.
Thank you for your interest in a Security Specialist position with Department of the Army. Your resume and the responses you provide to this assessment questionnaire will be used to determine if you are among the best qualified for this position. Your responses are subject to verification. Please review your responses for accuracy before you submit your application.
(limit characters)
1.
Select the one statement that best describes the experience that you possess that demonstrates your ability to perform the work of a Security Specialist at the GS-13 grade level or equivalent pay band in the Federal Service.
(limit characters)
.
Select the one statement that most accurately describes your training and experience carrying out each task using the scale provided.
(limit characters)
2.
Analyze data to identify physical and operations security or compliance or noncompliance, vulnerabilities, trends, strengths, and benchmarks in order to identify systemic deficiencies in security posture to develop and implement remedial action.
(limit characters)
3.
Responsible for the initial and continued accreditation and management of Sensitive Compartmented Information Facilities (SCIFs) within compliance standards established by the Defense Intelligence Agency (DIA) and/or Department of Defense (DoD) for SCIF facilities.
(limit characters)
4.
Develop and maintain activity programs for information security including systems for classified document control and accountability, storage of classified materials, information, security inspections/inventories, personnel security training and orientation, briefings and debriefings, and inquires or investigation of possible loss or unauthorized disclosure of classified information.
(limit characters)
5.
Conduct access eligibility reviews to address the suitability indicators of people that are recommended for Special Access Program/Alternate Compensatory Control Measures (SAP/ACCM) access.
(limit characters)
6.
Analyze the effectiveness of security programs in order to develop new program measures to increase effectiveness of security programs in consonance with multi-level, special security operations.
(limit characters)
7.
Make authoritative and independent recommendations/decisions based on interpretation of security controls, policies and procedures having direct impact on the security and sensitive activities mission of the organization.
(limit characters)
8.
Receive, review, and process sensitive and complex requests for security clearances and/or access regarding very senior and/or very visible positions within the organization.
(limit characters)
9.
Advise and assist military and senior leaders with Sensitive Compartmented Information (SCI) program management to include operations policy, plans and integration.
(limit characters)
10.
Initiate and manage co-utilization agreements (CUA), Inter-Service Support Agreements (ISSA), and memorandums of understanding (MOU) relating to SCIFs, operations and security and intelligence support issues.
(limit characters)
11.
Manage, review, coordinate and direct appropriate actions, countermeasures and reporting requirements involving Sensitive Compartmented Information (SCI) and Collateral classified information.
(limit characters)
12.
Set up and maintain the accreditation for Special Access Program Facilities (SAPF) to ensure there is no conflict with program requirements.
(limit characters)
13.
Coordinate Transient Electro-Magnetic Pulse Emanation Standard and Testing (TEMPEST) countermeasures for collateral and SCI facilities, to include inspections of proposed and existing sites, establishment of new SCI facilities, and maintenance of existing sites.
(limit characters)
14.
Assist and advise command level management in matters pertaining to the enforcement of regulations governing the receipt, dissemination, reproduction, regarding, transmission, safekeeping, and destruction of classified material.
(limit characters)
15.
Provide requirements and procedures to execute Nondisclosure Statement (NdS) based on determination and need for completion of NdS for granting access to SCI.
(limit characters)
16.
Conduct risk assessment that weighs the value afforded a U.S. national security by an individual's continued SCI access eligibility against the risk posed by the intimate relationship with a foreign national when notified of intent the U.S. national will marry or cohabit with a foreign national.
(limit characters)
17.
Review requests for access in special circumstances, that include national emergency situations and hostilities based, on urgent need of the organization to prevent failure or serious impairment of missions or operations that are in the best interest of the national security.
(limit characters)
18.
Identify requirements for the safeguarding of classified information to include how classified information shall be protected against unauthorized disclosure during working hours, stored when not in use, escorted or hand-carried in and out of the installation command, and protected while in travel status.
(limit characters)
19.
Develop, execute and implement policies and procedures governing the protection of Sensitive Compartmented Information Facilities (SCIFs) operations, information, personnel and material.
(limit characters)
20.
Develop, interpret and explain security policies, procedures, plans and regulatory guidance to all levels of management and operating elements concerning all aspects of security programs including SCI/collateral security programs and their interface with other related operational or security functions.
(limit characters)
21.
Plan, develop and implement industrial security policies and procedures in order to monitor, approve, advise, and/or prepare all security and administrative processes required during the course of unclassified and classified contracts.
(limit characters)
22.
Establish command visitor control procedures to accommodate visitor access to, or disclosure of, classified information to include verification of personnel security clearances and need-to-know.
(limit characters)
23.
Complete SCI Access Suspension Incident Reports that identify specific reasons for the report, accesses held, justification for the debriefing and any other pertinent information.
(limit characters)
24.
Develop and maintain training programs for organizational staff to support one or more of the following security program areas: Special Access Program, Special Technical Operations (STO), Sensitive Activities (SA), and/or Alternate Compensatory Control Measures (ACCM).
(limit characters)
25.
Conduct documents, papers, articles, briefings and material pre-publication reviews to determine correct classification of information and/or that information proposed for public release contains no classified information.
(limit characters)
26.
Give oral presentations to include briefings or conducting strategy sessions with senior level staff members, to include senior command officials, in order to resolve controversial matters or convey information relative to proposed changes in assigned program(s).
(limit characters)
27.
Brief appointed inquiry official upon security incidents and violations when deliberate or accidental disclosure and/or exposure of SCI to unauthorized personnel resulting in loss, theft, or capture; recovery by salvage; defection; press leaks or public declarations; release of unauthorized publications; or unauthorized means.
(limit characters)
28.
Conduct Sensitive Compartmented Information (SCI) indoctrinations and briefings to convey unique nature, unusual sensitivity and special security safeguards and practices for SCI handling, particularly the necessity to protect sensitive sources and methods.
(limit characters)
29.
Interpret and explain SCI, collateral, and Special Access Program security policies, procedures, plans and regulatory guidance to all levels of management and operating elements concerning all aspects of security programs including their synchronization with other related operational or security functions.
(limit characters)
30.
Conduct defensive travel security and risk of capture briefings to provide situational concepts of threats that can be encountered, to include providing passive and active measures to avoid becoming targets or inadvertent victims.
(limit characters)
31.
Conduct SCI debriefings to individuals who have had their SCI access suspended and/or revoked.
(limit characters)
32.
Your responses to the Announcement and Assessment Questionnaires, along with your resume and all supporting documentation are subject to evaluation and verification to ensure accuracy. Please take this opportunity to review your responses to ensure their accuracy.
(limit characters)