Skip to main content

Grade: 12

Please answer the following questions.
1 Please select the response that best describes your experience as it relates to this position. Answer to this question is required
  • I have one year of specialized experience equivalent to the GS 11 as described in the vacancy announcement.
  • I do not have the experience described above.

Grade: 13

1 Please select the response that best describes your experience as it relates to this position. Answer to this question is required
  • I have one year of specialized experience equivalent to the GS 12 as described in the vacancy announcement.
  • I do not have the experience described above.

Grade: All Grades

Please read the definitions for Performance Improvement Plan and Letter of Requirement before addressing the question below. A Performance Improvement Plan (PIP) is a 90-day written developmental plan for an employee whose performance on one or more critical elements is rated "Unacceptable". A Letter of Requirement (LOR) is issued when a supervisor identifies leave abuse and/or when frequent absences negatively impact operations of an office.
1 Are you a current civilian federal employee, on a Performance Improvement Plan (PIP) or a Letter of Requirement (LOR)? Answer to this question is required
  • Yes
  • No
2 Do you have experience installing, configuring, operating and maintaining Active Directory and Group Policy in a Windows 2008 RS Server environment? Answer to this question is required
  • Yes
  • No
3 Please select the responses that describe your experience in planning, installation, configuration, testing, implementation and management of the systems environment in support of the organization's IT architecture and business needs. Answer to this question is required
  • Analyzed systems requirements in response to business requirements, risks, and costs
  • Evaluated, selected, verified, and validated the systems software environment
  • Evaluated, selected, and installed compilers, assemblers, and utilities
  • Integrated hardware and software components within the systems environment
  • Monitored and fine-tuned performance of the systems environment
  • Evaluated new systems engineering technologies and their effect on the operating environment
  • Ensured that information security/information assurance policies, principles, and practices are an integral element of the operating environment
  • None of the above
4 Please select the responses that describe your experience with verification and validation (V&V) activities. Answer to this question is required
  • Developed and implemented V&V plans
  • Verified requirements via inspection, audit or testing
  • Validated requirements
  • Reviewed and validated test plans
  • Performed compliance audits against defined plans
  • None of the above
5 Please select the responses that describe your experience in installing, configuring, operating and maintaining client server systems with these components. Answer to this question is required
  • Workstations using Microsoft Windows 2000 or greater.
  • UNIX
  • Apple OS
  • None of the above
6 Do you have prior network design and engineering experience that involved multiple sites (100 or more) with multi-tier architecture and multi-level security, including type 1 encryption? Answer to this question is required
  • Yes
  • No
7 Please select the response that best describes your experience working with a Windows distributed network. Answer to this question is required
  • I have performed basic installation, configuration and maintenance of servers and work stations.
  • I have supported most components of an installed network including operating system upgrades, troubleshooting server performance, PC performance, communications, organization and system security administration.
  • I have managed the following processes: design, acquisition, installation, configuration, operations, maintenance and security of the system.
  • I have managed units with Active Directory and have supported network services such as Global Catalogue, Dynamic DNS, DHCP and WINS.
  • None of the above
8 Please select the response that best describes your experience in planning, designing and implementing information systems security. Answer to this question is required
  • Cross-domain: federating multiple communities of interest both internal and external to your sponsoring agency/organization.
  • Enterprise-wide: integrating multiple systems, infrastructures and user domains internal to your sponsoring agency/organization.
  • System-or infrastructure-specific.
  • Application-or devise-specific.
  • No experience planning, designing and implementing information systems security.
9 Please select the response that best describes your highest level of experience with computer software, equipment, and operating systems. Answer to this question is required
  • I have installed COTS packages; loaded operating systems software; maintained or modified LAN/WAN, relocated equipment, installed or updated software.
  • I have responded to users' problems encountered with daily utilization of desktop and/or server-based applications and related equipment such as work stations, servers, printers, telecommunication and other peripheral equipment. I repaired or replaced various system components to correct hardware/software problems; tested and debugged various aspects of application/operating systems software.
  • I am considered a technical expert with computer software, equipment, and operating systems. I handled and resolved complex issues/problems in the IT environment and others seek my technical assistance and guidance.
  • None of the above
10 Please select the response that best describes your knowledge regarding IT systems security principles, concepts and methods needed to conduct audits and ensure the soundness of IT systems. Answer to this question is required
  • I have performed IT security related duties that required knowledge of systems security certification and accreditation requirements and processes; Federal information systems security protocols; integrated information systems security with other security disciplines; I have lead the implementation of a security controls designed to anticipate, assess and minimize system vulnerabilities.
  • I have planned and conducted security accreditation reviews for installed systems; recommended new or revised measures and countermeasures based on the results of accreditation reviews; identified and specified information systems security requirements associated with migrations to new environments.
  • I have knowledge of the risk factors impacting IT security, such as computer viruses, hackers, denial of service. I have implemented correction or preventive actions, such as installing security packets and running antivirus utilities.
  • None of the above
11 Please select the responses that demonstrate your presentation/communication skills. Answer to this question is required
  • Provide telephone support to resolve technical problems with users of hardware or software.
  • Provide informal instructions and directions to users concerning complex software use
  • Deliver user training on applications, software, hardware or networks.
  • Give presentations to small groups within the user community.
  • Give presentations to large groups of users (twenty or more).
  • Deliver formal classroom instruction covering technical subject matter.
  • Provide IT training to upper level management.
  • Represent my employer as a conference leader or speaker at formal conferences.
  • Represent my employer as a lead negotiator in dealings with contractors, vendors or service providers from outside the agency
  • None of the above
12 How did you hear about this position? Answer to this question is required
  • Faith Based Initiatives
  • Television
  • Radio
  • Internet
  • Career Fairs
  • Bill board
  • Newspaper
  • Magazine
  • FBI Recruiter
  • Employee Referral
  • EdVenture Program
    12.1 Which EdVenture Program?
    • State University of New York at Albany
    • Georgia State University
    • Mercer University
    • Delaware State University
    • Fayetteville State University
    • Chicago State University
    • College of Charleston
    • Cleveland State University
    • University of Texas - El Paso
    • Hawaii Pacific University
    • Texas Southern University
    • Florida A&M University
    • Mississippi State University
    • California State University
    • Arkansas State University
    • Kentucky State University
    • University of Miami
    • Tuskegee University
    • Saint Peter's College
    • Virginia Wesleyan College
    • Concordia University
    • Virginia Union University
    • University of Texas - San Antonio
    • Texas State University - San Marcos
    • Cal State University - Sacramento
    • San Diego State University
    • San Jose State University
    • University of Texas - Pan American
    • University of California - Berkley
    • Alabama A & M - Huntsville
    • George Washington University
    • Johns Hopkins
    • Mississippi State University
    • Prairie View A&M University
    • University of Arkansas
    • University of Southern California
    • Savannah State
    • Ohio University
    • Central State University
    • Arkansas Baptist College
    • Wilberforce University
    • Morehouse College
    • Xavier University of Louisiana
    • Alabama State University
    • University of Albany
    • University of Illinois, Chicago
    • Clark Atlanta University
    • California State University, East Bay
    • Morgan State University
    • Jackson State University
    • Virginia Commonwealth University
    • California State University, Fullerton
    • University of Michigan, Dearborn
    • Naval Postgraduate School
    • New York University
    • North Carolina A&T State University
  • Other
    12.1 Please specify where you heard about this position. Maximum length of 250 characters.
  • I am currently an FBI Employee.
  • District of Columbia Department of Employment Services
13 Please provide the city and state where you were born. Maximum length of 250 characters. Answer to this question is required