The specialty code for this position is 001.
Complete this section ONLY IF you are a surplus or displaced Federal employee requesting special priority consideration under the Career Transition Assistance Plan (CTAP) or the Interagency Career Transition Assistance Plan (ICTAP). To be considered, you must be a surplus or displaced Federal employee as defined in the regulations, be applying for a vacancy at or below the grade level of the position from which you have been or are being separated (and with no greater promotion potential than your position), and be occupying or have been displaced from a position in the same local commuting area as the vacancy.
Note: To receive consideration for the CTAP or ICTAP, you must submit the necessary supporting documentation as specified in the vacancy announcement.
1. Select one statement from the choices below to show how you meet the qualification requirements for this GS-13 position.A. I have at least one full year of specialized experience comparable in scope and responsibility to the GS-12 level in the Federal service (obtained in either the public or private sectors). This experience must include activities such as: 1) analyzing the design of cybersecurity systems; 2) identifying needs for network security changes based on new cyber security technologies or threats; 3) analyzing and defining the security requirements for new or modified network security protection applications; and 4) resolving integration/interoperability issues related to the implementation of new cybersecurity technologies with the existing systems infrastructure. NOTE: The contents of your resume must fully and explicitly support this response in its entirety. Otherwise, you will be found ineligible.
SKILL IN APPLYING IT SYSTEMS SECURITY PRINCIPLES, CONCEPTS, AND METHODS
For each task in the following groups, choose the statement from the list A through E following each task that best describes your experience and/or training. Your resume must support your answers or your overall score may be lowered or considered ineligible.A- I have not had education, training or experience in this task.
2. Develop and interpret cybersecurity policies and procedures that reduce the risk to infrastructure control systems.
3. Implement higher-level security requirements resulting from changes to laws, regulations or policies.
4. Lead cybersecurity implementation activities for an organization.
5. Institute measure to ensure awareness and compliance with cybersecurity procedures and policies.
6. Apply new cybersecurity methods to previously unresolved infrastructure control security issues.
7. Monitor compliance with infrastructure protection requirements across cybersecurity programs.
KNOWLEDGE OF NETWORK SECURITY AND NETWORK DESIGN
8. Research and test new or modified hardware or software products to determine performance and interoperability.
9. Develop solutions to integration and interoperability for network technology issues.
10. Assess new systems design methodologies to improve software quality.
11. Develop or recommend network security measures, such as firewalls, network security audits, or automated security probes.
12. Design and implement security solutions including Intrusion Detection Systems, firewalls, web filters, and anti-virus.
13. Identify compromised machines and report on security measures taken to address threats.
14. Determine specific network hardware or software requirements, such as platforms, interfaces, bandwidths, or routine schemas.
15. Assign IP addresses to the devices connected to the networks.
16. Route protocols and table configuration assignment.
17. Develop new Internet protocol procedures to deal with viruses.
18. Provide network design and troubleshoot protocol issues in connection with various protocols, such as Transmission Control Protocol (TCP) Internet Protocol (IP) and routing protocols (Open Shortest Path First, Border Gateway Protocol, Enhanced Interior Gateway Routing Protocol) and Gateway Redundancy Protocols (Hot Standby Router Protocol, Virtual Router Redundancy Protocol, Generic Attribute Registration Protocol).
19. Configure and monitor Voice Over IP, VLAN Trunking Protocol, Spanning Tree Protocol, Remote Switched Port Analyzer, Network Address Translation, and Port Address Translation.
20. Work with network security tools such as Access Control List, Internet Protocol Security & Secure Sockets Layer based virtual private network technology, remote access, Firewalls (stateful packet inspection, application level), and application acceleration technologies.
21. Work with load balancers, such as – F5, Alteon, Cisco CSS, Foundry ServerIron.
22. Develop solutions in a classified environment.
SKILL IN PROJECT MANAGEMENT PRINCIPLES AND METHODS
23. Define the scope and level of detail for cybersecurity plans and policies.
24. Review and evaluate security incident response policies.
25. Develop long-range plans for cybersecurity systems that anticipate, identify, evaluate, and mitigate risks associated with cybersecurity systems vulnerabilities.
26. Estimate time and materials needed to complete projects.
27. Prepare or monitor project schedules, budgets, or cost control systems.
28. Identify the need for changes based on new cybersecurity technologies or threats.
ABILITY TO COMMUNICATE ORALLY
29. Provide expert technical advice to senior management concerning infrastructure security policies, programs, and procedures.
30. Advise and provide guidance, policies, and procedures to all levels of management regarding critical network issues.
31. Prepare and present briefings to senior management officials on complex/controversial issues.
32. Represent the organization at technical meetings in matters related to current projects.
33. Explain design specifications to integration or test engineers.