close
test_template

An Overview of It Job Description in Homeland Security Department

download print

About this sample

About this sample

close

Words: 1266 |

Pages: 3|

7 min read

Published: Dec 12, 2018

Words: 1266|Pages: 3|7 min read

Published: Dec 12, 2018

Table of contents

  1. Abstract
  2. Location in the Department of Homeland Security
  3. Relation to the Criminal Justice System
  4. Job Details, Duties, Qualification Requirements and Selection Process
  5. Job Details and Duties
    Qualification Requirements
  6. Selection Process
  7. Conclusion

Abstract

This paper is an outline of the Information Technology Specialist job title within the Department of Homeland Security. It covers the description of the job and the duties to be fulfilled, the educational and experience requirements that are needed, as well as the selection process for the job. It also covers why I would be interested in this job position, and how it relates to the criminal justice system.

'Why Violent Video Games Shouldn't Be Banned'?

A career in the criminal justice system that seemed interesting to me is that of an Information Technology Specialist working for the Department of Homeland Security. Currently, I have an Associate’s degree in Information Security, and I am working on my Bachelor’s degree in Computer & Network Security. A career dealing with cybercrimes would be an ideal fit once I graduate. However, before making a decision, it is important to research the job itself, the scope of the duties, the requirements, and the selection process before applying.

Location in the Department of Homeland Security

It is important to know the place of the Information Technology Specialist before going into the details of the job title itself. According to the USAJOBS (2015) posting, the position is with the United States Computer Emergency Readiness Team, or US-CERT. The job posting continues to list each department that US-CERT is a part of, starting with the National Cybersecurity and Communications Integration Center (NCCIC), then the Office of Cybersecurity & Communications, the National Protection & Programs Directorate, finally leading up to the Department of Homeland Security. According to the National Cybersecurity and Communications Integration Center (2015), “US-CERT develops timely and actionable information for distribution to federal departments and agencies, state and local governments, private sector organizations, and international partners.” (para. 8). Citing the same source, the National Cybersecurity Protection System (NCPS) is also operated by US-CERT, and provides the capabilities of intrusion prevention and detection to certain federal agencies (para. 8).

Relation to the Criminal Justice System

From this information in the previous section alone, it could be inferred that the role of an Information Technology Specialist has a large impact on the criminal justice system in regards to cybercrime. This is mainly because the US-CERT team is supplying multiple levels of governments with information regarding the matter. There is additional evidence that the US-CERT team has an even larger role than jest serving information. According to Bartley (2015), Andy Ozment was the assistant secretary of the Office of Cybersecurity and Communications, and testified that US-CERT was involved with the investigation of the Office of Personnel Management hack. Being a part of a legal investigation relating cybercrime, an Information Technology Specialist with US-CERT is no doubt a career heavily related to the criminal justice system.

Job Details, Duties, Qualification Requirements and Selection Process

Job Details and Duties

As described earlier in this paper, the Information Technology Specialist is a member of the US-CERT team, which deals with cyberattacks and cybercrime. Going further into the details of the job itself, USAJOBS (2015) describes the specific positions’ primary purpose as “… [applying] digital forensic and malware analysis to assess, contain, and eradicate malicious software.” (para. 2). In addition, assistance with matters regarding digital evidence will be provided to other staff (“USAJOBS”, 2015). Therefore, the role of the specific job posting I am looking at is focused on malware and forensics. According to Shanks (2014), “Incident response practices can be enhanced through forensics, memory image analysis and malware sandboxing techniques.” (p. 25). Recalling that the US-CERT team provides government agencies with information regarding cyberattacks, the role of this position enhances the practice of incident response provided by the team. Lastly, the USAJOBS posting also states that occasional travel up to 6-10 nights per month is required. Given that this position is heavily centered in malware assessment and forensics, it is safe to say that the purpose of the travel is more than likely to acquire forensic images after a cyberattack for later analysis.

Qualification Requirements

For the purpose of this paper, I will only cover the requirements for the lowest level for this job. USAJOBS (2015) lists three different levels of employment available, from GS-11 to GS-13. The Office of Personnel Management states that “The General Schedule has 15 grades--GS-1 (lowest) to GS-15 (highest)”, and that “Agencies establish (classify) the grade of each job based on the level of difficulty, responsibility, and qualifications required.” Given that I do not have much experience currently, I am only defining the qualifications for a GS-11 Information Technology Specialist.

The first qualification that will be discussed is the previous experience needed. The job posting states that to qualify for the position, a candidate must have at least one year IT-related experience in a GS-09 level position, or comparable experience in the public or private sector (“USAJOBS”, 2015). USAJOBS also requires that previous experience must demonstrate 4 basic competencies: Attention to Detail, Customer Service, Oral Communication and Problem Solving. In addition to these competencies USAJOBS (2015) states:

…experience must include activities such as: 1) assisting in gathering and assessing information related to IT system security; 2) performing forensic analysis of media acquisitions for the purpose of identifying malicious activities and documenting analytical findings derived from those activities; 3) implementing and supporting applicable forensic applications and tools; and 4) documenting information security incidents and escalating events, as necessary. (para. 8)

Although the requirements for previous experience seem very advanced, I believe they are doable with hard work and commitment.

The second potential qualification is education. According to USAJOBS (2015), a completed Ph.D. or Doctoral degree can be used in place of the 1 year of GS-09 work experience. This lines up with another article that also states a GS-11 position education level is that of a Ph.D. or Doctorate (Crosby, n.d). The USAJOBS (2015) posting also states multiple other equivalent education substitutions as well, all which nearly equal the degree required anyways. This requirement may be harder to qualify for than the experience, and may not be worth the money invested in education. First, a doctorate program can take 5 years or more to complete, and can cost on average from $123,500-$181,500 total (“How Much Does a Doctorate Degree Cost?”, n.d.). Second, the GS-11 pay scale only ranges from $51,298 to $66,688 for an annual salary in 2015 (GS-11 Pay - 2015 Federal GS Payscale”, n.d.). This shows that this option to qualify probably does not make the most financial sense.

One last qualification that should be mentioned is the one regarding security clearance. According to USAJOBS (2015), a candidate must be able to obtain a Top Secret/SCI clearance to hold this position.

Selection Process

The selection process for this job seems to be like any other job a person would apply for. According to USAJOBS (2015), you must submit your resume, any transcripts, and complete a questionnaire. At that point, if qualified, the application may be passed to hiring officials. After that, the candidate may be offered an opportunity to interview. Overall, the selection process seems very basic.

Get a custom paper now from our expert writers.

Conclusion

I believe that working as an Information Technology Specialist with the US-CERT team under the Department of Homeland Security would be a very good fit for me, taking into account my program of study and current career path. Performing incident response to cyberattacks and cybercrime is a very important piece of the criminal justice system. Malware analysis and forensics relating to this specific position would enhance the incident response process when dealing with cyberattacks. While I may not currently meet the qualifications, I believe that I could eventually apply for this position after graduating and gaining more work experience.

Image of Dr. Oliver Johnson
This essay was reviewed by
Dr. Oliver Johnson

Cite this Essay

An overview of IT job description in homeland security department. (2018, December 11). GradesFixer. Retrieved March 28, 2024, from https://gradesfixer.com/free-essay-examples/an-overview-of-it-job-description-in-homeland-security-department/
“An overview of IT job description in homeland security department.” GradesFixer, 11 Dec. 2018, gradesfixer.com/free-essay-examples/an-overview-of-it-job-description-in-homeland-security-department/
An overview of IT job description in homeland security department. [online]. Available at: <https://gradesfixer.com/free-essay-examples/an-overview-of-it-job-description-in-homeland-security-department/> [Accessed 28 Mar. 2024].
An overview of IT job description in homeland security department [Internet]. GradesFixer. 2018 Dec 11 [cited 2024 Mar 28]. Available from: https://gradesfixer.com/free-essay-examples/an-overview-of-it-job-description-in-homeland-security-department/
copy
Keep in mind: This sample was shared by another student.
  • 450+ experts on 30 subjects ready to help
  • Custom essay delivered in as few as 3 hours
Write my essay

Still can’t find what you need?

Browse our vast selection of original essay samples, each expertly formatted and styled

close

Where do you want us to send this sample?

    By clicking “Continue”, you agree to our terms of service and privacy policy.

    close

    Be careful. This essay is not unique

    This essay was donated by a student and is likely to have been used and submitted before

    Download this Sample

    Free samples may contain mistakes and not unique parts

    close

    Sorry, we could not paraphrase this essay. Our professional writers can rewrite it and get you a unique paper.

    close

    Thanks!

    Please check your inbox.

    We can write you a custom essay that will follow your exact instructions and meet the deadlines. Let's fix your grades together!

    clock-banner-side

    Get Your
    Personalized Essay in 3 Hours or Less!

    exit-popup-close
    We can help you get a better grade and deliver your task on time!
    • Instructions Followed To The Letter
    • Deadlines Met At Every Stage
    • Unique And Plagiarism Free
    Order your paper now