THIS IS A PUBLIC NOTICE: Please review further information below regarding how this posting will be used.
To fill this job we have been granted “Direct Hire Authority” or DHA. This means that we can hire any qualified candidate, either from this notice or from any source.
This position is located in the Federal Acquisition Service, General Services Administration, Information Technology Category
We are currently filling one vacancy, but additional vacancies may be filled as needed.
This Notice is issued under direct-hire authority to recruit new talent to occupations for which there is a severe shortage of candidates. We have been granted “Direct Hire Authority” or DHA. This means that when we have a vacant job, we can hire any qualified candidate, either from this notice or from any source.
A few key facts about this DHA notice:
- All GSA employees may be considered for a DHA appointment.
- Current civil service employees will receive a new appointment if selected under DHA.
For information on DHA, please visit https://www.opm.gov/directhire/index.asp.
Duties may include: (This is NOT an all-inclusive list)
Assists in the development and maintenance of supply chain, system, network, performance, and cybersecurity requirements. Assists with drafting and publication of supply chain security and risk management documents. Develops and documents supply chain risks for critical system elements, as appropriate.
Ensures that all acquisitions, procurements, and outsourcing efforts address information security requirements consistent with organizational goals. Ensures that supply chain, system, network, performance, and cybersecurity requirements are included in contract language and delivered.
Provides direct support for acquisitions that use information technology (IT) (including National Security Systems), applying IT-related laws and policies, and provides IT-related guidance throughout the total acquisition life cycle. Establishes/maintains communication channels with stakeholders. Reviews existing and proposed policies with stakeholders.
Develops/maintains long-range plans for IT security systems for clients that anticipate, identify, evaluate, mitigate, and minimize risks associated with IT system vulnerabilities. Participates in systems security evaluations, audits, and reviews. Uses specific common performance measures for service levels and costs.
For each job on your resume, provide:
- the exact dates you held each job (from month/year to month/year)
- number of hours per week you worked (if part time).
If you have volunteered your service through a National Service program (e.g., Peace Corps, Americorps), we encourage you to apply and include this experience on your resume.
For a brief video on creating a Federal resume, click here.
Starting Pay for all locations will be dependent upon the associated GS-Locality Pay Table for that area.
In addition to the Specialized Experience described below, you also must have IT-related experience demonstrating EACH of the four competencies as described below:
- Attention to Detail - This skill is generally demonstrated by assignments where the applicant keeps abreast of latest technology, information, research, etc., to maintain knowledge in field of expertise (for example, reads trade journals, participates in professional/technical associations, maintains credentials).
- Customer Service - This skill is generally demonstrated by assignments where the applicant promotes or develops and maintains good working relationships with key individuals or groups.
- Oral Communication - This skill is generally demonstrated by assignments where the applicant serves on panels, committees, or task forces as a representative for the organization on technical or professional issues.
- Problem Solving - This skill is generally demonstrated by assignments where the applicant monitors current trends or events (for example, technological, economic, political, social, educational, or employment trends or events) and applies the information as appropriate.
To qualify, you must have at least one year of specialized experience equivalent to the GS-09 level or higher in the Federal service.
Specialized experience is experience in working with computer networking concepts, protocols, network security methodologies, risk management processes; conducting cyber security systems evaluations and reviews of policy enforcement practices to ensure secure information systems reliability and accessibility; or evaluating Automated Information System (AIS) security program(s) to protect AIS from unauthorized access.
EDUCATION SUBSTITUTIONS: Ph.D. or equivalent doctoral degree OR three (3) full years of progressively higher level graduate education leading to a Ph.D. or equivalent doctoral degree. Degree must be in computer science, engineering, information science, information systems management, mathematics, operations research, statistics, or technology management or degree that provided a minimum of 24 semester hours in one or more of the fields identified above and required the development or adaptation of applications, systems or networks.
To qualify, you must have at least one year of specialized experience equivalent to the GS-11 level or higher in the Federal service.
Specialized experience is experience in managing computer networking concepts, protocols, network security methodologies, risk management processes; developing procedures and conducting systems cyber security evaluations, audits and reviews of policy enforcement practices to ensure secure information systems reliability and accessibility; or developing Automated Information Systems (AIS) security contingency plans and disaster recovery procedures as part of an organization.
To qualify, you must have at least one year of specialized experience equivalent to the GS-12 level or higher in the Federal service.
Specialized experience is experience working with computer networking concepts, protocols, network security methodologies; identifying IT system control vulnerabilities, risks and protection needs; resolving issues and problems involving IT systems security; implementing information system security policies, standards and guidelines; and, providing technical advice to management officials on security requirements.