Bonneville Power Administration Logo
Position Title
IT Cybersecurity Specialist
Agency
Bonneville Power Administration
Announcement Number
21-BPA-25424-11160731-DE Opens in new window
Open Period
Thursday, July 8, 2021 to Saturday, July 17, 2021
For preview purposes only. To apply, please return to the USAJOBS announcement and click the Apply button.
Eligibilities
1. Do you claim Veterans’ Preference? (limit characters)
2. Are you a current or former federal employee displaced from a position in a federal agency, other than the Department of Energy?

If yes, confirm:

--you are located in the same local commuting area as the vacancy;
--you are applying to a position that is at or below the grade level of the position from which you were or will be separated;
--you are applying to a position that does not have greater promotion potential than the position from which you were or will be separated; AND
--your last performance rating of record is at least fully successful or equivalent.

For more information on eligibility visit:  https://www.usajobs.gov/Help/working-in-government/unique-hiring-paths/federal-employees/ictap/

Check the REQUIRED DOCUMENTS section in the job announcement for instructions to support your eligibility to apply for this vacancy.
(limit characters)
Preferences
1. Do any of your relatives work for the agency to which you are applying? If so, please list any applicable names below. Please enter N/A in the text box, if not Applicable. (Include: father, mother, husband, wife, son, daughter, brother, sister, uncle, aunt, first cousin, nephew, niece, father-in-law, mother-in-law, daughter-in-law, brother-in-law, sister-in-law, stepfather, stepmother, stepson, stepdaughter, stepbrother, stepsister, half brother, and half sister).
(limit characters)
Assessment 1
1. BASIC REQUIREMENT (GS-12 AND ABOVE) - Choose one answer that best describes your experience.
(limit characters)
2. In addition to the Basic Requirement, choose one answer that best describes your education and experience.
(limit characters)
For the following task statements, please select the option that best describes your training or experience. You must ensure that the level of training or experience claimed is reflected in your resume. If the information cannot be found in your resume, your self-rating will be adjusted accordingly. (limit characters)
Select the one statement that most accurately describes your training and experience carrying out each task using the scale provided. (limit characters)
3. Assist in implementing patches for software and operating systems to minimize cyber security vulnerabilities.
(limit characters)
4. Assists in analyzing standards and policies imposed by Federal laws or regulatory entities (WECC, NERC, FISMA, etc.) to determine impact on existing applications.
(limit characters)
5. Assess cyber security standards and regulations to determine the impact on existing information security policies, principles and practices related to the delivery of application software services.
(limit characters)
6. Assess security controls in applications to identify deficiencies and remediate security weaknesses.
(limit characters)
7. Analyze malware, network packets, and log information in the course of incident response.
(limit characters)
8. Assist with the creation of server security models or plans for application, database, or server access requirements to ensure compliance with NIST Standards and FISMA requirements.
(limit characters)
9. Analyze results of security control assessment of systems, devices, or networks to recommend new or revised security measures and countermeasures.
(limit characters)
10. Identify security risks to recommend solutions for the design, development, configuration, integration, and management of networks.
(limit characters)
11. Plan, design, develop, test, implement, and manage internal and external Web sites to optimize overall Web design and structure to ensure Web site functionality, integrity, and security.
(limit characters)
12. Analyze security requirements for network and telecommunications applications to ensure continued system accessibility.
(limit characters)
13. Review proposed new systems, networks, and software designs for potential security risks.
(limit characters)
14. Perform security control assessments for installed systems, devices, or networks to ensure conformance with established security authorization processes.
(limit characters)
15. Perform root cause analysis to solve difficult problems with effective solutions.
(limit characters)
16. Develop procedures for checking key files for problems and reviewing running operations to ensure only authorized processes are running.
(limit characters)
17. Troubleshoot IT equipment to determine the integrity and functionality of the item.
(limit characters)
18. Recommend appropriate corrective action where information security requirements are not being observed.
(limit characters)
19. Recommend corrective actions on non-compliance security requirements in order to ensure personnel are adhering to established policy and practice and to correct deficiencies.
(limit characters)
20. Participate in internal and external committees and working groups in order to resolve critical cyber security problems in existing systems and programs.
(limit characters)
21. Evaluates the impact of proposed applications or changes on the operating environment in order to recommend alternatives or modification if needed.
(limit characters)
22. Assist with the development and maintenance of cyber security policies and standards.
(limit characters)
23. Serve as a team member on various studies to develop standardized processes in order to ensure consistency in planning and implementation of initiatives, studies, and analysis.
(limit characters)
24. Provide subject matter expertise on technology teams in order to represent an operations and maintenance perspective.
(limit characters)
25. If you selected E in response to any question above, indicate where in your resume the information can be found to support your answer (identify by job title and dates). In order to receive credit, please be sure that your resume provides adequate details to support your answer or your response will be adjusted accordingly. (Maximum length of 250 characters): (limit 250 characters)