Skip to main content

Vacancy Details

Grade: 09

1 Choose the one answer that best describes your experience, education, or combination of education and experience as related to the basic qualification requirements for this position. Before answering this question, see the education and experience requirements described under the Qualifications section of the vacancy announcement. Answer to this question is required
  • I have a master's degree or equivalent graduate degree or 2 years of progressively higher level graduate education leading to a master's degree or equivalent graduate degree. My degree is in one of the following fields: computer science, engineering, information science, information systems management, mathematics, operations research, statistics, or technology management or degree that provided a minimum of 24 semester hours in one or more of the fields identified above and required the development or adaptation of applications, systems, or networks.
  • I have at least one (1) full year of experience equivalent to the GS-07 level in the Federal service, that included assisting in installs, configuration, and troubleshooting of IT components; basic hardware and software maintenance; and diagnosing and resolving basic IT problems in response to customer reported incidents. My IT-related responsibilities demonstrated the following competencies: attention to detail, customer service, oral communication and problem solving.
  • I have a combination of graduate level education and specialized experience that is equivalent to the GS-07 level in the Federal Service. This experience and education together meets 100% of the qualification requirements for this position as described in the vacancy announcement.
  • I do not meet any of the requirements described above.
2 Do you have experience identifying and assessing threats posed by cyber criminals against United States information systems, critical infrastructure, and cyber-related interests? Answer to this question is required
  • Yes
    2.1 If yes, please identify where in your resume you performed this experience. Maximum length of 250 characters.
  • No
3 From the choices below, select the response that BEST represents your experience reviewing an organization’s cybersecurity controls. Answer to this question is required
  • I have identified security weaknesses and made recommendations in an organization’s IT security policies, practices, and management. I ensured our conclusions were supported by evidence, best practices, or other defendable rationales.
  • I have made recommendations to mitigate vulnerabilities in an organization’s IT security policies, practices, and management. My recommendations were supported by other team members.
  • I have identified weaknesses in an organization’s IT security policies, practices, and management. My work was reviewed by my supervisor or senior team member.
  • I do not have experience reviewing an organization’s IT security controls.
4 From the list below, select the laws, regulations, guidance, and best practices you have applied in securing IT systems Answer to this question is required
  • Federal Information Security Modernization Act
  • Federal Information Technology Acquisition Reform Act
  • OMB Circular A-130
  • National Institute of Standards and Technology Special Publication 800 series on Computer Security
  • SANS Institute publications on information security
  • Sarbanes Oxley
  • Statement on Standards for Attestation Engagements (SSAE) 18
  • Payment Card Industry Data Security Standard (PCI-DSS)
  • None of the above
5 From the choices below, select the response that best represents your experience with analyzing technical artifacts: Answer to this question is required
  • I am experienced at analyzing technical artifacts such as system log files (firewall, operating system, etc), network packet captures, and memory captures for indicators of compromise.
  • I do not have work experience but I have training or education in analyzing technical artifacts such as system log files (firewall, operating system, etc), network packet captures, and memory captures for indicators of compromise.
  • I do not have any experience or training analyzing technical artifacts such as system log files (firewall, operating system, etc), network packet captures, and memory captures for indicators of compromise.
6 Do you have experience with Linux and Windows client/server environments and related components sufficient to maintain performance and troubleshoot technical issues?  Select the response that best describes your level of experience. Answer to this question is required
  • I am experienced with Linux and Windows client/server environments and related components sufficient to maintain performance and troubleshoot technical issues independently.
  • I have some experience with Linux and Windows client/server environments and related components. I may require help from a supervisor or senior team member to maintain performance and troubleshoot technical issues.
  • I do not have experience with Linux and Windows client/server environments and related components sufficient to maintain performance and troubleshoot technical issues.
7 From the choices below, select the response that best represents your technical experience with executing tools and analyzing output: Answer to this question is required
  • I am experienced with executing technical tools (Nmap, Nessus, etc.) and analyzing output to assess the operating effectiveness of technical security controls.
  • I have training or education in but do not have work experience with executing technical tools (Nmap, Nessus, etc.) and analyzing output to assess the operating effectiveness of technical security controls.
  • I have no work experience or training in executing technical tools (Nmap, Nessus, etc.) and analyzing output to assess the operating effectiveness of technical security controls.
8 From the list below, identify the type(s) of situations in which you have orally communicated IT information. Answer to this question is required
  • Presenting recommendations on how to improve cybersecurity controls to IT personnel
  • Providing technical assistance to end users with little to no IT education or experience
  • Presenting IT training
  • Providing troubleshooting advice to IT users concerning hardware, software, system, or server issues
  • Discussing troubleshooting issues with hardware, software, system, or server vendor representatives
  • Interviewing individuals concerning their IT policies, practices, and/or procedures
  • None of the above
9 Select the type(s) of written documents you have authored independently or as part of a team to communicate IT information. Answer to this question is required
  • White papers on topics concerning information security
  • Course materials for use in a training or classroom setting
  • Incident response reports
  • Findings of potential security vulnerabilities in networks, systems, hardware, or software
  • Recommendations for improving network, system, hardware, or software performance
  • Recommendations for improving IT security posture
  • None of the above

Grade: All Grades

No questions specified.