Skip to main content
U.S. Department of Energy
About DOE
Careers Home
Veterans
Persons with Disabilities
Students & Recent Graduates
Toggle navigation
About DOE
Careers Home
Veterans
Persons with Disabilities
Students & Recent Graduates
Print
Vacancy Details
View Eligibility Questions
View Vacancy Questions
Print Vacancy
Vacancy Questions Preview
Grade: 14
1
GS-14 Choose the one answer that best describes your experience.
Answer to this question is required
I have one year of specialized experience equivalent to the GS-13 grade level in the Federal service performing work related to the duties of the position described in the vacancy announcement.
I do not meet any of the requirements as described.
Grade: 15
1
GS-15 Choose the one answer that best describes your experience.
Answer to this question is required
I possess at least one year of specialized experience equivalent to the GS-14 grade level in the Federal service performing work related to the duties of the position described in the vacancy announcement.
I do not meet any of the requirements as described.
2
Do you have experience in leading and conducting audits and assessments of cyber security programs?
Answer to this question is required
Yes
No
3
Do you have experience in evaluating technical criteria for disciplines assessed (e.g., network security, special nuclear material, and the protection of classified and sensitive information) while planning and conducting cyber security and special reviews at nuclear and non-nuclear facilities?
Answer to this question is required
Yes
No
4
Have you provided expert technical advice, guidance, and recommendations to management and other technical specialists on critical cyber security issues?
Answer to this question is required
Yes
No
Grade: All Grades
1
I understand that the responses provided in this questionnaire must be fully supported in my online resume. I further understand that my resume must provide detailed descriptions and/or examples of my knowledge, skill, and abilities as required in the vacancy announcement and that my failure to do so, may result in my being rated "Ineligible" or "Not Qualified" for this position.
Answer to this question is required
Yes
No
2
Are you currently serving or have served in the last five (5) years in a Political Appointment in the Federal Government?
Answer to this question is required
Yes
2.1
Please list the title, agency and dates of this appointment. Please note you will be required to provide proof to meet OPM Approval of your appointment if selected.
Maximum length of 1000 characters.
No
3
This position requires a security clearance. Are you able to obtain or maintain a security clearance?
Answer to this question is required
Yes
No
4
Do you have dual citizenship with the United States and another country?
Answer to this question is required
Yes
4.1
Please list the country(ies), other than the United States, with which you possess citizenship.
Maximum length of 250 characters.
No
5
Can you travel approximately 30% of the time (15+ weeks a year) for a period of 2 weeks (or longer) at a time?
Answer to this question is required
Yes
No
6
Which statement best describes your IT experience applying project management procedures to daily assignments with emphasis on effective planning and project execution?
Answer to this question is required
Monitors program/project execution activities and resources to mitigate risk and to resolve issues to ensure successful implementation.
Monitors, reviews, and analyzes program/project implementation.
Makes recommendations for program/project adjustments.
No experience in the planning and execution of projects.
7
Do you have experience in managing and conducting penetration testing of networks that contain sensitive or proprietary information, business systems that require a high degree of availability, and information that requires a high degree of integrity?
Answer to this question is required
Yes
No
8
From the list below, check all that apply, indicating the work experiences you have that demonstrate your knowledge of information system life cycle management and development concepts, technologies and practices:
Answer to this question is required
Requirements management
Design and development
Testing
Quality assurance
Configuration management and implementation
None of the above.
9
Which of the following statements describe activities you have performed as an Information Technology security systems subject matter expert? (please check all that apply):
Answer to this question is required
Providing expert technical advice, guidance, and recommendations to management and other technical specialists on critical information security infrastructure and related information technology issues.
Providing oversight for information and security systems technologies, methodologies, and processes, then documenting related organizational compliance.
Developing and implementing strategic and operational plans to align information and systems security solutions with organizational business objectives and use that to improve customer service.
Analyzing complex information technology issues, problems, and challenges and to clearly and effectively communicate solutions in a variety of ways, including in a non-technical manner to senior executives and officials.
Analyzing security performance issues and identified trends, systemic issues, and underlying causal factors.
Participating in meetings, conferences, and symposiums concerning networking, telecommunications, and information security.
Applying knowledge of the operating characteristics of Internet, telecommunications and networking equipment, server and workstation hardware, and system software to identify and alleviate problems or failures and to maintain a secure operating environment.
None of the above.
10
Select the choices where you have utilized your knowledge and skill in applying advanced IT principles, concepts, methods, standards, and practices.
Answer to this question is required
Developed and interpreted policies, procedures, and strategies governing the planning and delivery of services throughout the agency
Provided expert technical advice, guidance, and recommendations to management and other technical specialists on critical IT issues
Applied new developments to previously unsolvable problems
No experience as listed above
11
From the functions listed below, select the cyber security functions that you have regularly performed.
Answer to this question is required
Assess impact of regulatory change on cyber program.
Authored cyber security orders and procedures.
Implement cyber security changes to enterprise wide business processes.
Assess organizational compliance with security policies.
Develop and manage project(s) to bring the organization into compliance with cyber security standards.
None of the above.
12
Have you analyzed cyber security performance issues and identified lessons learned trends, systemic issues, and underlying causal factors?
Answer to this question is required
Yes
No
13
Please select all that apply to describe your experience with managing the retirement of software systems within a large and complex organization.
Answer to this question is required
I led a project team responsible for the retirement of existing software and systems within a large and complex organization.
I led the cleanup and migration of data from retired software systems to the new software systems.
None of the above
14
Do you have experience in designing or evaluating the architecture of large-scale computer networks, enclave boundaries and security controls, and secure computer applications that store, process and share data and information?
Answer to this question is required
Yes
No
15
Have you applied risk management strategies and developed risk profiles using IT security systems?
Answer to this question is required
Yes
No
16
Have you applied risk management strategies for cyber security?
Answer to this question is required
Yes
No
17
Which of the following software development lifecycle activities do you consider yourself as having advanced level knowledge?
Answer to this question is required
Managing, reviewing, and resolving conflicts associated with the development of overall functional and systems requirements and specifications.
Working with stakeholders to determine and document requirements.
Conducting feasibility studies and trade-off analyses.
Defining system scope and objectives.
Developing a project management plan to identify, prioritize, and manage requirements to support business needs and enhancements.
Ensuring the integration of all systems components, e.g., procedures, databases, software, supporting systems.
Planning and scheduling the installation of new or modified systems and application software.
Resolving software interface and interoperability problems.
Insuring systems availability, functionality, integrity, and efficiency.
Maintaining systems configuration.
Managing the installation and integration of systems fixes, updates, and enhancements.
Conducting user acceptance testing.
Ensuring systems are in compliance with statutory and regulatory requirements.
Ensuring systems maintain proper certification and accreditation.
Establishing service level agreements and system performance baselines.
None of the above.
18
This position is responsible for communicating a variety of issues on an interpersonal level. Please indicate which of the following duties you have performed as a regular part of a job.
Answer to this question is required
Negotiate policy changes
Mediate or facilitate problem resolution
Brief management on organizational issues or similar topics
Defend recommendations on controversial issues to top management
Interview individuals to obtain study data
Facilitate coordination of efforts between organizational entities
Independently plan, host & conduct meetings
Act as a management representative
Serve on panels, committees or task forces on technical or programmatic cyber security topics
Regularly consulted by others on technical or programmatic issues
None of the above
View Vacancy Details