Supervisory Information Technology Specialist (INFOSEC), GS-2210-14

This position is closed. 5/6/2013 12:00:00 AM

Agency:

Occupation:

Information Technology Management

Developed written communications including proposals , policies , recommendations and best practices to diplomatically persuade or influence a diversified audience .
Research , compile and evaluate data in the timely preparation and submission of reports .
Develop written material to provide guidance and clarification on a wide range of information security related issues .
Develop employee performance standards .
Managed electronic media messaging on a wide range of complex business related issues to diversified audiences through use of a wide variety of mobile technology , software and templates .
Made persuasive oral communications to potentially adversarial or indifferent audiences , resulting in a high level of acceptance by the target audiences and individuals .
Interact with representatives of other federal agencies , interdepartmental groups , and the private sector for the purpose of providing or receiving technical information .
Coached or mentored staff in a business environment .
Provide IT security technical guidance and assistance to program and support offices .
Discuss systems and equipment developments with vendors , contractors , consultants and other organization employees engaged in data security .
Recommend the distribution and balance of a teams workload and monitor the status and progress of work .
Provide recommendations on employee performance , technical guidance and training .
As a senior technical expert , coach mentor staff and provide constructive feedback .
Provide technical and administrative supervision to optimize the deployment of programs and services , and to achieve goals .
Develop the ability of others to perform and contribute to the organization by providing opportunities to learn through formal and informal methods .
Develop and interpret IT policies and procedures that reduce the risk to infrastructure control systems .
Develop and maintain policies and procedures to protect the integrity of systems , networks and data .
Implement IT security requirements resulting from changes to laws , regulations or policies .
Institute measures to ensure awareness and compliance with IT security procedures and policies .
Lead IT security implementation activities for an organization .
Applied Federal information technology security laws , regulations and policies in an operational information technology environment .
  • Recommend the distribution and balance of a teams workload and monitor the status and progress of work.
  • Provide recommendations on employee performance, technical guidance and training.
  • As a senior technical expert, coach/mentor staff and provide constructive feedback.
  • Provide technical and administrative supervision to optimize the deployment of programs and services, and to achieve goals.
  • Develop the ability of others to perform and contribute to the organization by providing opportunities to learn through formal and informal methods.
  • Develop and interpret IT policies and procedures that reduce the risk to infrastructure control systems.
  • Develop and maintain policies and procedures to protect the integrity of systems, networks and data.
  • Implement IT security requirements resulting from changes to laws, regulations or policies.
  • Institute measures to ensure awareness and compliance with IT security procedures and policies.
  • Lead IT security implementation activities for an organization.
  • Applied Federal information technology security laws, regulations and policies in an operational information technology environment.
  • Developed written communications including proposals, policies, recommendations and best practices to diplomatically persuade or influence a diversified audience.
  • Research, compile and evaluate data in the timely preparation and submission of reports.
  • Develop written material to provide guidance and clarification on a wide range of information security related issues.
  • Develop employee performance standards.
  • Managed electronic media messaging on a wide range of complex business related issues to diversified audiences through use of a wide variety of mobile technology, software and templates.
  • Made persuasive oral communications to potentially adversarial or indifferent audiences, resulting in a high level of acceptance by the target audiences and individuals.
  • Interact with representatives of other federal agencies, interdepartmental groups, and the private sector for the purpose of providing or receiving technical information.
  • Coached or mentored staff in a business environment.
  • Provide IT security technical guidance and assistance to program and support offices.
  • Discuss systems and equipment developments with vendors, contractors, consultants and other organization employees engaged in data security.