Skip Navigation

Vacancy Questions Preview

Vacancy Questions Preview

Grade: All Grades
* 1.Please select the response that best describes your experience as it relates to this position.
  1. I have one year of specialized experience equivalent to the GS 13 as described in the vacancy announcement.
  2. I do not have the experience described above.

* 2.Please select the response that best describes your experience serving as a technical expert, addressing the most complex advanced systems projects as well as critical problems which confronted an organization in the Information Technology area.
  1. I have experience isolating and defining systems related problems and conditions, formulating projects, establishing specifications and guidelines, creating and implementing advanced systems projects. Work impacted the functions of a wide variety of IT programs throughout the organization and addressed the full range of issues that impact the determination of automation needs including planning system development, design, procurement and implementation.
  2. I have experience providing additional IT functionality and extending system capabilities. Assignments required departure from past approaches and traditional techniques. I had to analyze operating system interfaces, user requirements, computer resource requirements, data conversions and interrelationships as well as interactions with existing IT functions and facilities to insure compatibility and usability and to develop implementation approaches and alternatives.
  3. I have experience that concerned maintenance of services, capabilities, effectiveness and efficiency of IT systems. The work impacted a nominal subset of the overall complement of systems supported and serviced.
  4. None of the above

* 3.Please select the response that best describes your experience supporting Cisco routers/switches.
  1. I have experience in troubleshooting and correcting Cisco router/switch problems.
  2. I have configured Cisco routers/switches.
  3. I have designed a network infrastructure using Cisco routers/switches.
  4. None of the above

* 4.Please select the response that best describes your most closely reflect IT jobs you have held.
  1. IT Specialist providing technical support and problem solving to users of stand alone or networked work stations and peripherals.
  2. IT Specialist providing user support on enterprise, legacy or large commercial software applications.
  3. IT Specialist providing second or third level troubleshooting on operating system, hardware or communication problems.
  4. Network Administrator providing site management of servers, LAN, WAN technology and systems.
  5. Security Specialist investigating security breaches, unauthorized access to or corruption of enterprise data.
  6. IT Training Specialist delivering user training on applications, software, hardware, networks, communications and/or computer security.
  7. Internet Specialist developing and maintaining web sites in order to meet user needs in commercial or governmental organizations.
  8. Systems Analyst interfacing with users to investigate and document business processes, writing specifications for programmers and testing completed modules or applications.
  9. None of the above

* 5.Please select the responses that describe your experience in planning, analysis, designing, development, testing, quality assurance, configuration, installation, implementation, integration, maintenance, and/or management of networked systems used for the transmission of information in voice, data and/or video formats.
  1. Analyzed and defined network requirements
  2. Defined and maintained network architecture and infrastructure
  3. Configured and optimized network servers, hubs, routers, and switches
  4. Analyzed network workload
  5. Monitored network capacity and performance
  6. Diagnosed and resolved network problems
  7. Installed, tested, maintained and upgraded network operating systems software
  8. Developed network backup and recovery procedures
  9. Applied information security/information assurance policies, principles, and practices in the delivery of network services
  10. None of the above

* 6.Do you have prior network design and engineering experience that involved multiple sites (100 or more) with multi-tier architecture and multi-level security, including type 1 encryption?
  1. Yes
  2. No

* 7.Do you have experience in identifying sensitive data and systems, identifying pertinent threats and vulnerabilities, and managing risk.
  1. Yes
  2. No

* 8.Do you have previous IT related experience that involved responsibility for developing, delivering and supporting classified Federal computer systems and services and/or secure communications networks?
  1. Yes
  2. No

* 9.Do you have experience with Public Key Infrastructure or Vulnerability Management, in addition to a strong background with Microsoft Active Directory?
  1. Yes
  2. No

* 10.Do you have experience working with information systems projects related to products and solutions with Owl Technologies Inc. data diode, Trusted Computer Solutions Webshield, Trusted Gateway, Virtual Trusted Thin Client, and Raytheon High Speed Guard?
  1. Yes
  2. No

* 11.Please select the response that best describes your experience in planning, designing and implementing information systems security.
  1. Cross-domain: federating multiple communities of interest both internal and external to your sponsoring agency/organization.
  2. Enterprise-wide: integrating multiple systems, infrastructures and user domains internal to your sponsoring agency/organization.
  3. System-or infrastructure-specific.
  4. Application-or devise-specific.
  5. No experience planning, designing and implementing information systems security.

* 12.Have you administered Firewall policies and practices including the configuration and implementation of firewall hardware and software?
  1. Yes
  2. No

* 13.Have you applied the theories, principles, advances and practices pertaining to information systems security in a real time environment?
  1. Yes
  2. No

* 14.Do you have previous IT related experience that involved responsibility for developing, delivering and supporting unclassified computer systems?
  1. Yes
  2. No

* 15.Do you have experience with or fundamental understanding of encryption (e.g., Taclanes, Secure Mobile Environment Portable Electronic Device (SME PED), etc) as it applies to computer systems or enterprise level network within the federal/private sector.
  1. Yes
  2. No

* 16.Do you have experience with Public Key Infrastructure or Vulnerability Management, in addition to a strong background with Microsoft Active Directory?
  1. Yes
  2. No

* 17.From the following list, please select the information security technologies and techniques you have experience in working.
  1. Network bases intrusion detection systems and analysis
  2. Host based intrusion detection systems and analysis
  3. Vulnerability scanners and vulnerability analysis
  4. Incident response
  5. Threat analysis and tracking
  6. Security information management systems
  7. Network intrusion prevention systems
  8. Host intrusion prevention systems
  9. Operating system security
  10. Patch management systems and techniques
  11. None of the above

* 18.How did you hear about this position?
  1. Faith Based Initiatives
  2. Television
  3. Radio
  4. Internet
  5. Career Fairs
  6. Bill board
  7. Newspaper
  8. Magazine
  9. FBI Recruiter
  10. Employee Referral
  11. EdVenture Program
  12. Other
  13. I am currently an FBI Employee.
  14. District of Columbia Department of Employment Services

* 19.Please specify where you heard about this position.
Maximum length of 250 characters.

* 20.Please provide the city and state where you were born.
Maximum length of 250 characters.

This is a Federal job application system. Providing false information, creating fake IDs, or failing to answer all questions truthfully and completely may be grounds for not hiring, for disbarment from Federal employment, or for dismissal after the applicant begins work. Falsifying a Federal job application, attempting to violate the privacy of others, or attempting to compromise the operation of this system may be punishable by fine or imprisonment (US Code, Title 18, section 1001).