Skip to main content
U.S. DEPARTMENT OF THE INTERIOR
BUREAU OF LAND MANAGEMENT

Vacancy Details

Grade: 14

1 I qualify for the GS-14 because I have one year of specialized experience equivalent to, or at, the GS-13 level. I have read the vacancy announcement for examples of specialized experience needed to qualify for this position. Answer to this question is required
  • Yes
  • No
2 Select the statement that best describes your experience identifying issues, resolving conflicts, and negotiating solutions. Answer to this question is required
  • I have worked with the Department level, Agency level, Bureau level, District level, Field Office level, state and local levels of government identifying issues, resolving conflicts, and negotiating solutions.
  • I have worked with Agency level, Bureau level, District level, Field Office level, state and local levels of government identifying issues, resolving conflicts, and negotiating solutions.
  • I have worked with Bureau level, District level, Field Office level, state and local levels of government identifying issues, resolving conflicts, and negotiating solutions.
  • I have worked with District level, Field Office level, state and local levels of government identifying issues, resolving conflicts, and negotiating solutions.
  • I have worked with Field Office level, state and local levels of government identifying issues, resolving conflicts, and negotiating solutions.
  • I have worked with state and local levels of government identifying issues, resolving conflicts, and negotiating solutions.
  • None of the above
3 Select the statement that best describes your ability to communicate technical information: Answer to this question is required
  • I have not presented or provided technical or non-technical information.
  • I have presented or provided only non-technical information to persons on the job.
  • I have made presentations or provided technical information on the job to supervisors, coworkers, and others.
  • I have been acknowledged for my ability to present or provide technical and non-technical information to a variety of audiences.
4 Select the statement that best describes your communication skills to interact with people who have diverse interests and backgrounds. Answer to this question is required
  • I have not had education, training or experience in performing this task.
  • I have had education or training in performing this task, but have not yet performed it on the job.
  • I have performed this task on the job, with close supervision from supervisor or senior employee.
  • I have performed this task as a regular part of a job, independently and normally without review by a supervisor or senior employee.
5 Which of the following best describes your experience in performing contingency planning to assure that adequate emergency response, back-up operations, and post-disaster recovery plans are current and adequate? Answer to this question is required
  • I have routinely performed the full range of contingency planning activities as a central or major part of my work. I have trained others in performance of this task, and/or others have consulted me as an expert for assistance.
  • I have routinely and independently performed contingency planning activities as a regular part of my work, usually without review.
  • I have performed contingency planning activities as a part of my job under generally close supervision to ensure compliance with correct procedures.
  • I have completed formal education or training in performing this task, but have not yet fully performed this task on the job.
  • I have little to no education, training or experience in this area.
6 Which of the following best describes your application of regulatory requirements, policy, and legislation (from agencies such as National Security Agency, National Institute of Standards and Technology, OMB, and GAO) which impact IT security operations, objectives, and goals? Answer to this question is required
  • I have routinely applied regulations and legislation as a major part of my IT security work. I have trained others in applying regulations and legislation, and/or others have consulted me as an expert for assistance.
  • I have routinely and independently applied regulations and legislation as a regular part of my IT security work, usually without review.
  • I have applied regulations and legislation as a regular part of my IT security work under generally close supervision to ensure compliance with correct procedures. Or, I have completed formal education or training in performing this task, but have not yet performed this task on the job.
  • I have little to no training or experience in performing this task.
7 Which of the following best describes your experience in conducting risk and vulnerability assessments of planned and installed information systems and conducting security evaluations, audits and reviews for the purposes of enhancing IT security? Answer to this question is required
  • I have routinely conducted risk and vulnerability assessments and security evaluations, audits and reviews as a major part of my IT work. I have also trained others in the performance of these tasks, and/or others have consulted me as an expert for assistance.
  • I have routinely conducted risk and vulnerability assessments and security evaluations, audits and reviews as a regular part of my IT work, usually without review.
  • I have conducted risk and vulnerability assessments and security evaluations, audits and reviews as a regular part of my IT work under generally close supervision to ensure compliance with correct procedures. Or, I have completed formal education or training to conduct risk and vulnerability assessments and security evaluations, audits and reviews, but have not yet performed them on the job.
  • I have little to no training or experience in performing these tasks.
8 Which of the following best describes your experience, application and implementation of the Federal Government Certification and Accreditation process and procedures? Answer to this question is required
  • I have not had education, training or experience in performing this task.
  • I have had education or training in performing this task, but have not yet performed it on the job.
  • I have performed this task on the job, with close supervision from supervisor or senior employee.
  • I have performed this task as a regular part of the job, independently and usually without review by supervisor or senior employee.
  • I have supervised performance of this task and/or I have trained others in performance and/or am normally consulted by others as an expert for assistance in performing this task.
9 Select the statement that best describes your experience in developing technical evaluations of network security infrastructure: Answer to this question is required
  • I develop technical evaluations of network security hardware and software taking into consideration both technical and business requirements and make recommendations to senior executives.
  • I regularly conduct technical evaluations of network security hardware and software, document the results and provide recommendations to management.
  • I participate in technical evaluation of network security equipment and software and develop the documentation of the results.
  • I have limited experience in technical evaluations of network security systems.
  • None of the above.
10 Select the statement that best describes your experience in developing network intrusion systems: Answer to this question is required
  • I have broad national level experience in developing network intrusion detection systems, incident mitigation, and network scanning technical procedures and standards.
  • I have local or State level experience in developing network intrusion detection systems, incident mitigation, and network scanning technical procedures and standards.
  • I have limited experience in developing network intrusion detections systems, incident mitigation, and network scanning technical procedures and standards.
  • I have had training in developing network intrusion detection systems, incident mitigation, and network scanning technical procedures and standards.
  • None of the above.
11 Select the statement that best describes your experience in network forensics investigations: Answer to this question is required
  • I have regularly planned, designed, and developed enterprise wide network forensic systems and policies that respond to business requirements and have regularly participated in Bureau-wide forensic investigations or lead national level computer incident response teams.
  • I have regularly operated and integrated network forensics systems across enterprise networks and performed as team lead in network forensics investigations or computer incident response teams.
  • I have regularly assisted in the development, configuration, installation, and maintenance of local network forensics systems, and performed routine network forensics investigations.
  • I have had education or training in network forensics systems.
  • I have limited knowledge of network forensics systems.
12 Select the statement that best describes your level of experience in developing secure public web sites and web-based applications: Answer to this question is required
  • I am a certified security expert, experienced in developing secure web applications and frequently instruct others in proper web-site security.
  • I have formal classroom training in web-site security, know how to fix most types of security problems and have developed many secure web-based applications.
  • I know how to write secure web-based applications and can fix most common errors.
  • I know the principles of building secure web-based forms and applications and can describe the difference between cross-site scripting and SQL injection.
  • I have experience in testing web-site security and can interpret results of security scans but do not generally fix code errors.
  • I have no experience in building secure websites and rely on others to manage web security.
13 Select the statement that best describes your experience in designing, installing the operating a wireless local area network (WLAN). Answer to this question is required
  • I have designed, installed, and maintained a secure corporate WLAN. I understand and have routinely utilized the concepts and technologies associated with: Radio frequency coverage requirements, access point installation, and antenna usage; association and authentication protocols, 802.1X in a wireless environment, Extensible Authentication Protocol EAP; and WLAN controllers.
  • I have maintained an existing secure corporate WLAN. I am somewhat knowledgeable with design concepts and have routinely maintained a controller based WLAN environment including authentication, association, security, and hardware trouble resolution.
  • I have little to no experience with a corporate WLAN but I have installed, secured, and operated consumer grade home wireless systems.
  • I have no experience with wireless technologies.
14 Select the statement that best describes your experience leveraging cloud based IT infrastructure and solutions to meet a business demand. Answer to this question is required
  • I have experience in this arena working independently.
  • I have experience in the arena with more senior level staff support.
  • I have very limited experience in this arena.
  • None of the above.
15 Select all of the statements that best describe your experience analyzing sensitive and confidential security data in systems for Personally Identifiable Information (PII), specifically in the area of collection and securing of information for the following types of applications. Answer to this question is required
  • Financial Information (i.e. credit card)
  • Personal Information (i.e. personal name and address)
  • None of the above
16 I possess a current Certified Information Systems Security Professional (CISSP) certification Answer to this question is required
  • Yes
  • No

Grade: All Grades

No questions specified.