Institute of Museum and Library Services Logo
Position Title
Chief Information Security Officer (CISO)
Agency
Institute of Museum and Library Services
Announcement Number
DE-10877462-20-SW Opens in new window
Open Period
Monday, September 14, 2020 to Friday, September 18, 2020
For preview purposes only. To apply, please return to the USAJOBS announcement and click the Apply button.
Eligibilities
1. Do you claim Veterans' Preference? (limit characters)
2. Are you a current or former federal employee displaced from the agency hiring for this position? If yes, confirm:
• you are located in the same local commuting area of the vacancy
• your grade is equivalent to or below the grade level of the vacancy AND
• your last performance rating of record is at least fully successful or the equivalent.

You will be required to submit supporting documentation to validate your claim of CTAP eligibility such as a Reduction in Force (RIF) separation notice or a Proposed Removal/Separation notice and a copy of your latest Notification of Personnel Action, Standard Form 50.

For more information, review the USAJOBS Resource Center.
(limit characters)
3. Are you a current or former federal employee displaced from a position in a federal agency other than the agency hiring for this position? If yes, confirm:
• you are located in the same local commuting area of the vacancy
• your grade is equivalent to or below the grade level of the vacancy and
• your last performance rating of record is at least fully successful or the equivalent.

You will be required to submit supporting documentation to validate your claim of ICTAP eligibility such as a Reduction in Force (RIF) separation notice or a Proposed Removal/Separation notice and a copy of your latest Notification of Personnel Action, Standard Form 50. For more information, review the USAJOBS Resource Center
(limit characters)
Preferences
1. Which of the following items describe your current or recent (i.e. within the last five years) political appointee service? If you respond yes to any of the items below, you will need to include a SF-50 specifying your prior service. (limit characters)
2. Have you accepted a buyout from a Federal agency within the past 5 years? Answer to this question is required. (limit characters)
Assessment 1
Thank you for your interest in a position with the Institute of Museum and Library Services (IMLS). Your responses to this assessment questionnaire, in conjunction with other portions of your completed application, will be evaluated in making screening decisions. This is an IMLS job application system. Your responses in this Assessment Questionnaire are subject to evaluation and verification. Later steps in the selection process are specifically designed to verify your responses. Deliberate attempts to falsify information will be grounds for disqualifying you or for dismissing you from employment following acceptance. Please review your responses for accuracy before you submit this application. Incomplete/incorrect responses may result in you not receiving appropriate consideration. (limit characters)
For the following questions, please select the response that best describes your education and/or experience. You may select only one response for each question. If you feel that your education or experience exceeds all of the descriptions for a particular question, choose the description that is the closest level to the experience or education that you possess. Failure to respond to these questions will result in an ineligible rating. (limit characters)
1. From the descriptions below, select the ONE response that BEST describes the specialized experience that demonstrates your ability to perform as a GS-2210-15, Chief Information Security Officer. (limit characters)
2. From the descriptions below, select the ONE response that BEST describes your experience that can be applied to a certification level of the Federal Acquisition Certification in Contracting, FAC-P/PM Certification Requirements (Includes IT Core-Plus Specialization), Mid-Level certification. (limit characters)
3. From the descriptions below, select the ONE response that BEST describes your level of experience regarding security theories and concepts, practices, emerging issues, and project management methods. (limit characters)
For each task in the following group, choose the statement from the list below that best describes your experience and/or training.   Please select only one letter for each item. (limit characters)
Select the one statement that most accurately describes your training and experience carrying out each task using the scale provided. (limit characters)
4. Performs or provides contractor and general oversight for the assessment of the effectiveness of the agency's IT security system. (limit characters)
5. Performs or provides contractor and general oversight for the security of privacy information within the agency's IT systems. (limit characters)
6. Ensures security of all agency systems, networks, and infrastructure devices. (limit characters)
7. Directs policy review for the agency's Internet, Intranet, the agency's network, cloud infrastructure, and desktop/laptop systems.
(limit characters)
8. Directs operational analysis for the agency's Internet, Intranet, the agency's network, cloud infrastructure, and desktop/laptop systems.
(limit characters)
9. Directs engineering review for the agency's Internet, Intranet, the agency's network, cloud infrastructure, and desktop/laptop systems.
(limit characters)
10. Evaluates and applies current tools and methodologies for security audits.
(limit characters)
11. Designs and implements programs to ensure the security of government systems. (limit characters)
12. Applies federal and industry standards to the Office of Chief Information Officer (OCIO) contracts. (limit characters)
13. Oversees the implementation of higher-level security requirements, such as those resulting from laws, regulations, or Presidential
directives.
(limit characters)
14. Ensures the confidentiality, availability, and integrity of IT systems through full compliance with various federal policies and standards (e.g., the Federal Information Security Management Act (FISMA), related National Institute of Standards and Technology (NIST) standards, OMB Circular A-130 - Managing Information as a Strategy Resource), and agency IT security policies and standards. (limit characters)
15. Applies current awareness of emerging trends and developments in information technology and infrastructure security of systems for the agency. (limit characters)
16. Performs or provides contractor and general oversight for the evaluation and Investigation of IT security incidents.
(limit characters)
17. Evaluates current system security posture.
(limit characters)
18. Monitors activities and assesses the security awareness knowledge of staff.
(limit characters)
19. Conducts information security reporting and data gathering as per the Federal Information Security Management act (FISMA) and other laws or regulations. (limit characters)
20. Assesses, evaluates, and identifies opportunities to improve the IT infrastructure support for the agency privacy program.
(limit characters)
21. Analyzes information processing needs and proposed system changes for security requirements and implications.
(limit characters)
22. Determines the scope of involvement and the objectives of the security area to meet current and projected requirements.
(limit characters)
23. Leads mitigation efforts to resolve audit findings.
(limit characters)
24. Prepares and oversees the implementation of policies and procedures to assure the continuous security of the information technology architecture. (limit characters)
25. Designs and implements an information technology security awareness program for agency staff.
(limit characters)
26. Plans and develops programs and policies per the Federal Information Security Management Act (FISMA) and other federal security policies to ensure the security of the agency's existing and newly deployed systems. (limit characters)
27. Plans and develops programs and policies per the Federal Information Security Management Act (FISMA) and other federal security policies to ensure the security of the agency's Internet/Intranet security and security for the enterprise network. (limit characters)
28. Incorporates the goals and objectives into the Office of the Chief Information Officer (OCIO) strategic plan. (limit characters)
29. Participates in or leads strategic planning teams involving information technology security.
(limit characters)
30. Ensures compliance of all the Office of Chief Information Officer (OCIO) initiatives with applicable law and regulations and OCIO and industry security standards. (limit characters)
31. Develops a security strategy and ensures that it translates into tangible projects.
(limit characters)
32. Conducts regular information technology security audits.
(limit characters)
33. Directs and provides agency-wide oversight to the management and execution of an agency's IT Security Program. (limit characters)
34. Documents findings of information technology security audits and performs follow-up audits.
(limit characters)
35. Designs and implements the Office of the Chief Information Officer (OCIO) security policies and procedures for an enterprise information technology architecture. (limit characters)
36. Prepares security procedures and training and awareness materials.
(limit characters)
37. Provides advice to project managers and Office of the Chief Information Officer (OCIO) staff who manage and monitor contract personnel. (limit characters)
38. Represents the Office of the Chief Information Officer (OCIO) on issues relating to system security in numerous forums throughout the agency and in other parts of the federal sector. (limit characters)
39. Provides IT Security advice and recommendations to the agency Chief Information Officer (CIO). (limit characters)
40. Ensures the application of a variety of strategies and measures designed to protect equipment, control access, and detect security
threats and systems vulnerabilities.
(limit characters)
41. Develops new security tools, utilizing commercially available tools, published methods, public domain tools, or agency developed
programs to maintain the security of the agency's networks and servers.
(limit characters)
42. Directs the performance of penetration attacks and security posture assessments on agency's firewalls, production and development servers, or file servers. (limit characters)
43. If you fail to answer this question, you will be disqualified from consideration for this program.

I certify that, to the best of my knowledge and belief, all of the information included in this questionnaire is true, correct, and provided in good faith. I understand that if I make an intentional false statement, or commit deception or fraud in this application and its supporting materials, or in any document or interview associated with the examination process, I may be fined or imprisoned (18 U.S.C. 1001); my eligibilities may be cancelled, I may be denied an appointment, or I may be removed and debarred from Federal service (5 C.F.R. part 731). I understand that any information I give may be investigated. I understand that responding "No" to this item will result in my not being considered for this position.

I understand a comprehensive background investigation, to include a fingerprint examination is required for this position.
(limit characters)