This is a GG-13 position in the Cyber Excepted Service (CES). The GG-13 duties for the "Professional" work category are at the "Senior" work level and are equivalent to those at the GS-13 level. The selectee's salary will be set within the grade equivalent to a GS/GG grade based on the selectee's qualifications in relation to the job.
In order to qualify, you must meet the quality experience requirements described in the Office of Personnel Management (OPM) Qualification Standards for General Schedule Positions, Information Technology (IT) Management Series, 2210 (Alternative A).
BASIC REQUIREMENT OR INDIVIDUAL OCCUPATIONAL REQUIREMENT:
For all positions individuals must have IT-related experience demonstrating each of the four competencies listed below. The employing agency is responsible for identifying the specific level of proficiency required for each competency at each grade level based on the requirements of the position being filled.
- Attention to Detail - Is thorough when performing work and conscientious about attending to detail.
- Customer Service - Works with clients and customers (that is, any individuals who use or receive the services or products that your work unit produces, including the general public, individuals who work in the agency, other agencies, or organizations outside the Government) to assess their needs, provide information or assistance, resolve their problems, or satisfy their expectations; knows about available products and services; is committed to providing quality products and services.
- Oral Communication - Expresses information (for example, ideas or facts) to individuals or groups effectively, taking into account the audience and nature of the information (for example, technical, sensitive, controversial); makes clear and convincing oral presentations; listens to others, attends to nonverbal cues, and responds appropriately.
- Problem Solving - Identifies problems; determines accuracy and relevance of information; uses sound judgment to generate and evaluate alternatives, and to make recommendations.
NOTE: IN ADDITION TO MEETING THE BASIC REQUIREMENTS ABOVE APPLICANT MUST ALSO MEET THE QUALIFICATION REQUIREMENTS LISTED BELOW.
EXPERIENCE REQUIRED: Your resume must reflect the quality level of experience which demonstrates the possession of the knowledge, skills, abilities, and competencies necessary for successful job performance required for this position. Examples of creditable experience include: knowledge of the principles, methods, and practices for integrating information system components
sufficient to plan and coordinate offensive or defensive cyberspace operations. Carries out activities leading to the development of cyber operations plans and/or security of IT systems by utilizing understanding of IT principles, concepts, practices, systems software, database software, and immediate access storage technology. Anticipates, assesses, and minimizes systems vulnerabilities by using education, training, and/or experiences. Leads teams to develop, implement, maintain, and operate
information systems security/Cyber programs, policies, procedures, and tools. Employes specific IT/Cyber knowledge and cyber-related infrastructure interdependencies analysis as required. Maintains mastery knowledge of IT/cyberspace mission, terminology, organizational relationships, and interrelationships of cyberspace operations to develop improved operations results, methods, and policies.
Note: Creditable experience may include previous military experience, experience gained in the private sector, or experience gained in another government agency.
KNOWLEDGE, SKILLS AND ABILITIES (KSAs): Your qualifications will be evaluated on the basis of your level of knowledge, skills, abilities and/or competencies in the following areas:
1. Knowledge of the capabilities and limitations of local and wide area networks, world-wide-web, technical computer integration and communication/distributed processing techniques, system software, and programming aids to accomplish IT/cyber program support or to accomplish tasks associated with network and/or telecommunications security projects.
2. Knowledge and familiarity with OCO and DCO planning, execution, and assessments, and integration. Understanding of cyber offense/defense analysis techniques to gather information using a variety of cyber offense/defense tools (e.g., IDS alerts, firewalls, network traffic logs) to analyze events that occur within their environments for the purposes of mitigating threats.
3. Knowledge of technical characteristics of standardized telecommunications systems operating modes, equipment, equipment configuration, system software rules, work processes/rules, data models, file/database design/structure and content, internal computer processes, applications, and utility programs sufficient to administer the COMSEC program and carry out safeguarding of cryptographic equipment and material.
4. Knowledge of the use and operation of a wide variety of cryptographic codes and equipment used in security telecommunications circuits, data, voice, and facsimile systems/networks that transmit sensitive unclassified or classified information. Ability to understand, develop analytical investigative techniques and provide recommended feasible solutions to JFHQ-C (AF), and CCMDs operational challenges, by working within and outside the organization to gain support for the organization's goals and objectives. Typically, also includes applying findings of assessments to mitigate IT security risks through the implementation of corrective actions.
5. Ability to communicate effectively, both orally and in writing while applying sound judgment in the use of security knowledge and in weighing the impact of variables such as granting access to classified keying material and other issues that influence the course of actions taken in resolving security questions or issues.
6. Knowledge of IT OCO/DCO/Cybersecurity principles, policies, planning, products, and services to assess risk factors and advise on vulnerability to attack from a variety of sources (e.g., destructive programs/applications/viruses, unauthorized access, disruption of services, espionage) and procedures and methods for protection of systems and applications. Ability to apply policies, principles, and IT concepts sufficient to carry out activities leading to countering adversary Cyber effects.
PART-TIME OR UNPAID EXPERIENCE: Credit will be given for appropriate unpaid and or part-time work. You must clearly identify the duties and responsibilities in each position held and the total number of hours per week.
VOLUNTEER WORK EXPERIENCE: Refers to paid and unpaid experience, including volunteer work done through National Service Programs (i.e., Peace Corps, AmeriCorps) and other organizations (e.g., professional; philanthropic; religious; spiritual; community; student and social). Volunteer work helps build critical competencies, knowledge and skills that can provide valuable training and experience that translates directly to paid employment. You will receive credit for all qualifying experience, including volunteer experience.