Office of the Chief Information Officer Logo
Position Title
IT CYBERSECURITY SPECIALIST
Agency
Office of the Chief Information Officer
Announcement Number
21-HUD-2212-DH Opens in new window
Open Period
Wednesday, October 20, 2021 to Wednesday, November 3, 2021
For preview purposes only. To apply, please return to the USAJOBS announcement and click the Apply button.
Eligibilities
1. Do you claim Veterans' Preference? (limit characters)
2. Are you a surplus or displaced Federal employee eligible under the Career Transition Assistance Plan (CTAP)?  Click CTAP for eligibility and a detailed list of required documents you must submit in order to be eligible.
 
(limit characters)
3. Are you a displaced Federal employee eligible under the Interagency Career Transition Assistance Plan (ICTAP)?  Click ICTAP for eligibility and a detailed list of required documents you must submit in order to be eligible.
 
(limit characters)
Preferences
1. Are you currently serving or have served in the last five years in a Political Appointment in the Federal Government? (limit characters)
Assessment 1
For the GS-15, you must have one (1) year of specialized experience at a level of difficulty and responsibility equivalent to the GS-14 grade level in the Federal service. Specialized experience for this position includes:

- Experience in a leadership role managing cybersecurity compliance, risk, governance, security architecture, computer incident response or security operations; AND
- Providing cyber security management to lead enterprise-wide cyber security project implementations; AND
- Leading cybersecurity programs/projects to enhance cybersecurity capabilities and reducing threats against an organizations computer and network infrastructure.
(limit characters)
Select “Yes” or “No” to the following question(s). (limit characters)
1. Do you have one (1) year of specialized experience equivalent to the GS-14 grade level in a leadership role managing cybersecurity compliance, risk, governance, security architecture, computer incident response or security operations? (limit characters)
2. Please specify where you documented the above experience in your resume (Indicate place of employment, job title, and length of time performing the duties). (limit 20,000 characters)
Select “Yes” or “No” to the following question(s). (limit characters)
3. Do you have one (1) year of specialized experience equivalent to the GS-14 grade level providing cyber security management to lead enterprise-wide cyber security project implementations? (limit characters)
4. Please specify where you documented the above experience in your resume (Indicate place of employment, job title, and length of time performing the duties). (limit 250 characters)
Select “Yes” or “No” to the following question(s). (limit characters)
5. Do you have one (1) year of specialized experience equivalent to the GS-14 grade level leading cybersecurity programs/projects to enhance cybersecurity capabilities and reducing threats against an organizations computer and network infrastructure? (limit characters)
6. Please specify where you documented the above experience in your resume (Indicate place of employment, job title, and length of time performing the duties). (limit 20,000 characters)
In addition to meeting specialized experience, individuals must have IT-related experience demonstrating each of the four competencies listed below.
1. Attention to Detail- Is thorough when performing work and conscientious about attending to detail.
2. Customer Service- Works with clients and customers (that is, any individuals who use or receive the services or products that your work unit produces, including the general public, individuals who work in the agency, other agencies, or organizations outside the Government) to assess their needs, provide information or assistance, resolve their problems, or satisfy their expectations; knows about available products and services; is committed to providing quality products and services.
3. Oral Communication- Expresses information (for example, ideas or facts) to individuals or groups effectively, taking into account the audience and nature of the information (for example, technical, sensitive, controversial); makes clear and convincing oral presentations; listens to others, attends to nonverbal cues, and responds appropriately.
4. Problem Solving- Identifies problems; determines accuracy and relevance of information; uses sound judgment to generate and evaluate alternatives, and to make recommendations.
(limit characters)
Select “Yes” or “No” to the following question(s). (limit characters)
7. Do you have IT-related experience demonstrating each of the four competencies listed above? (limit characters)
8. Please specify where you documented the above experience in your resume (Indicate place of employment, job title, and length of time performing the duties). (limit 250 characters)
9. Which of the following information security related tasks have you performed as part of your job? Select all that apply. (limit characters)
10. In which areas of Information Technology do you have experience? (limit characters)
11. Select all the items that describe the security tools you have used to support IT security compliance activities to include management of security assessments and authorization documentation, vulnerability management and penetration testing activities. (limit characters)
12. Select all the items that describe your experience performing vulnerability assessment and management and penetration testing activities. (limit characters)
13. Which of the following best describes your experience evaluating requirements, analyzing alternatives, and recommending solutions for IT Infrastructure systems? (limit characters)
14. Which of the following best describes your experience researching technical and security information? (limit characters)
15. Select all the items that describe your experience performing tasks relating to execution of IT security compliance principles in support of continuous monitoring of information system with completion of network and system account reviews to perform the following tasks? (limit characters)
16. Select all the items that describe your experience with developing or updating policies and plans that support Information Security activities? (limit characters)
17. Select the item(s) that best describes your experience with developing, compiling, and reviewing the following security documentation that supports security assessment and authorization for information systems. (limit characters)
18. Select the item(s) that best your experience in developing, implementing and maintaining a cyber security program. (limit characters)
19. Which of the following do have experience performing? Select all that may apply. (limit characters)
20. Choose the response that best reflects your highest level of experience with respect to the adoption of new and emerging laws, guidance, best practices, and technologies. (limit characters)
21. Choose the response that best represents your highest level of experience with respect to developing cyber security related technical/policy documentation related to new or existing systems, projects, or programs. (limit characters)
22. Choose the response that most accurately reflects the highest level of experience you have with respect to developing technical documentation related to information security. (limit characters)
23. Select all applicable liaison areas with whom you have worked on IT security. (limit characters)
24. Choose the statements that describe your experience in IT security. (limit characters)
25. Which of the following IT security related tasks have you performed as part of your job? (limit characters)