Skip to main content

Grade: 13

No questions specified.

Grade: All Grades

You MUST submit a complete resume in order to be considered for this position. Please review the required documents section of the vacancy announcement for further information.
1 How did you learn about this position?
  • Career Fair
  • Census Bureau Employee
  • College Information Session/Classroom Presentation
  • Friend/Colleague
  • Individuals with Disabilities Recruitment Event
  • Internship
  • Job Search Website
  • Print Advertisement
  • Professional Conference/Organization
  • Professional Magazine/Trade Journal
  • Radio/TV Announcement
  • Recruiter/Headhunter/Search Firm
  • Social Network
  • Special Emphasis/Affinity Group
  • Veterans Recruitment Event
  • Other
2 Have you held a political appointment within the previous five-year period?
  • Yes
  • No
3 I authorize the sharing of my application for other similar positions within United States Census Bureau.
  • Yes
  • No
4 Do you have one year of specialized experience equivalent to at least the GS-12 level ? (See the 'Qualifications' section for a definition of specialized experience) Answer to this question is required
  • Yes
  • No
5 Does your experience meet all four competency-related AND the specialized experience as described in the vacancy announcement? Refer to the Qualifications section of the announcement for the descriptions. Answer to this question is required
  • Yes
  • No
6 Do you have experience conducting computer incident investigations?
  • Yes
  • No
7 Do you have experience associated with security incident response management, incident response procedures, and incident response plans to include investigation techniques and analysis?
  • Yes
  • No
8 Do you have one or more of the following professional certifications?
  • CompTIA A+
  • CompTIA Network +
  • CompTIA Security +
  • GIAC Certified Incident Handler (GCIH)
  • GIAC Security Essentials Certification (GSEC)
  • GIAC Security Expert (GSE)
  • GIAC Information Security Professional (GISP)
  • GIAC Security Leadership Certification (GSLC)
  • ISC2 Certified Authorization Professional (CAP)
  • ISC2 System Security Certified Practitioner (SSCP)
  • ISC2 Certified Information System Security Professional (CISSP
  • ISC2 Certified Information System Security Associate (CISSA)
  • ISACA Certified Information System Auditor (CISA)
  • ISACA Certified in Risk and Information System Control (CRISC)
  • Security Certified Program Security Certified Network Professional (SCNP)
  • Security Certified Program Security Certified Network Architect (SCNA)
  • None of the above.
9 Choose the response that most accurately describes your experience performing Digital Forensic Examination of electronic media.
  • I have not had relevant education, training or experience in these IT management activities.
  • I have had education or training in these IT management activities, but have no experience or no recent relevant experience performing these activities on the job.
  • I have performed these IT management activities on the job, but with close supervision from a supervisor or other senior manager or employee.
  • I have supervised performance of these IT management activities and/or I have trained others in performance and/or I am normally consulted as an expert for assistance in performing these IT management activities.
  • I have performed these IT management activities as a regular part of the job, independently and usually without review by a supervisor or other senior manager or employee.
10 Please indicate the operating systems which you have experience using within the last three years:
  • AIX
  • HPUX
  • Mac OS
  • Linux
  • Solaris
  • Unix
  • VMS
  • MVS
  • Microsoft Windows 2000, 2003, Server editions
  • None of the above
11 Rate your level of experience with PowerShell, Python, Perl and/or shell scripting.
  • No experience or knowledge.
  • have some knowledge, but no job experience
  • I have experience independently writing PowerShell, Python, Perl and/or shell scripts to perform systems administration tasks .
  • I have experience independently writing advanced PowerShell, Python, Perl and/or shell scripts to perform systems administration tasks and I have instructed or mentored others in performing this work.
12 Have you used SAS, R, or Python in the analysis or manipulation of data?
  • Yes
  • No
13 Have you prepared presentations and/or special reports for informational purposes, including responding to detailed questions from stakeholders or other agencies regarding IT Security?
  • Yes
  • No
14 Select the statement that best describes your level of experience in briefing senior management and other key stakeholders on technical IT issues and concerns.
  • I do not have any experience briefing senior management nor do I have any experience developing or contributing to development of briefing materials for someone else to present to senior management and other key stakeholders.
  • I have limited experience in briefing senior management about technical IT issues and concerns, and I have some experience developing or contributing to development of briefing materials for someone else to present to senior management and other key stakeholders.
  • I have extensive experience and have frequently briefed senior managers and other key stakeholders about technical IT issues and concerns and have developed detailed presentation materials as part of my normal job responsibilities.
15 Describe your formal training in information system security.
  • I have completed a graduate level degree program in information security from an accredited university.
  • I have completed an undergraduate level degree program in information system security from an accredited university.
  • I have completed a certificate program in information system security of more than 100 contact hours.
  • I have completed a certificate program in information system security of more than 30 contact hours.
  • I have less than 30 hours of formal training in information system security.
  • I have less than 0 hours of formal training in information system security.