Sign in
Post Jobs


Full Time

Website United States Fleet Forces Command

Applicants must have directly applicable experience that demonstrates the possession of knowledge, skills, abilities, and competencies necessary for immediate success in the position. Qualifying experience may have been acquired in any public or private sector job, but will clearly demonstrate past experience in the application of the particular competencies or knowledge, skills and abilities necessary to successfully perform the duties of the position. Such experience is typically in or directly relates to the work of the position to be filled. You must have IT-related experience demonstrating each of the four competencies listed below: 1. Attention to Detail – Is thorough when performing work and conscientious about attending to detail. Examples of experience demonstrating this competency include: Applying analytical methods and skills used to evaluate, implement, and disseminate IT/cybersecurity concepts, tools and procedures; network operations and protocols; operating systems and technology areas, mission analysis and decomposition processes, and cybersecurity risk management. 2. Customer Service – Works with clients and customers (that is, any individuals who use or receive the services or products that your work unit produces, including the general public, individuals who work in the agency, other agencies, or organizations outside the Government) to assess their needs, provide information or assistance, resolve their problems, or satisfy their expectations; knows about available products and services; is committed to providing quality products and services. Experience demonstrating this competency include: Providing guidance and articulating recommendations for implementing cybersecurity policies and procedures and other feasible methods to mitigate risks and prevent compromise of information, systems and processes. 3. Oral Communication – Expresses information (for example, ideas or facts) to individuals or groups effectively, taking into account the audience and nature of the information (for example, technical, sensitive, controversial); makes clear and convincing oral presentations; listens to others, attends to nonverbal cues, and responds appropriately. Examples of experience demonstrating this competency include: Analyzing findings, documenting results, and recommending changes in cybersecurity operations, and controls, including presenting and justifying the need for such actions in written reports and in oral briefings to managers. 4. Problem Solving – Identifies problems; determines accuracy and relevance of information; uses sound judgment to generate and evaluate alternatives, and to make recommendations. Examples of experience demonstrating this competency include: Identifying gaps in technical capabilities and ability to develop or recommend analytic approaches or solutions to problems and situations for which information is incomplete or for which no precedent exists. In addition to my experience demonstrating the four competencies above, I have qualifying experience such as: Experience utilizing computer networking concepts and protocols, network security methodologies, cybersecurity and privacy principles, cyber threats and vulnerabilities including cyber-attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks), attack methods and techniques (e.g., passive, active, insider, close-in, distribution attacks). Experience applying internet network addressing (IP addresses, classless inter-domain routing, TCP/UDP port numbering). Experience performing network security (e.g., encryption, firewalls, authentication, honey pots, perimeter protection) and network topology. Experience identifying/describing techniques/methods for conducting technical exploitation of the target and potential vulnerabilities. Experience applying network protocols such as Transmission Control Protocol [TCP] and Internet Protocol [IP] (TCP/IP), Dynamic Host Configuration, Domain Name System (DNS), directory services and how traffic flows across the network. Experience identifying system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code). This position is within the Work Category: Professional at Work Level: Full Performance, Series and Grade GG-2210-12. Additional qualification information can be found from the following Office of Personnel Management website: Experience refers to paid and unpaid experience, including volunteer work done through National Service programs (e.g., professional, philanthropic, religious, spiritual, community, student, social). Volunteer work helps build critical competencies, knowledge, and skills and can provide valuable training and experience that translates directly to paid employment.

Tagged as: Cybersecurity, Infosec, Specialist

To apply for this job please visit

You can apply to this job and others using your online resume. Click the link below to submit your online resume and email your application to this employer.

Share on