IT Specialist

Employer
USAJobs
Location
Washington D.C.
Posted
Apr 07, 2017
Closes
Aug 07, 2017
Function
IT
Hours
Full Time
JOB SUMMARY:

Are you interested in a job where your primary purpose will be to support the design, development, management and sustainment of national cybersecurity systems that aim to protect federal and critical infrastructure entities? Then consider joining the Network Security Deployment (NSD) Division, Office of Cybersecurity and Communications, National Protection and Programs Directorate (NPPD), Department of Homeland Security (DHS).

NPPD leads the national effort to protect and enhance the resilience of the Nation's physical and cyber infrastructure. Within NPPD, CS&C is responsible for helping the civilian government and the private sector better manage their cybersecurity and communications risk.

At CS&C, we help our government and private sector customers by responding to incidents, sharing information, developing and promulgating best practices, and increasing our Nation?s cybersecurity capacity. Every day, CS&C employees make a difference as they enhance the security, resilience, and reliability of our Nation?s critical networks and address threats to our public health and safety, economy, and national security.
From incident response to international affairs, penetration testing to policy development, systems engineering to stakeholder engagement, the careers and opportunities to make a difference at CS&C are endless.

This announcement is issued under the Direct Hire Authority (DHA) to recruit for positions for which there is a critical hiring need. Selectee(s) will receive a career or career-conditional appointment in the competitive service and may be required to serve a one year probationary period.

This is an open continuous announcement for 120 days, or until all positions are filled. It will be used to fill immediate and future vacancies for this agency. The first cut-off date will be 10 business days after the opening date of the announcement. Additional cut-off dates may be established until all vacancies have been filled.

For definitions of terms found in this announcement, please click here.

More than one selection may be made from this announcement.

Appointments are subject to the availability of funds.


TRAVEL REQUIRED:
  • Occasional Travel
  • You may be expected to travel for this position.

RELOCATION AUTHORIZED:
  • No

KEY REQUIREMENTS:
  • You must be a U.S. citizen to apply for this position
  • You must successfully pass a background investigation
  • Selective Service registration required
  • You must be able to obtain and hold a TOP SECRET/SCI security clearance
  • May be required to perform duty at other operating locations
  • No financial disclosure required.
  • Selective Placement Factor:
    Applicants must possess experience in the following and it must be clearly reflected in resume to receive credit:

    • Knowledge of IT/cybersecurity program management and project management principles and techniques.
    • Knowledge of IT/cybersecurity systems engineering principles.
    Minimum Qualifications
    To be considered minimally qualified for this position, you must demonstrate that you have the required specialized experience for the respective grade level(s) in which you are applying:

    To qualify at the grade GS-11, applicants must have one of the following:
    Specialized experience:
    at least one full year of specialized experience comparable in scope and responsibility to the GS- 09 level in the Federal service (obtained in either the public or private sectors). This experience must include activities such as 1) providing project management support to cybersecurity projects or programs; 2) detecting information technology security program implications of new technologies or technology upgrades; 3); soliciting and documenting requirements for system design procedures and processes; and 4) identifying design constraints, trade-offs, and detailed system and security designs to identify necessary lifecycle support.
    NOTE: this experience must be clearly represented in your resume in order to be found eligible.

    OR

    Education: have successfully completed a Ph.D. or equivalent doctoral degree, or 3 full years of progressively higher level graduate education leading to such a degree (L.L.M, if related), that provided the knowledge, skills, and abilities necessary to perform this work. Such fields include computer science, information science, information systems management, mathematics, statistics, operations research, or engineering or degree that provided a minimum of 24 semester hours in one or more of the fields identified above and required the development or adaptation of applications, systems or networks.
    NOTE: You must submit a copy of your transcripts (official or unofficial) to verify this education. Otherwise, you will be found ineligible.

    To qualify at the grade GS-12, applicants must have:
    Specialized experience:
    at least one full year of specialized experience comparable in scope and responsibility to the GS- 11 level in the Federal service (obtained in either the public or private sectors). This experience must include activities such as 1) providing program management support to cybersecurity projects or programs; 2) analyzing information technology security program implications of new technologies or technology upgrades; 3) documenting requirements, capabilities, and constraints for system design procedures and processes; and 4) assessing design constraints, trade-offs, and detailed system and security designs to identify necessary lifecycle support.
    NOTE: this experience must be clearly represented in your resume in order to be found eligible.
    Education is not a suitable substitute at this grade level.

    To qualify at the grade GS-13, applicants must have:
    Specialized experience: at least one full year of experience comparable in scope and responsibility to the GS-12 level in the Federal service (obtained in either the public or private sectors). This
    experience must include activities such as 1) managing cybersecurity projects to ensure that developed solutions meet customer requirements; 2) identifying information technology security program implications of new technologies or technology upgrades; 3) developing and documenting requirements, capabilities, and constraints for system design procedures and processes; and 4) analyzing design constraints, trade-offs, and detailed system and security designs to identify necessary lifecycle support and providing recommended courses of action.
    NOTE: this experience must be clearly represented in your resume in order to be found eligible.
    Education is not a suitable substitute at this grade level.

    In addition to the above minimum qualifications, the following competencies are also required for this position. The below experience must be reflected in resume.
    • Attention to Detail: Is thorough when performing work and conscientious about attending to detail.
    • Customer Service: Identifies solutions and alternatives to IT problems identified from customer surveys and group discussion.
    • Oral Communication: Communicates moderately complex ideas or information clearly.
    • Problem Solving: Identifies and solves problems by gathering and applying information from a variety of materials or sources.

    For any college courses, graduate work, research, thesis or other non-descript courses listed on your transcript (such as "Independent Research"), your resume or attachment memorandum from an academic professor must indicate how each course fulfills the specific education requirement (i.e., state number of semester hours credited, topic of study, grade earned).

    NOTE: Education must be accredited by an accrediting institution recognized by the U.S. Department of Education in order for it to be credited towards qualifications (particularly positions with a positive education requirement). Applicants can verify accreditation here. All education claimed by applicants will be verified by the appointing agency accordingly.

    Special Instructions For Foreign Education: If you are using education completed in foreign colleges or universities to meet the qualification requirements, you must show that the education credentials have been evaluated by a private organization that specializes in interpretation of foreign education programs and such education has been deemed equivalent to that gained in an accredited U.S. education program; or full credit has been given for the courses at a U.S. accredited college or university. For further information, visit here.

    New employees must serve a one year probationary period.

    Training (Mandatory): Mandatory training is required which must be successfully completed and other training may occur as necessary for success in the position.

    Essential Personnel: This position may be designated as essential personnel. Essential personnel must be able to serve during continuity of operation events without regard to declarations of liberal leave or government closures due to weather, protests, acts of terrorism, or lack of funding. Failure to report for or remain in this position may result in disciplinary or adverse action in accordance with applicable laws, rules, and regulations (5 U.S.C. 7501-7533 and 5 CFR Part 752, as applicable).

    Top Secret/SCI


    DUTIES:


    The incumbent may perform a variety of duties in the following areas:

    • Provide program/project management support for information technology (IT) and/or cybersecurity related programs and/or projects, to include examining strategic direction for program initiatives and activities, personnel, infrastructure, policy enforcement, emergency planning, IT and/or cybersecurity awareness, and/or other resources.
    • Consult with customers to evaluate functional requirements; coordinate with systems architects, as needed, to provide oversight in the development of design solutions; define project scope and objectives based on customer requirements.
    • Research and identify available technologies and standards to meet customer requirements; identify functional-and security-related features to find opportunities for new capability developments to exploit or mitigate cyberspace vulnerabilities.
    • Support the design and development of secure interface specifications between interconnected systems; design, develop, integrate, and update system security measures (including polices and requirements) that provide confidentiality, integrity, availability authentication, and non-repudiation; develop architectures or system components consistent with technical specifications.