The experience described in your resume will be evaluated and screened from the Office of Personnel Management's (OPMs) basic qualifications requirements. See:
Information Technology (IT) Management Series 2210 for OPM qualification standards, competencies and specialized experience needed to perform the duties of the position as described in the MAJOR DUTIES and QUALIFICATIONS sections of this announcement by 08/18/2025.
Applicant must have directly applicable experience that demonstrates the possession of the knowledge, skills, abilities and competencies necessary for immediate success in the position. Qualifying experience may have been acquired in any public or private sector job, but will clearly demonstrate past experience in the application of the particular competencies/knowledge, skills and abilities necessary to successfully perform the duties of the position.
You must have specialized experience sufficient to demonstrate that you have acquired all the competencies necessary to perform at a level equivalent in difficulty, responsibility, and complexity to the next lower grade GS/GG-14 in the Federal service and are prepared to take on greater responsibility.
Generally, this would include one year or more of such specialized experience. Specialized experience for this position includes: Utilizing DoD Risk Management Framework (RMF) to determine security relevancy, risk assessment, and IT system cybersecurity strategy planning and implementation. Overseeing IT engineering and development for information technology (IT) security goals and objectives to mitigate program risk and ensure baseline security safeguards. Applying IT data source security management, DoD Zero Trust Strategy, cybersecurity resource allocation, and mitigation of audit findings.
Specifically you will be evaluated on the following competencies:
1. Information Assurance: Knowledge of methods and procedures to protect information systems and data by ensuring their availability, authentication, confidentiality, and integrity.
2. Information Systems Security Certification: Knowledge of the principles, methods, and tools for evaluating information systems security features against a set of specified security requirements. Includes developing security certification and accreditation plans and procedures, documenting deficiencies, reporting corrective actions, and recommending changes to improve the security of information systems.
3. Problem Solving: Identifies problems; determines accuracy and relevance of information; uses sound judgment to generate and evaluate alternatives, and to make recommendations.
4. Cybersecurity: Protect and defend information and information systems in order to ensure confidentiality, integrity, and availability. (AKA Information Assurance)
5. Leadership: Influences, motivates, and challenges others; adapts leadership styles to a variety of situations.