COMPUTER SCIENTIST Government - Kunia, HI at Geebo

COMPUTER SCIENTIST

Basic Requirements:
Bachelor's degree in computer science or bachelor's degree with 30 semester hours in a combination of mathematics, statistics, and computer science.
At least 15 of the 30 semester hours must have included any combination of statistics and mathematics that included differential and integral calculus.
All academic degrees and course work must be from accredited or pre-accredited institutions.
In addition to the Basic Requirements for this position, your resume must also demonstrate at least one year of specialized experience at or equivalent to the GS/GG-12 level in the Federal Service or equivalent experience in the private or public sector performing duties such as:
1) Conducting computer network reconnaissance and vulnerability analysis of systems to identify potential points of strength and vulnerability among segments of network maps; 2) Developing exploitation and defensive opportunities and maintaining situational awareness of ongoing network operations to identify and resolve problems; 3) Analyzing, designing, and executing cyber operations in support of organizational requirements; 4) Researching, testing, and evaluating networks tools and capabilities in support of cyber operations.
Additional qualification information can be found from the following Office of Personnel Management website:
https:
//www.
opm.
gov/policy-data-oversight/classification-qualifications/general-schedule-qualification-standards/#url=GS-PROF.
https:
//www.
opm.
gov/policy-data-oversight/classification-qualifications/general-schedule-qualification-standards/1500/computer-science-series-1550/.
Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.