Information Technology Specialist Government - Cherokee, NC at Geebo

Information Technology Specialist

Works on all aspects of IT projects involving use of Internet-based databases and data collection systems for HHS programs, customers, managers, employees, and citizens. Maintains software applications for the purpose of implementing Agency public reporting initiatives. Installs and converts databases to be included in content management applications. Provide professional support, technical assistance, consultation and training; develop educational and training materials; and evaluate activities, with the intended goal of continuous quality improvement for targeted educational and training materials to promote public understanding of the facility/agency programs. Serve as safety offer for the facility. To qualify for this position, your resume must state sufficient experience and/or education, to perform the duties of the specific position for which you are applying. Experience refers to paid and unpaid experience, including volunteer work done through National Service programs (e.g., Peace Corps, AmeriCorps) and other organizations (e.g., professional; philanthropic; religious; spiritual; community; social). You will receive credit for all qualifying experience, including volunteer and part time experience. You must clearly identify the duties and responsibilities in each position held and the total number of hours per week. For positions requiring positive education requirements, or if you are using education to meet all or part of the qualification requirements, you MUST submit a copy of your transcripts or an itemized list of college courses which includes equivalent information from the transcript (course title, semester/quarter hours, and grade/degree earned) in your resume. BASIC REQUIREMENT(S):
This standard allows eligibility through meeting either the requirements specified in the section titled Education or the requirements specified in the section titled Experience. Education:
All academic degrees and coursework must be from accredited or pre-accredited institutions Undergraduate or Graduate Education:
Degree in computer science, engineering, information science, information systems management, mathematics, operations research, statistics, or technology management or degree that provided a minimum of 24 semester hours in one or more of the fields identified above and required the development or adaptation of applications, systems or networks. In addition to the Basic Requirements, you must also meet the Minimum Qualifications stated below. MINIMUM
Qualifications:
GS-11:
One year of specialized experience equivalent to at least the GS-9 grade level or Ph.D. or equivalent doctoral degree or 3 full years of progressively higher level graduate education leading to a Ph.D. or equivalent doctoral degree. GS-11 Specialized
Experience:
Examples include:
work experience in a health care information technology environment, installing, configuring, upgrading, and troubleshooting hardware and software components; provide hardware and software experience working with website reporting requirements; database structures and processing needs; data storage and maintenance. You must meet all qualification requirements within 30 days of the closing date of the announcement. Federal employees in the competitive service are also subject to the Time-In-Grade Requirements:
Merit Promotion (status) candidates must have completed one year of service at the next lower grade level. Time-In-Grade provisions do not apply under the Excepted Service Examining Plan (ESEP).
  • Department:
    2210 Information Technology Management
  • Salary Range:
    $65,141 to $84,682 per year

Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.