Information Technology Specialist Government - Arlington, VA at Geebo

Information Technology Specialist

The incumbent applies advanced, specialized expertise to ensure the confidentiality, integrity, and availability of systems, networks, and data through the planning, analysis, development, implementation, maintenance, and enhancement of networked systems and information systems security programs, policies, procedures, and tools. Serving in INV as an expert on information technology issues, the incumbent has wide-ranging responsibilities, primarily in relation to INV systems. Major duties include, but are not limited to:
1) developing policies and procedures; 2) preparing risk and vulnerability assessments; 3) evaluating and approving the installation of updates and new releases; 4) participating in network and systems design; 5) conducting systems security evaluations; 6) developing systems security contingency plans and disaster recovery procedures; 7) facilitating the gathering, analysis, and preservation of evidence; 8) assessing security events and implementing corrective actions; 9) analyzing and defining network requirements; 10) installing, testing, maintaining, and upgrading network operating systems software; 11) maintaining and administering virtual desktops, virtual servers, and other virtual appliances. Applicants must meet all the required qualification requirements, including education, and any selective placement factors described below by the closing date of this announcement.If you are qualifying based on education OR if there are mandatory education requirements listed below, you MUST submit a copy of your college transcript with your application. NOTE:
Applicants must meet time-in-grade and time after competitive appointment requirements, by the closing date of this announcement. Time-In-Grade Requirements:
Federal applicants must have served 52 weeks at the next lower grade to satisfy time-in-grade restrictions, per 5CFR 300, Subpart F. Applicants applying for the GS-14 grade level must meet the following requirements:
Have IT-related experience demonstrating EACH of the four competencies AND specialized experience listed below:
Attention to Detail Customer Service Oral Communication Problem Solving ANDHave at least 1 full year of specialized experience equivalent to the GS-13 level in the Federal service which provided you with the particular knowledge, skills and abilities to perform the duties of the position. Qualifying specialized experience must demonstrate the following:
Experience in applying and interpreting advanced IT systems security principles, concepts, and methods. Experience in developing and interpreting policies, procedures and strategies governing the planning and delivery of services. Experience providing expert technical advice, guidance and recommendations. Experience in staying current with new and updated IT security and network developments. Experience in interpreting and applying project management principles and methods. Experience in coordinating the implementation of security programs and network operating systems across multiple platforms. Experience in establishing vulnerability reporting criteria. NOTE:
In order to qualify for this position, your experience MUST be IT related; the experience may be demonstrated by paid or unpaid experience and/or completion of specific, intensive training (for example, IT certification), as appropriate.There is no substitute of education for specialized experience for the GS-14 position.
  • Department:
    2210 Information Technology Management
  • Salary Range:
    $121,316 to $157,709 per year

Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.