This is a GG-14 position in the Cyber Excepted Service (CES). The GG-14 duties for the "Supervision and Management" work category are at the "Senior" work level and are equivalent to those at the GS-14 level. The selectee's salary will be set within the grade equivalent to a GS/GG grade based on the selectee's qualifications in relation to the job.
In order to qualify, you must meet the experience requirements described in the Office of Personnel Management (OPM) Qualification Standards for Individual Occupational Requirements for Information Technology (IT) Management Series, 2210 (Alternative A)
BASIC REQUIREMENT OR INDIVIDUAL OCCUPATIONAL REQUIREMENT:
The employing agency is responsible for identifying the specific level of proficiency required for each competency at each grade level based on the requirements of the position being filled.
- Attention to Detail - Is thorough when performing work and conscientious about attending to detail.
- Customer Service - Works with clients and customers (that is, any individuals who use or receive the services or products that your work unit produces, including the general public, individuals who work in the agency, other agencies, or organizations outside the Government) to assess their needs, provide information or assistance, resolve their problems, or satisfy their expectations; knows about available products and services; is committed to providing quality products and services.
- Oral Communication - Expresses information (for example, ideas or facts) to individuals or groups effectively, taking into account the audience and nature of the information (for example, technical, sensitive, controversial); makes clear and convincing oral presentations; listens to others, attends to nonverbal cues, and responds appropriately.
- Problem Solving - Identifies problems; determines accuracy and relevance of information; uses sound judgment to generate and evaluate alternatives, and to make recommendations.
In addition to meeting the basic requirement above, to qualify for this position you must also meet the qualification requirements listed below:
EXPERIENCE REQUIRED: Your resume must reflect the quality level of experience which demonstrates the possession of the knowledge, skills, abilities, and competencies necessary for successful job performance required for this position. Examples of creditable experience include: The position oversees the development of new technical advances in proactive defensive cyber operations where legislative guidance and organizational responsibilities are not yet fully defined, and where applicable technology is
evolving at a rapid rate. Precedents are often lacking, considering the constantly changing nature of cyber threats and the ever-changing composition of DoD networks and capabilities.
Note: Creditable experience may include previous military experience, experience gained in the private sector, or experience gained in another government agency.
KNOWLEDGE, SKILLS AND ABILITIES (KSAs): Your qualifications will be evaluated on the basis of your level of knowledge, skills, abilities and/or competencies in the following areas:
1. Knowledge of a full range of IT and cybersecurity principles, concepts, and methods as well as risk management processes (e.g., methods for assessing and mitigating risk), specific operational impacts of cybersecurity lapses and their application to the organization's core mission processes, and emerging technologies that have potential for exploitation by adversaries sufficient to provide expert technical advice to management on a wide range of complex IT issues, to manage the evaluation of risks and vulnerabilities, to oversee the development of mitigating improvements, and to manage the dissemination of IT security tools and procedures. Ability to interpret, implement, and apply Federal cybersecurity and cyber defense laws, policies, regulations, procedures, standards, and compliance measures to command information systems and to the development of policy, plans, and strategies in support of cyber activities and the DoD Information Network (DODIN) security posture.
2. Knowledge of computer networking concepts and protocols (e.g., TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services); network security methodologies and architecture concepts including topology, components, and principles (e.g., application of defense-in-depth); and related computer disciplines such as systems, communication lines, intrusion detection systems, firewalls, and routers as they relate to computer network defense (CND) operations and environments. Skill in conducting technical and non-technical risk and vulnerability assessments, in administering and utilizing
vulnerability scanning tools to protect systems and networks; in using network analysis tools to identify
vulnerabilities; and in recognizing and categorizing types of vulnerabilities and associated attacks
3. Knowledge of cyber threats, vulnerabilities, and attack methodologies and stages (e.g., foot printing and
scanning, enumeration, gaining access, escalation or privileges, maintaining access, network exploitation, covering tracks); threat types and capabilities; different classes of attacks (e.g., passive, active, insider, close-in, distribution); and system and application threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, and malicious code).
4. Knowledge of complex cyber forensics, cyber threat, and intrusion detection concepts, disciplines,
methodologies, and techniques for detecting host and network-based intrusions via intrusion detection technologies sufficient to oversee the development of countermeasures to classified and unclassified computer network and system attacks. Knowledge of safety and security regulations, practices, and procedures.
5. Knowledge of advanced incident management, analysis, and response concepts and procedures; incident categories, incident responses, and timelines for responses; incident response and handling methodologies; and computer security incident response processes including countermeasure mitigation strategies, malware analysis, network traffic analysis, and network system analysis/forensics. Ability to communicate effectively, clearly, and concisely sufficient to convey complex technical information to
varying audiences using verbal, visual, and written communication methods.
6. Knowledge of vulnerability management processes and procedures; vulnerability categories, responses, and timelines for response; as well as computer network defense and vulnerability assessment tools (commercial and open source) and their capabilities, network traffic analysis tools, identification and authentication technologies, Security Information and Event Management (SIEM) tools, firewalls, malicious code identification tools, intrusion detection/prevention tools, proxies, email security filters, and vulnerability scanning tools among other technologies designed to protect systems and networks. Ability to plan, organize, and direct the functions and staff of a small organizational segment through subordinate supervisors.