Select at least one occupational specialty code. The specialty code(s) for this position are 001, 002 and 003. Please note that you must select at least one specialty code but may select multiple codes if desired. Each code is defined below:
001 - Open to All
002 - Competitive Merit Promotion. This includes current Federal employees who serve under a competitive career or career-conditional appointment in the competitive service, reinstatement eligibles (former Federal employees who served under a career appointment in the competitive service) and VEOA eligibles (veterans with preference and veterans who have been honorably discharged and substantially completed at least 3 years of continuous active duty service. You must provide qualifying documentation (i.e. SF-50 or veterans documentation).
003 - Noncompetitive and Special Hiring Authorities. This includes applicants who are eligible for noncompetitive or special appointment authorities such as: 30% or more compensably disabled veterans, Veterans' Recruitment Appointment (VRA - for positions at GS-11 and below), and persons with disabilities (Schedule A), military spouse preference, Federal employees in excepted positions covered under an interchange agreement, and other eligible special hiring authorities (such as Peace Corps, Boren Fellows, etc.). This also includes applicants who previously held, or currently hold, this position and grade with the same promotion potential as announced for this 807065. For more information about special hiring authorities, visit: http://www.opm.gov/hr_practitioners/lawsregulations/appointingauthorities/index.asp. You must provide qualifying documentation for a noncompetitive or special hiring authority.
Complete this section ONLY IF you are a surplus or displaced Federal employee requesting special priority consideration under the Career Transition Assistance Plan (CTAP) or the Interagency Career Transition Assistance Plan (ICTAP). To be considered, you must be a surplus or displaced Federal employee as defined in the regulations, be applying for a vacancy at or below the grade level of the position from which you have been or are being separated (and with no greater promotion potential than your position), and be occupying or have been displaced from a position in the same local commuting area as the vacancy.
Note: To receive consideration for the CTAP or ICTAP, you must submit the necessary supporting documentation as specified in the vacancy announcement.
1. Select one response from the choices below to show how you meet the Qualification Requirements for this GS-2210-15 Supervisory IT Specialist (INFOSEC) position.
ABILITY TO SUPERVISE SKILLED TECHNICAL PERSONNEL
For each task listed below, select the statement from A through E that best describes your level of experience, education, and/or training. If you leave any question blank your score will be negatively impacted. ATTENTION: For each question below, you must document your skill level in your resume. This means, for example, that if you rate yourself at the expert level (E) for a skill or task, you must document when you have supervised or trained others doing that skill or task. If you rate yourself at the independent level (D), you must show that you did the task as a regular and recurring part of a job. We will verify that you have documented your skills in your resume and your score will be lowered for skills that are not documented.A- I have no experience in performing this work behavior.
2. Provide technical and personal leadership to a professional and knowledgeable IT staff.
3. Direct activities of staff responsible for analyzing computer networks for intrusion vulnerability.
4. Develop performance standards and evaluate work performance of subordinates.
5. Hear and resolve employee complaints and grievances.
6. Identify any developmental and training needs of employees.
7. Coordinate the activities of contractual resources and make recommendations for cost effective options.
SKILL IN CYBER SECURITY ANALYSIS
8. Evaluate an organization's technical or all-source cyber security to assess potential threats to critical networks and infrastructure.
9. Conduct cyber security analysis across joint or interagency activities to assess potential threats.
10. Analyze current organizational structures and recommend modifications to improve information technology infrastructure security goals and objectives.
11. Assess risks and vulnerabilities to cyber security to identify appropriate responses (e.g., improved equipment, supplies, personnel, services, etc.)
ABILITY TO MANAGE IT-SECURITY RELATED PROGRAMS
12. Manage IT program activities to ensure the timely receipt, storage and dissemination of analytic products pertaining to IT threats.
13. Coordinate an IT security program to locate information on current or emerging threats and recommend security features or changes to practices which will mitigate the danger.
14. Evaluate new or existing cyber security software for implementation or adoption into information technology infrastructure.
15. Ensure the ongoing presence of management studies designed to enhance operational effectiveness of a program.
16. Prepare and review contractor certification and accreditation support documentation.
TEAMWORK AND COOPERATION
17. Network with technical, forensic or incident management personnel to understand the intent and activity of cyber threat actors.
18. Maintain collaborative working relationships with senior leadership in various organizations to provide insight and guidance on IT issues related to threats, capability or requirements.
19. Maintain liaison relationships with key government or critical infrastructure organizations to coordinate and direct immediate responses to cyber security incident.
20. Develop cyber security material concerning security concerns or imminent threats to update senior leadership, federal departments, private sector entities, international partners or the general public.
21. Serve as technical advisor to senior management on IT security program effectiveness, efficiency, policy, direction, or oversight.
22. Present conclusions and recommendations based on analysis and evaluation of studies to key management officials for their use in insuring efficiency, economy, and balance in the development and execution of major cyber security programs.
23. Work with Federal, State, Local, and Tribal government or private sector entities to develop or recommend improvements to the cyber security systems and functions of an organization.
24. Represent the organization in meetings, conferences, and other public forums to justify, defend, or negotiate resolutions for matters involving significant or controversial issues.