Cybersecurity and Infrastructure Security Agency Logo
Position Title
IT Specialist ( INFOSEC)
Agency
Cybersecurity and Infrastructure Security Agency
Announcement Number
DHA-10955049-21-JC Opens in new window
Open Period
Wednesday, November 25, 2020 to Saturday, July 31, 2021
For preview purposes only. To apply, please return to the USAJOBS announcement and click the Apply button.
Eligibilities
1. Do you claim Veterans’ Preference? (limit characters)
2. Are you a current or former federal employee displaced from the agency hiring for this position? If yes, confirm:
  • you are located in the same local commuting area of the vacancy
  • your grade is equivalent to or below the grade level of the vacancy AND
  • your last performance rating of record is at least fully successful or the equivalent.
You will be required to submit supporting documentation to validate your claim of CTAP eligibility such as a Reduction in Force (RIF) separation notice or a Proposed Removal/Separation notice and a copy of your latest Notification of Personnel Action, Standard Form 50. For more information, review the USAJOBS Resource Center.
(limit characters)
3. Are you a current or former federal employee displaced from a position in a federal agency other than the agency hiring for this position?

If yes, confirm:
  • you are located in the same local commuting area of the vacancy
  • your grade is equivalent to or below the grade level of the vacancy and
  • your last performance rating of record is at least fully successful or the equivalent.
You will be required to submit supporting documentation to validate your claim of ICTAP eligibility such as a Reduction in Force (RIF) separation notice or a Proposed Removal/Separation notice and a copy of your latest Notification of Personnel Action, Standard Form 50. For more information, review the USAJOBS Resource Center.
(limit characters)
Preferences
1. Select the locations you want to be considered for. You must choose at least one location. (limit characters)
2. Select the lowest grade you are willing to accept for this position. (limit characters)
Assessment 1
It is important to note that all of your responses are subject to review and verification. If after reviewing your resume and or supporting documentation a determination is made that you have overstated your qualifications and or experience, you will be rated ineligible or your score will be lowered. (limit characters)
1. Please select the following response that indicates how you meet the basic requirement for this position at the GS-13. (limit characters)
2. Select one statement from the choices below to show how you meet the qualification requirements for this position at the GS-13 level: (limit characters)
3. Please select the following response that indicates how you meet the basic requirement for this position at the GS-14 level. (limit characters)
4. Select one statement from the choices below to show how you meet the qualification requirements for this position at the GS-14 level: (limit characters)
For each item, select the one response that most accurately describes your current level of experience and capability using the scale below. (limit characters)
5. Identify and minimize risks in order to minimize IT systems vulnerabilities. (limit characters)
6. Apply IT systems security principles and methods in order to recommend appropriate technical strategies to resolve complex and persistent IT security challenges.
(limit characters)
7. Define the scope and level of detail for security plans and policies to ensure comprehensive coverage. (limit characters)
8. Asses new systems design methodologies to improve software quality.
(limit characters)
9. Lead new security technologies implementation activities to safeguard IT systems. (limit characters)
10. Institute measures to ensure security technologies awareness and compliance.
(limit characters)
11. Identify need for changes based on new security technologies and/or threats.
(limit characters)
12. Develop long-range plans for IT security systems to ensure their effectiveness. (limit characters)
13. Review proposed new systems, networks, and software designs for potential security risks.
(limit characters)
14. Ensure that implemented security safeguards are adequate to assure the integrity, availability and confidentiality of the information being processed, transmitted or stored.
(limit characters)
15. Review and evaluate security incident response policies to ensure their effectiveness. (limit characters)
16. Perform event correlation using information gathered from a variety of sources within the enterprise to gain situational awareness and determine the effectiveness of an observed attack.
(limit characters)
17. Determine and implement techniques for detecting host and network-based intrusions using intrusion detection technologies.
(limit characters)
18. Persuade employees and managers to accept and implement findings and recommendations.
(limit characters)
19. Overcome resistance to changes which may result from organizational conflicts, competing objectives, or resource problems.
(limit characters)
20. Use persuasion and negotiation to gain compliance with established policies and regulations.
(limit characters)
21. Advise system managers on appropriate trade-offs to ensure IT systems are given a level of protection commensurate with their importance to the overall mission.
(limit characters)
22. Make recommendations that enable expeditious remediation of IT security vulnerabilities.
(limit characters)
23. Recognize system and application security threats and vulnerabilities.
(limit characters)
24. Provide assistance in resolving complex technical issues as they arise.
(limit characters)
25. Perform cyber defense incident triage by identifying the specific vulnerability.
(limit characters)
26. Apply Computer Network Defense (CND) systems security principles and policies to develop long-range plans for IT security systems that anticipate and minimize risks associated with IT systems vulnerabilities.
(limit characters)
27. Perform real-time cyber defense incident handling (e.g., forensic collections, intrusion correlation and tracking, threat analysis, and direct system remediation) tasks to support deployable Incident Response Teams.
(limit characters)
28. Advise system designers and system administrators as to the consistency of proposed IT security strategies with regulatory and policy directives.
(limit characters)
29. Provide assessments of proposed design measures' feasibility, based on broad knowledge of parameters imposed by the IT infrastructure and operations.
(limit characters)
30. Integrate security programs across disciplines to ensure effective mitigation. (limit characters)
31. Coordinate technical support from enterprise-wide cyber defense technicians to resolve cyber defense incidents.
(limit characters)
32. I certify that, to the best of my knowledge and belief, all of the information included in this questionnaire is true, correct, and provided in good faith. I understand that if I make an intentional false statement, or commit deception or fraud in this application and its supporting materials, or in any document or interview associated with the examination process, I may be fined or imprisoned (18 U.S.C. 1001); my eligibilities may be cancelled, I may be denied an appointment, or I may be removed and debarred from Federal service (5 C.F.R. part 731). I understand that any information I give may be investigated. I understand that responding "No" to this item will result in my not being considered for this position. (limit characters)