Skip to main content

Grade: 14

1 GS-14 Choose the one answer that best describes your experience. Answer to this question is required
  • I have one year of specialized experience equivalent to the GS-13 grade level in the Federal service performing work related to the duties of the position described in the vacancy announcement.
  • I do not meet any of the requirements as described.

Grade: 15

1 GS-15 Choose the one answer that best describes your experience. Answer to this question is required
  • I possess at least one year of specialized experience equivalent to the GS-14 grade level in the Federal service performing work related to the duties of the position described in the vacancy announcement.
  • I do not meet any of the requirements as described.
2 Do you have experience in leading and conducting audits and assessments of cyber security programs? Answer to this question is required
  • Yes
  • No
3 Do you have experience in evaluating technical criteria for disciplines assessed (e.g., network security, special nuclear material, and the protection of classified and sensitive information) while planning and conducting cyber security and special reviews at nuclear and non-nuclear facilities? Answer to this question is required
  • Yes
  • No
4 Have you provided expert technical advice, guidance, and recommendations to management and other technical specialists on critical cyber security issues? Answer to this question is required
  • Yes
  • No

Grade: All Grades

1 I understand that the responses provided in this questionnaire must be fully supported in my online resume. I further understand that my resume must provide detailed descriptions and/or examples of my knowledge, skill, and abilities as required in the vacancy announcement and that my failure to do so, may result in my being rated "Ineligible" or "Not Qualified" for this position. Answer to this question is required
  • Yes
  • No
2 Are you currently serving or have served in the last five (5) years in a Political Appointment in the Federal Government? Answer to this question is required
  • Yes
    2.1 Please list the title, agency and dates of this appointment. Please note you will be required to provide proof to meet OPM Approval of your appointment if selected. Maximum length of 1000 characters.
  • No
3 This position requires a security clearance. Are you able to obtain or maintain a security clearance? Answer to this question is required
  • Yes
  • No
4 Do you have dual citizenship with the United States and another country? Answer to this question is required
  • Yes
    4.1 Please list the country(ies), other than the United States, with which you possess citizenship. Maximum length of 250 characters.
  • No
5 Can you travel approximately 30% of the time (15+ weeks a year) for a period of 2 weeks (or longer) at a time? Answer to this question is required
  • Yes
  • No
6 Which statement best describes your IT experience applying project management procedures to daily assignments with emphasis on effective planning and project execution? Answer to this question is required
  • Monitors program/project execution activities and resources to mitigate risk and to resolve issues to ensure successful implementation.
  • Monitors, reviews, and analyzes program/project implementation.
  • Makes recommendations for program/project adjustments.
  • No experience in the planning and execution of projects.
7 Do you have experience in managing and conducting penetration testing of networks that contain sensitive or proprietary information, business systems that require a high degree of availability, and information that requires a high degree of integrity? Answer to this question is required
  • Yes
  • No
8 From the list below, check all that apply, indicating the work experiences you have that demonstrate your knowledge of information system life cycle management and development concepts, technologies and practices: Answer to this question is required
  • Requirements management
  • Design and development
  • Testing
  • Quality assurance
  • Configuration management and implementation
  • None of the above.
9 Which of the following statements describe activities you have performed as an Information Technology security systems subject matter expert? (please check all that apply): Answer to this question is required
  • Providing expert technical advice, guidance, and recommendations to management and other technical specialists on critical information security infrastructure and related information technology issues.
  • Providing oversight for information and security systems technologies, methodologies, and processes, then documenting related organizational compliance.
  • Developing and implementing strategic and operational plans to align information and systems security solutions with organizational business objectives and use that to improve customer service.
  • Analyzing complex information technology issues, problems, and challenges and to clearly and effectively communicate solutions in a variety of ways, including in a non-technical manner to senior executives and officials.
  • Analyzing security performance issues and identified trends, systemic issues, and underlying causal factors.
  • Participating in meetings, conferences, and symposiums concerning networking, telecommunications, and information security.
  • Applying knowledge of the operating characteristics of Internet, telecommunications and networking equipment, server and workstation hardware, and system software to identify and alleviate problems or failures and to maintain a secure operating environment.
  • None of the above.
10 Select the choices where you have utilized your knowledge and skill in applying advanced IT principles, concepts, methods, standards, and practices. Answer to this question is required
  • Developed and interpreted policies, procedures, and strategies governing the planning and delivery of services throughout the agency
  • Provided expert technical advice, guidance, and recommendations to management and other technical specialists on critical IT issues
  • Applied new developments to previously unsolvable problems
  • No experience as listed above
11 From the functions listed below, select the cyber security functions that you have regularly performed. Answer to this question is required
  • Assess impact of regulatory change on cyber program.
  • Authored cyber security orders and procedures.
  • Implement cyber security changes to enterprise wide business processes.
  • Assess organizational compliance with security policies.
  • Develop and manage project(s) to bring the organization into compliance with cyber security standards.
  • None of the above.
12 Have you analyzed cyber security performance issues and identified lessons learned trends, systemic issues, and underlying causal factors? Answer to this question is required
  • Yes
  • No
13 Please select all that apply to describe your experience with managing the retirement of software systems within a large and complex organization. Answer to this question is required
  • I led a project team responsible for the retirement of existing software and systems within a large and complex organization.
  • I led the cleanup and migration of data from retired software systems to the new software systems.
  • None of the above
14 Do you have experience in designing or evaluating the architecture of large-scale computer networks, enclave boundaries and security controls, and secure computer applications that store, process and share data and information? Answer to this question is required
  • Yes
  • No
15 Have you applied risk management strategies and developed risk profiles using IT security systems? Answer to this question is required
  • Yes
  • No
16 Have you applied risk management strategies for cyber security? Answer to this question is required
  • Yes
  • No
17 Which of the following software development lifecycle activities do you consider yourself as having advanced level knowledge? Answer to this question is required
  • Managing, reviewing, and resolving conflicts associated with the development of overall functional and systems requirements and specifications.
  • Working with stakeholders to determine and document requirements.
  • Conducting feasibility studies and trade-off analyses.
  • Defining system scope and objectives.
  • Developing a project management plan to identify, prioritize, and manage requirements to support business needs and enhancements.
  • Ensuring the integration of all systems components, e.g., procedures, databases, software, supporting systems.
  • Planning and scheduling the installation of new or modified systems and application software.
  • Resolving software interface and interoperability problems.
  • Insuring systems availability, functionality, integrity, and efficiency.
  • Maintaining systems configuration.
  • Managing the installation and integration of systems fixes, updates, and enhancements.
  • Conducting user acceptance testing.
  • Ensuring systems are in compliance with statutory and regulatory requirements.
  • Ensuring systems maintain proper certification and accreditation.
  • Establishing service level agreements and system performance baselines.
  • None of the above.
18 This position is responsible for communicating a variety of issues on an interpersonal level. Please indicate which of the following duties you have performed as a regular part of a job. Answer to this question is required
  • Negotiate policy changes
  • Mediate or facilitate problem resolution
  • Brief management on organizational issues or similar topics
  • Defend recommendations on controversial issues to top management
  • Interview individuals to obtain study data
  • Facilitate coordination of efforts between organizational entities
  • Independently plan, host & conduct meetings
  • Act as a management representative
  • Serve on panels, committees or task forces on technical or programmatic cyber security topics
  • Regularly consulted by others on technical or programmatic issues
  • None of the above