IT Specialist Government - Watertown, SD at Geebo

IT Specialist

This position serves as a the Windows desktop support for the Supervisory Control and Data Acquisition (SCADA) system located in the Watertown Operations Office. The Windows Desktop Support Technician performs a full range of IT services and support for a variety of difficult and complex assignments or projects in a mission critical/real-time control system. The projects and assignments managed by this position include the following:
desktop support, systems administration, information security, operating systems, systems analysis, planning, monitoring, support and system documentation. The Windows Desktop Support Technician also ensures the rigorous application of information security policies, principles and practices. The position works closely with the applications development team to create and manage the energy management system (EMS) software used in the Watertown Operations Office
Qualifications:
Must have IT-related experience demonstrating EACH of the four competencies AND specialized experience listed below. The experience must be IT related and may be demonstrated by paid or unpaid experience and/or completion of specific, intensive training (for example, IT certification) as appropriate. Attention to Detail - Applicant established criteria for measuring the effectiveness of the system authorization program, formulating certification and accreditation projects; investigating and analyzing a variety of unusual conditions, problems and issues that affect the accomplishment of IT security goals and objectives. Customer Service- Applicant coordinate with staff in analyzing and investigating a variety of IT security issues. Oral Communication- Effectively transfer thoughts and express ideas orally in individual or group situations to provide recommendations on vulnerabilities and key remediation coordination efforts. Problem Solving- Make certification and accreditation decisions that involve major uncertainties as to the most effective approach or methodology to be applied to such significant information systems security issues. You must meet all the qualification and eligibility requirements for the position by the closing date of the announcement. SPECIALIZED EXPERIENCE REQUIREMENTSA qualified candidate's online application and resume must demonstrate at least one year of specialized experience equivalent to the next lower grade level in the Federal service. Specialized experience for this position is defined as:
To qualify you must have 1 year of specialized experience r the GS-09:
Minimum of one year experience at GS-07 or equivalent with at least 1 of following:
Experience in System Administration, Configuration, and Management of Windows desktops supporting a real-time SCADA (Supervisory Control and Data Acquisition) environment. Experience in System Administration, Configuration, and Management of Windows desktops supporting a complex IT environment Experience meeting computer infrastructure compliance requirements in a regulated industry. Experience in supporting information technology infrastructure in a 24/7 real-time environment. Your application and resume should demonstrate that you possess the following knowledge, skills and abilities (KSAs). Do not provide a separate narrative written statement. Rather, you must describe in your application how your past work experience demonstrates that you possess the KSAs identified below. Cite specific examples of employment or experience contained in your resume and describe how this experience has prepared you to successfully perform the duties of this position. DO NOT write see resume in your application! Ability to document actions taken; give needed guidance or training to customers to prevent recurrences. Ability to identify areas where additional customer training and assistance is needed. Ability to provides group and individual training to other IT support specialists on technical issues. Ability to work as part of team to solve issues and improve services. Ability to provides technical guidance and support in planning for, analyzing, and designing hardware, software, and operating systems. Ability in determining technical specifications, testing requirements, and implementation strategies. Ability to provide technical oversight of IT operating system security ensuring the confidentiality, integrity, and availability of systems, networks and data. Implements security procedures and tools and ensures the rigorous application of information security/information assurance policies, principles, and practices. Analyzes possible security problems and provides feedback to Cyber Security specialists on potential risks. Experience refers to paid and unpaid experience. Examples of qualifying unpaid experience may include:
volunteer work done through National Service programs (such as Peace Corps and AmeriCorps); as well as work for other community-based philanthropic and social organizations. Volunteer work helps build critical competencies, knowledge, and skills; and can provide valuable training and experience that translates directly to paid employment. You will receive credit for all qualifying experience, including volunteer experience.Time-in-Grade:
Current Federal employees must meet time-in-grade requirements by the closing date of this announcement to receive consideration.CTAP/ICTAP candidates:
To be considered well qualified you must meet all of the requirements as described in this section.You must meetallqualifications and eligibility requirements by the closing date of this announcement.

  • Department:
    2210 Information Technology Management

  • Salary Range:
    $57,812 to $75,152 per year


Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.