Cybersecurity and Infrastructure Security Agency Logo
Position Title
IT Specialist (INFOSEC)
Agency
Cybersecurity and Infrastructure Security Agency
Announcement Number
DHA-10950050-21-JC Opens in new window
Open Period
Wednesday, November 25, 2020 to Saturday, July 31, 2021
For preview purposes only. To apply, please return to the USAJOBS announcement and click the Apply button.
Eligibilities
1. Do you claim Veterans’ Preference? (limit characters)
2. Are you a current or former federal employee displaced from the agency hiring for this position? If yes, confirm:
  • you are located in the same local commuting area of the vacancy
  • your grade is equivalent to or below the grade level of the vacancy AND
  • your last performance rating of record is at least fully successful or the equivalent.
You will be required to submit supporting documentation to validate your claim of CTAP eligibility such as a Reduction in Force (RIF) separation notice or a Proposed Removal/Separation notice and a copy of your latest Notification of Personnel Action, Standard Form 50. For more information, review the USAJOBS Resource Center.
(limit characters)
3. Are you a current or former federal employee displaced from a position in a federal agency other than the agency hiring for this position?

If yes, confirm:
  • you are located in the same local commuting area of the vacancy
  • your grade is equivalent to or below the grade level of the vacancy and
  • your last performance rating of record is at least fully successful or the equivalent.
You will be required to submit supporting documentation to validate your claim of ICTAP eligibility such as a Reduction in Force (RIF) separation notice or a Proposed Removal/Separation notice and a copy of your latest Notification of Personnel Action, Standard Form 50. For more information, review the USAJOBS Resource Center.
(limit characters)
Preferences
1. Select the locations you want to be considered for. You must choose at least one location. (limit characters)
2. Select the lowest grade you are willing to accept for this position. (limit characters)
Assessment 1
It is important to note that all of your responses are subject to review and verification. If after reviewing your resume and or supporting documentation a determination is made that you have overstated your qualifications and or experience, you will be rated ineligible or your score will be lowered. (limit characters)
1. Select one statement from the choices below to show how you meet the qualification requirements for this position at the GS-09 level. (limit characters)
2. Select one statement from the choices below to show how you meet the qualification requirements for this position at the GS-11 level. (limit characters)
3. Select one statement from the choices below to show how you meet the qualification requirements for this position at the GS-12 level. (limit characters)
Select the one statement that most accurately describes your training and experience carrying out each task using the scale provided. (limit characters)
4. Resolve integration issues related to the implementation of new systems with the existing infrastructure.
(limit characters)
5. Conduct risk and vulnerability assessments of planned and installed information systems to identify vulnerability, risks and protection needs of activities.
(limit characters)
6. Assist in the development of long-range plans for IT security systems that anticipate, identify, evaluate and minimize risks associated with IT systems vulnerabilities.
(limit characters)
7. Evaluate security incident response policies in order to provide recommendations for an organization.
(limit characters)
8. Implement cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).
(limit characters)
9. Monitor integration of security programs with other IT programs and services for an organization.
(limit characters)
10. Review proposed new systems, networks, and software designs for potential security risks.
(limit characters)
11. Define the scope and level of detail for security plans and policies applicable to a security program.
(limit characters)
12. Identify need for changes based on new security technologies or threats.
(limit characters)
13. Assess new systems design methodologies to improve software quality for an organization.
(limit characters)
14. Provide technical advice and guidance to Department managers on information security problems and issues.
(limit characters)
15. Provide technical support to those seeking assistance with the network.
(limit characters)
16. Provide advice to customers on the application of operating systems.
(limit characters)
17. Provide technical support to enterprise-wide cyber defense technicians to resolve cyber defense incidents.
(limit characters)
18. Perform cyber defense incident triage to identify the specific system vulnerability. (limit characters)
19. Document cyber security incidents that may cause ongoing and immediate impact to the environment.
(limit characters)
20. Escalate network incidents to the appropriate technical staff to provide remediation.
(limit characters)
21. Utilize techniques for detecting host and network-based intrusions using intrusion detection technologies.
(limit characters)
22. Provide recommendations that enable expeditious remediation. (limit characters)
23. Evaluate security incident response policies to implement ways to avoid potential security risks.
(limit characters)
24. Conduct risk assessments to identify protection needs of activities.
(limit characters)
25. Manage application programming to predict impact on all systems.
(limit characters)
26. Integrate security programs across disciplines to help define the level of detail for security plans.
(limit characters)
27. Listen to problematic concerns related to system malfunctions to provide thorough advice and guidance.
(limit characters)
28. Communicate computer networking concepts to individuals seeking technological support.
(limit characters)
29. Trouble shoot connectivity problems for customers to ensure minimal impact to operations
(limit characters)
30. Provide advice and assistance to customers on the application of operating systems.
(limit characters)
31. I certify that, to the best of my knowledge and belief, all of the information included in this questionnaire is true, correct, and provided in good faith. I understand that if I make an intentional false statement, or commit deception or fraud in this application and its supporting materials, or in any document or interview associated with the examination process, I may be fined or imprisoned (18 U.S.C. 1001); my eligibilities may be cancelled, I may be denied an appointment, or I may be removed and debarred from Federal service (5 C.F.R. part 731). I understand that any information I give may be investigated. I understand that responding "No" to this item will result in my not being considered for this position. (limit characters)