Office of Inspector General Logo
Position Title
IT Specialist (INFOSEC)
Agency
Office of Inspector General
Announcement Number
24-HUDIG-67-DH Opens in new window
Open Period
Wednesday, July 17, 2024 to Tuesday, July 30, 2024
For preview purposes only. To apply, please return to the USAJOBS announcement and click the Apply button.
Eligibilities
1. Do you claim Veterans’ Preference? (limit characters)
2. Are you a surplus or displaced Federal employee eligible under the Career Transition Assistance Plan (CTAP)?  Click CTAP for eligibility and a detailed list of required documents you must submit in order to be eligible.
 
(limit characters)
3. Are you a displaced Federal employee eligible under the Interagency Career Transition Assistance Plan (ICTAP)?  Click ICTAP for eligibility and a detailed list of required documents you must submit in order to be eligible.
 
(limit characters)
Preferences
1. Select the lowest grade you are willing to accept for this position. (limit characters)
2. Are you currently serving or have served in the last five years in a Political Appointment in the Federal Government? (limit characters)
3. If you were born a male after December 31, 1959, and are at least 18 years of age, have you registered with the Selective Service System (select "Not applicable" if this question does not apply to you)? (limit characters)
4. Are you a current Federal employee? (limit characters)
5. If you are, or ever were a Federal civilian employee, indicate the pay plan and grade level or pay band of the highest graded position you have ever held. (limit 250 characters)
Performance Appraisal
1.

As outlined in the vacancy announcement, you must submit a copy of your most recent performance appraisal that includes the final rating. If you have not received this documentation for any reason (not employed, current employer does not give a performance appraisal, etc.) you must explain why in your application. If you fail to provide a copy of the performance appraisal, or a statement advising why it is unavailable, you will be removed from further consideration.

Type "yes" in the text box below if you are providing a performance appraisal meeting the above requirements with your application. If you are unable to provide a performance appraisal with your application, please provide a reason in the text box below. (This is required of all applicants regardless of prior federal service. "N/A" is not considered an acceptable response.)

(limit characters)
Assessment 1
Specialized experience for the GS-14 is one year (52 weeks) of experience at the GS-13 level or equivalent in the public or private sectors, which is directly related to the position as listed in this announcement and has equipped the candidate with the particular knowledge, skills, and abilities to successfully perform the duties of the position. Specialized experience includes:
- Skill in applying, advanced IT principles, concepts, methods, standards, and practices sufficient to provide sound guidance, technical advice and recommendations to management on all security policies and procedures;
- Managing a small investigative network performing duties in multiple, affiliated roles such as systems administration, network security, and implementing network updates/changes;
- Identifying, documenting, and implementing recommendations to ensure network compliance with the Federal Information Security Management Act (FISMA), and/or identifying the need for risk assessments where necessary; AND
- Conducting forensic analysis/review of electronic evidence, network logs, and security device output relating to the investigation of attacks, intrusions, and threats against an organization's computer and network infrastructure.
(limit characters)
1. Select the answer that best describes your experience as it directly relates to the specialized experience statement. Carefully review your application and ensure that your response is supported by your resume. (limit characters)
2. This experience must be clearly documented in your resume. Indicate where we can find this specialized experience to ensure you receive proper credit. (limit 250 characters)
Specialized experience for the GS-13 is one year (52 weeks) of experience at the GS-12 level or equivalent in the public or private sectors, which is directly related to the position as listed in this announcement and has equipped the candidate with the particular knowledge, skills, and abilities to successfully perform the duties of the position. Specialized experience includes performing a full range of advanced information technology security activities such as:

- Analyzing and preserving evidence used in reporting information security incidents;
- Analyzing and researching Information Security Programs to assess risks and weaknesses;
- Conducting IT vulnerability assessments;
- Serving as an authority on information technology security audits; AND
- Providing advice based on research of governing policies, regulations, and legal precedents.
(limit characters)
3. Select the answer that best describes your experience as it directly relates to the specialized experience statement. Carefully review your application and ensure that your response is supported by your resume. (limit characters)
4. This experience must be clearly documented in your resume. Indicate where we can find this specialized experience to ensure you receive proper credit. (limit 250 characters)
5. I have experience and knowledge of the following concepts as each applies to management and security controls. (limit characters)
6. I have experience and knowledge of the following concepts as each applies to cyber/information security technologies. (limit characters)
7. In which of the following areas have you worked with IT security? (limit characters)
8. Please indicate the types of system security with which you have experience. (limit characters)
9. Select all of the tools and/or functional areas below in which you have work-related experience or training. (limit characters)
10. Have you implemented system authorization/certification based on National Institute of Standards and Technology (NIST), National Security Agency (NSA), or other relevant sources? (limit characters)
11. Have you conducted security tests in order to evaluate system integrity? (limit characters)
12. Which of the following reflects your highest level of experience with system security? (limit characters)
13. Which of the following best reflects your highest level of experience correcting security vulnerabilities and implementing security controls? (limit characters)
14. Which of the following long term solutions have you used in support of an incident? (limit characters)
15. Which of the following best reflects your highest level of experience gathering and analyzing data to assess current practice against established policies and best practices? (limit characters)
16. Select the choice that best describes your experience in supporting and implementing changes in policies, procedures, and organizational structure. (limit characters)
17. Choose the statement that best describes your ability to plan and execute work sufficiently to break down the requirements of the assigned work components for accomplishment. (limit characters)
18. Which of the following incident analysis duties have you performed? (limit characters)
19. Please select the response that best describes your experience developing, implementing, maintaining, & reviewing Plan of Action & Milestones (POA&Ms). (limit characters)
20. Select all the below as they relate to your experience administering a network and/or troubleshooting/responding to network based problems. (limit characters)
21. Select the choice that best describes your experience in developing and interpreting policy on designated programs. (limit characters)
22. Have you developed and modified information technology security policies for an organization? (limit characters)
23. Have you developed Action Plans or Contingency Plans to deal with information technology security issues? (limit characters)
24. Select the answer that best indicates your experience in expressing ideas effectively in writing. (limit characters)
25. Select the group or groups to which you have made oral presentations. (limit characters)
26. Select the choice that best describes your ability to establish and maintain effective working relations outside of the organization. (limit characters)
27. Have you prepared written reports or papers that focused on information technology security matters? (limit characters)
28. Which of the following contacts do you have experience communicating, both orally and in writing, with? (limit characters)
29. Select all the following that pertain to you and having the responsibility of being a Point of Contact. (limit characters)
30. Have you collected, analyzed, and disseminated intelligence information on cyber threats to infrastructures that directly affected security? (limit characters)
31. Have you provided information security risk analysis and system integrity testing services as part of a structured system development process? (limit characters)
32. Have you developed guidelines or training materials related to information technology security issues? (limit characters)
33. Select the choice that best describes your experience in developing plans for and administering a nationwide program or an organization. (limit characters)
34. How would you rate your level of experience/knowledge in incident response and analysis? (limit characters)
35. Select the choice that best describes your experience in establishing goals for a process or project, and translating those goals into action plans. (limit characters)
36. Have you identified information technology security issues and made recommendations for policy changes to resolve these issues? (limit characters)