Senior Information Technology Specialist (Cybersecurity & Network Assessment)
K2 Group, Inc.
Check Your Fit
Have a quick 6-10 minute voice conversation to see how your skills match this role. Get personalized feedback — no resume needed.
About this role
*This is a contingent opportunityOverview
We are seeking a Senior IT Specialist to support Air Education & Training Command (AETC) A3/6 with advanced cybersecurity, network assessment, and technical training. This role focuses on evaluating and improving the security posture of Air Force network environments—local, enterprise, and cloud—using DISA STIGs, DoD/AF guidance, and JFHQ-DODIN requirements.Key Responsibilities• Conduct hands-on security assessments across LAN/WAN infrastructure, Layer 2/3 routing/switching, wireless, VoIP/VVOIP, server OS, databases, and web technologies.
• Perform STIG reviews, identify CAT I/II/III vulnerabilities, document Key Indicators of Risk (KIORs), and support vulnerability remediation with base-level teams.
• Execute automated SCAP scans to identify misconfigurations and vulnerabilities, producing actionable remediation reports.
• Use DISA cyber tools including ACAS, STIG Viewer, Evaluate STIG, and SCAP tools to support vulnerability analysis and root-cause problem identification.
• Deliver daily briefs and hands-on training during NSAT site visits; support virtual Cybersecurity Essentials Training (CET) sessions.
• Prepare consolidated NSAT findings reports within 3 business days; follow up with unit POCs every 10 business days until closure or POA&M acceptance.
• Provide clear technical recommendations and configuration guidance to network and system administrators.Required Qualifications• Bachelor’s degree in Computer Science or related field.
• Minimum 3 years of IT, cybersecurity, or network operations experience.
• DoD 8140 IAT Level II certification (required).
• DoD 8140 Vulnerability Assessment Analyst (CS-541) certification (Intermediate).
• Active Secret clearance.
• Experience with DISA STIGs, STIG Viewer, SCAP tools, and enterprise vulnerability remediation.
• Strong knowledge of LAN/WAN technologies, server OS, databases, and web services.Preferred Skills• Background in Air Force cyber defense (1D7XX/X or similar).
• Experience with JFHQ-DODIN, DISA policy, or enterprise-scale STIG compliance.
• Strong communication skills for briefings and training delivery.
Travel• 12 Site Visits per yer (+/-)Powered by JazzHR
What you'll get after applying
Unlike traditional applications, you won't submit and wait in silence. Here's what you get immediately:
See what you did well — communication, experience, enthusiasm
Specific, actionable feedback on how to strengthen your interview skills
Personalized guides and resources to help you grow professionally
Common questions
How does Apply by Voice work?
Instead of filling out forms or uploading a resume, you have a 6-10 minute voice conversation with an AI interviewer. It asks about your experience, skills, and interest in the role — then gives you instant feedback.
What feedback do I get after applying?
You'll immediately see your strengths highlighted, specific areas for improvement, actionable tips to get better, and recommended resources to build your interview skills.
How long does the conversation take?
Most conversations take 6-10 minutes. It's a natural back-and-forth about your experience — much faster than filling out a traditional application.