities such as bending, crouching, stooping, stretching, reaching, and lifting of moderately heavy objects such as boxes of project files, computer hardware, and equipment.
Factor 9 - Work Environment:
The work is performed in a typical office setting. Special safety precautions are not required.
d. OTHER SIGNIFICANT FACTS:
Must meet and maintain applicable training standards and certifications determined by the unit to be essential to the position.
Fair Labor Standards Act (FLSA) Determination = (EXEMPT)

1. Availability Pay Exemption - (e.g., Criminal Investigators, U.S. Customs and Border Protection pilots who are also Law Enforcement Officers).

2. Foreign Exemption - (Note: Puerto Rico and certain other locations do not qualify for this exemption – See 5 CFR 551.104 for a list of Nonexempt areas.)

3. Executive Exemption:

a. Exercises appropriate management responsibility (primary duty) over a recognized organizational unit with a continuing function, AND

b. Customarily and regularly directs 2 or more employees, AND

c. Has the authority to make or recommend hiring, firing, or other status-change decisions, when such recommendations have particular weight.
Note: Shared supervision or “matrix management” responsibility for a project team does not meet the above criteria. Limited “assistant manager” functions or “acting in the absence” of the manager does not meet the above criteria.

4. Professional Exemption:

a. Professional work (primary duty)

b. Learned Professional, (See 5 CFR, 551.208 ) (Registered Nurses, Dental Hygienists, Physician’s Assistants, Medical Technologists, Teachers, Attorneys, Physicians, Dentists, Podiatrists, Optometrists, Engineers, Architects, and Accountants at the independent level as just some of the typical examples of exempt professionals). Or

c. Creative Professional, (See 5 CFR, 551.209 ) (The primary duty requires invention and originality in a recognized artistic field (music, writing, etc.) and does not typically include newspapers or other media or work subject to control by the organization are just some examples of Creative Professionals). Or

d. Computer Employee, (See 5 CFR, 551.210 ) ( must meet salary test and perform such duties as system analysis, program/system design, or program/system testing, documentation, and modification). Computer manufacture or repair is excluded (non-exempt work).

5. Administrative Exemption:

a. Primary duty consistent with 5 CFR 551 (e.g.; non-manual work directly related to the management or general business operations of the employer or its customers), AND job duties require exercise of discretion & independent judgment.
FLSA Conclusion:
Exempt
Non Exempt
FLSA Comments/Explanations:
Computer Employee
CONDITIONS OF EMPLOYMENT & NOTES:
POSITION EVALUATION:
A. Title, Series and Grade: Information Technology Specialist IT Specialist (INFOSEC/NETWORK), GS-2210-11
B. References: USOPM Job Family PCS for Administrative Work in the Information Technology Group, GS-2200, GS-2210 Series, May 2001.
C. Background: This description was developed for use in an Information Warfare Aggressor Squadron (IWAS). The new description is being established as an Information Operations (IO) national position description.
D. Pay Plan, Series, Title, and Grade Determination:
1. Pay Plan: The paramount requirement of the position determines the pay plan. A position falls under the General Schedule (GS) pay plan when the primary duties and responsibilities of the position are identified as requiring knowledge or experience that is administrative, clerical, scientific, artistic, or technical in nature. The primary duties of this position require knowledge in the area of information technology. Such knowledge is associated with administrative and technical responsibilities and therefore meets the requirements of the GS pay plan.
2. Series: The duties and responsibilities of the position match the series definition in the GS-2210 series. This series includes positions involved in the development, delivery, management, and support of information technology systems and services. This includes managing, analyzing, and maintaining security of data and computer systems.
3. Title: Information Technology Specialist is the title for all non-supervisory positions in this series. DoD Titling Instructions for GS-2210 positions requires the usage of the basic title of IT Specialist for all non-supervisory positions in the GS-2210 occupation. DoD Titling Instructions also require the use of the appropriate specialty area parenthetical. A parenthetical title of “INFOSEC” is added to denote specialization in work that involves ensuring confidentiality, integrity, and availability of systems, networks, and data through the planning, analysis, development, implementation, maintenance and enhancement of information systems security programs, policies, procedures and tools. In addition, since the position is testing the vulnerability of computer networks, the parenthetical title of “NETWORK” is also added to the title. The appropriate title for this position is IT Specialist (INFOSEC/NETWORK).
4. Grade: GS-11. See attached Factor Evaluation System (FES) Position Evaluation Statement.
E. Conclusion: Information Technology Specialist IT Specialist (INFOSEC/NETWORK), GS-2210-11.
CLASSIFIER: Roger M. Parrish, NGB-J1-TNC Date: 15 Jun 06
FACTOR EVALUATION SYSTEM
POSITION EVALUATION STATEMENT
FACTOR FL PTS REMARKS
1. Knowledge Required by the Position 1-7 1250 See Analysis Below
2. Supervisory Controls 2-4 450 “ “ “
3. Guidelines 3-3 275 “ “ “
4. Complexity 4-4 225 “ “ “
5. Scope and Effect 5-4 225 “ “ “
6. Personal Contacts &
7. Purpose of Contacts 3C 180 “ “ “
8. Physical Demands 8-1 5 “ “ “
9. Work Environment 9-1 5 “ “ “
TOTAL POINTS ASSIGNED: 2615 GRADE: GS-11
Factor 1 – Knowledge Required by the Position: FL 1-7 1250 points
Exceeds Level 1-6 wherein the position requires performance of routine and recurring assignments in the specialty area. Fully meets Level 1-7 involving carrying out difficult and complex assignments and providing advice and guidance on a wide range of IT issues. The subject position requires thorough knowledge of network systems design, development, testing and installation, thorough knowledge of mission objectives/practices, extensive knowledge of information protection techniques and procedures, knowledge of systems analysis, configuration management, and equipment requirements relating to networks to assess vulnerabilities.
Factor 2 – Supervisory Controls: FL 2-4 450 points
Fully meets FL 2-4 of the standard. According to the standard that level is appropriate when overall objectives and available resources are outlined by the supervisor and the employee and supervisor, in consultation, discuss possible timeframes, scope of assignment, and possible approaches. The most appropriate approach is determined by the employee and the employee frequently interprets regulations on his/her own. This meets Level 2-4 for Supervisory Controls under which the incumbent operates.
Factor 3 – Guidelines: FL 3-3 275 points
Guidelines utilized by the incumbent consist of a wide variety of commercial, Federal, DoD, agency regulations, policies, standards, and objectives that are general in nature. Initiative and judgment are required in adapting and or designing the best approaches and in selecting, interpreting, and modifying established approaches. This parallels Level 3-3 of the standard.
Factor 4 – Complexity: FL 4-4 225 points
This position involves working with numerous computer operating systems, firewalls, and intrusion detection software and information protection techniques. It involves independent accomplishment of an integration of various dissimilar computer and automated processes and methodologies and requires designing solutions and methods to test the systems. There is extensive analysis involved in performing the duties. The position requires working on a number of interacting systems to evaluate the vulnerability. This fully meets the intent of Level 4-4 wherein duties involve a variety or work involving many different and unrelated processes wherein the employee decides what needs to be done by evaluating unusual circumstances, and utilizes different approaches in dealing with incomplete and conflicting data.
Factor 5 – Scope and Effect: FL 5-4 225 points
Meets Level 5-4. The standards identifies work at this level as involving establishing criteria, formulating projects, assessing program effectiveness, and investigating/analyzing a variety of unusual conditions, problems, or issues. Also, the work affects a wide range of agency activities or the activities of other organizations.