CIVILIAN INTELLIGENCE PERSONNEL
MANAGEMENT SYSTEM (CIPMS)
GS-080
SECURITY
ADMINISTRATION SERIES
APPENDIX C
JUNE 1991

CONTENTS

    Part I    |    Part II


ARMY OCCUPATIONAL GUIDE

FOR GS-080 SECURITY ADMINISTRATION SERIES

Part I

CONTENTS

Section - A   |   Section - B   |   Section - C   |   Section - D   |   Section - E


PART I - SECTION A
DEFINITION AND OFFICIAL TITLES

Series Definition.

This series includes positions primarily established to perform analytical, planning, advisory, operational, or evaluative work concerning the development and/or implementation of policies, procedures, standards, training, and methods for identifying and protecting information, sensitive operations, material, and/or facilities from such national security threats as compromise, unauthorized disclosure, espionage or sabotage . Duties involve the management, supervision, or performance of work in, (1) developing, evaluating, maintaining, and/or operating systems, policies, devices, procedures and methods used for safeguarding information, sensitive operations, and materials; (2) managing a multi-functional activity security program; (3) developing and implementing policies and procedures for analyzing and evaluating the character, background, and history of employees, candidates for employment, and other persons having access or proposed for access to classified or other sensitive information, materials, or work sites; or (4) developing, implementing and reviewing policies and procedures for assuring the loyalty, reliability, suitability, and trustworthiness of persons who have and require access to classified information, reporting derogatory information, determining sufficiency of investigative scope, adjudicative standards and criteria, and affording administrative due process for personnel on whom unfavorable administrative actions are contemplated.

Positions in this series require knowledge of the principles, concepts, policies, practices and methods of security administration. At certain organizational levels, these positions also require knowledge of basic intelligence program functions and requirements. They also require analytical ability, ability to innovate (problem solving), fact finding skills, ability to communicate both in writing and orally (including briefing ability), and interpersonal skills.

Additional occupational information on covered functional specialties is found in Part 2, Section A and in Section B below, exclusions.

Official Titles.

The official title for nonsupervisory positions is Security Specialist. Positions which meet the definition of supervisor/manager are titled Supervisory Security Specialist.

Parenthentical titles may be used as part of the official title as specified in the appropriate section of Part II.

Positions responsible for the development, installation, and management of an activity security program which crosses major security disciplines (for example: personnel, information, industrial, automation, etc.) and which are subject only to administrative supervision and control at the local level are titled Security Officer.

Career Path.

Positions in this series are in the Professional-Administrative career path.

PART I - SECTION B
COVERAGE AND EXCLUSIONS

This section provides supplemental information to assist in series determination and classification of Army positions.

Series Coverage.

This standard is to be used to grade all nonsupervisory CIPMS security specialist and officer positions. These positions generally perform one or more of the following intelligence-related security specialties: automation, disclosure, industrial, information, operations (OPSEC), personnel, physical, or technical security. See exclusion number one be]low and Section C (page 5) for information on non-CIPMS security specialist positions.

Exclusions.

1. Title 5, GS-080, Security Specialists: Positions established primarily to perform duties related to physical security, law enforcement, and the protection of property (as described in Section C below) are excluded from CIPMS and classified by the OPM Position Classification Standard for the Security Administration Series. Security Specialist positions with a mix of Title 5 and Title 10 duties are also excluded when 50 percent or more of those duties are non-CIPMS security functions/duties.

2. Security as an incidental duty: Positions which are concerned with using, processing, protecting, or otherwise handling classified/sensitive information as an incidental function of the principal duties assigned. For example, positions involving the maintenance of files; 'technical, scientific, or other positions the incumbents of which know and apply specific security protective practices only incidentally to the conduct of their main work are classified in the series appropriate for the principal duties.

3. Law enforcement duties: Positions which are principally concerned with directly administering, supervising, or performing , (1) work involved in protecting public property, or property in the custody of the Government or (2) law enforcement operations involving the protection of personnel and property, when such duties consist mainly of supervising or performing guard, patrol, or police work, even when such work is primarily concerned with protecting restricted areas, and implementing related security controls. Such positions are classified to the Guard Series, GS-085, or the Police Series, GS-083, depending on the nature and scope of the specific duties and responsibilities.

4. Investigative duties: Positions which are primarily concerned with conducting or supervising the conduct of personnel security or criminal investigations. Such positions are classified in the General Investigating Series, GS-1810, or the Criminal Investigating Series, GS-1811.

5. Non-intelligence subject matter knowledge required: Positions requiring substantive subject-matter knowledge which advise security specialists concerning or personally classifying information or material into appropriate security categories, (e.g., CONFIDENTIAL, SECRET, etc.) or with declassifying such material are classified in an appropriate subject-matter series, such as the Physical Sciences Group, GS-1300, or others as appropriate.

6. Duties in the legal profession: Positions which require either the performance of work requiring a qualified attorney, or clerical work in support of such legal work. Such positions are classified in appropriate series in the Legal and Kindred Group, GS-900.

7. Personnel administration duties: Positions which have as their primary concern applying the principles and practices of personnel administration, including resolving questions of personnel suitability for employment, are classified in appropriate series in the Personnel Administration and Industrial Relations Group, GS-200.

8. Electronic/electrical knowledge required: Positions the primary duties of which require knowledge of the technical electronic or electrical circuitry of security equipment in order to evaluate, install, maintain, or repair such equipment are classified in the appropriate technical, repair, or equipment analysis series, such as the Engineering Technician Series, GS-802.

9. Computer specialist positions: Positions concerned with safeguarding classified, sensitive, or personal information in computer accessible media, when the primary requirements in the positions are knowledges of computer programming, computer system analysis, or automatic data processing equipment analysis, are classified in the Computer Specialist Series, GS-334.

10. Intelligence specialist positions: Positions performing work in the collection, processing, reporting, analysis, evaluation, interpretation, and dissemination of information and/or products on foreign areas which directly or indirectly affect the national security when the positions require a basic knowledge and understanding of one or more of the natural or social sciences, engineering or military science, but do not demand, as a primary qualification requirement, the full academic or other formal qualifications of that science (i.e., to be a fully qualified scientist, engineer, etc.) are classified to the GS-132 series by reference to one or more of the applicable CIPMS AOGs. In addition, duties relating to counterintelligence polygraphy are classified in the GS-132 series by reference to the Intelligence Operations AOG.

11. Security technician positions: Positions which involve performance of one-grade interval technician work in support of' security specialists. Such technician positions require the application of a practical knowledge of procedures, techniques, rules and methods of the work supported and are classified in the Security Clerical and Assistance Series, GS-086 by reference to the (future) AOG for Technician occupations.

PART I - SECTION C
CIPMS SECURITY SPECIALIST POSITIONS COMPARED WITH THOSE IN THE COMPETITIVE SERVICE (TITLE 5).

1. General. The determination of whether a security specialist position is covered by Title 10 (CIPMS) or Title 5 (the competitive service) is sometimes a difficult one. In cases where a position contains a mix of Title 10 and Title 5 duties, the determination of personnel system coverage should be made before classification of the position using either system. This section of the AOG is designed to help in making those decisions.

a. Intelligence-related security specialists devote a predominant portion of their time (at least fifty-one percent) to the direction, planning, development, implementation, coordination, control, inspection, or conduct of programs designed primarily to protect personnel, information, materiel, operations, and/or facilities from national security threats of compromise, unauthorized disclosure, or espionage. These positions generally perform. one or more of the following security specialities: personnel, information, industrial, technology, foreign disclosure, communications, electronic, operations, or automation security. Intelligence-related security specialists primarily use Army Regulations in the 380 series. Positions meeting this description are in CIPMS (Title 10, excepted service).

b. Non-intelligence related security specialists devote at least fifty percent of their time to the direction, planning, development, implementation, coordination, control, inspection, or conduct of programs designed primarily to protect personnel, property, and operations, to prevent unauthorized access to equipment, facilities, materiel; and to protect against sabotage, terrorism, damage, misuse, theft, loss, malicious mischief or other-acts of willful interference. Law enforcement programs and operations security are excluded from CIPMS when targeted against traditional criminal activity. These positions generally perform one or more aspects of physical security that do not involve protection from national security threats such as compromise, unauthorized disclosure, or espionage. Non-intelligence related security specialists primarily use Army Regulations in the 190 series. Positions meeting this description are in the competitive service (Title 5).

2. Additional information on covered functions/duties: a. Freedom of Information Act and Privacy Act security/-security review are considered to be part of information security (a covered CIPMS functional specialty) when they concern intelligence information or classified research and development data. Intelligence information can take the form of documents, materials, devices, industrial processes, or systems, among others.

b. OPSEC. When the object of the operations security responsibilities is to protect critical, sensitive or classified operations, information, projects or programs from compromise, disclosure or espionage, the duties are classifiable in CIPMS through this AOG. Operations Security duties which are related to physical security (see general description of non-intelligence related security above) are in the competitive service. For example, the identification of the threat of sabotage is a covered CIPMS function; however, the typical response to the identified threat of sabotage (changes in the physical security program) is not a CIPMS function.

c. Duties involved in Sensitive Compartmented Information security or as a Special Security Officer/Special Security Representative (SSO/SSR); duties involving the protection of intelligence sources or methods/intelligence systems and means of collection, with the release of intelligence outside authorized channels, or with the physical security of Sensitive Compartmented Information Facilities (SCIFs); and duties involved in decompartmentation, decontrol and/or sanitization of intelligence information are classified in CIPMS through this AOG.

3. Mixed positions. As can be seen from the above definitions, there will be "mixed" security specialist positions, i.e., positions containing a mixture of duties from both the excepted and competitive services. For this reason, the 51% criterion discussed above is key to the identification of intelligence-related security positions. Other considerations: a. Organizational considerations: the overall mission of the organization; the existing or planned career ladder; and methods/sources of recruitment.

b. Bargaining unit status. All CIPMS positions are exempt from participation in bargaining units; therefore, if there is labor/management agreement that a GS--080 position is properly included in a bargaining unit, such a position is excluded from CIPMS.

c. Position management options. In organizations with multiple mixed positions, similar duties should be grouped together by personnel system, as well as by grade level in as few positions as possible.

PART I - SECTION D
OCCUPATIONAL BACKGROUND INFORMATION

Nature of Security Administration Work.

National security policy originates from a variety of authorities and must be interpreted, evaluated, and implemented by recipient agencies and organizations. Authorities include legislation, Executive Orders (EOs), and time National Security Council issuances for national policy. Policy guidance is provided by Director of Central Intelligence (DCI) for Sensitive Compartmented Information (SCI); the National Security Agency (NSA) for Communications Security (COMSEC) and security of automated information systems; and the Department of Energy (DOE) for nuclear security; as well as by DOD and DA policies and regulations.

Security specialists may. perform work in one or a combination of specialized areas. As a general rule, each of the specializations in security work stems from the need to provide for the physical, procedural, mechanical, electrical, and psychological means of protection and for assuring security reliability of individuals and systems. Security administration is concerned with safeguarding information and material whether it is in the direct custody of the US Government or in the hands of other governments, DOD affiliated businesses (e.g., those having contracts with the government), educational institutions, or other persons or organizations. Information and material, particularly that affecting the national security and defense, may be in any of a wide variety of forms. It may exist in documentary or electronic form, or as materials, hardware, equipment, industrial or other processes, or even as ideas or concepts in the minds of individuals. The multiplicity of forms of sensitive information and materials helps to emphasize the fact that security administration, as covered by this series, is part of a total protective program required by all DOD elements, organizations, and installations. Those protective programs vary widely in scope, complexity, and purpose. They may, for example, serve primarily to protect a command, its staff, and its premises from espionage, terrorism, disclosure and/or compromise of information or material which is considered vital to national defense or national security from hostile intelligence collectors, or dedicated terrorist group collection cells.

Some security specialists perform security work that is directed toward protecting highly defined intelligence information, material, equipment, or processes by applying specifically tailored security criteria. They use knowledge, skills, and abilities derived from the basic functional areas of security in combination with supplemental training and experience needed for specialized program requirements. As an example, Sensitive Compartmented Information (SCI) security involves specialized security programs for intelligence-related information and systems under the cognizance of the Director of Central Intelligence. The work can be one element of a broad security program or, because of the size of facility and/or volume of materials involved, may be a full-time assignment. Security specialists may be designated as SSO by an appropriate authority. They may be involved in developing or applying systems to protect intelligence sources or methods, intelligence systems and means of collection; in release of intelligence outside authorized channels, i.e., to contractors, or non-intelligence activities; in decompartmentation, decontrol, and/or sanitization of intelligence; in damage assessments when sensitive intelligence is involved; in establishment of intelligence exchange agreements or memorandums of understanding with foreign governments, monitoring international intelligence agreements, and security assurance; and in protective systems, establishment of security areas and/or SCIF Systems accreditation.

Work assignments may be very broad or narrow, covering a single specialization or several and may concentrate on one or more specific subject matter areas. Security specialists at all :levels typically interpret, evaluate, develop or implement policy direction for application on an organization-wide basis and conduct oversight reviews on the effectiveness of lower echelon programs and practices. At operating commands, MACOM subordinate commands, or installation levels, specialists further interpret and define policy guidelines, develop and implement procedures addressing specific local requirements, and monitor effectiveness.

Covered functions are described in more detail in Part II, Section A.

PART I - SECTION E
GRADE BAND BAR ILLUSTRATION

Security Administration positions are in the Professional/Administrative Career Path depicted below:
BAND 2 * BAND 3 BAND 4 BAND 5
GS Grades 5 6 7 8 9 10 11 12 13 14 15 16 17 18
GS-080 Entry Full Performance Expert Serior Expert
* Depicted grade bands are not intended to preclude the dual track concept. Supervisory and managerial positions are also found in the Security Administration grade bands but not discussed in this AOG.

Depicted grade bands are not intended to preclude the dual track concept. Supervisory and managerial positions are also found in the Security Administration bands but not discussed in this AOG.

* Please note: Although not shown above, Band 1 (the pre-professional band encompassing grades 1 through 4) may be used when activities wish to establish Cooperative Education Program (COOP) positions or other forms of upward mobility programs. See the CIPMS Guide for Classifying GS Positions, paragraph 3-8, for procedures on establishment of positions in the pre-professional grade band.


ARMY OCCUPATIONAL GUIDE

FOR GS-080 SECURITY ADMINISTRATION SERIES

Part II

CONTENTS

   Section A   |   Section B   |   Section C    Section D    Section E   


PART II - SECTION A

ARMY SPECIFIC CIPMS OCCUPATIONAL INFORMATION AND FUNCTIONAL SPECIALTY TITLES

1. Titles - General.

In addition to the titles in Part 1, the following parenthetical functional specialty titles may be added to CIPMS positions classified by this AOG. These titles are used when a security specialist position is established to perform duties in one of the specialties a majority of the time. The generic title Security Specialist is used when a-position performs duties from more than one functional specialty and when no one function predominates.

Authorized Parenthetical titles:
Security Specialist (Automation)
Security Specialist (Disclosure)
Security Specialist (Industrial)
Security Specialist (Information)
Security Specialist (Operations)
Security Specialist (Personnel)
Security Specialist (Physical)
Security Specialist (Technical)

Note: Organizational titles or functional titles not appearing above may appear in the body of the job description but are not authorized official titles. Example: Special Security Officer (SSO).

2. Security Specialist {Automation)

This functional specialty includes those security specialists primarily concerned with the protection of information, processes and equipment in the automated systems environment. Primary duties include ensuring the protection of information stored, processed and/or communicated by computer-driven automated information systems from physical or electronic unauthorized disclosure, modification or destruction and protection of automated systems from physical or electronic degradation, disablement or destruction.

The automation security specialist must be familiar with the hardware/ firmware/software architecture, functioning and capabilities of the systems concerned and the state of the art in secure systems technologies, to include specific system vulnerabilities. Design of responsible automated systems, security policies and specific system security programs alike require the comprehensive, integrated and systematic application of multiple security disciplines in order to develop an acceptable system security posture, including hardware/ firmware/software security, physical security, information security, personnel security, administrative/ procedural security, COMSEC, and emissions security. The foregoing, in combination, provide systems capabilities in terms of critical security functions, such as access control (both access to the system and access within and among system capabilities and files), audit/accountability and separation of users, capabilities and information on the basis of sensitivity, classification and need-to-know. Responsibility also normally involves preparation of comprehensive system security program documentation, development and implementation of security testing and evaluation and submission for formal security approval.

Automation security specialists provide authoritative, critical information and assistance to organization officials by advising on the relative level of risk inherent in dependency upon automated systems for critical mission support; identifying specific system security vulnerabilities and designing responsible safeguards; and assessing the impact of security requirements upon system cost, efficiency and user effectiveness throughout the system's life cycle, from concept phase through initial design, development, testing, installation and operation, to phase out.

3. Security Specialist (Disclosure)

Security specialists in the disclosure function determine whether information or data contained in technical reports, papers, manuscripts and other documents which, except for the controlled information itself, may be released in part to other foreign governments or the public at large. They are frequently concerned with evaluating foreign government eligibility for receipt of classified and controlled unclassified information, and ensuring that decisions to release such information are in the best interest of the United States. These specialists develop and implement policies and procedures to support foreign disclosure and technology security programs within an organization. They review foreign government, non-DOD affiliated person, or group requests for classified information or controlled unclassified information with unique military applicability or utility; they process foreign government requests for foreign representative accreditation to DA/DOD agencies and MACOMs, and process foreign government requests for visits to DA/DOD installations and activities.

The disclosure security specialist also makes release decisions on equipment that is integrated into or embedded with other systems such as military aircraft, automated information systems, weapons systems, and others. The disclosure security specialist must be knowledgeable of such information, equipment and systems, to include limited changes in restrictions regarding releasability to one country or another, and must continuously monitor the precautions taken to protect such information from unauthorized transfer and exploitation. Release decisions are based upon known security protection capability and formalized assurances by friendly government military organization requestors. Each proposed disclosure of classified and controlled unclassified information to foreign government, non-DOD person, or group requestor is initially evaluated against five basic criteria:

a) Is the disclosure consistent with US foreign policy and national security objectives;

b) Is the disclosure for a specific, identifiable US national interest purpose;

c) Is the disclosure consistent with US military and security objectives;

d) Will the prospective foreign government recipient of the information, data, system, or equipment be able to provide substantially the same degree of security protection given to it by the US Government; and

e) Will the disclosure result in benefit to the US Government which is at least of equal value to the information considered for disclosure.

4. Security Specialist (Industrial)

Security specialists performing work in the defense industrial security program (DISP) must be knowledgeable in all other security areas, e.g., personnel, disclosure, technology, physical and information security, and must be capable of understanding application of these skills in a business/industrial environment. As such, the individual must also be cognizant of a wide range of non-security knowledges and skills applicable to contracting and the business world.

Industrial security specialists review contract documentation to identify the level and kind of secure work to be performed in the facility, including the extent of security protection required for the program(s), or system(s), or information involved. The Security Specialist must be cognizant of DISP inspection requirements and processes, when government owned/contractor operated (GO/CO) facilities are located on an installation.

Industrial security specialists conduct surveys of industrial or other private facilities located on Army installations to determine .the organizations' eligibility to work with and store classified and sensitive information. These surveys involve thorough examination of business documents and personal interviews to assure clearance levels for officials are commensurate with information handled and to assess the facilities' physical acceptability for possession of classified and sensitive information.

Industrial security specialists assure that security is considered in the earliest stages of procurement planning and that all requirements are fulfilled. They work with contracting officers to assure that bidders can meet security requirements of the contract. They attend pre-award and pricing conferences to assure that security costs are not excessive and assist the contracting office in carrying out security responsibilities. They perform periodic reviews of facilities and their personnel to assess protection against espionage; investigate suspected security violations; and recommend or take appropriate measures to correct security deficiencies, up to and including removal of classified material from organization's possession or stopping work operations when a significant breach of security is probable.

Industrial security specialists may represent a number of user agencies in the facilities to which they are assigned. As a consequence, the specialists must be aware of the variety of contracts in the facilities, activity (or Department) officials responsible for several programs, and any special program requirements affecting security matters. They identify security requirements for inclusion in the contract security classification specification. Often, these specialists provide the contractor with SCI security administration oversight in the performance of the contract.

5. Security Specialist (Information)

Information security specialists are primarily concerned with the overall safeguarding of national security information, with emphasis on classified or other sensitive information originated or controlled by DA/DOD elements. Such information (documents, materials, devices, industrial processes, systems, etc.) may be contained within DA/DOD facilities and systems, or located in industrial facilities, academic institutions, other non-DOD organizations (including foreign governments), or other locations. Duties include developing, implementing, managing, and monitoring policies, instructions, procedures, control systems, and methods to prevent the compromise or loss of classified defense information or material. Some specialists review plans for proposed or new projects to assure adequate information security controls are in place. This involves determining who should have classification authority and assessing document and access controls, transmitting sensitive information and materials, and related information safeguards. This process often includes determining whether a proposed security classification level is appropriate and whether adjustments are required in control and storage plans. This work requires a basic understanding of the subject matter in order to distinguish various levels of classification for existing and new information. During the course of a contract or project, classification guidance is periodically reviewed to assure it is current. While the focus of the information security specialization is on the protection of information, the work requires knowledge of the policies and techniques involved in personnel, physical, foreign disclosure, technology, and industrial security programs. This knowledge is used to develop, implement, and monitor specific controls directed at protecting information.

Information security includes the subfunctions of classification management, sanitization and decompartmentalization, special access programs (SAPs), security education, and may involve some aspects of Freedom of Information Act and Privacy Act information release programs.

6. Security Specialist {Operations)

Operations security is a program designed to deny the enemy information concerning planned, ongoing, and completed operations. Casual conversation, deviation from routine practices, changes in priorities, intensification of troop movement or logistic support, and the nature of activities, configuration or location of materiel cause speculation by the media, the general public and hostile intelligence services. When analyzed, these seemingly innocent kinds of activities point toward and tend to compromise classified information, projects or programs. The protection of information is the foundation of the operations security program and the term "operation" may refer to any activity which involves classified and unclassified sensitive defense operations. The OPSEC program frequently involves the intense coordination and application of supporting principles from each of the various specialties tailored to fit specialized situations or conditions. Sources of information to be protected include sensitive unclassified information, communications (document or electronic means), informative patterns and signatures (visual, acoustic, electronic, or infrared), and stereotyped procedures (tactical or administrative). All could signal Allied plans and readiness postures to hostile observers. OPSEC has a broad, all-encompassing scope and involves a systematic approach to the identification and neutralization of potential unclassified information sources.

OPSEC specialists use knowledge of hostile intelligence collection methods to analyze and determine the threat to Allied operations represented by the multi-disciplined intelligence services using human intelligence, signal intelligence and imagery intelligence approaches. They become involved with certain aspects of Allied intelligence, counter-intelligence, electronic warfare, deception and psychological operations which frequently impact upon OPSEC. OPSEC specialists engage in comprehensive survey and analysis of Allied operational functions to determine what needs to be protected, to identify and assess the degrees of vulnerability, and to select or design appropriate countermeasures. In assessing operational vulnerability, OPSEC specialists also perform terrorist threat evaluation and assessment.

7. Security Specialist (Personnel)

Personnel Security involves the establishment, development and implementation of policy and procedures to ensure that acceptance and retention of personnel in the Armed Forces, acceptance or retention of civilian employees in the Department of Defense (DoD), and granting members of the Armed Forces (including Reserves and National Guard), DoD civilian employees, DoD contractors, or other affiliated persons access to classified information are clearly consistent with the interests of national secururity. This functional area includes those personnel security specialists who are responsible for the formulation, development and application of security policy, systems, procedures and programs involving the loyalty and reliability of people.

Personnel security specialists develop and implement policies and procedures for the personnel security program within an activity or organization, review requests for clearances and special accesses, interview nominees, apply regulations regarding the type of personal security investigation needed (i.e., National Agency Check, special background investigation); and request an investigation from the appropriate organization.

Personnel security specialists determine the adequacy of investigations and other data collected; evaluate the authenticity, veracity, and pertinence of data to the case at hand; recommend or decide whether a security clearance should be granted, suspended, revoked, or denied; and request additional investigations or develop other information if needed. When a commander takes a security-related adverse action against an individual, personnel security specialists provide a statement of reasons for the adverse action, and consider any response in explanation, mitigation or refutation. In the event a security clearance must be questioned or cannot be granted, personnel security specialists may negotiate with activity or industry management officials regarding the possibility of changes in position location, need-to-know, need for access to restricted areas, to limit access of individuals and, thus, reduce the risk of compromise. Personnel security specialists provide authoritative information and assistance to organization officials by advising on personnel security policies and their impact on organizational missions; formulating and recommending personnel security investigative requirements; advising on procedures for adverse personnel security determinations and employees rights; representing the organization in personnel security matters; administering programs for continuous security evaluation of personnel; developing guidelines, procedures, and other materials for use by operating officials; assisting in arranging and conducting hearings or appeals; and/or administering security awareness programs. Additionally, personnel security specialists are required to have knowledge of personnel security requirements as they apply to special access programs, compartmented programs, and contractor programs.

Personnel security specialists determine and/or participate in program planning efforts to evaluate the need for security requirements and make decisions on or recommend policy, methods, procedures, and adjudicative guidelines for the continuing evaluation of personnel in sensitive positions, reporting and evaluating derogatory information, and for the overall personnel security process. Some specialists make recommendations and decisions which materially affect the scope and direction or mission of a command, activity or Department.

Some personnel security specialists participate in planning, developing, implementing and coordinating with personnel specialists regarding security requirements for civilian and military personnel programs (i.e., employment in sensitive positions, requesting investigations from OPM and OPM investigative requirements, position sensitivity, security requirements for officer appointments, security requirements for branch assignment or transfer, military occupational specialty security requirements, criteria for removal from civilian employment or elimination from military service; clearance requirements for enlisted promotions, security actions to take in connection with drug and alcohol rehabilitation programs, etc.).

8. Security Specialist (Physical)

Physical security specialists within CIPMS are concerned primarily with protection of personnel, property, equipment, and facilities from hostile intelligence activities. The physical security specialist works with that part of the overall security system which is developed in response to intelligence threat analysis. It includes aspects of OPSEC as well as measures targeted against foreign intelligence. Supporting studies, surveys, inspections, and reviews are the means of measuring the adequacy of the procedures and measures. Physical security procedures include, but are not limited to, application of physical measures to reduce vulnerability to the intelligence threat by: integration of physical security into contingency plans; testing physical security procedures and measures during exercise of plans; and interfacing of OPSEC and physical security programs.

9. Security Specialist (Technical)

This functional specialty includes the security subfunctions of communications security (COMSEC), electronics security (ELSEC), TSCM (technical surveillance countermeasures) and TEMPEST (compromising emanations). Persons in this specialty area are involved in policy development or implementation with a goal of protecting classified and other sensitive information in electronic form from interpretation and exploitation by unauthorized personnel. Technical security specialists may be involved in the design and approval of cryptofacilities, development of COMSEC policies to provide necessary protection to highly sensitive COMSEC keying material, evaluation of COMSEC programs through review/analysis of cryptofacility inspection and COMSEC account audit reports; or they may recommend cost effective, efficient COMSEC solutions to individual, unique operations. Additionally, these persons may be involved in the development and/or oversight of formal cryptographic access programs. Personnel in this specialty may develop implementing TEMPEST policies based upon national level guidance. They may conduct, assist or provide advice in the conduct of facility assessments and evaluations to determine degree of TEMPEST compliance necessary and direct the achievement of necessary actions. They may assist in facility design planning to incorporate necessary TEMPEST countermeasures and/or coordinate with engineering or procurement officials to identify equipment TEMPEST requirements. Technical security specialists may engage in classified facility design planning to identify countermeasures necessary or recommended to reduce the risks of electronics eavesdropping on voice, electronics or electromagnetic emanations. The Security Specialist may request services from supporting US Army Intelligence and Security Command (INSCOM) element to analyze and evaluate effectiveness of applied countermeasures.


PART II - SECTION B

DISCAS CODES

Definitions for the following DISCAS codes are in DoD-wide Intelligence Career Development Program Manual, DOD 1430.10-M-3.

Functional area:

Security Countermeasures

Occupational Specialties:

Automation security
Communications Security
Electronic Security
Foreign Disclosure Security
Industrial Security
Information Security
Operations Security
Physical Security
Personnel Security
Release/Disclosure/Freedom of Information
Technology Security



PART II - SECTION C

GRADE BAND DESCRIPTIONS

Note: Not all aspects of assignments are discussed here or in the factor degree descriptions (FDD). WORK EXAMPLES ARE NOT DESIGNED TO BE ALL INCLUSIVE BUT HAVE BEEN SELECTED FOR ASSISTANCE IN COMPARING AN INDIVIDUAL POSITION'S ASSIGNMENTS AND RESPONSIBILITIES TO THE CIPMS PRIMARY GRADING STANDARDS AND THIS AOG.

1. ENTRY LEVEL: GS-5 - GS-9

The entry level security specialist performs routine and developmental aspects of any or-all of the security administration functional specialties at various organizational echelons. Assignments entail research of regulations and other policy and procedural guidance and application of those policies and procedures to non-controversial work situations. Specialists in entry level grades normally perform tasks that assist or simplify the work of other higher level specialists. They perform the following duties in structured situations:

- Review security clearance submission paperwork. Prepare access rosters based on clearance records. Conduct personnel interviews. Assist in execution of non-disclosure agreements.

- Review personnel security investigations and grant security clearances in favorable cases or those containing minor derogatory information. Request expansion of investigation if investigative scope is lacking. Refer cases containing major or questionable derogatory information to higher level adjudicator.

- Assist in/conduct security inspections. Review classified documents for proper markings. Assist in arranging security measures for classified meetings. Review security classification guides for administrative requirements.

- Assist in/conduct inspection of on-site contractor facilities. Ensure clearance/need-to-know of contractor visitors. Ensure contractor is eligible to receive/store classified information. Ensure classified material in contractor hands is properly disposed of following contract completion.

- Maintain access rosters for sensitive computer areas. Ensure passwords are properly issued and controlled. Review accreditation packages for compliance with administrative requirements. Assist in/conduct inspections of computer facilities.

- Assist in/conduct OPSEC awareness briefings. Assist in/con-duct OPSEC surveys. Ensure OPSEC reviews of proposed open source literature are conducted.

- Refer document/visit requests to appropriate office. Ensure visit requests are approved. Ensure application of necessary security statements on information to be released. Complete FORDTIS forms as directed by superiors.

- Assist in/conduct physical security inspections. Ensure security containers/vaults/open storage areas for classified information are approved. Assist in/conduct reviews of SCIF requirements.

- Assist in/conduct inspection of telephone equipment. Ensure implementation of policy and procedures concerning proper labeling of telephones to preclude discussion of classified information over non-secure lines. Ensure requests for TSCM services conform with DA regulatory requirements.

2. FULL PERFORMANCE LEVEL: GS-10 - GS-13

Security specialists at the full performance level perform a full range of moderately difficult to complex functional security duties and assignments. They apply contemporary security program philosophy, techniques, and regulatory requirements to resolve routine to complex security policy and procedural problems. They review and maintain existing security programs to ensure relevancy, currency and thoroughness in meeting existing or evolving security mission requirements. Where security programs are determined to be insufficient or nonexistent, the specialist plans, develops. and implements programs to accomplish security mission goals and formalize findings in official reports. Some security specialists train other security specialists, subject matter experts or other employees on security policy, programs and procedures. They provide guidance and subject matter expertise to security supervisors and managers, as well as other activity personnel. Some security specialists concentrate on one functional area; others serve as security advisors to activity commanders or organization directors on the full range of security functions and the security posture of the installation/command.

Sample duties for the Full Performance Grade Band:

- Review information security classification guides for consistency with EO security classification criteria. Conduct inquiries/investigations of security violations involving classified information. Ensure all locally generated classified documents meet the classified document marking requirements of EO, DoD and Army regulations.

- Adjudicate derogatory, conflicting or questionable data from personnel security, counterintelligence, or criminal investigations or received from other sources and grant security clearance/SCI access or recommend suspension of access, denial/revocation of security clearance/SCI access.

- Review statements of work (SOW) or contract security classification specifications for accuracy/completeness. Prepare requests for sponsorship of contractor for facility security clearances. Provide security analysis of foreign ownership, control or influence or special security agreement matters affecting Army contracts.

- Conduct OPSEC surveys of sensitive activities. Provide OPSEC assessments for information proposed for public release. Develop OPSEC measures to safeguard sensitive unclassified information.

- Develop physical security plans for safeguarding classified information. Determine physical security requirements for secure areas, vaults, and/or sensitive compartmented information facilities.

- Provide security analysis for munitions control cases. Coordinate activity position on accreditation of foreign nationals, document releases, visit requests, etc. Provide technology security input to technology transfer cases.

- Review accreditation packages, develop security plan(s), and plan and coordinate inspections for a data processing installation(s).

- Coordinate requests. for TSCM services. Develop access plan for installation and guidance on security aspects for use of secure telephone unit (STU).

3. EXPERT LEVEL: GS-14 - GS-15

Employees at this level have a mastery of the security administration field and are considered a technical authority in the broad area or areas of the field presently assigned. They serve as project leaders and program managers for the commands or activities they represent. These positions may exist at HQDA, MACOMs, and, in some cases, at larger MSCs, independent activities or field operating agencies. Expert level security specialists develop programs, policies and procedures in response to emerging technologies or new or expanded security requirements. They develop solutions to complex security problems and coordinate those solutions with higher and lateral headquarters for command-wide or department-wide application. They provide highly technical evaluations of current Department or IC security systems and policies and recommend changes to existing programs, policies, procedures, or methods of application. They represent their command or the Army at conferences, seminars, and direct one-on-one meetings with commanders, activity directors, staff heads, and ranking officials outside their command and the Army to gain necessary cooperation or persuade 'to action.

4. SENIOR EXPERT LEVEL: Above GS-15

Employees at this level are a leading authority within their Department and the security/intelligence community. They serve as technical experts in interdepartmental IC study groups, provide expert technical advice to top level decision makers such as the HQDA DCS, G-2, MACON commanders, or other high ranking staff officers or officials from DA and other agencies. They direct long range planning (5 to 10 years), studies, and forecasts used to develop future security requirements caused by emerging technologies or mission area changes while integrating these plans with and providing support for other Department/IC level missions.


SECTION D - FACTOR DEGREE DESCRIPTIONS FOR NONSUPERVISORY POSITIONS

Note: Not all aspects of each functional assignment are discussed/addressed in the Factor Degree Definitions (FDDs). WORK EXAMPLES ARE NOT DESIGNED TO BE ALL INCLUSIVE BUT HAVE BEEN SELECTED FOR ASSISTANCE IN COMPARING AN INDIVIDUAL POSITION'S ASSIGNMENTS AND RESPONSIBILITIES TO THE FDDs. THE EXAMPLES ARE.MEANT TO SERVE AS POINTERS TO SELECTION OF THE PROPER FDD. EXAMPLES HELP ADDRESS THE NUMBER OF DISTINCT FUNCTIONAL SPECIALTIES WITHIN THE OVERALL CIPMS SECURITY ADMINISTRATION FIELD.

FACTOR A - ESSENTIAL KNOWLEDGES

This factor measures the nature and extent of information or facts which employees must understand to do acceptable work (e.g., steps, procedures, practices, rules, policies, theories, principles, and concepts) and the nature and extent of the skills needed to apply this knowledge.

Degree A-5 - 40 Points

Knowledge of basic principles, policy, procedures, and methodology of the security administration occupation and skill in applying this knowledge in carrying out elementary assignments and operations. Ability to research regulations, locate specific guidance, and apply that guidance to well-defined situations. Ability to communicate orally and in writing.

Examples:

- Assist senior specialists in conduct of comprehensive security inspections of Army elements or contractor facilities.

- Assist in developing an activity position regarding a visit by a friendly foreign national when the visit will entail access to classified information. Assist in developing the activity position by reviewing the NDP, precedents and value to the US.

- Review security classification guides for consistency with directed classification criteria.

- Assist security officials in designating position sensitivity levels and determining security clearance investigations and clearance requirements.

- Recommend interim security clearances in accordance with established procedure. Recommend final security clearances based on favorable personnel security investigations.

- Assist in preparation of security briefings, debriefings, and administration of security awareness programs by gathering statistics and obtaining background information by research of regulations or other documents.

- Review physical security plans-for approved open storage of classified munitions at an Army depot.

Degree A-6 - 60 Points

In addition to the kinds of knowledge required at degree A-5,. employees at this degree apply practical knowledge of commonly applied security principles, concepts and methodologies in carrying out recurring assignments independently. Depending on their organizational assignment, security specialists at this level may concentrate on one functional area or may be developing skill in related functional specialties.

Examples:

- Develop requests for exception to security policy based on knowledge of the mechanisms by which the activity or Army policy was formulated.

- Participate in the conduct of security inspections of Army elements which may have multiple subordinate activities.

- Authorize release of classified information to foreign nationals, visitors, and accredited individuals through application of MACOM or installation regulations, procedures and review of precedent cases.

- Grant clearances/accesses through application of knowledge of investigative scope and regulatory requirements for each level of security clearance, SCI and/or SAP information access eligibility. Use judgment and knowledge of regulations in order to determine appropriate course of action,. e.g., Letter of Intent or additional investigation. When significant derogatory information is developed, furnish advice and coordinate with commander/supervisor on advisability of suspending access.

- Develop and conduct an entry/exit inspection program to deter unauthorized removal/introduction of classified information from/to an organization.

- Develop criteria and conduct an inspection of storage areas for classified military hardware.

- Review automation security accreditation packages and recommend appropriate action to the accreditation activity.

- Develop and apply traditional approaches for the conduct of a full-range security awareness, education, and training program involving both collateral and Special Access Program (SAP) security procedures.

Degree A-7 -80 Points

Employees use knowledge, in addition to that at the lower degrees, of a wide range of security concepts, principles, and practices to review, analyze, and resolve difficult and complex security problems. The solutions developed often result in new methods, approaches or procedures. They apply a wide range of security functional area knowledge to treat unique organizational or geographical or mission or political security problems not resolvable by application of standard regulatory requirements. Security specialists at this degree typically serve as an authoritative source of multi-functional security program knowledge in the organization or for subordinate organizations.

Examples:

- Resolve security clearance problems caused by conflicting testimony and sources, and conflicting policy such as conflicts between personnel management and personnel security policies. Determine course of action based on analysis of precedent cases and all pertinent information, and make a final assessment of the risk to national security of granting the clearance or access. Decisions contribute to the development of new policy because of their precedent-setting nature.

- Provide guidance and training to subordinate command staff officers and security personnel on the personnel security program. When necessary, recommend suspension of access to classified information to ensure unit readiness and protect the security of the command. May administer the Limited Access Authorization Program for foreign national employees. Grant waiver(s) of investigative requirements for emergency hire in sensitive positions.

- Develop or implement innovative methods to ensure optimal security programs in activities/facilities with overlapping and conflicting requirements, where agreements with other Army organizations or with DoD elements for security resources and responsibility sharing must be developed.

- Use delegated disclosure authority and evaluation of political conditions to determine whether newly available technologies should or should not be shared and with whom.

- Serves as an authority on the adjudication of special personnel security cases, SCI access authorizations, and for special program requirements (e.g., nuclear, chemical, or ADP duties, White House/Presidential support duties, etc.). Responsible for implementation of Army personnel security directives within the Department through analysis of existing program guidance and resolution of existing security, personnel management or operational conflicts and through issuance of new procedures.

- Develop innovative and cost effective guidelines and processes through which multiple releases of a Militarily Critical Technologies List (MCTL) item, or sensitive technical information with unique military utility, may be transferred to a single government entity for subsequent release to select Allied foreign government military counterpart organizations with an established need to receive it. May be required to seek and obtain formal in-writing agreements from counterpart foreign government officials to assure the item is not reproduced without express permission of item proponent(s).

Degree A-8 - 95 Points

Senior security specialists at this degree have established technical expertise in the security functional specialties and are required to apply new therories and standards where problems are not solved by accepted standards. They use comprehensive knowledge of the security administration field to function as technical authorities and program managers in assignments and positions which plan policy and studies and guide the implementation of the results of :such studies. In their capacity as senior action officers, security specialists at this level are responsible for security programs and for resolving major conflicts in policy and program objectives. Decisions and recommendations made or programs developed significantly change policies or programs across broad organizational lines.

Examples:

- Develop or recommend the development of new policies and procedures affecting broad security functional area(s), their policy, programs and operations; such as, security of contractor operation in the US, its foreign subsidiaries, and/or contractors of our Allies as a result of co-production programs.

- Apply experimental techniques to evaluate the probability of compromise resulting from the transfer of classified major weapons systems to foreign governments or organizations.

Degree A-9 - 115 points

Assignments at this degree require a mastery of the security administration field in order to generate and develop new., integrated hypotheses and theories. Employee is recognized as a department authority on security countermeasures. Does serve as a leading authority in the security administration field throughout the Defense Department or the IC.

Employees at this level plan, organize and direct studies to develop long range (e.g., 5 - 10 year) studies and forecasts. They recommend methods for enhancing the efficiency of security countermeasures and/or defensive counterintelligence systems through modification or application of evolving technology. They participate as technical experts in interdepartmental or intergovernmental study groups convened to resolve critical issues in existing or planned security -programs requiring innovative solutions.

Security specialists at this degree are frequently called upon because of their recognized expertise and extensive operational experience; they are particularly skilled at interpreting threat projections, developing vulnerability analyses, and managing broad-based security assets to meet organizational requirements for particularly complex, changeable field or operational situations within the Department or IC.

Examples:

- Develop a program to forecast long-range security requirements and new policies to protect major end item equipment or breakthrough military technology which is in the research and development phase.

- Act as the Army's final authority on interdepartmental or intergovernmental working groups developing new security policy, applying to and necessitated by the dynamic nature of multinational weapons systems production agreements.

FACTOR B - GUIDELINES

This factor measures the nature of the guidelines used (e.g., regulations, procedures, precedents, methods, techniques and other guidelines that govern the work) and the degree of interpretation required of these references, including the elements of judgment and originality.

Note on Factor B - Guidelines.

For specific security programs, Security Specialists use (apply, interpret, supplement, recommend change to, etc.) regulations of other agencies of the IC such as NSA or CIA. When evaluating this factor, do not attach undue weight to the fact that an employee may be using non-Army regulations in the performance of his/her duties. Factor B requires the evaluator to consider the degree of interpretation required of these references, and the degree of judgment and originality the employee needs in order to complete his/her assignment(s).

Degree B-2 - 25 Points

Procedural instructions containing specific guidelines for doing the work have been established by the employing organization and are readily available to the employee. The number and similarity of guidelines and work situations require the employee to use judgment in locating, selecting and applying the most appropriate guidelines, references, manuals, checklists, or procedural or technical instructions for application in specific security assignments. Employee makes minor deviations to adapt the guidelines in specific cases, but significant deviations are reviewed by the supervisor.

Guidelines at this degree cover a wide variety of procedural and administrative conditions, such as: documentation requirements for new or proposed security systems; personal information needed for background investigations and security clearance processes; clearly acceptable information for granting clearances or marking and storage instructions for classified or sensitive documents, processes, and equipment; standard requirements for granting foreign requests for information or visits, for inspection of industrial security programs or a SCIF or for evaluation of a security awareness, education and training program.

Degree B-3 - 50 Points

Guidelines are available, but are not completely applicable to the work or have gaps in specificity. Typical guidelines consist of Army regulations, MACOM/MSC supplements to those regulations, local policies, procedures and precedent cases and may include the regulations or directives of other IC agencies. The employee uses judgment in interpreting and adapting guidelines and work directions for application to specific security system requirements or problems. The employee often resolves gaps in specificity and overlaps or conflicts in guidelines by proposing regulatory or procedural changes consistent with stated security program objectives in local implementing guidance.

Examples:

- Use judgment in identifying, analyzing, evaluating and recommending solutions for procedural inconsistencies/ discrepancies among the program guidelines of a security specialty in an environment with several user or tenant activities. For example:

> An industrial security environment under contract to several users representing multiple activities or departments.

> Foreign disclosure policy determinations for a project involving more than one organization or multiple project managers.

> Accommodate the conflicting policies and procedures for safeguarding a sensitive test activity involving several project managers.

- Develop procedures to ensure intermediate safeguarding of classified material in the absence of both sufficient security containers and a local policy covering such a situation.

- Apply policies and regulations such as those that cover access to and protection of compartmented information or TEMPEST criteria for a given installation.

- Develop a program to ensure letter and spirit of "two person integrity" rule are applied within an organization, using judgment in considering impact on mission accomplishment and consistency with other organizational guidelines.

- Recommend appropriate action to take when derogatory information is surfaced on individuals with access to classified information.

Degree B-4 - 70 Points

Administrative policies and precedents are applicable but are stated only in very general terms and guidelines for performing the work are scarce or of limited use. The employee uses initiative and resourcefulness in deviating from traditional methods or researching trends and patterns to develop new methods, criteria or proposed new policies.

Guidelines regularly applied at this degree consist of broad security guidance in the form of directives issued by Executive Orders, DOD, DCI, NSA, and Army regulations.

Examples:

- Integrate industrial security guidelines from various countries with US policy for an international dual production program which establishes a multi-national consortium of contractors. Use judgment and originality in formulating policies acceptable to all member countries.

- Determine whether broadly stated national disclosure policy applies to new disclosure situations and whether information may be released without an exception to that policy. Employee frequently must determine if new information, which lacks specificity or is ill-defined, falls under existing broad disclosure policy and precedents.

- Institute innovative measures to foster information security awareness, oversight, and feedback, when traditional policies and procedures have not been effective. Deviates from local and higher echelon information security requirements in formulating these measures.

- Determine SCI access or collateral clearance eligibility based on DCI or DOD directives -- which are broad statements of factors to be considered and require continuous interpretation and adaptation to meet unique circumstances of individual cases. These clearance decisions require consideration of numerous precedent case histories. Interpretations and decisions made require a great deal of personal judgment and discretion in applying these guidelines to situations involving all active duty military, members of the ARNG, USAR, Department of the Army civilians, consultants, and contractor personnel.

- Adapt general guidelines normally applied to well-defined situations to allow application to a new and unique set of circumstances. For example, uses judgment and ingenuity to adapt OPSEC guidelines (which were designed to protect the secrecy of tactical operations) to a non-tactical (research and development, test and evaluation, or training and doctrine) environment.

Degree B-5 - 95 Points

In addition to those guidelines described in lower degrees of this factor, guidelines regularly applied at this degree consist of broad security guidance such as: basic legislation, court decisions, Presidential Executive Orders, National Security Council Directives, and broad policy statements issued by the Department.

Guidelines provide a general outline of the concepts, methods, and goals of security programs, but judgment and ingenuity are required in order to determine the intent, and to refine and coordinate, and implement decisions made. Employees at this degree are frequently recognized as an authority in the development and interpretation of guidelines.

Examples:

- Interpret and prepare implementing procedures and instructions from rather general organizational policy statements in order to establish and monitor operating security programs in organizations covering a number of locations and a variety of security program considerations (classified information, facilities, devices, industrial or scientific processes, and others) including personnel, industrial, physical, information, COMSEC/TEMPEST, and/or special compartmented requirements.

- Evaluate the degree of risk to classified contracts caused by foreign ownership, control or influence, and determine best method of negating those risks. Available guidelines are vague and vary from case to case.

- Based on broad policy guidance in the Executive Order, develop a program to improve compliance with the need-to-know principle which satisfies the needs of a variety of activities. Such program development requires a thorough understanding of problems associated with prior implementation plans and the ability to use innovative judgment in creating feasible, non-traditional means to institutionalize the policy.

- Interpret and apply the guidelines of more than one Federal agency, e.g., CIA and DOD, or CIA and DA, etc., which may apply to personnel security programs at a single facility. Personnel security decisions involve several personnel security program proponents, and the application of a variety of security guidelines which are lacking in specificity. Personnel Security Specialists apply guidance concerning the following: collateral clearances, sensitive compartmented information, Presidential Support duties, loyalty acceptance/-retention decisions, nuclear/chemical/ADP security requirements, special access program cases; security screening for General Officer promotions. Such work involves individuals assigned to various locations in CONUS, OCONUS and at all organizational echelons, to include joint organizations, attache duties at US Embassies, and White House assignments.

- Develop programs and/or procedures based on broad policy statements such as a treaty or legislation. For example, may develop a program based on an international treaty allowing access to sensitive areas by individuals representing countries other than US allies; or disclosure criteria and procedures for a new international cooperative program. Programs developed include procedures to negate unfriendly access.

- Interpret and determine application of broad COMSEC security guidance of more than one DOD component, i.e., NSA, DIA., DCA, and DA in the development/procurement of major information systems which may be needed to satisfy multi-agency requirements. COMSEC guidance is generic and judgment must be used in determining methods of application.

Degree B-6 - 115 Points

Guidelines are virtually non-existent. Precedents are obscure or not available. Originality, creativity and/or long-term experience are required to deal with or to plan theoretical, experimental or complex programs of such advanced and novel character that new concepts and methodology must be developed. Develops definitive plans and heads pioneering efforts to solve problems that require an extension of theory.

Examples:

- Serve as a member of an IC or government-wide group convened to develop new national disclosure policy(s) necessitated by changes in world politics. Testify before Congressional committees to explain Army security policy and positions and recommend changes affecting the IC as a whole.

- During development of a new international treaty, develop inspection protocols to be adhered to by "adversaries," ensuring that the security of sensitive items not subject to the treaty is not compromised.

- Develop departmental policy or serve as a member on DA/DOD group convened to originate security policy governing emerging technologies.

FACTOR C - SCOPE OF AUTHORITY AND EFFECT OF DECISIONS

This factor covers the relationship between (1) the nature of the, work (e.g., purpose, breadth, and depth of assignments) and. (2) the effect of the work products or services both within and outside the organizational element. Effect also measures such things as whether the work output facilitates the: work of others, provides timely service of a personal nature, or impacts on the adequacy of research conclusions.

Degree C-1 - 15 Points.

At this degree, the employee performs routine, procedural or operational aspects of security administration where errors can be readily detected and corrected. The primary purpose of the work is to facilitate the work of higher-graded coworkers within the organization and to gain skills and experience in the career field. The primary consequence of error is localized loss of time.

Degree C-2 - 30 Points

The primary purpose of the work is to provide assistance to experienced employees by relieving them of detailed and routine work. It involves the application of specific, well-established rules, regulations, and procedures in one of the security specialties or as a function of developing general skills in security administration. Work products and services affect the accuracy and timeliness of broader projects or studies being performed by more experienced employees and may affect the work of other units.

Examples:

- Review contractor facility clearance documentation to determine eligibility to receive or retain classified information. Errors could result in visits being postponed or delay in release of classified information.

- Participate in a classified document marking program review by making specific checks of classified documents. Errors in accuracy or timeliness may result in classified information being erroneously marked and possibly compromised. Failure of assigned personnel to properly mark classified documents may result in inability to meet a suspense date for contract performance.

- Review requests for personnel security clearances and changes in position sensitivity to determine validity; verify clearances, access authority and citizenship; screen military personnel records and OPM investigations, comparing information with employee application to determine falsifications; and conduct briefings and debriefing of employees. Errors in accuracy, failure to conduct proper local records checks, or failure to check proper documentation to verify citizenship, etc. may cause the Defense Investigative Service (DIS) to return investigative packet without action for correction of error, which results in loss of time and can affect unit readiness or an individual's ability to perform assigned duties.

- Inspect adequacy of local facilities for destruction of classified information. Observe destruction and, where incomplete, make recommendations for corrective actions. Inspections which do not identify existing security weaknesses may cause present and future classified information compromise resulting from incomplete destruction of the material.

- Conduct an OPSEC inspection using locally developed checklist, Army regulation, and MACOM supplement. A poor inspection can result in the installation being in non-compliance with regulation, and possibly in compromise of -sensitive aspects of the activity's projects..

- Review requests by foreign nationals to conduct classified visits to contractor facilities. Errors could result in the disclosure of classified information to unauthorized individuals.

Degree C-3 - 50 Points

The work involves resolving a variety of conventional :security problems, questions, or situations such as those where responsibility has been assigned for monitoring established security systems and programs or performing :independent reviews and recommending actions based upon .interpretation of existing security regulations and practices. Work products, advice, assistance given, and/or clearances granted affect the effectiveness and efficiency of ongoing security programs or contribute to the security effectiveness of newly introduced programs and facilities requiring such protective services. The effect of the work is primarily local in nature, although some programs may be part of multi-facility or organization-wide program operations with interlocking security requirements.

Clearances granted, security systems installed, access controls implemented (pass and identification, ADP access passwords, COMSEC systems,.etc.), storage facilities and ,devices installed, periodic security inspections conducted, or.similar other security program services contribute to the .adequacy of local security programs in meeting mission .objectives within required levels of security protection (i.e., need to know, physical access, intrusion detection, anti-terrorist protection, sensitive operations, automated systems data protection, and others).

Examples:

- For the functional specialty to which assigned, the employee may either issue tailored local guidance to supplement Departmental/MACOM/MSC policies, or review policies of subordinate units. Errors can result in inconsistent. inadequate or inaccurate application of security guidance in serviced activities.

- Review TOP SECRET material accountability procedures organization-wide or for a subordinate unit. Inaccurate or untimely -reviews may result in non-discovery of a possible loss of TOP SECRET material which could endanger organization-wide mobilization capabilities.

- Employee interprets personnel security regulations. Initiates requests for investigations and periodic reinvestigations when required for collateral clearances and SCI accesses. Errors resulting from incorrect interpretations or actions initiated could have an adverse effect on a command, training base, unit of assignment, or a gaining command due to holdovers at basic or advanced training. This is costly in terms of readiness due to inability of individuals to perform their assigned duties.

- Some employees perform work at a centralized adjudication facility and determine eligibility for access to classified information and sensitive compartmented information for individuals affiliated with the US Army as a military or civilian employee, or consultant. Also determine SCI eligibility for contractors. Findings and recommendations at this level have a major impact on an individual's employment, career progression, and unit readiness.

- Review installation emergency plans for the disposition of classified information during a civil disturbance, natural disaster, etc., to ensure continuity of operations. Failure to accurately or in a timely manner destroy at-risk classified information during an emergency could result in compromise of classified information essential to continuity of operations.

Degree C-4 - 70 Points

Employee makes decisions and initiates actions which involve the interpretation of policy or the setting of precedents. Makes authoritative determinations and advises on technical problems. Decisions and commitments often involve large expenditures of resources and have strong impact on important programs. The work involves investigating and analyzing a variety of unusual policy situations. In general, questions about security relate to a specialty area which must consider the interrelationships between security and other mission areas. The work affects security system design, installation and maintenance in a wide range of activities within the activity or command and/or in non-government organizations. Approaches to security problems and questions involve the development of alternatives and options designed to meet requirements in a variety of physical and environmental circumstances. Recommendations and technical interpretations result in large expenditures to meet program objectives of important programs or services. Program and project proposals frequently cut across component or geographic lines within the activity. Contractor security requirements are often involved. Decisions affect the budgets, programs, and interests of serviced organizations.

Examples:

- Determine changes required in industrial security policy to accommodate a major, high dollar value program involving commercial entities, academic institutions, or international organizations. Decisions affect scheduling, resourcing and possible compromise of sensitive information.

- Initiate comprehensive security plans and procedures .impacting mobilization or emergency situations where classified information is in danger of compromise, or where major physical security shortcomings may evolve, for example, at a data processing activity. Policy interpretation and determination of program requirements necessitate the expenditure of significant dollar resources. Revise plans in order to solve problems for which no clear precedents exist .and significant problems of coordination, geographic .dispersion and conflicting mission interests must be solved.

- Advise project managers on specific, project-oriented information security program safeguards, such as positive access controls requiring physical security hardware with significant dollar cost implications. Failure to identify appropriate and cost-effective physical security hardware could result in inadequate safeguards and/or unnecessary cost expenditure.

- Determine need to waive personnel security and investigative standards, and/or whether specific kinds of waivers are justified. Personnel security decisions are often based on compelling need for service and mission accomplishment. Decisions at this level affect assignments and appointments to highly sensitive or high dollar value programs; often are precedent setting; and influence Army readiness.

- As a senior personnel security specialist, works with security and counterintelligence specialists from other activities or commands to minimize the security risk factor, and to ensure that adjudicative guidelines and personnel security policy will minimize the possibility that national defense information will come into the hands of foreign intelligence services.

- Review OPSEC procedures and countermeasures, compare to existing vulnerabilities, and determine whether tests of sensitive equipment may be conducted. Inappropriate decisions could result in costly program delays or possible compromise of sensitive program features.

Degree C-5 - 90 Points

Employee makes recommendations and decisions which materially affect the scope and direction of large and complex programs of crucial importance to the mission of large activities/commands, or technical and scientific activities. Commitments may result in the initiation of major programs or the cancellation or modification of existing major programs.

The work at this degree involves: isolating and defining issues or conditions, such as where a number of program efforts or studies must be coordinated and integrated; resolving critical problems in Army-wide systems. Advice, guidance, or results of efforts affect development of major aspects of security program definition and administration throughout the Army. Such work significantly affects the work of other security specialists throughout the Army, and may affect public organizations or DoD contractors.

Examples:

- Develops solutions to broad and complex security programmatic issues that apply to the protection of state-of-the-art Army communication networks. Decisions and commitments may result in the initiation of new information systems security programs, or modification to information systems developed for use throughout Army.

- Responsible for integrating the requirements of a multi-national production program with foreign disclosure policy. Determine changes required based on analysis of all participating country's laws and regulations.

- Lead a working group in resolution of classified information problems associated with joint testing of a weapons system by multiple agencies. Recommend commitment of security resources as necessary to resolve problems.

- Directs the revision of entire information security programs for major Army scientific laboratories to ensure compatibility between effective security and mission accomplishment.

- Plan, develop, and implement personnel security adjudicative policy and procedures incorporating multi-Department guidance. Serve on committees coordinating policy, procedures and special projects involving senior security managers. Authorized to make commitments which affect the entire personnel security program and through those commitments significantly affect mission accomplishment.

Degree C-6 - 110 Points

Employee makes recommendations and decisions which directly affect achievement of the Army's or joint organization's overall mission and may result in major policy changes which affect not only the Army/joint organization, but others as well. Employee has authority, limited only by governing policy and precedents, to make commitments which are directly related to the overall Army/joint organization mission.

Examples:

- Serve as a leader of a group of key representatives from other activities which determines policy for long-term efforts on new, significantly enhanced, or significantly changed DA/DOD security programs. Such efforts establish precedent in the affected areas and influence major functions of other Departments or MACOMs.

- Is responsible for the development and approval of security policy at the department level.

- Represent the department on interagency working groups or similar bodies established to develop disclosure policy which will affect relations with foreign countries as well as international alliances.

- Serve on an interagency committee or as a delegate to a national security organization involved in reviewing, analyzing, developing and/or issuing national policy directives, Executive Orders, and in drafting legislation affecting security policies and programs as they relate to defense, manning the force, economic and/or political programs.

FACTOR D - WORK RELATIONSHIPS

This factor includes contacts with persons not in the supervisory chain, and is based on what is required to make the initial contact, the difficulty of communicating with those contacted, and the degree to which the employee and those contacted recognize their relative roles and authorities. Purpose of the contacts ranges from factual exchanges of information to situations involving significant or controversial issues and differing viewpoints, goals, or objectives.

[Note: Examples should be interpreted as indicative of a particular deqree of work relationships, rather than a one-time, non-recurring event.]

Degree D-2 - 15 Points

Person-to-person work relationships are a regular and necessary part of the job and are for the purpose of giving or obtaining factual information which is easy to convey and simple to understand. Person-to-person work relationships are with employees who support the security or adjudicative mission and are typically non-controversial.

Degree D-3 - 35 Points

Contacts are to obtain or convey facts or information about the security programs of the employing organization where some explanation or interpretation of facts is required in order to render service, implement regulations and policies or maintain coordination.

For example, an explanation of why funds were allocated for security projects; interpretation of scheduling, milestones and the resulting impact on rate of implementation on security systems; instruct in current security policies and regulations and procedures for planning and implementing a security system.

Examples:

- Assist senior level security specialists in the review of Contract Security Classification Specification, DD Form 254. Instruct non-security personnel regarding proper use and execution of the form, a task frequently made more difficult by time constraints imposed by procurement requirements.

- Explain to non-security personnel the procedures to follow in releasing information to a foreign government or to host a meeting involving attendance by foreign nationals.

- Answer various information security program questions concerning the safeguarding of classified information which arise in the course of daily operations. Questions require research of regulation and/or clarification of facts in order to solve the problem surfaced.

- Coordinate with security managers at other locations to verify or clarify information pertinent to security clearance determinations or to explain regulatory guidance and procedures.

- Explain to non-security personnel how to conduct an OPSEC review of an UNCLASSIFIED article proposed for public disclosure. Task involves making individuals aware of the threat and of OPSEC philosophy. Assist technical experts in judging whether' risk of releasing information is outweighed by benefits to be gained by publication.

-. Conduct a seminar for activity officials on overall information security classification management. Convince the activity officials why properly classified information is critical to the on-time and within budget success of their project.

-. Personnel Security Specialists at this degree provide authoritative information regarding requirements for personnel security clearances, SCI accesses, interpretation of personnel security regulations, and adjudicative guidelines to others both in and outside of the activity. Using information obtained from Personnel Security Screening Program (PSSP) interviewers, security specialists determine additional information required and make SCI access determinations based on reports of available information (and knowledge of appropriate guidelines).

Degree D-4 - 55 Points

Person-to-person work relationships are for the purpose of giving or obtaining information on non-routine problems requiring not only explanation or interpretation of facts but also discussion of implications and inferences in order to gain concurrence or persuade to action. Frequently the purpose of contacts at this degree is to influence or persuade employees to adopt a recommended course of action or comply with existing program policies, methods and/or procedures.

Roles and relative authorities of participants are known, as in the case of a security specialist conferring with the director of a program in order to present optional security plans involving alternative plans of protection and differing cost factors, or a formal presentation of security recommendations in a meeting with the responsible activity official.

Examples:

- Explain to contractor/project manager the necessity to impose new/more stringent industrial security requirements.

- Provide a project manager specifics concerning why a foreign visit to a contractor may not be approved. Must explain the relationship between the National Disclosure Policy and the purpose of the visit.

- Resolve derogatory information relative to suspending access to classified information or to clarify security requirements with investigators.

- Provide authoritative advice to an activity commander on information security program shortfalls, including recommendations on practicable corrective actions.

- Serve as the spokesperson on a security management working group convened to review, recommend corrective action, gain support for and oversee implementation of necessary activity security program upgrades.

- Confer with activity officials on security vault requirements which must be considered in the design of a new (classified) technical library. Gain concurrence for security requirements even when these requirements are costly and affect scheduled completion and/or materiel requirements of the project.

- Convince a project manager why operations security considerations preclude the conduct of an important test (as scheduled); or why the test must be conducted within certain OPSEC constraints.

Degree D-5 - 75 Points

Contacts and person-to-person work relationships are for the purpose of discussing policy matters and changes in program emphasis in order to provide authoritative advice on their effect and feasibility, to gain necessary cooperation and support, or to persuade to action.

Examples:

- Deal directly with personnel responsible for new or proposed policies in a functional specialty (e.g., industrial, OPSEC, disclosure, etc.) which will affect existing contracts.

- Explain how national disclosure policy considerations affect proposed international cooperative agreements. Explain how technology security guidelines impact proposed transfers of sensitive items and items of militarily critical technology, or why OPSEC policy considerations should take precedence over operational commitments (for example, a new policy which would preclude all testing until program managers develop operations security plans for all new systems).

- Represent the activity in meetings, conferences, and symposia with officials of other activities or agencies for the purpose of planning, modifying or initiating security policy changes and procedures. May represent the department by furnishing expert testimony in EEO, MSPB, labor union complaint hearings, courts martial, court actions and DAIG inquiries to explain, defend and justify security policies and nexus for unfavorable security clearance decisions. Maintain personal contact and liaison with personnel in other DoD components and other Federal agencies to ensure exchange of information concerning individuals in whom there is a joint interest and to gain cooperation and support for changes in security policy or guidelines.

Degree D-6 - 95 Points

Person-to-person work relationships are for the purpose of securing acceptance or indispensable support of, or explaining or defending, policies and programs which represent the most controversial or crucial phases of the Army/joint organization's programs. Personal contacts are typically with high-ranking officials at national or international levels, with executives of large industrial firms or with specific policy makers and senior staff of other departments/joint organizations or the IC.

Examples:

-Serve as an Army representative on working groups/teams of experts with interdepartmental or international counterparts to develop security procedures to be applied in international co-production programs. Participate on teams that survey security policies and procedures of foreign governments to determine their adequacy, or develop security protocols and procedures to be used in sensitive international treaties or agreements.

- Represent department or joint organization security interests at DA/DOD/National level fora to explain, defend, or gain support for important or controversial aspects of the implementation of the DA functional security program(s).

- Represent Army in a joint DoD/industrial security effort to develop security countermeasures to evolving technical threats.


FACTOR E - SUPERVISION RECEIVED

This factor covers the nature and extent of direct or indirect controls exercised by the supervisor, the employee's responsibility, and the methodology for reviewing completed work.

Degree E-1 - 5 Points

Supervisor-or higher graded specialist makes specific assignments that are accomplished by clear, detailed, and specific instructions. As the employee gains familiarity with the work, instructions are not detailed for repetitive tasks, but the employee's responsibilities remain clearly defined. The employee works a instructed and consults with the supervisor as required on all matters not covered in the instructions. Supervisor maintains control through review of the work for such things as accuracy, adequacy, and adherence to instructions and established procedures.

Degree E-2 - 20 Points

Supervisor maintains control over work through checking for accuracy, adequacy, and adherence to instructions. Instructions given to the employee are well defined, but the employee may recommend modifications to these instructions if assignment is new, difficult, or unusual. The employee carries out routine assignments but unforeseen problems and unusual situations may be referred to the supervisor or higher-graded specialist for help or decisions.

Degree E-3 - 35 Points

The supervisor makes assignments by defining objectives, priorities, and deadlines, and assists employee with unusual situations which do not have clear precedents. The employee plans and carries out successive steps and handles problems and deviations in the work assignment in accordance with instructions, previous training, or accepted practices in the occupation. Assignments typically require the employee to do some preliminary investigation to ascertain security and/or subject matter interrelationships which may affect the methods and procedures used. Finished work is reviewed for accuracy, quality, and compliance with more complex instructions and guidelines.

Degree E-4 - 55 Points

The supervisor sets the overall objectives and resources available. The employee and supervisor, in consultation, develop the deadlines and projects. The employee, having developed expertise in the particular security specialty, is responsible for planning and carrying out the assignment, resolving most of the conflicts that arise, and interpreting policy on own initiative in terms of established objectives. The supervisor is kept informed of progress and any controversial matters. Finished work and methods are reviewed for accuracy and effectiveness and for compliance with complex instructions and guidelines.

Degree E-5 - 75 Points

The supervisor generally provides only broad administrative and policy direction, and discussion of program goals, with assignments made only in terms of broadly defined missions or functions. The employee exercises delegated responsibility for independent planning, designing, carrying out: and evaluating effectiveness of programs, projects, studies or other work. Supervisor is kept informed of significant developments. Completed work is reviewed only from an overall standpoint in terms of feasibility, compatibility with other security program requirements, or effectiveness in meeting objectives and achieving expected results.

Degree E-6 - 95 Points

Assignments are made in terms of overall activity missions and policies. The employee selects objectives, plans and methods independent of any review. Delegated authority is complete. The employee makes extensive unreviewed technical judgments concerning the interpretation and implementation of security policy for the assigned specialty areas(s) and in deciding which analytical and technical decisions lead to, or form the basis for, major organizational program policy and operational decisions. Broad policy questions or major problems of coordination are resolved in conference with advisors and/or personnel of other activity elements. Recommendations for new projects and alteration of objectives are usually evaluated for such considerations as availability of funds and other resources, broad program goals, or national priorities. The employee is regarded as a technical authority for the employing organization in the security specialization(s) and recommendations made or actions taken within the employee's delegated authority are normally accepted without significant change.

Degree E-7 - 115 Points

The employee is often the most authoritative professional in one or more particular security functional specialty within the Army and/or joint organization. The work is generally considered to be pioneering. Supervision is virtually non-existent. The independence of action inherent at this level is hampered only by the constraint of unavailability of funds and other resources, and/or compatibility with major IC/DOD program goals and national priorities.

CIPMS GRADE CONVERSION TABLE FOR NONSUPERVISORY POSITIONS
Table Page 1 [Reprinted from the CIPMS Guide for Classifying GS Positions, dated June 90, page 29.]

SECTION F - OCCUPATIONAL LISTING OF COMMON ACRONYMS
BI Background Investigation
CCF US Army Central Personnel Security Clearance Facility (PERSCOM)
CMI Classified Military Information
COMSEC Communications Security
CUI Controlled Unclassified Information
DCI Director of Central Intelligence
DCID Director of Central Intelligence Directive
DIS Defense Investigative Service
DISP Defense Industrial Security Program
DODD Department of Defense Directive
DOE Department of Energy
EEO Equal Employment Opportunity
ELSEC Electronic Security
ENTNAC Entrance National Agency Check
EO Executive Order
FORDTIS Foreign Disclosure Technical Information System
IC Intelligence Community
JCS Joint Chiefs of Staff
MACOM Major Command
MCTL Militarily Critical Technologies List
MI Military Intelligence
MPRJ Military Personnel Records Jacket
MSC Major Subordinate Command
MSPB Merit Systems Protection Board
NAC National Agency Check
NACI National Agency Check and Written Inquires
NDP-1 National Disclosure Policy
NSA National Security Agency
NSCD National Security Council Directives
OCONUS Outside the Continental United States
OPM Office of Personnel Management
OPSEC Operations Security
PR Periodic Reinvestigation
PSSP Personnel Security Screening Program
SAP Special Access Program
SBI Special Background Investigation
SCI Sensitive Compartmented Information
SCIF Sensitive Compartmented Information Facility
SIGSEC Signal Security
SIO Senior Intelligence Officer
SSO/SSR Special Security Officer/Special Security Representative
STU Secure Telephone Unit
TEMPEST Compromising Emanations
TSCM Technical Surveillance Countermeasures



Department of the Army Civilian Personnel

Chg 2 June 1991

GUIDE FOR CLASSIFYING

GENERAL SCHEDULE POSITIONS IN THE CIVILIAN INTELLIGENCE PERSONNEL MANAGEMENT SYSTEM

Table of Contents, Page 1, Page 2


APPENDIX B

Chg 1

7 June 1991

Lead Positions

Coverage. Positions which both technically and administratively lead other employees in, as well as perform work in, clerical or technician occupations on a continuing, non temporary basis.

Responsibilities. Leaders assure work assignments of the group are carried out. Control over the positions led is less than that described at-Factor Degree D-I, Part 3 of the CIPMS Primary Standard. The range of duties may include:

-- distribution, balancing and checking of day-to-day workload;

-- work and production reports;

-- on-the-job training, instruction and aid in tasks and job techniques;

-- approve leave for a few hours or emergencies;

-- report to supervisor on progress and performance, providing information as requested for personnel actions.

Grade determination. a. General. Lead positions are placed one grade above the highest level of nonsupervisory work led. This level must be one which the position leads both technically and administratively.

b. Mixed position. Classify a lead position as a mixed position if it has duties which are separate and distinct from the work led. The final grade and title is determined by selecting the higher level if the two grade levels differ. (See also Chapter 3-5a and 5d.)

GLOSSARY A

TERMS

Terminology used through all classification guides is sometimes misinterpreted or interpreted so differently as to affect the classification of positions. The following definitions were agreed to by DoD for-use in the PGS and should be followed consistently in interpreting AOGs. The definitions are not all inclusive; exceptions, such as joint organizations, must be evaluated in terms of alignment with the definitions. Further terms specific to an AOG are defined in that AOG.

a. Activity - Separate organizational component at various echelons of command within a Department.

b. Program - Long-term endeavor with many related projects and dedicated resources.

c. Project - Short-term endeavor that supports a long-term program.