Department of the Air Force - Agency Wide Logo
Position Title
IT CYBERSECURITY SPECIALIST (INFOSEC)
Agency
Department of the Air Force - Agency Wide
Announcement Number
8X-DCIPS-518989-JR Opens in new window
Open Period
Thursday, August 15, 2024 to Wednesday, August 21, 2024
For preview purposes only. To apply, please return to the USAJOBS announcement and click the Apply button.
Eligibilities
1. Do you claim Veterans’ Preference? (limit characters)
Please answer the following question by selecting a response. NOTE: Applicants are responsible for claiming their appropriate eligibility. Veterans' Preference is NOT an eligibility; it is a hiring preference, where applicable. You must select an eligibility to receive consideration for this position. If you are not a US citizen, you are not "eligible" to apply for this position and your application will not be referred to the hiring manager.

We are not responsible for erroneous eligibilities that you list or fail to list. All competitive eligible candidates must complete the entire Application Questionnaire as part of the application package. Ensure you thoroughly read the instructions for each section.
(limit characters)
2. US Citizen - Are you a US citizen (either by birth or naturalization) or national of the United States? (limit characters)
Preferences
1. I am a current or prior military member of the Armed Forces that is retiring or has been retired less than 180 days. Hiring (appointments or transfers) of retiring or retired members of the Armed Forces to positions in any DoD Component during the 180 days immediately following retirement may only be made IAW DoDI 1402.01 and may require a waiver for appointment prior to the 180 days from official military retirement. (limit characters)
2. Are you retired from the Federal civilian service or are you in a phased retirement and receiving an annuity? (limit characters)
3. Current or Former Political Appointees: The Office of Personnel Management (OPM) must authorize employment offers made to current or former political appointees. If you are currently employed, or have been employed within the last 5 years, in any one of the categories below, you must disclose this information. Failure to disclose this information could result in disciplinary action including removal from Federal Service.

Are you a current or former political appointee as described under 5 U.S.C. sections 5312 through 5316?
-OR-
Are you a current or former Schedule A or Schedule C political appointee, or an appointee who serves/served in a political capacity under agency-specific authority in the Executive Branch?
-OR-
Are you a current or former political appointee or non-career SES Executive Branch employee?
(limit characters)
4. Did you voluntarily separate from federal service and receive Voluntary Separation Incentive Pay (VSIP)?

NOTE: If your response is yes, you must provide a copy of your SF 50 or Leave and Earnings statement showing receipt of payment as part of your application submission. If you become reemployed by the federal government within 5 years of separating from federal service and have received a VSIP, you will be required to repay the full VSIP amount paid to you.
(limit characters)
5. Are you a military spouse who is currently married to an active duty military member?

NOTE: This item is for demographic reporting only. It does not confer eligibility or preference. If you want to apply as a military spouse, you must select from the eligibility options above. Military spouse and military spouse preference may not be available for all positions.
(limit characters)
6. Are you currently working or previously worked in a Department of Defense position in a foreign location(s)? (limit characters)
7. 24-Month US Physical Presence: Have you had a continuous physical presence in the United States or a non-foreign area (e.g., Guam, HI, AK) for the past 24-months? (limit characters)
Assessment 1
This section will be used to determine if you possess the basic requirements needed to qualify for an IT Cybersecurity Specialist (INFOSEC), GG-2210-12. Failure to respond to this question will result in an ineligible rating. 
 
(limit characters)
1. Select the one statement that best describes experience that you possess that demonstrates your ability to perform the work of Information Technology Specialist (INFOSEC) at the GG-2210-12 grade level or equivalent pay band. Your resume must support the response you select. (limit characters)
For each task in the following group, choose the statement from the list below that best describes your experience and/or training. Please select only one letter for each item. (limit characters)
Select the one statement that most accurately describes your training and experience carrying out each task using the scale provided. (limit characters)
2. Apply security principles related to IT, IA, and MA to conduct difficult and complex analysis of network and system-level events using data collected from a variety of cyber defense tools (e.g., IDS alerts, firewall logs, proxy logs), network packet capture, and host system information in order to discover and mitigate threats or malicious activity. (limit characters)
3. Analyzes identified malicious activity to determine weaknesses exploited, exploitation methods, and effects on systems or information.
(limit characters)
4. Conduct research, analysis, and correlation across a wide variety of data sets for indications and warnings. (limit characters)
5. Identify and characterize systems, network components, and observed communications protocols to construct a baseline model of protected assets, interrelationships, and authorized activity. (limit characters)
6. Execute security reviews, identifies gaps in security architectures, and makes recommendations to mission partners and higher headquarters for risk mitigation strategies. (limit characters)
7. Provide expert advice and input to mission partners to recommend modifications or adjustments to security practices, system configurations, network architectures, applications, and appliances for hardening specified terrain against threat specific unauthorized activity to reduce attack surfaces and increase the difficulty of system access and exploitation. (limit characters)
8. Analyze mission partner cyber defense policies and configurations and evaluates compliance with regulations and organizational directives. (limit characters)
9. Implement technical and non-technical risk evaluations and vulnerability assessments of mission partner policies, local computing environments, network infrastructure, enclave boundaries, and supporting applications. (limit characters)
10. Conduct and support penetration testing on enterprise network assets, computers, and infrastructure to assess the security posture and effectiveness of response operations against current and future risks to specified mission partner terrain. (limit characters)
11. Apply broad knowledge of defensive methodologies, adversary tactics, advanced exploitation methodologies, and programming principles to plan and execute complex penetration activities on mission partner networks and systems to determine potential attack vectors, entry points, trust relationships, and exfiltration paths based on threat intelligence. (limit characters)
12. Conduct cyber analysis using appropriate weapon system and/or tools as designated by team or mission lead to enable hardening of systems and networks against exploitation. (limit characters)
13. Execute missions using the appropriate cyber weapon system to find evidence of unauthorized, malicious, or adversary activity against the supported mission on operational systems. (limit characters)
14. Provide technical input during mission execution and ensures assigned milestones are met. (limit characters)
15. Assist with the formulation of conclusions and recommendations for mission systems based on the identified network vulnerabilities and operational security concerns that impact the readiness of organization's programs and the overall security posture of the organization. (limit characters)
CERTIFICATION: I certify that, to the best of my knowledge and belief, all of the information included in this questionnaire is true, correct, and provided in good faith. I understand that if I make an intentional false statement, or commit deception or fraud in this application and its supporting materials, or in any document or interview associated with the examination process, I may be fined or imprisoned (18 U.S.C. 1001); my eligibilities may be cancelled, I may be denied an appointment, or I may be removed and debarred from Federal service (5 C.F.R. part 731). I understand that any information I give may be investigated. I understand that responding "No" to this item will result in my not being considered for this position. (limit characters)
16. Failure to agree or respond to the statement below will disqualify you from further consideration for the position. Select the most appropriate response below. (limit characters)