CYBER SECURITY WORKFORCE
|
|
|
- Kristin Peters
- 10 years ago
- Views:
Transcription
1 Department of the Navy CYBER SECURITY WORKFORCE SCHEDULE A HIRING AUTHORITY FINAL IMPLEMENTING GUIDANCE Prepared by: DONCIO USMC SPAWAR NAVY CYBER FORCES FFC OCHR HRO HRSC 1
2 Table of Contents I. Introduction II. Coverage III. Authority IV. Position Description Statement Required V. Qualifications Required VI. Selective Placement Factors VII. Hiring Methodology Option Factor - Certifications VIII. Positions in Alternative Personnel Systems IX. DCPDS Coding X. Allocations XI. Reporting Appendix A: References 2
3 I. Introduction The Department of Defense requested and received the authority to staff certain cyber security positions worldwide. This authority is limited to positions that require unique qualifications not currently established by the Office of Personnel Management to perform such functions as cyber risk and strategic analysis incident handling and malware/vulnerability analysis, program management, distributed control systems security, cyber incident response, cyber exercise facilitation and management, cyber vulnerability detection and assessment, network and systems engineering, enterprise architecture, intelligence analysis, investigation, investigative analysis and cyber related infrastructure inter-dependency analysis. Specific references associated with this authority are indicated in Part IX of this guidance. In order to use this authority, Department of the Navy was required to create selective placement factors to be used as part of the qualifications for these positions. Human resources and information technology professionals collaborated across the Department to address the mission-critical need in Cyber Security. The Office of Civilian Human Resources partnered with Fleet Forces, Marine Corps, SPAWAR, NETWARCOM, Human Resource Service Centers, Human Resource Offices and the DON CIO to deploy this new Schedule A Hiring Authority. The DON has been authorized to fill 1013 positions. The effort is in direct support of the emergent needs identified with the newly created Department of the Navy Cyber Forces Command. This guidance will be updated and reissued as needed. II. Coverage This authority covers positions GS-9 through 15 (or equivalent) in the following occupations: 0391; 0854; 0855; 1515; 1550; 2210 requiring cyber security skills and knowledge as described above. This authority is limited to 1013 positions across the Department of the Navy. No new appointments may be made under this authority after December 31, 2012 or the date on which the Office of Personnel Management establishes applicable qualification standards whichever is earlier. III. Authority DoD Schedule A Authority (b) (11) must be used for hiring under his authority. IV. Position Description Statement Required This is an Excepted Service Cyber Security Workforce Schedule A Hiring Authority position subject to the laws, regulations and requirements outlined in 5 CFR part 302; the Office of Personnel and Management (OPM) letter of 10 November 2009 and 3 May 2010, the Department of Defense (DoD) Memorandum of 25 March 2010, and the 3
4 Department of the Navy Implementing Guidance of 30 Jul This position requires unique qualifications not currently established by OPM. V. Qualification Requirements One year of directly related experience as described in the duties statement of the position description. Additionally candidates are required to meet the selective placement factor appropriate to the occupation and grade level of the position to be filled as described in this guidance. Only the Selective Placement Factors described herein are authorized for use. VI. Selective Placement Factors Optional Selective Factor In addition to the proposed selective placement factors below, certifications/professional training may be added as per below: Certification requirement. For IA Position requires IA Category and Level certification. Professional IT training, certifications/coursework in addition to experience related to the selective placement factor. For example, specialized IT certifications/coursework with various schools or vendors is continuing education (MSCE (certification), CISSP Certification Training or Certified Ethical Hacker (CEH) certification). 4
5 0391 Telecommunications GS 9: Knowledge or skill in identifying security risks to implement and manage controls that ensure secure classified and unclassified communications as evidenced by education, training and/or experience. GS 11: Knowledge or skill in identifying security risks to direct, control, implement and manage controls that ensure secure classified and unclassified communications as evidenced experience. Specific cyber security knowledge in one (or more) of the following areas required: distributed control systems security; network and systems engineering; cyber vulnerability detection and assessment; cyber incident response; incident handling and malware/vulnerability analysis; and, cyber-related infrastructure inter-dependency. GS 12: Knowledge or skill in identifying security risks to develop, evaluate, direct, control, implement and manage controls that ensure secure classified and unclassified communications as evidenced by experience. Specific cyber security knowledge in one (or more) of the following areas required: distributed control systems security; network and systems engineering; cyber vulnerability detection and assessment; cyber incident response; incident handling and malware/vulnerability analysis; and, cyber-related infrastructure inter-dependency. GS 13: Knowledge or skill in identifying security risks to develop, evaluate, direct, control, implement and manage controls that ensure secure classified and unclassified communications as evidenced by experience. Ability to provide guidance in determining the most appropriate methods for delivering information securely via communications services. Specific cyber security knowledge in one (or more) of the following areas required: distributed control systems security; network and systems engineering; cyber vulnerability detection and assessment; cyber incident response; incident handling and malware/vulnerability analysis; and, cyber-related infrastructure inter-dependency. GS 14: Knowledge and expertise in identifying security risks to develop, evaluate, direct, control, implement and manage controls that ensure secure classified and unclassified communications as evidenced by experience. Manage operations to determine the most appropriate methods for delivering information securely via communications services. Specific cyber security knowledge in one (or more) of the following areas required: distributed control systems security; network and systems engineering; cyber vulnerability detection and assessment; cyber incident response; incident handling and malware/vulnerability analysis; and, cyber-related infrastructure inter-dependency. GS 15: Mastery of security risks identification and determination and development of solutions to ensure secure classified and unclassified communications as evidenced by experience. Senior technical authority responsible for determination of the most 5
6 0391 Telecommunications (continued) appropriate methods for delivering information securely via communications services. Specific cyber security knowledge in one (or more) of the following areas required: distributed control systems security; network and systems engineering; cyber vulnerability detection and assessment; cyber incident response; incident handling and malware/vulnerability analysis; and, cyber-related infrastructure inter-dependency. 6
7 0854 Computer Engineer GS-9: Knowledge and skills identifying cyber security computer engineering work involving the application of cyber security engineering and scientific theories and principles to complex cyber security computer-based systems. This position covers performance of professional cyber security engineering and scientific work involving the design, construction, and operation of cyber security computer systems, to include hardware and software and their integration. Specific cyber security knowledge and experience in one (or more) of the following areas required: cyber risk and strategic analysis; incident handling and malware vulnerability analysis, program management, distributed control systems security, cyber incident response, cyber exercise facilitation and management, cyber vulnerability detection and assessment, network and systems engineering, enterprise architecture, intelligence analysis, investigation, investigative analysis and cyber-related infrastructure inter-dependency analysis. GS-11/12: Knowledge and skills identifying cyber security computer engineering work involving the application of cyber security engineering and scientific theories and principles to complex cyber security computer-based systems. This position covers performance of, and/or leading professional cyber security engineering and scientific work involving the design, construction, and operation of cyber security computer systems, to include hardware and software and their integration. Specific cyber security knowledge and experience in two (or more) of the following areas required: cyber risk and strategic analysis; incident handling and malware vulnerability analysis, program management, distributed control systems security, cyber incident response, cyber exercise facilitation and management, cyber vulnerability detection and assessment, network and systems engineering, enterprise architecture, intelligence analysis, investigation, investigative analysis and cyber-related infrastructure inter-dependency analysis. GS-13: Knowledge and skills identifying cyber security computer engineering work involving the application of cyber security engineering and scientific theories and principles to complex cyber security computer-based systems. This position covers leading, supervising, and/or performance of professional cyber security engineering and scientific work involving the design, construction, and operation of cyber security computer systems, to include hardware and software and their integration. Specific cyber security knowledge and experience in two (or more) of the following areas required: cyber risk and strategic analysis; incident handling and malware vulnerability analysis, program management, distributed control systems security, cyber incident response, cyber exercise facilitation and management, cyber vulnerability detection and assessment, network and systems engineering, enterprise architecture, intelligence analysis, investigation, investigative analysis and cyber-related infrastructure interdependency analysis. 7
8 0854 Computer Engineer (continued) GS-14/15: Knowledge and skills identifying cyber security computer engineering work involving the application of cyber security engineering and scientific theories and principles to complex cyber security computer-based systems. This position covers managing, supervising, leading, and/or performance of professional cyber security engineering and scientific work involving the design, construction, and operation of cyber security computer systems, to include hardware and software and their integration. Specific cyber security knowledge and experience in two (or more) of the following areas required: cyber risk and strategic analysis; incident handling and malware vulnerability analysis, program management, distributed control systems security, cyber incident response, cyber exercise facilitation and management, cyber vulnerability detection and assessment, network and systems engineering, enterprise architecture, intelligence analysis, investigation, investigative analysis and cyber-related infrastructure interdependency analysis. 8
9 0855 Electronics Engineer GS-9: Knowledge and skills identifying electronic engineering involves electronic circuits, circuit elements, equipment, systems, and associated phenomena concerned with electromagnetic or acoustical wave energy or electrical information for the purpose of cyber security. This series covers positions performing professional cyber security engineering and scientific work. Specific cyber security knowledge and experience in one (or more) of the following areas required: cyber risk and strategic analysis; incident handling and malware vulnerability analysis, program management, distributed control systems security, cyber incident response, cyber exercise facilitation and management, cyber vulnerability detection and assessment, network and systems engineering, enterprise architecture, intelligence analysis, investigation, investigative analysis and cyber-related infrastructure inter-dependency analysis GS-11/12: Knowledge and skills identifying electronic engineering involves electronic circuits, circuit elements, equipment, systems, and associated phenomena concerned with electromagnetic or acoustical wave energy or electrical information for the purpose of cyber security. This series covers positions performing and/or leading professional cyber security engineering and scientific work. Specific cyber security knowledge and experience in two (or more) of the following areas required: cyber risk and strategic analysis; incident handling and malware vulnerability analysis, program management, distributed control systems security, cyber incident response, cyber exercise facilitation and management, cyber vulnerability detection and assessment, network and systems engineering, enterprise architecture, intelligence analysis, investigation, investigative analysis and cyber-related infrastructure inter-dependency analysis. GS-13: Knowledge and skills identifying electronic engineering involves electronic circuits, circuit elements, equipment, systems, and associated phenomena concerned with electromagnetic or acoustical wave energy or electrical information for the purpose of cyber security. This series covers positions leading, supervising, and/or performing professional cyber security engineering and scientific work. Specific cyber security knowledge and experience in two (or more) of the following areas required: cyber risk and strategic analysis; incident handling and malware vulnerability analysis, program management, distributed control systems security, cyber incident response, cyber exercise facilitation and management, cyber vulnerability detection and assessment, network and systems engineering, enterprise architecture, intelligence analysis, investigation, investigative analysis and cyber-related infrastructure inter-dependency analysis. GS-14/15: Knowledge and skills identifying electronic engineering involves electronic circuits, circuit elements, equipment, systems, and associated phenomena concerned with electromagnetic or acoustical wave energy or electrical information for the purpose of cyber security. This series covers positions managing, supervising, leading, and/or performing professional cyber security engineering and scientific work. Specific cyber 9
10 0855 Electronics Engineer (continued) security knowledge and experience in two (or more) of the following areas required: cyber risk and strategic analysis; incident handling and malware vulnerability analysis, program management, distributed control systems security, cyber incident response, cyber exercise facilitation and management, cyber vulnerability detection and assessment, network and systems engineering, enterprise architecture, intelligence analysis, investigation, investigative analysis and cyber-related infrastructure interdependency analysis. 10
11 1515 Operations Research Analyst GS-9: Knowledge and skills identifying this series covers positions that perform scientific cyber security work that involves designing, developing, and adapting mathematical, statistical, econometric, and other scientific methods and techniques. The work also involves analyzing management problems and providing advice and insight about the probable effects of alternative solutions to these problems. The primary requirement of the work is competence in the rigorous methods of scientific cyber security inquiry and analysis. Specific cyber security knowledge and experience in one (or more) of the following areas required: cyber risk and strategic analysis; incident handling and malware vulnerability analysis, program management, distributed control systems security, cyber incident response, cyber exercise facilitation and management, cyber vulnerability detection and assessment, network and systems engineering, enterprise architecture, intelligence analysis, investigation, investigative analysis and cyber-related infrastructure inter-dependency analysis GS-11/12: Knowledge and skills identifying this series covers positions that lead or perform scientific cyber security work that involves designing, developing, and adapting mathematical, statistical, econometric, and other scientific methods and techniques. The work also involves analyzing management problems and providing advice and insight about the probable effects of alternative solutions to these problems. The primary requirement of the work is competence in the rigorous methods of scientific cyber security inquiry and analysis. Specific cyber security knowledge and experience in two (or more) of the following areas required: cyber risk and strategic analysis; incident handling and malware vulnerability analysis, program management, distributed control systems security, cyber incident response, cyber exercise facilitation and management, cyber vulnerability detection and assessment, network and systems engineering, enterprise architecture, intelligence analysis, investigation, investigative analysis and cyber-related infrastructure inter-dependency analysis. GS-13: Knowledge and skills identifying this series covers positions that supervise, lead, or perform scientific cyber security work that involves designing, developing, and adapting mathematical, statistical, econometric, and other scientific methods and techniques. The work also involves analyzing management problems and providing advice and insight about the probable effects of alternative solutions to these problems. The primary requirement of the work is competence in the rigorous methods of scientific cyber security inquiry and analysis. Specific cyber security knowledge and experience in two (or more) of the following areas required: cyber risk and strategic analysis; incident handling and malware vulnerability analysis, program management, distributed control systems security, cyber incident response, cyber exercise facilitation and management, cyber vulnerability detection and assessment, network and systems engineering, enterprise architecture, intelligence analysis, investigation, investigative analysis and cyber-related infrastructure inter-dependency analysis. 11
12 1515 Operations Research Analyst (continued) GS-14/15: Knowledge and skills identifying this series covers positions that manage, supervise, lead, or perform scientific cyber security work that involves designing, developing, and adapting mathematical, statistical, econometric, and other scientific methods and techniques. The work also involves analyzing management problems and providing advice and insight about the probable effects of alternative solutions to these problems. The primary requirement of the work is competence in the rigorous methods of scientific cyber security inquiry and analysis. Specific cyber security knowledge and experience in two (or more) of the following areas required: cyber risk and strategic analysis; incident handling and malware vulnerability analysis, program management, distributed control systems security, cyber incident response, cyber exercise facilitation and management, cyber vulnerability detection and assessment, network and systems engineering, enterprise architecture, intelligence analysis, investigation, investigative analysis and cyber-related infrastructure inter-dependency analysis. 12
13 1550 Computer Scientist GS-9: Knowledge and skills identifying computer scientists involve the development of new and improved cyber security concepts, principles, and techniques that will advance the body of knowledge of cyber security, and adapt and apply advanced cyber security computer science methods and techniques to solve complex cyber security computer processing requirements. Specific cyber security knowledge and experience in one (or more) of the following areas required: cyber risk and strategic analysis; incident handling and malware vulnerability analysis, program management, distributed control systems security, cyber incident response, cyber exercise facilitation and management, cyber vulnerability detection and assessment, network and systems engineering, enterprise architecture, intelligence analysis, investigation, investigative analysis and cyber-related infrastructure inter-dependency analysis GS-11/12: Knowledge and skills identifying computer scientists involve leading and/or performing in the development of new and improved cyber security concepts, principles, and techniques that will advance the body of knowledge of cyber security, and adapt and apply advanced cyber security computer science methods and techniques to solve complex cyber security computer processing requirements. Specific cyber security knowledge and experience in two (or more) of the following areas required: cyber risk and strategic analysis; incident handling and malware vulnerability analysis, program management, distributed control systems security, cyber incident response, cyber exercise facilitation and management, cyber vulnerability detection and assessment, network and systems engineering, enterprise architecture, intelligence analysis, investigation, investigative analysis and cyber-related infrastructure inter-dependency analysis. GS-13: Knowledge and skills identifying computer scientists involve supervising, leading, and/or performing in the development of new and improved cyber security concepts, principles, and techniques that will advance the body of knowledge of cyber security, and adapt and apply advanced cyber security computer science methods and techniques to solve complex cyber security computer processing requirements Specific cyber security knowledge and experience in two (or more) of the following areas required: cyber risk and strategic analysis; incident handling and malware vulnerability analysis, program management, distributed control systems security, cyber incident response, cyber exercise facilitation and management, cyber vulnerability detection and assessment, network and systems engineering, enterprise architecture, intelligence analysis, investigation, investigative analysis and cyber-related infrastructure interdependency analysis. GS-14/15: Knowledge and skills identifying computer scientists involve managing, supervising, leading, and/or performing in the development of new and improved cyber security concepts, principles, and techniques that will advance the body of knowledge of cyber security, and adapt and apply advanced cyber security computer science methods 13
14 1550 Computer Scientist (continued) and techniques to solve complex cyber security computer processing requirements. Specific cyber security knowledge and experience in two (or more) of the following areas required: cyber risk and strategic analysis; incident handling and malware vulnerability analysis, program management, distributed control systems security, cyber incident response, cyber exercise facilitation and management, cyber vulnerability detection and assessment, network and systems engineering, enterprise architecture, intelligence analysis, investigation, investigative analysis and cyber-related infrastructure interdependency analysis 14
15 2210 IT Specialists: Parenthetical Policy and Planning GS- 9: Knowledge or skill identifying cyber security issues and risks to address future cybersecurity challenges as evidenced by education, training, and/or experience. GS-11: Knowledge and skill identifying cyber security issues and risks and the ability to address future cyber security challenges as evidenced by experience. Specific cyber security knowledge and experience in one (or more) of the following areas required: cyber risk and strategic analysis; program management; incident handling; cyber incident response; cyber workforce structure and roles; education, training and exercise facilitation and management; enterprise architecture; and cyber-related infrastructure inter-dependency analysis. GS-12: Knowledge and skill identifying cyber security issues and risks and the ability to develop strategies to address future cyber security challenges as evidenced by experience. Specific cyber security knowledge and experience in two (or more) of the following areas required: cyber risk and strategic analysis; program management; incident handling; cyber incident response; cyber workforce structure and roles; education, training and exercise facilitation and management; enterprise architecture; and cyber-related infrastructure inter-dependency analysis. GS-13: Knowledge and skill in identifying cyber security issues and risks and the ability to develop policies, strategies, and guidance to address future cyber security challenges. The employee is recognized as a technical authority throughout the organization, and is responsible for implementing and integrating new programs or requirements and developing new policy, guidance, standards, and methods. Serves as expert for the organization, and analyzes and resolves difficult policy and planning problems or issues, conducts special studies, and makes recommendations on new approaches to delivering services. Specific cyber security knowledge in two (or more) of the following areas required: cyber risk and strategic analysis; incident handling malware/vulnerability analysis; program management; distributed control systems security; cyber incident response; cyber exercise facilitation and management; cyber vulnerability detection and assessment; network and systems engineering; enterprise architecture; and, cyber-related infrastructure inter-dependency analysis. GS-14: Knowledge and skill in identifying cyber security issues and risks and the ability to develop policies, strategies, and guidance to address future cyber security challenges. The employee is recognized as a technical authority throughout the organization, and is responsible for implementing and integrating new programs or requirements and developing new policy, guidance, standards, and methods. Serves as principal expert and manager for the organization, and analyzes and resolves difficult policy and planning problems or issues, manages special studies, and makes recommendations on new approaches to delivering services. Specific cyber security knowledge in two (or more) of 15
16 2210 IT Specialists: Parenthetical Policy and Planning (continued) the following areas required: cyber risk and strategic analysis; incident handling malware/vulnerability analysis; program management; distributed control systems security; cyber incident response; cyber exercise facilitation and management; cyber vulnerability detection and assessment; network and systems engineering; enterprise architecture; and, cyber-related infrastructure inter-dependency analysis. GS-15: Expertise and skill in identifying cyber security issues and risks and the ability to develop policies, strategies, and guidance to address future cyber security challenges. The employee is recognized as the senior technical authority throughout the organization, and is responsible for implementing and integrating new programs or requirements and developing new policy, guidance, standards, and methods. Serves as senior expert and leader for the organization, and analyzes and resolves difficult policy and planning problems or issues, manages one or more special studies, and makes recommendations on new approaches to delivering services. Specific cyber security knowledge in two (or more) of the following areas required: cyber risk and strategic analysis; incident handling malware/vulnerability analysis; program management; distributed control systems security; cyber incident response; cyber exercise facilitation and management; cyber vulnerability detection and assessment; network and systems engineering; enterprise architecture; and, cyber-related infrastructure inter-dependency analysis. 16
17 2210 IT Specialists: Parenthetical Applications Software GS 9: Knowledge or skill in identifying software security risks to reduce risks as evidenced by education, training, and/or experience. GS 11: Knowledge and skill in identifying software security risks and determining software solutions to reduce risks as evidenced by experience. Specific cyber security knowledge and experience in one (or more) of the following areas required: malware/vulnerability analysis; program management; distributed control systems security; cyber vulnerability detection and assessment; and cyber security software development. GS 12: Knowledge and skill in identifying software security risks and determining/ developing software solutions to reduce risks as evidenced by experience. Specific cyber security knowledge and experience in two (or more) of the following areas required: malware/vulnerability analysis; program management; distributed control systems security; cyber vulnerability detection and assessment; and, cyber security software development. GS 13: Knowledge and skill in software security design principles, methods, and approaches; principles, methods, and procedures for designing, developing, optimizing, and integrating new and/or reusable systems components; identifying software security risks to reduce risks as evidenced by education, training, and/or experience. Specific cyber security knowledge and experience in one (or more) of the following areas required: malware/vulnerability analysis; program management; distributed control systems security; cyber vulnerability detection and assessment; and, cyber security software development. GS 14: Knowledge and expertise in identifying software security risks and determining software solutions to reduce risks as evidenced by experience. Manage teams to develop new work methods, standards, and practices designed to significantly improve the safety, quality, reliability, predictability, reusability, and cost performance of applications software systems. Specific cyber security knowledge and experience in one (or more) of the following areas required: malware/vulnerability analysis; program management; distributed control systems security; cyber vulnerability detection and assessment; and, cyber security software development. GS 15: Mastery of systems security engineering concepts and factors, such as structured design; supportability; survivability; reliability; scalability; and maintainability sufficient to ensure that applications are optimized for state-of-the-art technology and functionality as evidenced by education, training, and/or experience. Senior technical authority responsible for standards, and practices designed to significantly improve the safety, quality, reliability, predictability, reusability, and cost performance of applications software systems. Specific cyber security knowledge and experience in two (or more) of the following areas required: malware/vulnerability analysis; program management; distributed control systems security; cyber vulnerability detection and assessment; and, cyber security software development. 17
18 2210 IT Specialists: Parenthetical Customer Support GS 9: Knowledge or skill in determining network and application cybersecurity incidents, type of incident, and initial incident response as evidenced by education, training, and/or experience. GS 11: Knowledge and skill in determining network and application cyber security incidents, type of incident, and initial incident response as evidenced by experience. Specific cyber security knowledge in one (or more) of the following areas required: incident handling and malware/vulnerability analysis, and cyber incident response. GS 12: Knowledge and skill in determining network and application cyber security incidents, type of incident, and initial incident response as evidenced by experience. Specific cyber security knowledge in two (or more) of the following areas required: incident handling and malware/vulnerability analysis, and cyber incident response. GS 13: Knowledge and skill in determining network and application cybersecurity incidents, type of incident, and initial incident response as evidenced by education, training, and/or experience. Specific cyber security knowledge in one (or more) of the following areas required: incident handling and malware/vulnerability analysis, and cyber incident response. GS 14: Knowledge and expertise in determining and managing network and application cyber security incidents, type of incident, and initial incident response as evidenced by education, training, and/or experience. Manage teams to plan and deliver a full range of customer support services to the organization and to install, configure, upgrade, and troubleshoot hardware and software components. Specific cyber security knowledge in one (or more) of the following areas required: incident handling and malware/vulnerability analysis, and cyber incident response. GS 15: Mastery of processes and procedures required to leading efforts to address network and application cyber security incidents, types of incident, and initial incident response as evidenced by education, training, and/or experience. Senior technical authority responsible for planning and delivery of a full range of customer support services to the organization and install, configure, upgrade, and troubleshoot any hardware and software components. Specific cyber security knowledge in one (or more) of the following areas required: incident handling and malware/vulnerability analysis, and cyber incident response. 18
19 2210 IT Specialists: Parenthetical Data Management GS 9: Knowledge or skill in identifying security risks to ensure the availability, integrity, authentication, confidentiality, and non-repudiation of data; and reduce risks as evidenced by education, training, and/or experience. GS 11: Knowledge and skill in identifying security risks and determining solutions to ensure the availability, integrity, authentication, confidentiality, and non-repudiation of data; and reduce risks as evidenced by experience. Specific cyber security knowledge in one (or more) of the following areas required: malware/vulnerability analysis; distributed control systems security; cyber vulnerability detection and assessment; incident handling and cyber incident response. GS 12: Knowledge and skill in identifying security risks and determining and developing solutions to ensure the availability, integrity, authentication, confidentiality, and non-repudiation of data; and reduce risks as evidenced by experience. Specific cyber security knowledge in two (or more) of the following areas required: malware/ vulnerability analysis; distributed control systems security; cyber vulnerability detection and assessment; incident handling and cyber incident response. GS 13: Knowledge and skill in identifying security risks to ensure the availability, integrity, authentication, confidentiality, and non-repudiation of data; and reduce risks as evidenced by education, training, and/or experience. Ability to apply cybersecurity concepts in the design, development, and maintenance of data management systems and databases. Specific cyber security knowledge in one (or more) of the following areas required: malware/vulnerability analysis; distributed control systems security; cyber vulnerability detection and assessment; incident handling and cyber incident response. GS 14: Knowledge and expertise in identifying security risks to ensure the availability, integrity, authentication, confidentiality, and non-repudiation of data; and reduce risks as evidenced by education, training, and/or experience. Manage teams to ensure inclusion of cybersecurity concepts in the design, development, and maintenance of data management systems and databases. Specific cyber security knowledge in one (or more) of the following areas required: malware/vulnerability analysis; distributed control systems security; cyber vulnerability detection and assessment; incident handling and cyber incident response. GS 15: Mastery of security risks identification and determination and development of solutions to ensure the availability, integrity, authentication, confidentiality, and non-repudiation of data; and reduce risks as evidenced by as evidenced by education, training, and/or experience. Senior technical authority responsible for inclusion of cybersecurity concepts in the design, development, and maintenance of data management systems and databases. Specific cyber security knowledge in two (or more) of the following areas required: malware/ vulnerability analysis; distributed control systems security; cyber vulnerability detection and assessment; incident handling and cyber incident response. 19
20 2210 IT Specialists: Parenthetical Internet GS 9: Knowledge or skill in identifying security risks to ensure the availability, integrity, and confidentiality of Internet, intranet, and extranet services as evidenced by education, training, and/or experience. GS 11: Knowledge and skill in identifying security risks and determining solutions to ensure the availability, integrity, and confidentiality of Internet, intranet, and extranet services as evidenced by experience. Specific cyber security knowledge in one (or more) of the following areas required: distributed control systems security; cyber vulnerability detection and assessment; incident handling and malware/vulnerability analysis, and cyber incident response. GS 12: Knowledge and skill in identifying security risks and determining and developing solutions to ensure the availability, integrity, and confidentiality of Internet, intranet, and extranet services as evidenced by experience. Specific cyber security knowledge in two (or more) of the following areas required: distributed control systems security; cyber vulnerability detection and assessment; incident handling and malware/vulnerability analysis, and cyber incident response. GS 13: Knowledge or skill in identifying security risks to ensure the availability, integrity, and confidentiality of Internet, intranet, and extranet services as evidenced by education, training, and/or experience. Ability to provide guidance in determining the most appropriate methods for delivering information via the Internet, creation of Internet applications, and management of Internet resources. Specific cyber security knowledge in one (or more) of the following areas required: distributed control systems security; cyber vulnerability detection and assessment; incident handling and malware/vulnerability analysis, and cyber incident response. GS 14: Knowledge and expertise in identifying security risks to ensure the availability, integrity, and confidentiality of Internet, intranet, and extranet services as evidenced by education, training, and/or experience. Manage teams to determine the most appropriate methods for delivering information via the Internet; creation of Internet applications; and management of Internet resources. Specific cyber security knowledge in one (or more) of the following areas required: distributed control systems security; cyber vulnerability detection and assessment; incident handling and malware/vulnerability analysis, and cyber incident response. GS 15: Mastery of security risks identification and determination and development of solutions to ensure the availability, integrity, and confidentiality of Internet, intranet, and extranet services as evidenced by education, training, and/or experience. Senior technical authority responsible for determination of the most appropriate methods for delivering information via the Internet, creation of Internet applications, and management of Internet resources. Specific cyber security knowledge in one (or more) of the following areas required: distributed control systems security; cyber vulnerability detection and assessment; incident handling and malware/vulnerability analysis, and cyber incident response. 20
21 2210 IT Specialists: Parenthetical Network Services GS 9: Knowledge or skill in identifying security risks to integrate security solutions into the design, development, configuration, integration and managment of networks as evidenced by education, training, and/or experience. GS 11: Knowledge and skill in identifying security risks and determine and promulgate solutions to integrate security solutions into the design, development, configuration, integration and management of networks as evidenced by experience. Specific cyber security knowledge in one (or more) of the following areas required: cyber risk and strategic analysis; distributed control systems security; network and systems engineering; enterprise architecture; cyber vulnerability detection and assessment; incident handling and malware/vulnerability analysis; cyber incident response; and, cyber-related infrastructure inter-dependency analysis. GS 12: Knowledge and skill in identifying security risks and determine/develop/ promulgate solutions to integrate security solutions into the design, development, configuration, integration and management of networks as evidenced by experience. Specific cyber security knowledge in two (or more) of the following areas required: cyber risk and strategic analysis; distributed control systems security; network and systems engineering; enterprise architecture; cyber vulnerability detection and assessment; incident handling and malware/vulnerability analysis; cyber incident response; and, cyber-related infrastructure inter-dependency analysis. GS 13: Knowledge or skill in identifying security risks to integrate security solutions into the design, development, configuration, integration and management of networks as evidenced by education, training, and/or experience. Ability to provide guidance in the areas of network systems design, development, testing, installation, integration, operations, management, and maintenance. Specific cyber security knowledge in one (or more) of the following areas required: cyber risk and strategic analysis; distributed control systems security; network and systems engineering; enterprise architecture; cyber vulnerability detection and assessment; incident handling and malware/vulnerability analysis; cyber incident response; and, cyber-related infrastructure inter-dependency analysis. GS 14: Knowledge and expertise in identifying security risks to integrate security solutions into the design, development, configuration, integration and management of networks as evidenced by education, training, and/or experience. Manage teams to design, development, test, install, integrate, operate, manage, and maintain network systems. Specific cyber security knowledge in one (or more) of the following areas required: cyber risk and strategic analysis; distributed control systems security; network and systems engineering; enterprise architecture; cyber vulnerability detection and assessment; incident handling and malware/vulnerability analysis; cyber incident response; and, cyber-related infrastructure inter-dependency analysis. 21
22 2210 IT Specialists: Parenthetical Network Services (continued) GS 15: Mastery of security risks identification and determination and development of solutions to ensure security solutions integration into the design, development, configuration, integration and management of networks as evidenced by education, training, and/or experience. Senior technical authority responsible for the design, development, testing, installation, integration, operation, management, and maintenance of network systems. Specific cyber security knowledge in one (or more) of the following areas required: cyber risk and strategic analysis; distributed control systems security; network and systems engineering; enterprise architecture; cyber vulnerability detection and assessment; incident handling and malware/vulnerability analysis; cyber incident response; and, cyber-related infrastructure inter-dependency analysis. 22
23 2210 IT Specialists: Parenthetical Operating Systems GS-9: Knowledge or skill in identifying security risks to integrate security solutions into the design, development, configuration, integration and managment of operating systems as evidenced by education, training, and/or experience. GS-11: Knowledge and skill in identifying security risks and determine and promulgate solutions to integrate security solutions into the design, development, configuration, integration and management of operating systems as evidenced by experience. Specific cyber security knowledge in one (or more) of the following areas required: cyber risk and strategic analysis; program management; distributed control systems security; network and systems engineering; enterprise architecture; cyber vulnerability detection and assessment; incident handling and malware/vulnerability analysis; and, cyber incident response. GS 12: Knowledge and skill in identifying security risks and determine/develop/ promulgate solutions to integrate security solutions into the design, development, configuration, integration and management of operating systems as evidenced by experience. Specific cyber security knowledge in two (or more) of the following areas required: cyber risk and strategic analysis; program management; distributed control systems security; network and systems engineering; enterprise architecture; cyber vulnerability detection and assessment; incident handling and malware/vulnerability analysis; and, cyber incident response. GS-13: Knowledge or skill in identifying security risks to integrate security solutions into the design, development, configuration, integration and management of operating systems as evidenced by education, training, and/or experience. Ability to provide guidance in the areas of operating systems design, development, testing, installation, integration, operation, management, and maintenance. Specific cyber security knowledge in one (or more) of the following areas required: cyber risk and strategic analysis; program management; distributed control systems security; network and systems engineering; enterprise architecture; cyber vulnerability detection and assessment; incident handling and malware/vulnerability analysis; and, cyber incident response. GS-14: Knowledge and expertise in identifying security risks and determine and promulgate solutions to integrate security solutions into the design, development, configuration, integration and management of operating systems as evidenced by education, training, and/or experience. Manage teams to design, development, test, install, integrate, operate, manage, and maintain operating systems. Specific cyber security knowledge in one (or more) of the following areas required: cyber risk and strategic analysis; program management; distributed control systems security; network and systems engineering; enterprise architecture; cyber vulnerability detection and 23
24 2210 IT Specialists: Parenthetical Operating Systems (continued) assessment; incident handling and malware/vulnerability analysis; and, cyber incident response. GS 15: Mastery of security risks identification and determination and development of solutions to integrate security solutions into the design, development, configuration, integration and management of operating systems. Senior technical authority responsible for the design, development, testing, installation, integration, operation, management, and maintenance of operating systems. Specific cyber security knowledge in two (or more) of the following areas required: cyber risk and strategic analysis; program management; distributed control systems security; network and systems engineering; enterprise architecture; cyber vulnerability detection and assessment; incident handling and malware/vulnerability analysis; and, cyber incident response. 24
25 2210 IT Specialists: Parenthetical Project Management GS-9: Knowledge or skill in identifying security risks to integrate security solutions into the design, development, configuration, integration and management of Information technology product, service or system acquisition as evidenced by education, training, and/or experience. GS-11: Knowledge and skill in identifying security risks and determining and promulgating solutions to integrate security solutions into the design, development, configuration, integration and management of Information technology product, service or system acquisition as evidenced by experience. Specific cyber security knowledge in one (or more) of the following areas required: cyber risk and strategic analysis; enterprise architecture; program management; distributed control systems security; network and systems engineering; enterprise architecture; cyber vulnerability detection and assessment; incident handling and malware/vulnerability analysis; and, cyber-related infrastructure inter-dependency. GS-12: Knowledge and skill in identifying security risks and determining/developing/ promulgating solutions to integrate security solutions into the design, development, configuration, integration and management of Information technology product, service or system acquisition as evidenced by experience. Specific cyber security knowledge in two (or more) of the following areas required: cyber risk and strategic analysis; enterprise architecture; program management; distributed control systems security; network and systems engineering; enterprise architecture; cyber vulnerability detection and assessment; incident handling and malware/vulnerability analysis; and, cyber-related infrastructure inter-dependency. GS-13: Knowledge or skill in integration security solutions into the design, development, configuration, testing, integration and management of Information Technology products, services or system acquisitions as evidenced by education, training, and/or experience. Specific cyber security knowledge in one (or more) of the following areas required: cyber risk and strategic analysis; enterprise architecture; program management; distributed control systems security; network and systems engineering; enterprise architecture; cyber vulnerability detection and assessment; incident handling and malware/vulnerability analysis; and, cyber-related infrastructure inter-dependency. GS-14: Knowledge and expertise in identifying security risks and determining and promulgating solutions to integrate security into the design, development, configuration, testing, integration and management of Information technology product, service or system acquisition as evidenced by experience. Specific cyber security knowledge in one (or more) of the following areas required: cyber risk and strategic analysis; enterprise architecture; program management; distributed control systems security; network and systems engineering; enterprise architecture; cyber vulnerability detection and 25
26 2210 IT Specialists: Parenthetical Project Management (continued) assessment; incident handling and malware/vulnerability analysis; and, cyber-related infrastructure inter-dependency. GS-15: Mastery of security risks identification and determination and development of solutions to integrate security into the design, development, configuration, testing, integration and management of Information technology product, service or system acquisition as evidenced by experience. Senior technical authority responsible for the design, development, testing, installation, and integration Information technology acquisitions. Specific cyber security knowledge in two (or more) of the following areas required: cyber risk and strategic analysis; enterprise architecture; program management; distributed control systems security; network and systems engineering; enterprise architecture; cyber vulnerability detection and assessment; incident handling and malware/vulnerability analysis; and, cyber-related infrastructure inter-dependency. 26
27 2210 IT Specialists: Parenthetical Security GS 9: Knowledge or skill in identifying security risks to integrate security solutions into the design, development, configuration, integration and management of operating systems as evidenced by education, training, and/or experience. GS 11: Knowledge and skill in identifying security risks and determining and promulgating solutions to integrate security solutions into the design, development, configuration, integration and management of operating systems as evidenced by experience. Specific cyber security knowledge in one (or more) of the following areas required: cyber risk and strategic analysis; enterprise architecture; program management; distributed control systems security; network and systems engineering; training and exercise facilitation and management; enterprise architecture; cyber vulnerability detection and assessment; incident handling and malware/vulnerability analysis; and, cyber-related infrastructure inter-dependency. GS 12: Knowledge or skill in identifying security risks and determining/ developing/promulgating solutions to integrate security solutions into the design, development, configuration, integration and management of operating systems as evidenced by experience. Specific cyber security knowledge in two (or more) of the following areas required: cyber risk and strategic analysis; enterprise architecture; program management; distributed control systems security; network and systems engineering; training and exercise facilitation and management; enterprise architecture; cyber vulnerability detection and assessment; incident handling and malware/vulnerability analysis; and, cyber-related infrastructure inter-dependency. GS 13: Knowledge and skill in implementation, operation and management of security programs designed to anticipate, assess, and minimize system vulnerabilities as evidenced by education, training, and/or experience. Ability to develop, implement, maintain, operate and enhance information systems security programs, policies, procedures, and tools. Specific cyber security knowledge in two (or more) of the following areas required: cyber risk and strategic analysis; incident handling malware/vulnerability analysis; program management; distributed control systems security; cyber incident response; cyber exercise facilitation and management; cyber vulnerability detection and assessment; network and systems engineering; enterprise architecture; and, cyber-related infrastructure inter-dependency analysis.. GS 14 Knowledge and skill in implementation, operation and management of security programs designed to anticipate, assess, and minimize system vulnerabilities as evidenced by education, training, and/or experience. Manage teams to develop, implement, maintain, operate and enhance information systems security programs, policies, procedures, and tools. Specific cyber security knowledge in two (or more) of the 27
28 2210 IT Specialists: Parenthetical Security (continued) following areas required: cyber risk and strategic analysis; incident handling malware/vulnerability analysis; program management; distributed control systems security; cyber incident response; cyber exercise facilitation and management; cyber vulnerability detection and assessment; network and systems engineering; enterprise architecture; and, cyber-related infrastructure inter-dependency analysis. GS 15: Mastery of security risks identification and determination and development of solutions to integrate security into the design, development, and implementation of security programs, policies, procedures, and tools as evidenced by education, training, and/or experience. Senior technical authority responsible for applying systems security principles, methods, regulations, and policies to meet security requirements. Specific cyber security knowledge in two (or more) of the following areas required: cyber risk and strategic analysis; enterprise architecture; program management; distributed control systems security; network and systems engineering; enterprise architecture; cyber vulnerability detection and assessment; incident handling and malware/vulnerability analysis; and cyber-related infrastructure inter-dependency. 28
29 2210 IT Specialists: Parenthetical Systems Administration GS 9: Knowledge or skill in identifying security risks to ensure the availability, integrity, and confidentiality of IT systems as evidenced by education, training, and/or experience. GS 11: Knowledge and skill in identifying security risks and determining and promulgating solutions to ensure the availability, integrity, and confidentiality of IT systems as evidenced by experience. Specific cyber security knowledge in one (or more) of the following areas required: cyber risk and strategic analysis; enterprise architecture; distributed control systems security; network and systems engineering; cyber vulnerability detection and assessment; incident handling and malware/vulnerability analysis; and, cyber incident response. GS 12: Knowledge and skill in identifying security risks and determining/ developing/promulgating solutions to ensure the availability, integrity, and confidentiality of IT systems as evidenced by experience. Specific cyber security knowledge in two (or more) of the following areas required: cyber risk and strategic analysis; enterprise architecture; distributed control systems security; network and systems engineering; cyber vulnerability detection and assessment; incident handling and malware/vulnerability analysis; and, cyber incident response. GS 13: Knowledge or skill in identifying security risks to ensure the availability, integrity, and confidentiality of IT systems as evidenced by education, training, and/or experience. Ability to manage multi-user computing environment(s), install and configure system hardware and software, manage and monitor system access, upgrade software and conduct backup and recovery. Specific cyber security knowledge in one (or more) of the following areas required: cyber risk and strategic analysis; enterprise architecture; distributed control systems security; network and systems engineering; cyber vulnerability detection and assessment; incident handling and malware/vulnerability analysis; and, cyber incident response. GS 14: Knowledge and expertise in identifying security risks and determining and promulgating solutions to ensure the availability, integrity, and confidentiality of IT systems as evidenced by experience. Manage teams to manage multi-user computing environment(s), install and configure system hardware and software, manage and monitor system access, upgrade software and conduct backup and recovery. Specific cyber security knowledge in one (or more) of the following areas required: cyber risk and strategic analysis; enterprise architecture; distributed control systems security; network and systems engineering; cyber vulnerability detection and assessment; incident handling and malware/vulnerability analysis; and, cyber incident response. 29
30 2210 IT Specialists: Parenthetical Systems Administration (continued) GS 15: Knowledge and skill in identifying security risks and determining/ developing/promulgating solutions to ensure the availability, integrity, and confidentiality of IT systems as evidenced by experience. Senior technical authority responsible for multi-user computing environment(s), installation and system hardware and software configuration, system access management and monitoring, software upgrade and backup and recovery processes and operations. Specific cyber security knowledge in two (or more) of the following areas required: cyber risk and strategic analysis; enterprise architecture; distributed control systems security; network and systems engineering; cyber vulnerability detection and assessment; incident handling and malware/vulnerability analysis; and, cyber incident response. 30
31 2210 IT Specialists: Parenthetical Systems Analysis GS 9: Knowledge of or skill in identifying and analyzing security risks to integrate security solutions into the design, development, configuration, integration and management of information systems as evidenced by education, training, and/or experience.. GS 11: Knowledge and skill in identifying and analyzing security risks and determining and promulgating solutions to integrate security solutions into the design, development, configuration, integration and management of information systems as evidenced by experience. Specific cyber security knowledge in one (or more) of the following areas required: cyber risk and strategic analysis; enterprise architecture; program management; distributed control systems security; network and systems engineering; enterprise architecture; cyber vulnerability detection and assessment; incident handling and malware/vulnerability analysis; and, cyber-related infrastructure inter-dependency. GS 12: Knowledge and skill in identifying and analyzing security risks and determining/developing/promulgating solutions to integrate security solutions into the design, development, configuration, integration and management of information systems as evidenced by experience. Specific cyber security knowledge in two (or more) of the following areas required: cyber risk and strategic analysis; enterprise architecture; program management; distributed control systems security; network and systems engineering; enterprise architecture; cyber vulnerability detection and assessment; incident handling and malware/vulnerability analysis; and cyber-related infrastructure inter-dependency. GS 13: Knowledge of or skill in identifying and analyzing security risks to integrate security solutions into the design, development, configuration, integration and management of information systems as evidenced by education, training, and/or experience. Specific cyber security knowledge in one (or more) of the following areas required: cyber risk and strategic analysis; enterprise architecture; program management; distributed control systems security; network and systems engineering; enterprise architecture; cyber vulnerability detection and assessment; incident handling and malware/vulnerability analysis; and, cyber-related infrastructure inter-dependency. GS 14: Knowledge and skill in identifying and analyzing security risks and determining and promulgating solutions to integrate security solutions into the design, development, configuration, integration and management of information systems as evidenced by education, training, and/or experience.. Specific cyber security knowledge in one (or more) of the following areas required: cyber risk and strategic analysis; enterprise architecture; program management; distributed control systems security; network and systems engineering; enterprise architecture; cyber vulnerability detection and assessment; incident handling and malware/vulnerability analysis; and, cyber-related infrastructure inter-dependency. 31
32 2210 IT Specialists: Parenthetical Systems Analysis (continued) GS 15: Mastery of security risks identification and determination and development of solutions to integrate security into the design, development, configuration, integration and management of information systems as evidenced by education, training, and/or experience. Ability to develop Enterprise Architecture artifacts. Senior technical authority responsible for new systems design methodologies software development risk determination; and determination of the impact of new systems design policies on the systems design process. Specific cyber security knowledge in two (or more) of the following areas required: cyber risk and strategic analysis; enterprise architecture; program management; distributed control systems security; network and systems engineering; enterprise architecture; cyber vulnerability detection and assessment; incident handling and malware/vulnerability analysis; and cyber-related infrastructure inter-dependency. 32
33 GS Parenthetical Enterprise Architecture GS 9: Knowledge or skill in identifying security risks to integrate security solutions into the enterprise architecture framework as evidenced by education, training and/or experience. GS 11: Knowledge or skill in identifying security risks to integrate security solutions into the enterprise architecture framework as evidenced by experience. Specific cyber security knowledge in one (or more) of the following areas required: enterprise architecture; distributed control systems security; network and systems engineering; cyber vulnerability detection and assessment; incident handling and malware/vulnerability analysis; and, cyber-related infrastructure inter-dependency. GS 12: Knowledge or skill in identifying security risks and determining, developing, and incorporating security solutions into the enterprise architecture framework as evidenced by experience. Specific cyber security knowledge in one (or more) of the following areas required: enterprise architecture; distributed control systems security; network and systems engineering; cyber vulnerability detection and assessment; incident handling and malware/vulnerability analysis; and, cyber-related infrastructure inter-dependency. GS 13: Knowledge or skill in identifying and analyzing security risks to integrate security solutions into the enterprise architecture framework to integrate security strategies, plans, standards, and principles into mission, goals, and business processes of the organization as evidenced by education, training, and/or experience. Ability to develop Enterprise Architecture plans, artifacts, reference models, and standards. Specific cyber security knowledge in one (or more) of the following areas required: cyber risk and strategic analysis; enterprise architecture; program management; distributed control systems security; network and systems engineering; enterprise architecture; cyber vulnerability detection and assessment; incident handling and malware/vulnerability analysis; and, cyber-related infrastructure inter-dependency.. GS 14: Knowledge or skill in identifying and analyzing security risks to integrate security solutions into the enterprise architecture framework to integrate security strategies, plans, standards, and principles into mission, goals, and business processes of the organization as evidenced by education, training, and/or experience. Manage teams to develop Enterprise Architecture plans, artifacts, reference models, and standards. Specific cyber security knowledge in one (or more) of the following areas required: cyber risk and strategic analysis; enterprise architecture; program management; distributed control systems security; network and systems engineering; enterprise architecture; cyber vulnerability detection and assessment; incident handling and malware/vulnerability analysis; and, cyber-related infrastructure inter-dependency. 33
34 GS Parenthetical Enterprise Architecture (continued) GS 15: Mastery of security risks identification and determination and development of solutions to integrate security into the design, development, configuration, integration and management of information systems as evidenced by education, training, and/or experience. Senior technical authority responsible for Enterprise Architecture plans, artifacts, reference models, and standards. Specific cyber security knowledge in two (or more) of the following areas required: cyber risk and strategic analysis; enterprise architecture; program management; distributed control systems security; network and systems engineering; enterprise architecture; cyber vulnerability detection and assessment; incident handling and malware/vulnerability analysis; and cyber-related infrastructure inter-dependency. 34
35 VII. Hiring Methodology This establishes hiring procedures for the use of this authority. There are two methods for hiring using this authority: a streamlined approach or using a vacancy announcement to solicit candidates. There is no requirement for a vacancy announcement, but managers may wish to post an individual announcement. Additionally, commands may market their vacancies using a flyer and have the flyer direct candidates to apply to one of the open continuous announcements created for the Cyber Security Workforce. Currently we have prepared and have available for use the GS-2210, GS-854, and GS-855 announcement templates. Managers are encouraged to work with their HRO and HRSC to implement a recruitment plan that best suits their needs. Merit System principles and veterans preferences entitlements will be afforded as contained in 5 CFR 302. Using the streamlined (Name Request) is simple. A Selecting officials or SMEs may identify a candidate through a name request. The following steps are provided: What to include with the RPA for a Name Request 1. PD with standard paragraphs for Cyber Security to indicate that these are Cyber Security Workforce Excepted Service positions 2. Selective Placement Factors 3. Resume 4. Transcripts (if positive education required) 5. OF Notepad: Schedule A appointing authority (b)(11) and include how the Selective Placement was met Using the traditional method of announcing the position may take longer but may solicit a larger number of candidates. The following steps are provided: What to include with a Recruit/Fill RPA 1. PD with standard paragraphs for Cyber Security to indicate that these are Cyber Security Workforce Excepted Service positions 2. Appropriate Selective Placement 3. Notepad: Identify the Recruitment Sources that hiring manager wants to consider (Individual announcement, OCA created for Cyber community (must be 855, 854 or 2210), Schedule A appointing authority (b)(11), Required Selective Placement factor VIII. Positions in Alternative Personnel Systems Those positions in alternative personnel systems are eligible for appointment using the Schedule A appointing authority based on OPM memo dtd 5/3/2010. The use of selective placement factors will be done in the same manner as current methodology for qualifications determinations (e.g., YA-2 under positions will use the GS-9 Selective Placement Factor). 35
36 IX. DCPDS Coding There is no separate DCPDS Code for these hires. Use Authority Code XZM; Authority (b) (11); Event Code: LS12004 X. Allocations: As distributed below. **Fifteen billets held in SECNAV reserve. USMC SPAWAR AIR RES NETWAR COM NAVSEC WARCOM MSC NAVSEA USFFC NETC CNIC CYBER NCIS **Total XI. Reporting Major commands, working with the HRSCs, will provide OCHR quarterly input beginning July 15, 2010, on the number of positions filled using this authority; the pay plan, occupation, series, and grade (or equivalent) of the position; and the nature of action of each hire. OCHR will forward a data call to ascertain this information each quarter. Appendix A: References a. OPM memo of May 3, 2010 b. CPMS memo of Mar 25, 2010 c. CMPS memo of Nov 27, 2009 d. OPM memo of Nov 10,
37 References: Appendix A a. OPM memo of May 3, 2010 b. CPMS memo of Mar 25, 2010 c. CMPS memo of Nov 27, 2009 d. OPM memo of Nov 10,
RECRUITMENT PROCEDURES FOR CYBER SECURITY POSITIONS UNDER SCHEDULE A AUTHORITY
Section 1A Overview RECRUITMENT PROCEDURES FOR CYBER SECURITY POSITIONS UNDER SCHEDULE A AUTHORITY Hiring Process Overview. This instruction establishes procedures for filling cyber security workforce
DEPARTMENT OF THE NAVY. Civilian Cybersecurity Workforce
DEPARTMENT OF THE NAVY Civilian Cybersecurity Workforce Position, Personnel, and Position Description Coding Guide 25 March 2015 Department of the Navy Chief Information Officer Department of the Navy
SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles
PNNL-24138 SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles March 2015 LR O Neil TJ Conway DH Tobey FL Greitzer AC Dalton PK Pusey Prepared for the
DON Pathways Programs Implementing Guide
DON Pathways Programs Implementing Guide Department of the Navy Office of Civilian Human Resources September 2012 Table of Contents Table of Contents... 1 INTRODUCTION... 2 COVERAGE AND AUTHORITY... 2
NICE and Framework Overview
NICE and Framework Overview Bill Newhouse NIST NICE Leadership Team Computer Security Division Information Technology Lab National Institute of Standards and Technology TABLE OF CONTENTS Introduction to
Subj: CYBERSPACE/INFORMATION TECHNOLOGY WORKFORCE CONTINUOUS LEARNING
SECNAV INSTRUCTION 1543.2 From: Secretary of the Navy SECNAVINST 1543.2 DON CIO Subj: CYBERSPACE/INFORMATION TECHNOLOGY WORKFORCE CONTINUOUS LEARNING Ref: See Enclosure (1) Encl: (1) References (2) Responsibilities
2012 Information Technology Workforce Assessment for Cybersecurity (ITWAC) Summary Report
2012 Information Technology Workforce Assessment for Cybersecurity (ITWAC) Summary Report March 14, 2013 TABLE OF CONTENTS List of Tables... iii List of Figures... iv Executive Summary... v 1. INTRODUCTION...
Schneps, Leila; Colmez, Coralie. Math on Trial : How Numbers Get Used and Abused in the Courtroom. New York, NY, USA: Basic Books, 2013. p i.
New York, NY, USA: Basic Books, 2013. p i. http://site.ebrary.com/lib/mcgill/doc?id=10665296&ppg=2 New York, NY, USA: Basic Books, 2013. p ii. http://site.ebrary.com/lib/mcgill/doc?id=10665296&ppg=3 New
Bridging the Cybersecurity Talent Gap Cybersecurity Employment and Opportunities for Engagement
Bridging the Cybersecurity Talent Gap Cybersecurity Employment and Opportunities for Engagement 2015 Burning Glass Technologies Cybersecurity has a Big Problem Attacks are rising Cyber incidents jumped
Position Classification Flysheet for Computer Science Series, GS-1550. Table of Contents
Position Classification Flysheet for Computer Science Series, GS-1550 Table of Contents SERIES DEFINITION... 2 OCCUPATIONAL INFORMATION... 2 EXCLUSIONS... 4 AUTHORIZED TITLES... 5 GRADE LEVEL CRITERIA...
Information Technology 2015 Programmes
Information Technology 2015 Programmes Well connected. Right here Innovation, intelligence and ingenuity. Do you have what it takes to make technology work? IT is a booming industry worth an estimated
Subj: MANAGEMENT OF SENIOR EXECUTIVE SERVICE (SES) AND OTHER SENIOR EXECUTIVE POSITIONS IN THE MARINE CORPS
MPC-10 MARINE CORPS ORDER 12920.1B From: Commandant of the Marine Corps To: Distribution List Subj: MANAGEMENT OF SENIOR EXECUTIVE SERVICE (SES) AND OTHER SENIOR EXECUTIVE POSITIONS IN THE MARINE CORPS
University of Central Florida Class Specification Administrative and Professional. Information Security Officer
Information Security Officer Job Code: 2534 Serve as the information security officer for the University. Develop and computer security system standards, policies, and procedures. Serve as technical team
Department of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 5505.13E March 1, 2010 ASD(NII)/DoD CIO SUBJECT: DoD Executive Agent (EA) for the DoD Cyber Crime Center (DC3) References: See Enclosure 1 1. PURPOSE. This Directive:
NASA DESK GUIDE ON THE EMPLOYMENT OF NONCITIZENS
NASA DESK GUIDE ON THE EMPLOYMENT OF NONCITIZENS Agency Workforce Management and Development Division Office of Human Capital Management NASA Headquarters DG-08 August 2006 Table of Contents Page Section
APPENDIX J INFORMATION TECHNOLOGY MANAGEMENT GOALS
APPENDIX J INFORMATION TECHNOLOGY MANAGEMENT GOALS Section 5123 of the Clinger-Cohen Act requires that the Department establish goals for improving the efficiency and effectiveness of agency operations
GAO DEFENSE DEPARTMENT CYBER EFFORTS. More Detailed Guidance Needed to Ensure Military Services Develop Appropriate Cyberspace Capabilities
GAO United States Government Accountability Office Report to Congressional Requesters May 2011 DEFENSE DEPARTMENT CYBER EFFORTS More Detailed Guidance Needed to Ensure Military Services Develop Appropriate
INFORMATION TECHNOLOGY ENGINEER V
1464 INFORMATION TECHNOLOGY ENGINEER V NATURE AND VARIETY OF WORK This is senior level lead administrative, professional and technical engineering work creating, implementing, and maintaining the County
Information Security Officer (# 1773) Salary: Grade 25 ($81,808-$102,167) / Grade 27 ($90,595 to $113,141) Summary of Duties. Minimum Qualifications
Thomas K. Lee, Executive Director/CIO Human Resources Department (518) 447-2906 Information Security Officer (# 1773) Salary: Grade 25 ($81,808-$102,167) / Grade 27 ($90,595 to $113,141) The New York State
Department of Defense Information Assurance Scholarship Program. Sponsored by the. DoD Chief Information Officer
Department of Defense Information Assurance Scholarship Program Sponsored by the DoD Chief Information Officer SOLICITATION FOR PROPOSALS From Universities Designated by the National Security Agency (NSA)
THE NATIONAL CYBERSECURITY WORKFORCE FRAMEWORK. USER GUIDE Employers
THE NATIONAL CYBERSECURITY WORKFORCE FRAMEWORK USER GUIDE Employers Workforce Framework User Guide Welcome to the User Guide! The Workforce Framework helps Employers to recruit from a larger pool of more
Introduction to NICE Cybersecurity Workforce Framework
Introduction to NICE Cybersecurity Workforce Framework Jane Homeyer, Ph.D., Deputy ADNI/HC for Skills and Human Capital Data, ODNI Margaret Maxson, Director, National Cybersecurity Education Strategy,
Report No. D-2010-058 May 14, 2010. Selected Controls for Information Assurance at the Defense Threat Reduction Agency
Report No. D-2010-058 May 14, 2010 Selected Controls for Information Assurance at the Defense Threat Reduction Agency Additional Copies To obtain additional copies of this report, visit the Web site of
17 July 2015 TECHNICIAN POSITION VACANCY ANNOUNCEMENT #15-084. POSITION: IT Specialist (CUSTSPT) (D0269000) (GS-2210-07/09) EXCEPTED POSITION
DEPARTMENT OF DEFENSE, VETERANS AND EMERGENCY MANAGEMENT Military Bureau Joint Force Headquarters, Maine National Guard Camp Keyes, Augusta, Maine 04333-0033 17 July 2015 TECHNICIAN POSITION VACANCY ANNOUNCEMENT
Sample Career Ladder/Lattice for Information Technology
Click on a job title to see examples of descriptive information about the job. Click on a link between job titles to see the critical development experiences needed to move to that job on the pathway.
Department of Defense INSTRUCTION. SUBJECT: Communications Security (COMSEC) Monitoring and Information Assurance (IA) Readiness Testing
Department of Defense INSTRUCTION NUMBER 8560.01 October 9, 2007 ASD(NII)/DoD CIO SUBJECT: Communications Security (COMSEC) Monitoring and Information Assurance (IA) Readiness Testing References: (a) DoD
Subj: CIVILIAN HUMAN RESOURCES MANAGEMENT IN THE DEPARTMENT OF THE NAVY
SECNAV INSTRUCTION 12250.6A From: Secretary of the Navy SECNAVINST 12250.6A ASN(M&RA)/OCHR 015 Subj: CIVILIAN HUMAN RESOURCES MANAGEMENT IN THE DEPARTMENT OF THE NAVY Ref: See enclosure (1) Encl: (1) References
SECURE POWER SYSTEMS PROFESSIONALS (SPSP) PROJECT PHASE 3, FINAL REPORT: RECRUITING, SELECTING, AND DEVELOPING SECURE POWER SYSTEMS PROFESSIONALS
1 SECURE POWER SYSTEMS PROFESSIONALS (SPSP) PROJECT PHASE 3, FINAL REPORT: RECRUITING, SELECTING, AND DEVELOPING SECURE POWER SYSTEMS PROFESSIONALS Synopsis SPSP Project Overview Phase I Summary Phase
Vendor Management. Outsourcing Technology Services
Vendor Management Outsourcing Technology Services Objectives Board and Senior Management Responsibilities Risk Management Program Risk Assessment Service Provider Selection Contracts Ongoing Monitoring
Online Recruiting and Selection
Online Recruiting and Selection Innovations in Talent Acquisition Douglas H. Reynolds and John A. Weiner ^WILEY-BLACKWELL A John Wiley &. Sons, Ltd., Publication Contents Series Editor's Preface About
DON Cybersecurity/Information Assurance Workforce Management
DON Cybersecurity/Information Assurance Workforce Management 23 March 2010 Chris Kelsall DON CIO, Director, Cyber/IT Workforce Steps to Transform IAWF Management Charter DON team to determine best approach
Page 1 of 5. IS 335: Information Technology in Business Lecture Outline Computer Technology: Your Need to Know
Lecture Outline Computer Technology: Your Need to Know Objectives In this discussion, you will learn to: Describe the activities of information systems professionals Describe the technical knowledge of
Bellevue University Cybersecurity Programs & Courses
Undergraduate Course List Core Courses: CYBR 250 Introduction to Cyber Threats, Technologies and Security CIS 311 Network Security CIS 312 Securing Access Control CIS 411 Assessments and Audits CYBR 320
DEPARTMENT OF DEFENSE IMPLEMENTING GUIDANCE FOR THE PATHWAYS PROGRAMS
DEPARTMENT OF DEFENSE IMPLEMENTING GUIDANCE FOR THE PATHWAYS PROGRAMS 1. PURPOSE. This provides the Department of Defense (DoD) guidance on the implementation of the Pathways Programs (PP). 2. AUTHORITY.
Impact of Juniper Training and Certification on Network Management Activities
WHITE PAPER Impact of Juniper Training and Certification on Network Management Activities Sponsored by: Juniper Networks Cushing Anderson January 2014 IDC OPINION IDC believes sufficient training and appropriate
Network Management and Defense Telos offers a full range of managed services for:
Network Management and Defense Telos offers a full range of managed services for: Network Management Operations Defense Cybersecurity and Information Assurance Software and Application Assurance Telos:
Logical Operations CyberSec First Responder: Threat Detection and Response (CFR) Exam CFR-110
Logical Operations CyberSec First Responder: Threat Detection and Response (CFR) Exam CFR-110 Exam Information Candidate Eligibility: The CyberSec First Responder: Threat Detection and Response (CFR) exam
Actions and Recommendations (A/R) Summary
Actions and Recommendations (A/R) Summary Priority I: A National Cyberspace Security Response System A/R 1-1: DHS will create a single point-ofcontact for the federal government s interaction with industry
CFIR - Finance IT 2015 Cyber security September 2015
www.pwc.dk Cyber security Audit. Tax. Consulting. Our global team and credentials Our team helps organisations understand dynamic cyber challenges, adapt and respond to risks inherent to their business
Job Family Standard for Administrative Work in the Information Technology Group, 2200 TABLE OF CONTENTS
Job Family Standard for Administrative Work in the Information Technology Group, 2200 TABLE OF CONTENTS INTRODUCTION... 2 COVERAGE... 2 MODIFICATIONS TO AND CANCELLATIONS OF OTHER EXISTING OCCUPATIONAL
Subj: DEPARTMENT OF THE NAVY CYBERSECURITY/INFORMATION ASSURANCE WORKFORCE MANAGEMENT, OVERSIGHT, AND COMPLIANCE
D E PAR TME NT OF THE N A VY OFFICE OF T HE SECRET ARY 1000 NAVY PENT AGON WASHINGT ON D C 20350-1000 SECNAVINST 5239.20 DON CIO SECNAV INSTRUCTION 5239.20 From: Secretary of the Navy Subj: DEPARTMENT
Marine Corps. Commercial Mobile Device Strategy
Marine Corps Commercial Mobile Device Strategy April 2013 THIS PAGE INTENTIONALLY LEFT BLANK FOREWORD The currently constrained budget environment requires us to balance fiscal responsibility and mission
Information Technology Specialists, #39110 Occupational Family: Engineering and Technology Pay Band Range: 4-8. Concept of Work
Information Technology Specialists #39110 Page 1 of 16 Information Technology Specialists, #39110 Occupational Family: Engineering and Technology Pay Band Range: 4-8 Concept of Work This Career Group provides
Federally Mandated Training for Federal Employees
Federally Mandated Training for Federal Employees Federally Mandated Training, as defined on the Standard Form (SF) 182 Authorization, Agreement and Certification of Training, is mandatory training for
Security and Emergency Services Community of Interest 0080-Information/Personnel Security Administration Career Road Map
Security and Emergency Services Community of Interest 0080-Information/Personnel Security Administration Career Road Map Prepared by: Booz Allen Hamilton Career progression within the 0080-Information/Personnel
National Initiative for Cybersecurity Education
THE NICE VISION National Initiative for Cybersecurity Education a national campaign to promote cybersecurity awareness and digital literacy from our boardrooms to our classrooms, and to build a digital
IT and Cybersecurity. Workforce Development with CompTIA Certification
IT and Cybersecurity Workforce Development with CompTIA Certification CompTIA solutions meet the federal IT security workforce challenge Federal agencies and contractors face an urgent and unrelenting
HUMAN RESOURCES DIRECTIVE
HUMAN RESOURCES DIRECTIVE SUBJECT: The Library of Congress Selective Placement Program NUMBER: HRD 7-05-14 EFFECTIVE DATE: November 1, 2011 I. PURPOSE This Directive describes the objectives, policies,
Commercial Practices in IA Testing Panel
Commercial Practices in IA Testing Panel March 22, 2001 Albuquerque, New Mexico First Information Assurance Testing Conference Sponsored by: Director, Operational Test and Evaluation Panel Members! Dr.
Linux Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS QUARTER 2 NETWORKING AND OPERATING SYSTEMS ESSENTIALS. Module 1 - Office Applications
NETWORK ENGINEERING TRACK Linux Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS Module 1 - Office Applications This subject enables users to acquire the necessary knowledge and skills to use Office
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 5200.39 May 28, 2015 USD(I)/USD(AT&L) SUBJECT: Critical Program Information (CPI) Identification and Protection Within Research, Development, Test, and Evaluation
Task Area 1: IT Services for Biomedical Research, Health Sciences, and Healthcare
CIO-SP 3 Task Areas Ten task areas constitute the technical scope of this contract: Task Area 1: IT Services for Biomedical Research, Health Sciences, and Healthcare The objective of this task area is
The National Cybersecurity Workforce Framework. 2015 Delaware Cyber Security Workshop September 29, 2015
The National Cybersecurity Workforce Framework 2015 Delaware Cyber Security Workshop September 29, 2015 Bill Newhouse NICE Program Office at the National Institute of Standards and Technology NICE is a
Secure by design: taking a strategic approach to cybersecurity
Secure by design: taking a strategic approach to cybersecurity The cybersecurity market is overly focused on auditing policy compliance and performing vulnerability testing when the level of business risk
Client Update SEC Releases Updated Cybersecurity Examination Guidelines
Client Update September 18, 2015 1 Client Update SEC Releases Updated Cybersecurity Examination Guidelines NEW YORK Jeremy Feigelson [email protected] Jim Pastore [email protected] David Sarratt
Department of Defense INSTRUCTION. Security of Unclassified DoD Information on Non-DoD Information Systems
Department of Defense INSTRUCTION NUMBER 8582.01 June 6, 2012 DoD CIO SUBJECT: Security of Unclassified DoD Information on Non-DoD Information Systems References: See Enclosure 1 1. PURPOSE. This Instruction:
GENERAL SERVICES ADMINISTRATION Federal Supply Schedule Authorized Federal Supply Schedule
GENERAL SERVICES ADMINISTRATION Federal Supply Schedule Authorized Federal Supply Schedule On line access to contract ordering information, terms and conditions, up-to-date pricing, and the option to create
Information Technology & Communications Department Organization N6
Information Technology & Communications Department Organization N6 Director, Information Technology & Communications Department N6 Deputy, Information Technology & Communications Department N6B Chart VI
4. Objective. To provide guidelines for IS requirements and LCM support under NMCI.
d. To apply basic policy and principles of computer hardware and software management as they relate to Information Management and Information Technology (IMIT) and Information Systems (IS) associated with
C ETS C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CSCSS / ENTERPRISE TECHNOLOGY + SECURITY
CSCSS / ENTERPRISE TECHNOLOGY + SECURITY C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CENTRE FOR STRATEGIC CSCSS CYBERSPACE + SECURITY SCIENCE CSCSS / ENTERPRISE TECHNOLOGY + SECURITY GROUP Information
POLICY ON THE USE OF COMMERCIAL SOLUTIONS TO PROTECT NATIONAL SECURITY SYSTEMS
Committee on National Security Systems CNSSP No. 7 9 December 2015 POLICY ON THE USE OF COMMERCIAL SOLUTIONS TO PROTECT NATIONAL SECURITY SYSTEMS THIS DOCUMENT PRESCRIBES MINIMUM STANDARDS YOUR DEPARTMENT
Subj: CIVILIAN EMPLOYEE TRAINING AND CAREER DEVELOPMENT
SECNAV INSTRUCTION 12410.25 From: Secretary of the Navy DEPARTMENT OF THE NAVY OFFICE OF THE SECRETARY 1000 NAVY PENTAGON WASHINGTON DC 20350-1000 SECNAVINST 12410.25 ASN(M&RA) Subj: CIVILIAN EMPLOYEE
CYBER PANEL MEMBERS. Mr. Hart is a member of the United States Air Force Senior Executive Service with over fifteen years service as an SES.
Mr. Bennett Hart, Senior Consultant in Intelligence, Operations, Technology, Training, Proposal Red Teams, and Key Personnel Selection. Mr. Hart is a member of the United States Air Force Senior Executive
Protecting Energy s Infrastructure and Beyond: Cybersecurity for the Smart Grid
Protecting Energy s Infrastructure and Beyond: Cybersecurity for the Smart Grid Which is it? Cyber Security ~or~ Cybersecurity? Dr. Ernie Lara President Presenters Estrella Mountain Community College Dr.
INFORMATION TECHNOLOGY & INFORMATION SECURITY CAREER PATHWAY
INFORMATION TECHNOLOGY & INFORMATION SECURITY CAREER PATHWAY The work of the Talent Pipeline Task Force was inspired by our community s existing assets in the areas of education and workforce. Members
Department of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 5144.02 November 21, 2014 DCMO SUBJECT: DoD Chief Information Officer (DoD CIO) References: See Enclosure 1. PURPOSE. Under the authority vested in the Secretary
Brandman University. School of CCNA
Information Technology Certifications CCNA The Cisco CCNA Training Package (ICND: Parts 1 and 2) includes expert instructor-led training modules with customized presentations, practice exam simulators
ANNEXURE A. Service Categories and Descriptions 1. IT Management
Service Categories and Descriptions 1. IT Management The ICT Management Services portfolio consists of services traditionally related to the technical or functional governance of an ICT domain, but with
An Overview of Large US Military Cybersecurity Organizations
An Overview of Large US Military Cybersecurity Organizations Colonel Bruce D. Caulkins, Ph.D. Chief, Cyber Strategy, Plans, Policy, and Exercises Division United States Pacific Command 2 Agenda United
External Supplier Control Requirements
External Supplier Control s Cyber Security For Suppliers Categorised as Low Cyber Risk 1. Asset Protection and System Configuration Barclays Data and the assets or systems storing or processing it must
Cyber-Security Assessment, Remediation, and Identity Protection, Monitoring, and Restoration Services
4937 Fargo Street North Charleston SC 29418 Phone 843.266.2330 Fax 843.266.2333 w w w. c o d e l y n x. c o m Request for Information: Cyber-Security Assessment, Remediation, and Identity Protection, Monitoring,
Social Media Security Training and Certifications. Stay Ahead. Get Certified. Ultimate Knowledge Institute. ultimateknowledge.com
Ultimate Knowledge Institute ultimateknowledge.com Social Media Security Training and Certifications Social Media Security Professional (SMSP) Social Media Engineering & Forensics Professional (SMEFP)
Subj: NAVY IMPLEMENTATION OF DEPARTMENT OF DEFENSE INTELLIGENCE INFORMATION SYSTEM (DODIIS) PUBLIC KEY INFRASTRUCTURE (PKI)
DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON, DC 20350-2000 IN REPLY REFER TO OPNAVINST 5239.3A N2 OPNAV INSTRUCTION 5239.3A From: Chief of Naval Operations
Computer Software Engineering Career, Jobs, and Employment Information
Computer Software Engineering Career, Jobs, and Employment Information Computer Software Engineering Career and Job Highlights Over the next decade, computer software engineering is expected to grow rapidly
Reliable, Repeatable, Measurable, Affordable
Reliable, Repeatable, Measurable, Affordable Defense-in-Depth Across Your Cyber Security Life-Cycle Faced with today s intensifying threat environment, where do you turn for cyber security answers you
FUNCTIONAL AREA 12. Network Administration (NET)
FUNCTIONAL AREA 12 Network Administration (NET) Incumbents in this functional area address interoperability issues related to hardware, software, and connectivity of communications such as cable, fiber
NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense
NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense Cyber Investigations Data Management Systems Security Data Security Analysis Digital Forensics Health Care Security Industrial
STATE OF NEVADA Department of Administration Division of Human Resource Management CLASS SPECIFICATION
STATE OF NEVADA Department of Administration Division of Human Resource Management CLASS SPECIFICATION TITLE GRADE EEO-4 CODE MASTER IT PROFESSIONAL II 43 B 7.909 SERIES CONCEPT Master Information Technology
Appendix A-2 Generic Job Titles for respective categories
Appendix A-2 for respective categories A2.1 Job Category Software Engineering/Software Development Competency Level Master 1. Participate in the strategic management of software development. 2. Provide
The Next Generation of Security Leaders
The Next Generation of Security Leaders In an increasingly complex cyber world, there is a growing need for information security leaders who possess the breadth and depth of expertise necessary to establish
Click to edit Master title style. How To Choose The Right MSSP
How To Choose The Right MSSP Meet Eric Eric Devansky Director of Global Security Services 15 Years of experience in the Cyber Security industry CISSP Palo Alto CNSE VMWare VCP Connect with me: @TruShield
Information Assurance Workforce Improvement Program
DoD 8570.01-M Information Assurance Workforce Improvement Program Incorporating Change 3, January 24, 2012 December 19, 2005 Assistant Secretary of Defense for Networks and Information Integration/Department
OFFICE OF THE SECRETARY OF DEFENSE 1700 DEFENSE PENTAGON WASHINGTON, DC 20301-1700
OFFICE OF THE SECRETARY OF DEFENSE 1700 DEFENSE PENTAGON WASHINGTON, DC 20301-1700 OPERATIONAL TEST AND EVALUATION AUG 0 1 2014 MEMORANDUM FOR COMMANDER, ARMY TEST AND EVALUATION COMMAND COMMANDER, AIR
SPAWAR HQ ARCHITECTURE AND HUMAN SYSTEMS GROUP Human-Systems Integration/Systems Engineering Support Performance Work Statement
SPAWAR HQ ARCHITECTURE AND HUMAN SYSTEMS GROUP Human-Systems Integration/Systems Engineering Support Performance Work Statement 1.0 INTRODUCTION The Department of the Navy Space and Naval Warfare Systems
CHAPTER 20 CRYPTOLOGIC TECHNICIAN (CT) NAVPERS 18068-20K CH-63
CHAPTER 20 CRYPTOLOGIC TECHNICIAN (CT) NAVPERS 18068-20K CH-63 Updated: July 2015 TABLE OF CONTENTS CRYPTOLOGIC TECHNICIAN (NETWORKS) (CTN) SCOPE OF RATING GENERAL INFORMATION CRYPTOLOGIC CYBERSPACE ANALYST
Network Consulting Engineer
Brochure Network Consulting Engineer February, 2012 2012 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 7 The Cisco Support Center in Krakow To understand
TICSA. Telecommunications (Interception Capability and Security) Act 2013. Guidance for Network Operators. www.gcsb.govt.nz www.ncsc.govt.
TICSA Telecommunications (Interception Capability and Security) Act 2013 Guidance for Network Operators www.gcsb.govt.nz www.ncsc.govt.nz Contents Introduction...2 Overview of the Guidance...3 Focus of
Enterprise IT. Aligning Strong Solutions, Assuring Enterprise Strength
Enterprise IT Aligning Strong Solutions, Assuring Enterprise Strength Strategic planning aligns your enterprise IT infrastructure with your mission, operational and efficiency goals. From the start, we
08 February 2016 TECHNICIAN POSITION VACANCY ANNOUNCEMENT #16-020. POSITION: IT Specialist (SYSADMIN) (D1626000) (GS-2210-07/09) EXCEPTED POSITION
DEPARTMENT OF DEFENSE, VETERANS AND EMERGENCY MANAGEMENT Military Bureau Joint Force Headquarters, Maine National Guard Camp Keyes, Augusta, Maine 04333-0033 08 February 2016 TECHNICIAN POSITION VACANCY
Professional Education Matrix
COURSE NUMBER AND TITLE KNOWLEDGE AND SKILLS All prospective teachers will complete studies in professional education. Professional education is a lifelong undertaking that is initiated in college course
Appendix. Key Areas of Concern. i. Inadequate coverage of cybersecurity risk assessment exercises
Appendix Key Areas of Concern i. Inadequate coverage of cybersecurity risk assessment exercises The scope coverage of cybersecurity risk assessment exercises, such as cybersecurity control gap analysis
Allegany College of Maryland. 239 Cisco Networking 2 * Offered Fall semester and
Cybersecurity comes to Allegany College of Maryland 107 Intro to Cybersecurity Offered fall and spring semesters. This course provides a broad overview of computer security, ethical issues and information
Position Classification Flysheet for Grants Management Series, 1109
Position Classification Flysheet for Grants Management Series, 1109 TABLE OF CONTENTS INTRODUCTION...2 COVERAGE...2 ESTABLISHING THE OCCUPATIONAL SERIES AND STANDARD...2 GENERAL SERIES DETERMINATION GUIDELINES...3
DEPARTMENT OF DEFENSE, VETERANS AND EMERGENCY MANAGEMENT Military Bureau Headquarters, Maine National Guard Camp Keyes, Augusta, Maine 04333-0033
DEPARTMENT OF DEFENSE, VETERANS AND EMERGENCY MANAGEMENT Military Bureau Headquarters, Maine National Guard Camp Keyes, Augusta, Maine 04333-0033 2 May 2016 TECHNICIAN POSITION VACANCY ANNOUNCEMENT #16-051
