Office of the Assistant Secretary for Health Logo
Position Title
Lead Information Technology Specialist (INFOSEC)
Agency
Office of the Assistant Secretary for Health
Announcement Number
HHS-OASH-IMP-23-12056079 Opens in new window
Open Period
Friday, July 21, 2023 to Thursday, July 27, 2023
For preview purposes only. To apply, please return to the USAJOBS announcement and click the Apply button.
Eligibilities
PLEASE READ THE FOLLOWING ELIGIBILITY QUESTIONS CAREFULLY. YOUR RESPONSES WILL AFFECT YOUR CONSIDERATION FOR THIS POSITION.

The following questions address if you are eligible to apply to this job opportunity announcement through Merit Promotion procedures. You will only be considered under the options you have selected, so please choose carefully. If you respond that you do not meet any of the following criteria, you will not be considered for this position under this announcement. Please refer to the announcement for additional information. If you still have questions concerning your eligibility for consideration, you may reach out to the contact in the announcement prior to the announcement closing. You must submit a complete application by the close of the announcement to be considered.
(limit characters)
1. Are you a current or former federal employee displaced from the Department of Health and Human Services? If yes, confirm:
• You are located in the same local commuting area of the vacancy
• Your grade is equivalent to or above the grade level of the vacancy AND
• Your last performance rating of record is at least fully successful or the equivalent.

You will be required to submit supporting documentation to validate your claim of CTAP eligibility such as a Reduction in Force (RIF) separation notice or a Proposed Removal/Separation notice and a copy of your latest Notification of Personnel Action, Standard Form 50. For more information, review the USAJOBS Resource Center page (https://www.usajobs.gov/Help/working-in-government/unique-hiring-paths/federal-employees/ctap/).
(limit characters)
2. Are you a current Department of Health and Human Services (HHS) employee who is serving under a competitive career or career-conditional appointment in the competitive service?  You must provide qualifying documentation (i.e. SF-50). (limit characters)
3. Are you a current Department of Health and Human Services (HHS) employee who currently holds, or has held a career or career-conditional appointment in the competitive service at the same or higher grade level with the same or higher promotion potential as the position being announced?  You must provide qualifying documentation (SF-50). (limit characters)
4. Are you a current United States Public Health Service Commissioned Corps Officer or a United States Public Health Service Commissioned Corps Officer candidate?

If yes:
  • For current active duty USPHS Commissioned Corps officers, submit a copy of your most recent personnel orders.
OR
  • For USPHS Commissioned Corps candidates, submit documentation from the Division of Commissioned Corps Personnel and Readiness (DCCPR) stating you have successfully completed the professional boarding process.
(limit characters)
Preferences
1. In the last five years, based on the closing date of this announcement, have you served or are you currently serving as an Executive Branch political, Schedule C, or Non-career SES appointee? You can find out if you have held one of these appointment types by looking at your Standard Form 50s in your Electronic Official Personnel Folder (eOPF), in Section 5 where the legal authorities are listed.
  • A political appointee is an appointment made by the President without confirmation by the Senate (5 CFR 213.3102(c)) OR an assistant position to a top-level federal official if filled by a person designated by the President as a White House Fellow (5 CFR 213.3102(z)).
  • A Schedule C appointee occupies a position excepted from the competitive service by the President, or by the Director of OPM, because of the confidential or policy-determining nature of the position duties (5 CFR 213.3301 and 5 CFR 213.3302).
  • A Non-career SES appointee is approved by the White House and serves at the pleasure of the appointing official without time limitations (5 CFR 317 Subpart F).
(limit characters)
Assessment 1
1. Basic Requirement: You must have information technology (IT)-related experience demonstrating each of the following four competencies. From the choices below, please select one response indicating how you meet the basic requirement for this position. Note: Your resume must explicitly indicate how you meet this requirement, otherwise you will be found ineligible. (limit characters)
Select “Yes” or “No” to the following question(s). (limit characters)
2. Do you possess at least one year of specialized experience equivalent in difficulty and responsibility to the GS-13 level in the Federal service (obtained in either the public or private sector) performing (3) of the (4) duties that included:
  • Providing technical advice, guidance, and/or recommendations to management and other specialists regarding critical information security issues;
  • Developing long-range plans for IT security systems that anticipate, identify, evaluate, mitigate, and/or minimize risks associated with systems vulnerabilities;
  • Coordinating the implementation of security programs across platforms and/or establishing vulnerability reporting criteria;
  • Identifying needs for changes based on new security technologies or threats.
(limit characters)
Select the one statement that most accurately describes your training and experience carrying out each task using the scale provided. (limit characters)
3. Develop, review, update and/or maintain required system security-related documentation.
(limit characters)
4. Provide advice, counsel, and/or instruction to management on IT security systems issues. (limit characters)
5. Review system-level reports, audit logs and/or vulnerability scan reports on a continuous basis.
(limit characters)
6. Evaluate and/or provide advice regarding new and existing security products, procedures, and/or requirements to ensure systems meet applicable integrity requirements.

(limit characters)
7. Manage the system security authorization process to ensure all systems are authorized and/or accredited prior to operation, are reaccredited within the system life cycle or whenever a significant change occurs.
(limit characters)
8. Develop policies, plans, and/or procedures specifically addressing incident response to ensure the continued reliability and to determine impact of security and accessibility of systems, network, and/or data infrastructure.
(limit characters)
9. Evaluate and/or implement new and existing security products, procedures, or requirements to ensure systems meet applicable integrity requirements.
(limit characters)
10. Assist in developing or implementing programs to ensure that systems, network, and/or data users adhere to systems security policies and procedures. (limit characters)
11. Ensure the organization's strategic plan, mission, vision, and values are communicated to the team and/or integrated into the team's strategies or work plans.
(limit characters)
12. Communicate to the team the data management assignments, projects, actionable events and/or milestones.
(limit characters)
13. Coach the team in the selection and/or application of appropriate problem-solving methods/techniques to provide advice on work methods, practices or procedures. (limit characters)
14. Train or arrange for the training of team members in team building to accomplish tasks or projects or for specific administrative/technical training necessary for accomplishment of individual and team tasks. (limit characters)
15. Identify security risks and/or participates in security risk assessments. (limit characters)
16. Review and/or analyze existing processes and recommend to senior management improvements, new workflows or revised business models to address information security threats and vulnerabilities.
(limit characters)
17. Monitor or enforce malicious code protection programs designed to minimize the risk of introducing malicious code into information systems and networks.
(limit characters)
18. Direct, review, and/or evaluate the impact of new incident response and other known practices. (limit characters)