IT Specialist; Security- Authority
Listed on 2026-01-17
-
IT/Tech
IT Consultant, Cybersecurity
Veteran's preference does not apply to DHA recruitment.
Click on "Learn more about this agency" button below for more information.
The primary purpose of this position is to serve as the primary technical advisor for Civil Engineer owned and operated control systems supporting facility and utility operations ensuring the integration of cybersecurity into and throughout the control system lifecycle.
Experience requirements are described in the Office of Personnel Management (OPM) Qualification Standards for General Schedule Positions, Information Technology Management Series.
Individual Occupational Requirement:Experience must be IT related; the experience may be demonstrated by paid or unpaid experience and/or completion of specific, intensive training (for example, IT certification), as appropriate.
GS-5 through GS-15 (or equivalent):
For all positions, individuals must have IT-related experience demonstrating each of the four competencies listed below. The employing agency is responsible for identifying the specific level of proficiency required for each competency at each grade level based on the requirements of the position being filled.
is committed to providing quality products and services.
Specialized Experience
:
Applicants must have at least 1 year (52 weeks) of specialized experience at the next lower broadband NH-02, equivalent to the next lower grade GS-11 or equivalent in other pay systems. Specialized experience includes experience with principles, methods, and techniques of Cybersecurity, Information Technology (IT), or Information Management (IM) assessment, planning, management, monitoring, and evaluation as well as knowledge of the principles, methods, or tools for developing, scheduling, coordinating, managing cyber, IT, or IM projects and resources, monitoring and inspecting costs, work, and contractor performance.
NOTE:
Due to the use of 120-day rosters, this period of experience may be completed within 120 days of the closing date of this announcement.
Knowledge,
Skills and Abilities
(KSAs):
Your qualifications will be evaluated on the basis of your level of knowledge, skills, abilities and/or competencies in the following areas:
- 1. Expert knowledge of the principles, methods, and techniques of IT cybersecurity assessment, planning, management, monitoring, and evaluation as well as knowledge of the principles, methods, or tools for developing, scheduling, coordinating, managing IT projects and resources, monitoring and inspecting costs, work, and contractor performance. Ability to lead and manage information systems planning, development, implementation, operation, and maintenance.
- 2. Knowledge of the principles, methods, and tools for the coordinated management of IT programs to include providing oversight of multiple IT projects, integrating dependent schedules and deliverables, and related activities such as life cycle management and program governance.
- 3. Knowledge of the principles and methods to identify, analyze, specify, design, and manage functional and infrastructure requirements; includes translating functional requirements into technical requirements used for logical design or alternative technologies or approaches. Ability to research and analyze external products to determine their potential for meeting mission requirements and business needs.
- 4. Knowledge of concepts, practices, and techniques used to identify, engage, influence and monitor relationships with individuals and groups connected to IT work/development efforts. Includes those who are actively involved, those who exert influence over the process and its results, and those who have a vested interest in the outcome. Ability to work effectively with customers to assess their requirements then provide information, expertise, and assistance to satisfy those needs.
- 5. Knowledge of organizational mission and function and how to work effectively within its social,…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).