Supervisory IT Cybersecurity Specialist (INFOSEC)
Patent and Trademark Office - Department of Commerce
You must meet the United States Office of Personnel Management’s (OPM) qualification requirements (including specialized experience and/or educational requirements) for the advertised position. You must meet all eligibility and qualifications requirements by the closing date of the job announcement. OPM Qualifications Standards are available at Information Technology (IT) Management Series 2210 (Alternative A) Specialized Experience is experience that has equipped applicants with the particular knowledge, skills and abilities to successfully perform the duties of the position, and that is typically in or related to the position to be filled. To be creditable, specialized experience must have been equivalent to at least the next lower grade level in the federal service. For this position, the next lower grade level is a GS-14. Specialized experience for this position includes: Monitoring Cyber threats and vulnerabilities; AND Providing technical supervision to a team of senior engineers and IT professionals; AND Recommending solutions to cybersecurity incidents or vulnerabilities. In addition to meeting specialized experience: For all positions individuals must have IT-related experience demonstrating each of the four competencies listed below. The employing agency is responsible for identifying the specific level of proficiency required for each competency at each grade level based on the requirements of the position being filled. Attention to Detail – Is thorough when performing work and conscientious about attending to detail. Customer Service – Works with clients and customers (that is, any individuals who use or receive the services or products that your work unit produces, including the general public, individuals who work in the agency, other agencies, or organizations outside the Government) to assess their needs, provide information or assistance, resolve their problems, or satisfy their expectations; knows about available products and services; is committed to providing quality products and services. Oral Communication – Expresses information (for example, ideas or facts) to individuals or groups effectively, taking into account the audience and nature of the information (for example, technical, sensitive, controversial); makes clear and convincing oral presentations; listens to others, attends to nonverbal cues, and responds appropriately. Problem Solving – Identifies problems; determines accuracy and relevance of information; uses sound judgment to generate and evaluate alternatives, and to make recommendations. Incumbent must have one of the following certificates within 120 days from entry on duty (EOD): ISC2 Certified Authorization Professional (CAP); ISC2 Certified Information System Security Professional (CISSP); ISACA Certified Information Security Manager (CISM); GIAC Information Security Fundamentals (GISF); GIAC Security Leadership Certification (GSLC). Since Security Operations Center in the Security Operations Branch must be staffed 24x7x365, nonstandard business hours (night shifts) may be required of the incumbent from time to time. Experience refers to paid and unpaid experience, including volunteer work done through National Service programs (e.g., Peace Corps, AmeriCorps) and other organizations (e.g., professional; philanthropic; religious; spiritual; community, student, social). Volunteer work helps build critical competencies, knowledge, and skills and can provide valuable training and experience that translates directly to paid employment. You will receive credit for all qualifying experience, including volunteer experience.
This position serves as the Security Operations Branch Chief. The Security Operations Branch serves as the organizations first line of defense through diligently monitoring, detecting, and responding to cybersecurity incidents in real-time to protect organizational assets and operations. The Branch is responsible 24 hours day, 7 days a week for ensuring the identification, protection, detection, response, and recovery of cybersecurity threats against USPTO.