Patent and Trademark Office Logo
Position Title
IT Cybersecurity Spec (INFOSEC)
Agency
Patent and Trademark Office
Announcement Number
TMCO-OCIO-23-11892361 - DHA Opens in new window
Open Period
Monday, March 20, 2023 to Wednesday, March 29, 2023
For preview purposes only. To apply, please return to the USAJOBS announcement and click the Apply button.
Eligibilities
1. Do you claim Veterans’ Preference? (limit characters)
2. Are you a current or former federal employee displaced from the agency hiring for this position? If yes, confirm:
  • you are located in the same local commuting area of the vacancy; AND,
  • you are applying to a position that is at or below the grade level of the position from which you were or will be separated; AND,
  • you are applying to a position that does not have greater promotion potential than the position from which you were or will be separated; AND,
  • your last performance rating of record is at least fully successful or the equivalent. For more information, review the USAJOBS Help Center.

To verify your eligibility, you must submit supporting documentation such as a Reduction in Force (RIF) separation notice or a Proposed Removal/Separation notice to include your latest performance rating (if the notice does not have this information included, you must submit a copy of your most recent performance appraisal) and a copy of your latest Notification of Personnel Action, Standard Form 50.
(limit characters)
3. Are you a current or former Federal employee displaced from a position in a Federal agency other than the agency hiring for this position? If yes, confirm:
  • you are located in the same local commuting area of the vacancy; AND,
  • you are applying to a position that is at or below the grade level of the position from which you were or will be separated; AND,
  • you are applying to a position that does not have greater promotion potential than the position from which you were or will be separated; AND,
  • your last performance rating of record is at least fully successful or the equivalent. For more information, review the USAJOBS Help Center.

To verify your eligibility, you must submit supporting documentation such as a Reduction in Force (RIF) separation notice to include your latest performance rating (if the notice does not have this information included, you must submit a copy of your most recent performance appraisal) and a copy of your latest Notification of Personnel Action, Standard Form 50.
(limit characters)
Preferences
1. How did you hear about USPTO Job possibilities? (No Choice Limit) (limit characters)
2. Have you held a political appointment within the previous five-year period? (limit characters)
3. If you are a current or former Federal civilian employee, by what agency/office or Department of Commerce bureau are you employed? (limit characters)
4. If you answered "Other" to the above question, please enter the agency and organization. (limit characters)
Assessment 1
Thank you for your interest in the IT Cybersecurity Specialist (INFOSEC), GS-2210-13, position with the United States Patent and Trademark Office (USPTO). Your resume and the responses you provide will be used to determine if you are among the best qualified for this position. Your responses are subject to verification. Please review your responses for accuracy before you submit your application. (limit characters)
1. Select the one statement that best describes the education and/or experience that you possess that demonstrates your ability to perform the work of an IT Cybersecurity Specialist (INFOSEC) at the GS-13 grade level or equivalent pay band in the Federal Service. (limit characters)
For each knowledge area, select the one response that most accurately describes your current level of knowledge using the scale below. (limit characters)
2. Investigates various security incidents and capture digital forensics artifacts to determine characteristics and risk to IT systems and infrastructure. (limit characters)
3. Uses tools and perform appropriate processes related to incident response investigations in order to document and resolve security incidents and provides feedback and takes appropriate steps to prevent future incidents. (limit characters)
4. Performs digital forensics, network and log analysis to support incident response and threat hunting capabilities. (limit characters)
5. Provide organization with innovative solutions to complex challenges and incidents to proactively identify and mitigate incidents. (limit characters)
6. Develops policies, SOPS and playbooks as needed to support organization cybersecurity operations. (limit characters)
7. Identifies change implications that result in changes in security guidance, processes and procedures. (limit characters)
8. Provide authoritative advice to other IT specialists in meeting security requirements for disaster recovery, business continuity, security policy changes, and develops and communicates security guidelines. (limit characters)
9. Review proposed security policies which might require updates to incident response processes and procedures. (limit characters)
10. Assist with research, testing and procurement of new tools and capabilities. (limit characters)
11. Provide engineering and administration support for existed tools and capabilities. (limit characters)
12. Develop and maintain policies, procedures, instructions and and/or playbooks for new and existing tools and capabilities. (limit characters)
13. Provide expert advice on integrating new tools, techniques and capabilities with existing security architecture. (limit characters)
14. Maintain currency with new and emerging technologies and cybersecurity industry best practices. (limit characters)
15. Leads and assists in execution of security related project initiatives. (limit characters)
16. Perform technical reviews of completed work projects and provide technical assistance and guidance regarding compliance with security guidelines. (limit characters)
17. Assist with security audits, assessments, reviews and follow up mitigations action. (limit characters)
18. Collect information and supply draft responses for all data calls, including ad-hoc requests, audits, and other related requests. (limit characters)
19. Assigns systems administration studies or portions of studies and program development to lower graded IT specialists and/or contractors. (limit characters)