Skip to main content

Grade: 14

1 Do you have at least 52 weeks of specialized experience equivalent to the GS-13 grade level as described in the announcement? Answer to this question is required
  • Yes
  • No
2 I understand that the responses I selected in this questionnaire must be fully supported by detailed descriptions of my work experiences in my resume. In the event that my responses are not supported by my resume, the human resources office will amend my responses to more accurately reflect the level of competency demonstrated in my resume.
  • Yes
  • No
3 Where did you learn about this Department of Labor job opportunity?
  • DOL Website
  • USAJOBS
  • DOL Employee (former or current)
  • Employment Office (Federal, State, or Local)
  • Friend or Relative
  • Job Fair, Conference or Convention
  • Public Notice or Service Announcement
  • Radio/Television Broadcast/Magazine Ads
  • Government Recruitment at School
  • Other
  • Email recruitment communication
4 I understand submission of supporting documentation, e.g., transcripts, DD-214, SF-50, may be required for this position. I also understand that my application will not be considered if the required supporting documentation is not submitted or is not submitted in accordance with the time frames indicated in the announcement.
  • Yes
  • No
5 Select the one response that describes your highest level of experience in Information Assurance.
  • I have expert-level knowledge of methods and procedures to protect information systems and data by ensuring their availability, authentication, confidentiality, and integrity.
  • I have mid-level knowledge of methods and procedures to protect information systems and data by ensuring their availability, authentication, confidentiality, and integrity.
  • I have entry-level knowledge of methods and procedures to protect information systems and data by ensuring their availability, authentication, confidentiality, and integrity.
  • I have no knowledge of methods and procedures to protect information systems and data by ensuring their availability, authentication, confidentiality, and integrity.
  • None of the above.
6 Choose the statement below that most accurately describes how you have applied knowledge of principles, practices, methods and techniques of Information Security Continuous Monitoring to support Security Authorization and/or Ongoing Authorizations.
  • I have not had experience, education, or training in performing this task.
  • I have completed formal education or training in performing this task but have not yet performed this task on the job.
  • I have performed this task on the job under close supervision by a supervisor, manager, or senior employee to ensure compliance with correct procedures.
  • I have performed this task as a regular part of a job, independently and usually without review by supervisor, manager or senior employee.
  • This task has been a central or major part of my work. I have performed it myself routinely, and I have trained others in performance of this task, and (or) others have consulted me as an expert for assistance in performing this task.
7 Which of the following types of system security documentation have you developed?
  • Privacy impact assessment
  • Risk assessment
  • System security plan
  • Contingency plan
  • Certification and accreditation
  • Security self assessments
  • IT security "white papers"
  • IT security standard operating procedures
  • IT security statements of work
  • None of the above
8 Choose the statement below that best describes your experience coordinating work activities for a unit by identifying, distributing, and balancing workload and tasks.
  • I have not had experience, education, or training in performing this task.
  • I have completed formal education or training in performing this task but have not yet performed this task on the job.
  • I have performed this task on the job under close supervision by a supervisor, manager, or senior employee to ensure compliance with correct procedures.
  • I have performed this task as a regular part of a job, independently and usually without review by supervisor, manager or senior employee.
  • This task has been a central or major part of my work. I have performed it myself routinely, and I have trained others in performance of this task, and (or) others have consulted me as an expert for assistance in performing this task.
9

Choose the statement below that most accurately describes how you have lead and or developed knowledge of principles, practices, methods and techniques of IT Security Continuous Monitoring, including automated tools.

 

  • I have not had experience, education, or training in performing this task.
  • I have completed formal education or training in performing this task but have not yet performed this task on the job.
  • I have performed this task on the job under close supervision by a supervisor, manager, or senior employee to ensure compliance with correct procedures.
  • I have performed this task as a regular part of a job, independently and usually without review by supervisor, manager or senior employee.
  • This task has been a central or major part of my work. I have performed it myself routinely, and I have trained others in performance of this task, and (or) others have consulted me as an expert for assistance in performing this task.
10 Choose as many of the following statements that accurately describe your IT project management skills:
  • Measured and oversaw project performance
  • Directed and managed project controls
  • Directed and managed reporting requirements
  • Developed a project plan that outlines all required resources (staff and equipment)
  • Managed teams in order to reach the assigned outcome
  • Managed technical projects involving complex hardware and software applications
  • Utilized advanced automation tools for the planning and control of IT projects
  • None of the above
11 Select the one response that describes your highest level of experience in implementing, managing, and maintaining an information security program.
  • I have expert-level knowledge of the policies, procedures, standards, and methodology for implementing, managing, and maintaining an methodology for implementing, managing, and maintaining an information security program; including developing supporting documentation, presenting security awareness and privacy training, performing proactive risk management, and performing continuous monitoring activities in support of federal information systems.
  • I have mid-level knowledge of the policies, procedures, standards, and methodology for implementing, managing, and maintaining an methodology for implementing, managing, and maintaining an information security program; including developing supporting documentation, presenting security awareness and privacy training, performing proactive risk management, and performing continuous monitoring activities in support of federal information systems.
  • I have entry-level knowledge of the policies, procedures, standards, and methodology for implementing, managing, and maintaining an methodology for implementing, managing, and maintaining an information security program; including developing supporting documentation, presenting security awareness and privacy training, performing proactive risk management, and performing continuous monitoring activities in support of federal information systems.
  • I have no knowledge of the policies, procedures, standards, and methodology for implementing, managing, and maintaining an methodology for implementing, managing, and maintaining an information security program; including developing supporting documentation, presenting security awareness and privacy training, performing proactive risk management, and performing continuous monitoring activities in support of federal information systems.
  • None of the above.
12 Choose the statement that best describes your experience conducting research, specifically relating to IT Security operational tools and techniques. (Select only one.)
  • I have been responsible for overseeing multiple, complex, new technology-related research projects, simultaneously.
  • I have been responsible for conducting one or more research projects dealing with new technology.
  • I have supported one or more new technology-related research projects.
  • I have training and education in the area of new technologies, but little applied research experience.
  • I have limited experience in conducting this kind of research.
  • I have no experience or training in conducting this kind of research.
13 Have you worked in an environment where attention to detail was critical to successfully completing work assignments?
  • Yes
  • No
14 On a daily basis, I provide customer service to:
  • General public in a customer-service related environment
  • Coworkers
  • Management
  • External stakeholders
  • Employees serviced by your organization
  • Other organizations or agencies
  • None of the above
15 Have you made formal presentations about technical IT security issues to ALL of the following four audiences? (a) executives, (b) senior IT specialist, (c) IT contractors, (d) computer users who are not IT specialists.
  • Yes
  • No
16 Select the one answer choice that best describes your highest level of skill in providing expert technical advice, guidance, and recommendations to management and other technical specialists on critical IT issues.
  • I have not had education, training or experience in performing this task.
  • I have had education or training in performing this task, but have not yet performed it on the job.
  • I have performed this task on the job, with close supervision from supervisor or senior employee.
  • I have performed this task as a regular part of the job, independently and usually without review by supervisor or senior employee.
  • This task has been a central or major part of my work. I have performed it myself routinely, and I have trained others in performance of this task and/or others have consulted me as an expert for assistance in performing this task.

Grade: All Grades

No questions specified.