Applicants must have demonstrated experience as listed below. This requirement is according to the AO Classification, Compensation, and Recruitment Systems which include interpretive guidance and reference to the OPM Operating Manual for Qualification Standards for General Schedule Positions.
1.
Attention to Detail - Is thorough when performing work and conscientious about attending to detail.
2.
Customer Service - Works with clients and customers (that is, any individuals who use or receive the services or products that your work unit produces, including the general public, individuals who work in the agency, other agencies, or organizations outside the Government) to assess their needs, provide information or assistance, resolve their problems, or satisfy their expectations; knows about available products and services; is committed to providing quality products and services.
3.
Oral Communication - Expresses information (for example, ideas or facts) to individuals or groups effectively, taking into account the audience and nature of the information (for example, technical, sensitive, controversial); makes clear and convincing oral presentations; listens to others, attends to nonverbal cues, and responds appropriately.
4.
Problem Solving - Identifies problems; determines accuracy and relevance of information; uses sound judgment to generate and evaluate alternatives, and to make recommendations.
Specialized Experience: Applicants must have at least one full year (52 weeks) of specialized experience which is in or directly related to the line of work of this position. Specialized experience is demonstrated experience must demonstrate
ALL areas defined below:
- Investigating compromised host machines using endpoint detection and response (EDR) platforms and other logging solutions.
- Knowledge of networking protocols to include detailed understanding of Transmission Control Protocol / Internet Protocol (TCP/IP), and the Open Systems Interconnection (OSI) model.
- Experience with security infrastructure components, including firewalls, web application firewalls (WAFs), proxies, DNS, and routing protocols, with a deep understanding of their role in enterprise defense strategies.
- Knowledge of operating system internals and built-in security mechanisms, enabling effective identification and remediation of vulnerabilities across Windows, Linux, and macOS platforms.
- Knowledge of adversarial tactics, techniques, and procedures (TTPs), with the ability to analyze and respond to evolving cybersecurity threats through proactive defensive measures.
Desired, but Not Required:
- Certified Information Systems Security Professional (CISSP)
- GIAC Certified Incident Handler (GCIH)
- GIAC Security Operations Certified (GSOC)
- GIAC Cloud Incident Response (GCIR)