DoD Information Assurance Scholarship Program (IASP)


DoD Information Assurance Scholarship Program (IASP) Applications due Feb. 21, 2013

Howard University's Systems and Computer Science program is now participating in the Department of Defense Information Assurance Scholarship Program. Below is a summary of some of the benefits, obligations, and application process.

Send or deliver completed applications (hard copy) to:

Attn: Wayne Patterson
Downing Hall, Room 2120B
Howard University
Washington, DC 20059
E-mail: wpatterson@howard.edu
Office Phone: (202) 329-5370

Benefits

Tuition, books, and a per year stipend; and Information security internships with the Department of Defense.

Obligations

Take certain courses and maintain the required GPA; Obtain and maintain eligibility for a security clearance; and A period of obligated service with the Department of Defense (in detail, from the web site: "If all conditions are met, Information Assurance Scholars who elect to serve a period of obligated service as civilian employees will receive full-time permanent positions with the Department of Defense on program completion. Alternately, scholarship recipients may elect to serve a period of obligated service as a member of the National Guard or Reserves.")

Eligibility

To be eligible for the IASP opportunity described in this announcement, you must meet all of the following minimum requirements:

  1. You must be 18 years of age or older.

  2. You must be a citizen of the United States at the time of application. Note, if family members are not U.S. Citizens, some DoD Agencies may be unable to process the applicant (student) to the security clearance level required. Every effort will be made to assign eligible students at an Agency without such restrictions.

  3. You must be enrolled (or accepted for enrollment) at Howard University.

  4. You must have completed (or by August 2013 will have completed) at a minimum the first two years of an undergraduate degree program and be eligible to (a) begin either the third or fourth years of an undergraduate degree program; (b) begin the first or second year of a master's degree program; (c) pursue doctoral studies; or (d) complete a graduate certificate program in cybersecurity.

  5. You must be pursuing a course of study and/or have a declared major in one of the scientific, technical or managerial disciplines related to computer and network security, with a concentration in an information assurance function.

  6. See the web page information below, which provides more information about fulfilling the necessary security requirements. Failure to be able to obtain a security clearance is grounds for dismissal from the DoD IASP. You must be able to obtain the required security clearance for the position selected. You may be required to undergo certain tests, including drug and polygraph tests, to obtain and maintain a clearance. Before you may be awarded a scholarship or hired by DoD, you will be required to complete certain forms to initiate the security clearance process. Some of these forms will require that you reveal extensive information about your background, such as potentially sensitive information about your financial circumstances and any arrests and/or convictions for offenses of any kind. You must agree to all of these conditions of employment and you must complete these forms as a condition of financial assistance and appointment.

    Current web pages from the Office of Personnel Management (OPM) are provided below. These are provided for your review and consideration in determining whether you will be eligible for a security clearance. They may not be all inclusive, however, it is highly recommended that you review and understand the requirements prior to signing up to participate in the DoD IASP.

    http://www.dss.mil/index.html

    The following web page contains additional information from other web sites about security clearances, which also may be useful when determining whether you will be eligible for a security clearance. This is for informational purposes only:

    http://usmilitary.about.com/cs/generalinfo/a/security_2.htm
    http://www.clearancejobs.com/security_clearance_faq.pdf
    http://www.taonline.com/securityclearances/
  7. Howard University must recommend you for the scholarship. (this will happen automatically with your approved application).

  8. Academic Sufficiency. Howard University will review the application materials, and conduct such verification as may be necessary to establish the following standards of academic sufficiency. Howard University will exclude from further evaluation (and provide an endorsement of "Not Recommended" for) any applicant unable to meet the following academic requirements:

    1. The applicant is pursuing a course of study and/or has a declared major in one of the scientific, technical or managerial disciplines related to computer and network security that are enumerated under Section G.3.A of the application package.

    2. As an undergraduate student, the applicant has a 3.2 out of a 4.0 grade point average (GPA) or, as a graduate student, the applicant has a 35 GPA out of 4.0, or an analogous rank based on a comparable scale. The applicant's demonstrated potential for academic success and fulfillment of degree requirements is substantial. Howard University will review the factors enumerated below, and shall exclude from further evaluation and not recommend any candidate unable to achieve a minimum score of 2 points on a 5-point scale. Scale values range from Insufficient Potential (One), Sufficient Potential (Two), Average Potential (Three), High Potential (Four), and Superior Potential (Five). Factors to be considered in arriving at the rating for "demonstrated potential" are:

      • The applicant's transcript(s) from all institutions of higher education attended. (Web printed copies will not be accepted)

      • The applicant's current Grade Point Average (GPA)

      • Academic honors, distinctions and awards

      • Letters of reference

    3. Knowledge and Ability. Howard University will document its evaluation of each applicant meeting administrative and academic sufficiency requirements against the following competencies, using a 5-point scale of values, to assess and report on each of the six competencies below. The rating scale is:

      • No Knowledge or Ability (One)

      • Basic Knowledge or Ability (Two)

      • Intermediate Knowledge or Ability (Three)

      • Advanced Knowledge or Ability (Four)

      • Superior Knowledge or Ability (Five)

      Evaluations of the following six competencies shall be based on the supplemental application material provided by the candidates, letters of reference, and any additional information provided by the applicant in response to Howard University's requests made for this purpose.

      1. Knowledge of the techniques of the information technology and/or information security (assurance) discipline, including encryption, access control, physical security, training, threat analysis, and authentication.

      2. Knowledge of the human factors in the information technology and/or information security (assurance), including human computer interaction, design, training, sabotage, human error prevention and identification, personal use policies, and monitoring.

      3. Ability to identify and analyze problems, distinguish between relevant and irrelevant information to make logical decisions, and provide solutions to individual and organizational problems.

      4. Ability to consider and respond appropriately to the needs, feelings, and capabilities of different people in different situations; is tactful, compassionate and sensitive, and treats others with respect.

      5. Ability to make clear and convincing oral presentations to individuals or groups; listens effectively and clarifies information as needed, facilitates an open exchange of ideas and fosters an atmosphere of open communication.

      6. Ability to express facts and ideas in writing in a clear, convincing and organized manner appropriate to the audience and occasion.

APPLICATION REQUIREMENTS FOR STUDENTS NOT CURRENTLY IN THE IASP PROGRAM

An acceptable application package for the IASP consists of the following requirements:

  1. The IASP Student Application completely filled out and signed. (see the application form)

  2. Separate sheet highlighting recognitions, honors and awards. You may attach a separate sheet of plain paper on which you record your responses or the continuations of your responses. On each such page, indicate your name.

  3. Supplemental Academic Sufficiency Statement. You must complete the Statement of Academic Sufficiency supplement to the OF612 (See page 7 of application form), to which you must attach the following additional supplemental statements:

  4. One (1) Letter of Reference from a current faculty member who is fully knowledgeable of your potential for successful learning, your knowledge, and your ability. See remainder of application package for instructions about the content of this Letter of Reference. Letters must be on University letterhead and contain the full name and contact information of the faculty member (phone, email, and address).

  5. One (1) additional Letter of Reference from either a current or former faculty member, or a current or former supervisor who is fully knowledgeable of your potential for successful learning, your knowledge, and your ability. See remainder of application package for instructions about the content of this Letter of Reference. Letters must be on official letterhead and contain the full name and contact information of the faculty member or current/former supervisor (phone, email, and address).

  6. Official (certified) transcripts from all the institutions of higher learning you have attended. Web printed copies will not be accepted.

  7. Supplemental Competency Statement: Knowledge, Skills and Attributes: You must complete the OF612 Supplemental Competency Statement with narrative responses that describe the level of your attainment of the knowledge and ability factors indicated. See Page 6 of the application form for instructions about the content of this supplemental statement.

  8. Signature of the Supplemental Statement of General Academic and Employment Conditions. If you agree with the all of the academic and employment conditions required for your receipt of scholarship assistance and appointment under the IASP, and wish to be considered for it, you must sign the OF612 Supplemental Statement of General Academic and Employment Conditions, which is the last page of the application form, Student Application.

APPLICATION REQUIREMENTS for CURRENT IASP STUDENTS WHO ARE REAPPLYING:

An acceptable application package for the Information Assurance Scholarship Program consists of the following:

  1. The IASP Student Application completely filled out and signed. (see application form). By signing the Student Application you are stating that you have re-read section G.

  2. One (1) Letter of Reference from the current Principal Investigator or key faculty member who is fully knowledgeable of your potential for successful learning, your knowledge, and your ability, based upon this past year of effort.

  3. Official (certified) transcripts from all the institutions of higher learning you have attended SINCE your last submission. You are required to maintain the appropriate grade point average to maintain your status in the program. Web printed transcripts will not be accepted.

  4. Updated resume to include your summer internship activities.
AttachmentSize
NEW Student Application 2013-2014.pdf1.95 MB
Scholarship and Vacancy Announcement 2013 .pdf165.04 KB