Information Technology Specialist (Information Security/Systems Administration) Government - Tobyhanna, PA at Geebo

Information Technology Specialist (Information Security/Systems Administration)

Who May Apply:
Only applicants who meet one of the employment authority categories below are eligible to apply for this job. You will be asked to identify which category or categories you meet, and to provide documents which prove you meet the category or categories you selected. See Proof of Eligibility for an extensive list of document requirements for all employment authorities. Current Department of Army Civilian EmployeesInteragency Career Transition Assistance PlanLand Management Workforce Flexibility ActMilitary Spouses, under Executive Order (E.O.) 13473Modification of Term AppointmentsPriority Placement Program, DoD Military Spouse Preference (MSP) EligibleVeterans Employment Opportunity Act (VEOA) of 1998 In order to qualify, you must meet the specialized experience requirements described below. Experience refers to paid and unpaid experience, including volunteer work done through National Service programs (e.g., Peace Corps, AmeriCorps) and other organizations (e.g., professional; philanthropic; religious; spiritual; community; student; social). You will receive credit for all qualifying experience, including volunteer experience. Your resume must clearly describe your relevant experience; if qualifying based on education, your transcripts will be required as part of your application. Additional information about transcripts is in this document. You must demonstrate each of the four Information Technology competencies listed:
1. Attention to Detail - Is thorough when performing work and conscientious about attending to detail. 2. Customer Service - Works with clients and customers (that is, any individuals who use or receive the services or products that your work unit produces, including the general public, individuals who work in the agency, other agencies, or organizations outside the Government) to assess their needs, provide information or assistance, resolve their problems, or satisfy their expectations; knows about available products and services; is committed to providing quality products and services. 3. Oral Communication - Expresses information (for example, ideas or facts) to individuals or groups effectively, taking into account the audience and nature of the information (for example, technical, sensitive, controversial); makes clear and convincing oral presentations; listens to others, attends to nonverbal cues, and responds appropriately. 4. Problem Solving - Identifies problems; determines accuracy and relevance of information; uses sound judgment to generate and evaluate alternatives, and to make recommendations. AND You must possess one year of specialized experience equivalent to the GS-11 grade level in the Federal service which provided:
1) Conducting risk and vulnerability assessments of planned and installed information systems to identify vulnerabilities, risks, and protection needs; 2) Assessing security events to determine impact and implementing corrective actions; and 3) Ensuring the rigorous application of information security/ information assurance policies, principles, and practices in the operation and maintenance of assigned systems, networks and data. You will be evaluated on the basis of your level of competency in the following areas:
Information Systems/Network SecurityInterpersonal SkillsProblem SolvingRisk Management Time in Grade Requirement:
Applicants who have held a General Schedule (GS) position within the last 52 weeks must have 52 weeks of Federal service at the next lower grade or equivalent (GS-11).
  • Department:
    2210 Information Technology Management
  • Salary Range:
    $88,651 to $115,251 per year

Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.