More jobs:
IT Specialist; APPSW
Job in
Cleveland, Cuyahoga County, Ohio, 44101, USA
Listed on 2026-01-02
Listing for:
DLA Careers
Full Time
position Listed on 2026-01-02
Job specializations:
-
IT/Tech
Cybersecurity, IT Support
Job Description & How to Apply Below
Join to apply for the IT Specialist (APPSW) role at DLA Careers
Summary:
See below for important information regarding this job.
Position will be filled at any of the locations listed below. Site specific salary information as follows:
- Battle Creek, MI: $88,621 - $115,213
- Columbus, OH: $92,475 - $120,222
- Dayton, OH: $91,922- $119,504
- Fort Belvoir, VA: $101,401- $131,826
- New Cumberland, PA: $101,401- $131,826
- Ogden, UT: $88,621 - $115,213
- Philadelphia, PA: $97,653- $126,955
- Richmond, VA: $92,573- $120,350
- Incumbent works in the Defense Logistics Agency (DLA), Information Operations (J6), Program Executive Office (J62), Platform Technical and Application Support (J62XF
), Application and Compliance Technical Support (J62XF
B). - Cybersecurity Compliance and FISMA Support:
Assist with FISMA docs and implement cybersecurity best practices to maintain a strong enterprise-level IA posture across all environments (TandD, Prod, COOP). Adhere to current information security practices. - Vulnerability Management and Remediation:
Conduct vulnerability assessments using tools (ACAS, Web Inspect, STIGs) and lead remediation for OS, DB, and apps. Manage POAMs and create vulnerability reports for Government repository. - Risk Management and RMF Expertise:
Apply RMF knowledge to assess IA controls, identify risks, and develop mitigation strategies. Conduct RMF Authorization Reviews of DLA ERP Applications. - Technical Guidance and
Collaboration:
Provide guidance on data integrity, emerging technologies, and security best practices. Support internal and external audits, including CAP planning and execution. Experience in Agile Methodologies. - Coordination and Documentation:
Coordinate PPSM, CLSA, and Firewall requests, maintain documentation, and support build account creation for emerging technologies. Assist in coordinating, analyzing, planning, and remediating CORA findings.
- Must be a U.S. citizen
- Tour of Duty:
Set Schedule - Security Requirements:
Non-Critical Sensitive - Appointment is subject to the completion of a favorable suitability or fitness determination; unfavorably adjudicated background checks will be grounds for removal.
- Fair Labor Standards Act (FLSA):
Exempt - Selective Service Requirement:
Males born after 12-31-59 must be registered or exempt from Selective Service. - Recruitment
Incentives:
Not Authorized - Bargaining Unit Status:
Yes - Pre-Employment Physical:
Not Required - Selectees are required to have a REAL other acceptable identification documents to access certain federal facilities. See https://(Use the "Apply for this Job" box below). more information.
- This position and any future selections from this announcement may be used to fill various shifts located anywhere within DLA Information Operations, J6.
- Defense Acquisition Workforce position. Must complete DoD certification and other requirements. See Addtl Info.
- Specialized
Experience:
One year of specialized experience that equipped you with the particular competencies to successfully perform the duties of the position. To qualify at the GS-12 level, one year of specialized experience equivalent to the GS-11 level or equivalent under other pay systems in the Federal service, military or private sector. Applicants must meet eligibility requirements and time-in-grade, time-after-competitive appointment, minimum qualifications, and other regulatory requirements by the cut-off/closing date of the announcement.
Creditable specialized experience includes: - Performs design, development and maintenance of training materials for knowledge transfer and training of team members.
- Develops project plans, implementation guidance, and assesses implementation of information assurance vulnerability alerts and CERT taskings.
- Interprets and clarifies policies, procedures, performance standards and monitoring techniques related to audit readiness, vulnerability management, and information security.
- Participates in all phases of the system development life cycle, including design, development, support and maintenance of the assigned system.
- Executes software administration best practices to ensure confidentiality, availability and integrity, security.
Education:
Substitution…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
Search for further Jobs Here:
×