Administration for Children and Families Logo
Position Title
Information Technology Cybersecurity Specialist (INFOSEC)
Agency
Administration for Children and Families
Announcement Number
HHS-ACF-DE-23-11964410 Opens in new window
Open Period
Thursday, May 25, 2023 to Monday, June 5, 2023
For preview purposes only. To apply, please return to the USAJOBS announcement and click the Apply button.
Eligibilities
1. Do you claim Veterans’ Preference? (limit characters)
2. Are you a current or former federal employee displaced from the Department of Health and Human Services? If yes, confirm:
• You are located in the same local commuting area of the vacancy
• Your grade is equivalent to or above the grade level of the vacancy AND
• Your last performance rating of record is at least fully successful or the equivalent.

You will be required to submit supporting documentation to validate your claim of CTAP eligibility such as a Reduction in Force (RIF) separation notice or a Proposed Removal/Separation notice and a copy of your latest Notification of Personnel Action, Standard Form 50. For more information, review the USAJOBS Resource Center page (https://www.usajobs.gov/Help/working-in-government/unique-hiring-paths/federal-employees/ctap/).
(limit characters)
3. Are you a current or former federal employee displaced from a position in a federal agency other than the agency hiring for this position?

If yes, confirm:
  • you are located in the same local commuting area of the vacancy
  • your grade is equivalent to or below the grade level of the vacancy and
  • your last performance rating of record is at least fully successful or the equivalent.
You will be required to submit supporting documentation to validate your claim of ICTAP eligibility such as a Reduction in Force (RIF) separation notice or a Proposed Removal/Separation notice and a copy of your latest Notification of Personnel Action, Standard Form 50.

For more information, review the USAJOBS Resource Center. (https://www.usajobs.gov/Help/working-in-government/unique-hiring-paths/federal-employees/ictap/)
(limit characters)
4. In the last five years, based on the closing date of this announcement, have you been or are you currently an employee in the Executive Branch serving on a political, Schedule C, or Noncareer SES appointment? If yes, and you are selected through this vacancy announcement, you may be required to obtain approval by the Office of Personnel Management (OPM) prior to beginning employment. (limit characters)
Preferences
1. Select the lowest grade you are willing to accept for this position. (limit characters)
Assessment 1
We will evaluate your resume and responses to this questionnaire to determine if you are among the best qualified for this position. Your responses are subject to verification and must be fully supported by your resume and supporting documents. (limit characters)
1. From the descriptions below, select the one which best describes the experience you possess in Information Technology (IT) related experience in demonstrating each of the four competencies as defined.
(limit characters)
2. From the descriptions below, select the one which best describes your experience and meets the minimum qualification requirements for this GS-12.
(limit characters)
3. From the descriptions below, select the one which best describes your experience and meets the minimum qualification requirements for this GS-13.
(limit characters)
For each task in the following groups, choose the statement from the list below that best describes your experience and/or training. Select only one letter for each item. Failure to support your answers to this questionnaire in your resume may result in a lowered score or loss of consideration. (limit characters)
Select the one statement that most accurately describes your training and experience carrying out each task using the scale provided. (limit characters)
4. Formulate, implement, and administer an IT security program consisting of standards, procedures, policies, and guidelines designed to protect information from unauthorized access.
(limit characters)
5. Exercise considerable judgment in monitoring agency compliance with infrastructure protection requirements across IT programs and adjusting program guidelines in response to changing technologies.
(limit characters)
6. Ensure the implementation of security policies and plans that ensure a robust level of protection is provided for applications and databases.
(limit characters)
7. Lead the implementation of security programs designed to anticipate, assess, and minimize system vulnerabilities.
(limit characters)
8. Identify current and potential problem areas; update or establish new requirements; and make recommendations for a fully compliant infrastructure protection program to be implemented throughout the agency.
(limit characters)
9. Experience developing and interpreting policies, processes, and related standards, to analyze security requirements relative to the capabilities of new information technologies.
(limit characters)
10. Ability to determine patterns of noncompliance to determine their impact on levels of risk and/or overall effectiveness of the enterprise's cybersecurity program.
(limit characters)
11. Ability to provide mitigation strategies to customers while maintaining constant quality and internal controls to ensure that regulatory and security requirements as well as customer satisfaction are met.
(limit characters)
12. Define unprecedented conditions and resolve critical cybersecurity problems.
(limit characters)
13. Ensure protection of the organization's IT assets through the administration of the IT security program and affects the scientific programs and mission of the organization in which the position is located.
(limit characters)
14. Integrate information systems security with other security disciplines; and ensure coordination and/or collaboration on security activities.
(limit characters)
15. Coordinate the implementation of security programs across platforms and establishes vulnerability reporting criteria.
(limit characters)
16. Review and evaluate security policies; identify need for changes based on new security technologies or threats; test and implement new policies; and institute measures to ensure awareness and compliance.
(limit characters)
17. Prepare and present briefings to senior management officials on complex/controversial issues.
(limit characters)
18. Ability to communicate, orally and in writing, complex technical requirements to non-technical personnel.
(limit characters)
19. Determine the most appropriate principles, practices, and methods to apply in all phases of assignments, including the approach to be taken, degree of intensity, and depth of research in management advisories.
(limit characters)
20. Experience identifying common attack vectors on the network layer.
(limit characters)
21. Experience identifying different classes of attacks like passive attacks, active attacks, insider attacks, close-in attacks, distribution attacks.
(limit characters)
22. Establish, implement, and interpret the requirements for agency compliance with higher-level policy directives and Executive orders governing infrastructure protection.
(limit characters)
23. Provide expert technical advice, guidance, and recommendations to management and other technical specialists on critical IT security issues.
(limit characters)
24. Apply new developments to previously unsolvable problems; and make decisions or recommendations that significantly
influence important agency IT policies or programs.
(limit characters)
25. Develop long- range plans for IT security systems that anticipate, identify, evaluate, mitigate, and minimize risks associated with IT systems vulnerabilities.
(limit characters)
26. Ability to plan, develop, coordinate, and/or evaluate instructional cybersecurity role-based training content using various formats, techniques.
(limit characters)
27. Deliver role-based training courses tailored to the audience and physical environment.
(limit characters)
28. Coordinate the review and evaluation of the agency infrastructure protection program, including policies, guidelines, tools, methods, and technologies.
(limit characters)
29. Use judgment, initiative, and resourcefulness in deviating from established methods to modify, adapt, and/or refine broader guidelines to resolve specific complex and/or intricate issues and problems; treat specific issues or problems; research trends and patterns; develop new methods and criteria; and/or propose new policies and practices.
(limit characters)
30. Use guidelines and precedents that are very general regarding agency policy statements and objectives.
(limit characters)
31. Interpret regulations on own initiative, apply new methods to resolve complex and/or intricate, controversial, or unprecedented issues and problems, and resolve most of the conflicts that arise; and keeps the supervisor informed of progress and of potentially controversial matters.
(limit characters)