Patent and Trademark Office Logo
Position Title
IT Cybersecurity Specialist (INFOSEC)
Agency
Patent and Trademark Office
Announcement Number
TMCO-CISO-25-12661498-DH Opens in new window
Open Period
Wednesday, January 8, 2025 to Friday, January 24, 2025
For preview purposes only. To apply, please return to the USAJOBS announcement and click the Apply button.
Eligibilities
1. Do you claim Veterans’ Preference? (limit characters)
2. Are you a current or former federal employee displaced from the agency hiring for this position? If yes, confirm:
  • you are located in the same local commuting area of the vacancy; AND,
  • you are applying to a position that is at or below the grade level of the position from which you were or will be separated; AND,
  • you are applying to a position that does not have greater promotion potential than the position from which you were or will be separated; AND,
  • your last performance rating of record is at least fully successful or the equivalent. For more information, review the USAJOBS Help Center.

To verify your eligibility, you must submit supporting documentation such as a Reduction in Force (RIF) separation notice or a Proposed Removal/Separation notice to include your latest performance rating (if the notice does not have this information included, you must submit a copy of your most recent performance appraisal) and a copy of your latest Notification of Personnel Action, Standard Form 50.
(limit characters)
3. Are you a current or former Federal employee displaced from a position in a Federal agency other than the agency hiring for this position? If yes, confirm:
  • you are located in the same local commuting area of the vacancy; AND,
  • you are applying to a position that is at or below the grade level of the position from which you were or will be separated; AND,
  • you are applying to a position that does not have greater promotion potential than the position from which you were or will be separated; AND,
  • your last performance rating of record is at least fully successful or the equivalent. For more information, review the USAJOBS Help Center.

To verify your eligibility, you must submit supporting documentation such as a Reduction in Force (RIF) separation notice to include your latest performance rating (if the notice does not have this information included, you must submit a copy of your most recent performance appraisal) and a copy of your latest Notification of Personnel Action, Standard Form 50.
(limit characters)
4. If you are a male at least 18 years of age, born after December 31, 1959, have you registered with the Selective Service system? (limit characters)
5. Are you a retiree receiving a Federal annuity?
Note: If you are an annuitant, your salary or annuity may be reduced upon employment.
(limit characters)
6. Have you accepted a Voluntary Separation Incentive Payment (VSIP/"buyout") from a Federal agency within the past 5 years? (limit characters)
Preferences
1. Select the lowest grade you are willing to accept for this position. (limit characters)
2. How did you hear about this USPTO job opportunity? (No Choice Limit) (limit characters)
3. Have you held a political appointment within the previous five-year period? (limit characters)
4. If you are a current or former Federal civilian employee, by what agency/office or Department of Commerce bureau are you employed? (limit characters)
5. If you answered "Other" to the above question, please enter the agency and organization. (limit characters)
Assessment 1
Thank you for your interest in the IT Cybersecurity Specialist (INFOSEC), GS-2210-09/11, position with the United States Patent and Trademark Office (USPTO). Your resume and the responses you provide will be used to determine if you are among the best qualified for this position. Your responses are subject to verification. Please review your responses for accuracy before you submit your application. (limit characters)
1. Specialized Experience is experience that has equipped applicants with the particular knowledge, skills and abilities to successfully perform the duties of the position, and that is typically in or related to the position to be filled. To be creditable, specialized experience must have been equivalent to at least the GS-09 grade level in the federal service. Select the one statement that best describes the experience that you possess that demonstrates your ability to perform the work of an Information Technology Cybersecurity Specialist (INFOSEC) at the GS-11 grade level or equivalent in the federal service. (limit characters)
Select the one statement that most accurately describes your training and experience carrying out each task using the scale provided. (limit characters)
2. Perform the initial, forensically sound collection of images and inspects to discern possible mitigation/remediation on enterprise systems. (limit characters)
3. Conduct cyber defense trend analysis and reporting. (limit characters)
4. Perform the identification and analysis of anomalies in network traffic using metadata. (limit characters)
5. Oversee research, analysis, and correlation across a wide variety of all-source data sets (indications and warnings). (limit characters)
6. Participate in technical support to enterprise-wide cyber defense technicians to resolve cyber defense incidents. (limit characters)
7. Lead the ownership of incidents originating in the SOC and works incidents toward resolution including any final reports required for internal and external audiences. (limit characters)
8. Correlate incident data to identify specific vulnerabilities and make recommendations that enable expeditious remediation. (limit characters)
9. Perform cyber defense incident triage, determining scope, urgency, and potential impact, identifying the specific vulnerability, and making recommendations that enable expeditious remediation. (limit characters)
10. Identify applications and operating systems of a network device based on network traffic. (limit characters)
11. Reconstruct malicious attacks or activities based on network traffic. (limit characters)
12. Identify network mapping and operating system (OS) fingerprinting activities. (limit characters)
13. Perform technical (evaluation of technology) and nontechnical (evaluation of people and operations) risk and vulnerability assessments of relevant technology focus areas (e.g., local computing environment, network and infrastructure, enclave boundary, supporting infrastructure, and applications). (limit characters)
14. Provide input to assist in creation of recommendations regarding the selection of cost-effective security controls to mitigate risk (e.g., protection of information, systems, and processes). (limit characters)
15. Support the management of systems that meet current and future intellectual property and business requirements, and apply, extend sub-systems. (limit characters)
16. Assist in the evaluation of the impact that emerging security threats will have on mission needs and organizational practices. (limit characters)
17. Complete identified special projects and meets milestones and goals as directed. (limit characters)
18. Specialized Experience is experience that has equipped applicants with the particular knowledge, skills and abilities to successfully perform the duties of the position, and that is typically in or related to the position to be filled. To be creditable, specialized experience must have been equivalent to at least the GS-07 grade level in the federal service. Select the one statement that best describes the experience that you possess that demonstrates your ability to perform the work of an Information Technology Cybersecurity Specialist (INFOSEC) at the GS-09 grade level or equivalent in the federal service. (limit characters)
Select the one statement that most accurately describes your training and experience carrying out each task using the scale provided. (limit characters)
19. Ensure data security and compliance with legal standards, especially in post-incident scenarios. (limit characters)
20. Perform intrusion detection, vulnerability management, and/or penetration testing to ensure that cybersecurity inspections, tests, and reviews are coordinated for the network environment. (limit characters)
21. Monitor external data to maintain currency of cyber defense threat condition and determines which security issues may have an impact on the enterprise. (limit characters)
22. Conduct cyber defense trend analysis and reporting. (limit characters)
23. Gather data through data analytics reports, provides input for reports of findings, identifies potential areas that may benefit from policy changes and/or process improvements, and develops recommendations for review and consideration. (limit characters)
24. Attend team and group project meetings to gain understanding of issues for review and resolution (limit characters)
25. Perform the initial, forensically sound collection of images and inspects to discern possible mitigation/remediation on enterprise systems. (limit characters)
26. Review solutions to mitigate security concerns and issues. (limit characters)
27. Utilize advanced forensic techniques to thoroughly investigate and analyze cyber incidents, aiding in the recovery of affected systems and preventing future breaches (limit characters)
28. Assist in preparation and follows plans, instructions, guidance, and standard operating procedures concerning the security of network system(s) operations. (limit characters)
29. Participate in developing correlation incident data to identify specific vulnerabilities and make recommendations that enable expeditious remediation. (limit characters)
30. Perform the identification and analysis of anomalies in network traffic using metadata. (limit characters)
31. Attend team and group project meetings to gain understanding of the organizational and customer IT strategic objectives, goals, plans and priorities. (limit characters)
32. Support the management of systems that meet current and future intellectual property and business requirements, and apply, extend sub-systems. (limit characters)
33. Assist in the evaluation of the impact that emerging security threats will have on mission needs and organizational practices. (limit characters)