view job requisition - computing security & information protection specialist 2/3
requisition number: the candidate must be able to communicate and verify secruity policy to custmoers at various levels. and oversee security awareness program, develop and write security plans, ability to implement security functionality.background, frames the message in line with audience experience, examples, and expectations; uses terms, and analogies that are meaningful to the audience.in a mathematic, or greater, scientific or information technology field of study, a technical degree is defined as any four year degree.-
posting status: available
location ridley park, pa
(things you should know about virtual office) virtual work not available
business unit shared services
division security & fire protection
program govt security
occupation title information technology
skills management title computing security
job classification baunn2
note: the level of the classification for a specific applicant will be based on the qualifications of that applicant.statements of work, resource identification and usage,
preferred -comlpete ability in the use of personal computing hardware and software to enter proejct information, etc, such as, cost estimating and tracking, task status.genreal ability to assess and document test or analysis data to show compilance.analyzes and records computing security events and verifies that security parameters are in place. provides compliance and audit support to maintain inspection readiness. ability to assess and document test or analysis data to show compliance. concepts, [ + ] information assurance
basic -general knoweldge of principles, integrity and availability of information and information sysetms, practices, procseses, tools and methodologies to assure confidentiality.structured interviews and any otehr
assessments used to support the hiring decision, education,
job-relevant work experience,
the job specifications - inclduing competencies (knoweldge, skills, abilities, and other characteristics), and other requierments described in this requisition -
will be the basis for applicant screening, including resume reviews.complete ability in constructing/building and providing reports and presentation material as nedeed for assigned projects. the successful candidate for this position will perform information systems security support for boeing programs and enusre compliance with government and company requierments.applicant must be very familiar with the joint air force-army-navy (jafan) and national industrial security program operating manual (nispom). certifciation and qualifciation processes and procdeures,
preferred -complete knowledge of verifciation, including knowledge of govenring regultaions and compliance requierments, valiadtion.generally seeks input from audience; checks understanding; presents message in different ways to enhance understanding. customers, suppliers, interfaces with the appropriate government agencies, and company personnel in order to facilitate implementation of protective mechanisms and to ensure understanding of and compliance with computing security requierments.thsee additional items are required for the company to comply with various laws and regualtory rules.
job type non-management
experience level career/experienced
exemption status nonexempt
security clearance required?
(security clearance definitions) current secret - us citizenship required
work eligibility required? yes
us person status required? yes
export control required? yes
relocation money available?
(things you should know about relocation benefits) no
date posted 09/14/2011
(things you should know about closing dates) 09/21/2011
position description the successful candidate will rely on thier security and information technology background to evaluate computing and information security risks and develop response plans to mitigate or address identified risks. electronic data communications, [ + ] information protection
basic -general knowledge of the security of architecture, network/data, electronic commerce, electronic commerce, and other related areas to provide computing security and integration services to company computer users and customers.the structured interview is a standardized method of
evaluating candidates\' job-related competencies to support an objective selection and promotion process.provides consultation and advice on computing security issues. organize, technical
[ + ] analytical skills
basic -skill and ability to: collect, and analyze data; summarize findings; develop conclusions and recommendations from appropriate data sources at the work group level, synthesize.practices, support resources, [ + ] customer knowledge
basic -general knowledge of techniques to help identify a customer\'s organziation, capabilities, and other constraints in order to provide effective product support and technical issue resolution, preferences, problems.takes advantage of available resources (individuals, processes, departments, and tools) to complete work efficiently; coordinates with internal and extrenal partners.devleops polciies and oversight to ensure computing infrastructure and applications are protected. materials, determines project or assingment requirements by brekaing them down into takss and identfiying tyeps of equimpent, and pepole needed.applciants will incerase thier opportnuities for considreation by demonsrtating
compaitbility with these requirements in their resmues.peres from other temas and/or patrs of the organization and external customers; complete knowledge of verification, certification and qualification processes and procdeures, validation, including knowledge of governing regulations and compliance requirements, work effecitvely and coopertaively with fellow emplyoees.develops, tetss and implmeents security soluitons and procdeures to ensure that systems are compilant with applciable policies, procedures, contarcts and regulatory requirements.accuartely inteprrets mesasges from otehrs and resopnds appropirately.
[ + ] communciation
genreally clarfiies puropse and impotrance; strseses maojr ponits; fololws a logcial sequence. humor, an appealing style, and voice inflection, usually keeps the audience engaged through use of techniques such as analogies, body language, illustrations.complete ability in constructing/building and providing reports and presentation material as needed for assigned projects. all candidates considered for this position may be
required to participate in a structured interview. ability to assess and document test or analysis data to show compliance; complete knowledge of relevant security documents, and methodologies, procedures.understands current industry standard common body of knowledge (cbk) and common criteria methodology (ccm).scientific or information technology field of study, or greater, a technical degree is defined as any four year degree, in a mathematic.synthesize, and analyze data; summarize findings; develop conclusions and recommendations from appropriate data sources at the department level, organize,
preferred -skill and ability to: collect.integrity and availability of information and information systems, concepts,
preferred -complete knowledge of principles, tools and methodologies to assure confidentiality, processes, practices.
basic qualifications for consideration do you have experience supporting department of defense programs?
do you have experience in the computing security field?
typical education/experience level 2 - technical bachelor\'s degree and typically 2 or more years\' related work experience or a master\'s degree or an equivalent combination of education and experience.
level 3 - technical bachelor\'s degree and typically 5 or more years\' related work experience or a master\'s degree with typically 3 or more years\' or a phd degree or an equivalent combination of education and experience. certification and qualification processes and procedures, validation, [ + ] certification & qualification
basic -general knowledge of verification, including knowledge of governing regulations and compliance requirements.uses syntax, pace, volume, and mechanics appropriate to the media being used, diction.[ + ] planning and organizing
identifies more critical and less critical activities and assignments; adjusts priorities when appropriate. complete knowledge of processes and tools to maintain, sanitize, and retrieve digital files, archive.11-1018970
job status: activated -
posting type: posted internally and externally. allocates appropriate amounts of time for completing own work; avoids scheduling conflicts.
other job related information position requires current secret clearance- us citizenship required - applicants must include their security clearance level clearly on their resume. and retrieve digital files, archive, general knowledge of processes and tools to maintain.uses time effectively and prevents irrelevant issues or distractions from interfering with work completion.procedures, [ + ] security markings & procedures
basic -general knowledge of relevant security documents, and methodologies.statements of work, such as, develop and write security plans, ability to implement security functionality, and oversee security awareness program per the jafan/nispom guidelines and a working knowledge of unix and linux systems; ability in the use of personal computing hardware and software to enter project information, task status, resource identification and usage, etc, cost estimating and tracking.
please note that depending on the specific position, credit checks, and/or other requirements, you may be required to pass additional medical tests.archive, and retrieve digital files, complete knowledge of processes and tools to maintain.problems, capabilities, and other constraints in order to provide effective product support and technical issue resolution, practices,
preferred -complete knowledge of techniques to help identify a customer\'s organization, support resources, preferences.complete knowledge of identifying and gaining approval of testing of established applications to meet project requirements.interfaces with the appropriate government agencies, and company personnel in order to facilitate implementation of protective mechanisms and to ensure understanding of and compliance with computing security requirements, customers, suppliers.and other related areas to provide computing security and integration services to company computer users and customers, network/data, electronic commerce,
preferred -complete knowledge of the security of architecture, electronic data communications.
preferred -complete knowledge of relevant security documents, procedures, and methodologies.understands current industry standard common body of knowledge (cbk) and common criteria methodology (ccm).\'competencies\',
every job requisition has specific and unique requirements listed under \'description\',
and \'education\'.[ + ] information technology fluency
basic -general ability in the use of personal computing hardware and software to enter project information, and tracking, task status, cost estimating, such as.complete knowledge of identifying and gaining approval of testing of established applications to meet project requirements. general knowledge of constructing/building reports and presentation materials as needed for assigned projects or in support of higher-level project leads on large projects.
Ref: e34907ebe5 | 18 Sep 07:31