Skip to main content
U.S. flag
Back to results

Supervisory IT Cybersecurity Specialist (Direct Hire)

Department of Health and Human Services
Centers for Disease Control and Prevention
Office of the Chief Information Officer (OCIO)
This job announcement has closed

Summary

The incumbent will oversee CDC-wide cybersecurity functions, privacy breach and incident response, risk management, threat protection, and compliance to ensure the protection of CDC data and the safety of CDC's public health mission.

Overview

Help
Job canceled
Open & closing dates
11/04/2019 to 11/05/2019
Salary
$129,662 to - $165,000 per year
Pay scale & grade
GS 15
Location
Atlanta, GA
1 vacancy
Telework eligible
Yes—as determined by the agency policy.
Travel Required
Occasional travel - You may be expected to travel up to 5% Domestically for this position.
Relocation expenses reimbursed
No
Appointment type
Permanent
Work schedule
Full-Time
Service
Competitive
Promotion potential
None
Supervisory status
Yes
Security clearance
Top Secret
Drug test
Yes
Position sensitivity and risk
Critical-Sensitive (CS)/High Risk
Trust determination process
Announcement number
HHS-CDC-DH-20-10643278
Control number
550391100

Duties

Help

As a Supervisory IT Cybersecurity Specialist (Direct Hire), you will:

  • Manage CDC privacy policies, procedures, and processes while ensuring compliance with Federal Information Security Management Agency (FISMA), OMB, HHS, CDC and other government mandates, and regulations.
  • Establish and oversee CDC information security risk management and compliance activities.
  • Provide and manage a centralized network and security operations command and control center.
  • Provide oversight and implementation of Information Security Continuous Monitoring (ISCM) activities, including maintenance of the agency's Continuous Diagnostics and Mitigation (CDM) program.
  • Manage CDC cybersecurity related insider threat detection, response, and cyberintelligence programs; manage and execute privacy breach response, including compliance and remediation efforts.
  • Perform Personally Identifiable Information (PII) inventory and data classification mapping and work with the Chief Privacy Official and OCIO offices and customers to effectively implement privacy standards in support of program outcomes.

Requirements

Help

Conditions of employment

  • US Citizenship is required.
  • Background Investigation is required.
  • E-Verify: If you are selected for this position, the documentation that you present for purposes of completing the Department of Homeland Security (DHS) Form I-9 will be verified through the DHS "E-Verify" System. Federal law requires DHS to use the E-Verify System to verify employment eligibility of all new hires, and as a condition of continued employment obligates the new hire to take affirmative steps to resolve any discrepancies identified by the system. The U.S. Department of Health and Human Services is an E-Verify Participant.
  • Direct Deposit: All Federal employees are required to have Federal salary payments made by direct deposit to a financial institution of their choosing.
  • All qualification requirements must be met by the closing date of the announcement.
  • One-year probationary period may be required.
  • Travel, transportation, and moving expenses will be paid: No
  • Bargaining Unit Position: No
  • Drug Screening Required: Yes
  • Relocation Incentive maybe authorized: Yes
  • Recruitment Incentive may be authorized: Yes
  • Annual Leave for non-federal service may be authorized: No
  • Supervisory position: Yes, Since this is a supervisory position, candidates must also have demonstrated or shown the potential to develop the necessary knowledge, skills, and abilities. A supervisory probationary period may be required. Applicants should describe any previous experience or responsibilities which could be used in relation to the supervisory requirements of this position.
  • CDC Financial Disclosure -OGE form 450 Holding ourselves to a higher standard; the Centers for Disease Control and Prevention inspires public confidence in its trust responsibilities and mission by maintaining high ethical principles. This position is subject to the confidential financial disclosure requirements of the Ethics in Government Act of 1978 (P.L. 95-521). Therefore, if selected, you will be required to complete a Confidential Financial Disclosure Report (OGE Form 450) to determine if a conflict or an appearance of a conflict exists between your financial interest and your prospective position with the agency. This Information will be required annually.
  • Position requires a Top Secret Clearance, Critical Sensitive Position.

Qualifications

Minimum Qualifications:

Applicants must have at least one year of specialized experience at or equivalent to the GS-14 in the Federal service as defined in the next paragraph.

Specialized experience is experience which is directly related to the position which has equipped the applicant with the particular knowledge, skills and abilities (KSAs) to successfully perform the duties of the position to include directing a program responsible for aspects of information systems security to ensure confidentiality, integrity, and availability of systems, networks, and data through the planning, analysis, development, implementation, maintenance, and enhancement of information system security program policies, procedures, and tools within and across the enterprise.

Additional Qualifying experience for the GS-15 grade level requires IT-related experience that demonstrated each of the following four competencies: Attention to detail; customer service; oral communications; and problem solving.

1. Attention to Detail - Is thorough when performing work and conscientious about attending to detail.

2. Customer Service - Works with clients and customers (that is, any individuals who use or receive the services or products that your work unit produces, including the general public, individuals who work in the agency, other agencies, or organizations outside the Government) to assess their needs, provide information or assistance, resolve their problems, or satisfy their expectations; knows about available products and services; is committed to providing quality products and services.

3. Oral Communication - Expresses information (for example, ideas or facts) to individuals or groups effectively, taking into account the audience and nature of the information (for example, technical, sensitive, controversial); makes clear and convincing oral presentations; listens to others, attends to nonverbal cues, and responds appropriately.

4. Problem Solving - Identifies problems; determines accuracy and relevance of information; uses sound judgment to generate and evaluate alternatives, and to make recommendations.

Cybersecurity Specialty Areas:

The following cybersecurity specialty areas are defined by the National Cybersecurity Workforce Framework (Framework), which is a national resource that categorizes and describes cybersecurity work. The incumbent may qualify in one or multiple specialty areas below. Please select the specialty area (s) that apply to you:

  • All Source Intelligence: Analyzes threat information from multiple sources disciplines, and agencies across the Intelligence Community. Synthesizes and places intelligence information in context; draws insights about the possible implications.
  • Exploitation Analysis: Analyzes collected information to identify vulnerabilities and potential for exploitation.
  • Threat Analysis: Identifies and assesses the capabilities and activities of cyber criminals or foreign intelligence entities; produces findings to help initialize or support law enforcement and counterintelligence investigations or activities.
  • Digital Forensics: Collects, processes, preserves, analyzes, and presents computer-related evidence in support of network vulnerability mitigation and/or criminal, fraud, counterintelligence, or law enforcement investigations.
  • Investigation: Applies tactics, techniques, and procedures for a full range of investigative tools and processes to include but not limited to interview and interrogation techniques, surveillance, counter surveillance, and surveillance detection, and appropriately balances the benefits of prosecution versus intelligence gathering.
  • Cyber Operations: Performs activities to gather evidence on criminal or foreign intelligence entities in order to mitigate possible or real-time threats, protect against espionage or insider threats, foreign sabotage, international terrorist activities, or to support other intelligence activities.
  • Incident Response: Responds to crisis or urgent situations within the pertinent domain to mitigate immediate and potential threats. Uses mitigation, preparedness, and response and recovery approaches, as needed, to maximize survival of life, preservation of property, and information security. Investigates and analyzes all relevant response activities.
  • Cybersecurity Supervision, Management and Leadership: Supervises, manages, and/or leads work and workers performing cybersecurity work.
The following certifications are desired:
Certified Information Systems Security Professional (CISSP)
Certified Ethical Hacker (CEH)

This announcement is for the Advanced Threat Protection Branch and the Cyber-Intelligence & Insider Threat branch.


Education

There is no educational requirement for this position.

Additional information

This position is being filled through Direct Hire Authority for this occupation and is open to all US Citizens.

Vacancies will be filled through OPM's Direct Hire Authority. Veterans' preference and traditional rating and ranking of applicants do not apply to positions filled under this announcement. All applicants who meet the minimum qualification requirements will be forwarded to the selecting official for consideration. Applications received as a result of job fairs, recruitment events, and emergency hiring mechanisms in support of this hiring initiative will also be accepted during the duration of the direct-hire authority. Applicants must apply to vacancy.

For more information on OPM's authorization of Direct Hire Authority, please visit: https://www.opm.gov/policy-data-oversight/hiring-information/direct-hire-authority/

The first cut-off date for you to be referred will be November 13, 2019. Applicants are encouraged to apply early in order to maximize their employment opportunities. Thereafter, additional referral lists will be generated as vacancies occur. Applications received after the cutoff date, may be considered on future referral lists.

Additional selections may be made within the same geographical location CDC-wide.

Males born after December 31, 1959 must be registered or exempt from Selective Service (see http://www.sss.gov).

Interagency Career Transition Assistance Program (ICTAP): For information on how to apply as an ICTAP eligible see http://opm.gov/rif/employee_guides/career_transition.asp#ictap. To be well-qualified and exercise selection priority for this vacancy, displaced Federal employees must be rated at 85.0 or above on the rating criteria for this position.

To view the questionnaire, click on the following link:
https://apply.usastaffing.gov/ViewQuestionnaire/10643278

If you are unable to apply online or need to fax a document(s), view the following link for information regarding an Alternate Application.

How you will be evaluated

You will be evaluated for this job based on how well you meet the qualifications above.

Once the application process is complete, a review of the resume and supporting documentation will be made and compared against your responses to the assessment questionnaire to determine if you are qualified for this job. If, after reviewing your resume and/or supporting documentation, a determination is made that you have inflated your qualifications and/or experience, you may lose consideration for this position. Please follow all instructions carefully. Errors or omissions may affect your eligibility.

Your qualifications will be evaluated on the following competencies (knowledge, skills, abilities and other characteristics).

  • Cybersecurity Specialty Areas
  • Information Security Risk Management Practices

Your session is about to expire!

Your USAJOBS session will expire due to inactivity in 8 minutes. Any unsaved data will be lost if you allow the session to expire. Click the button below to continue your session.