Summary This is a public notice flyer to notify interested applicants of anticipated vacancies. Applications will not be accepted through this flyer. Interested applicants must follow the directions in the "How to Apply" section of this flyer to be considered. There may or may not be actual vacancies filled from this flyer. Notice of Result letters will not be sent to applicants who respond to this flyer. Responsibilities You will oversee and facilitate the implementation and operation of cyber security Program requirements for all assigned projects. You will monitor compliance via continuous monitoring and maintain system authorization records and status. You will draft IA Program plans, policies and procedures for the planning and management of IT solutions. You will provide reviews for security issues on new IT projects and change existing systems throughout their lifecycle. You will support the development of IT security goals. Requirements Conditions of Employment Qualifications Your resume must also demonstrate at least one year of specialized experience at or equivalent to the GS-11 grade level or pay band in the Federal service or equivalent experience in the private or public sector. Specialized experience must demonstrate the following: Experience applying information systems security principles and methods (IT security certification and accreditation requirements, network operations and protocols, etc.) ability to perform oversight to assess program compliance. Experience conducting and certifying security accreditations for systems applications. Experience applying information systems security principles and methods sufficient to achieve the operational acceptance of approved information and communications systems, changes and modifications. Experience performing oversight of a clamancy-wide IA Program for policy compliance, Experience applying security principles and methods and IT security products and services sufficient to evaluate, recommend the acquisition of, implement, and disseminate IT security tools, procedures and practices to protect information assets. Experience with systems security principles and methods, sufficient to ensure compliance with appropriate procedures such as, physical access controls, security measures, classification and safeguarding of controlled information rules. Experience with configuration management techniques to document and control the functional and physical characteristics of a system, network, or product to include the requirements, design, software, hardware, documentation, and procedures during the system life cycle. Experience preparing and presenting reports, communicating technical requirements, interpreting policies and guidelines, providing advice and guidance to customers, and representing the organization in interactions with other organizations. Examples of Qualifying Experience: Attention to Detail - Identify current and potential problems areas, updates and establish new requirements. Customer Service - Consult with senior specialists and IT managers throughout MSC in the implementation of process improvement practices. Oral Communication - Oral communication skills to prepare and present reports, communicate complex technical requirements, interpret policies and guidelines, provide advice and guidance to customers, and represent the organization in interactions with other organizations. Problem Solving - Investigates serious IT security violations that potentially affect the integrity of the organization's infrastructure, recommending remediation based on findings, and follows up to ensure the implementation of corrective actions. Additional qualification information can be found from the following Office of Personnel Management website: IOR: https://www.opm.gov/policy-data-oversight/classification-qualifications/general-schedule-qualification-standards/2200/information-technology-it-management-series-2210-alternative-a/ Experience refers to paid and unpaid experience, including volunteer work done through National Service programs (e.g., professional, philanthropic, religious, spiritual, community, student, social). Volunteer work helps build critical competencies, knowledge, and skills and can provide valuable training and experience that translates directly to paid employment. Education Additional Information This position is covered by the Department of Defense Priority Placement Program. Several vacancies may be filled. A tentative offer of employment will be rescinded if the selectee fails to meet the pre-employment requirements, including failure to report to any of the scheduled appointments. Federal annuitant information: The selection of an annuitant is subject to the Department of Defense and Department of the Navy policy on the employment of annuitants. Policy information may be found at: http://www.secnav.navy.mil/donhr/Documents/CivilianJobs/FedCivAnnuitants.pdf. Veteran's preference does not apply when selecting individuals under this specific hiring authority. However, if you claim veteran's preference, you will be required to submit supporting documentation with your application as described in the Required Documents section below. A relocation incentive is generally a single payment intended to offset some of the relocation costs experienced by the selectee. A relocation incentive may be authorized. This position has been designated as a Cyberspace Workforce position in the DoD Cyber Workforce Framework (DCWF) work role of (752) proficiency level (Intermediate) and, as a condition of employment, the incumbent of the position is required to obtain and maintain qualification in accordance with DoDM 8140.03 Cyber Workforce Qualification and Management Program, February 15, 2023 and supporting Department of Navy policies. This designation requires the incumbent to: 1. Obtain the foundational qualification within nine months and the residential qualification within 12 months of appointment and maintain those credentials as described in DoDM 8140.03 for DCWF role of (752-Cyber Policy and Strategy Planner) proficiency level (Intermediate). For more information, please review DoDM 8140.03 and supporting DON policies. 2. Participate in continuous professional development program as described in DoDM 8140.03. An annual 20 hour minimum of Cyber Workforce related continuous professional development must be documented and completed in a current individual development plan signed by both the employee and supervisor. Continuous professional development begins in the fiscal year after the employee has obtained both foundational and residential qualification requirements. 3. Acknowledge responsibilities in writing via command designation letter. Failure to meet a condition of employment may result in disciplinary and/or adverse action up to removal from federal service.