• Help



    WHAT IS THE IRS INFORMATION TECHNOLOGY DIVISION? The mission of IRS Information Technology is to provide leadership in the delivery of information technology solutions that anticipate and meet enterprise-wide needs by empowering employees to deliver customer-centered, value-creating systems, products, services, and support.  

    See Other Information for Locations

    *Amended Description of duties, clarified position can be filled IT-Wide and increased vacancies*

    Learn more about this agency


    WHAT DOES AN INFORMATION TECHNOLOGY SPECIALIST (SECURITY) DO? As an Information Technology Specialist (Policy and Planning/Security) you will conduct extensive investigation and analysis of largely undefined factors to determine the nature and scope of problems and devise solutions where you will regularly develop new theories and concepts. In this position, you will deal with projects of exceptional breadth and intensity of effort, and of significant interest to the public and the government.

    As an ITS (SECURITY): you will:

    • Develop new theories, architectures, concepts, principles, standards, and methods in IT security.
    • Plan, develop, and coordinate IRS information security architecture.
    • Formulate IRS security program initiatives in response to critical IT security issues.
    • Coordinate IRS-wide implementation of government wide IT security defense strategies to ensure protection of the IT infrastructure.

    As a senior expert and consultant to top agency officials, the employee advises on integrating IT programs with the IRS Cybersecurity Program and other business programs of equivalent complexity within the agency. Responsibilities include:

    • Develop new theories, architectures, concepts, principles, standards, and methods in IT security, and advises other IT experts throughout Treasury and the IRS, and in other agencies, on a variety of situations and issues that involve applying or adapting new theories, architectures, concepts, principles, standards, methods, or practices, that are developed by the employee or result from the employee's leadership.
    • Plan, develop, and coordinate IRS information security architecture with the security programs and strategies (the IRS workforce security training program or the security audit program), and formulating IRS security program initiatives in response to critical IT security issues;
    • Plan, acquire, and coordinating IRS-wide implementation of government wide IT security defense
    • Provide technical expertise in overall risk management practices, continuous monitoring, and improvements to the security posture of the IRS computer environment.
    • Provide expert advice in audit and compliance; specifically, FISMA, NIST, GAO, TIGTA issues that affect the IRS computing environment.
    • Create and prepare comprehensive reports for executives that include project plans, findings, mitigation strategies and recommendations.
    • Provide technical expertise, abilities and skills to develop a holistic cloud security environment effectively by maintaining industry and globally accepted standards.
    • Provide expert level understanding of cloud security concepts, principals and frameworks and FedRAMP.
    • Provide data architecture standards providing a common Cybersecurity Data Warehouse data vocabulary, requirements and integrated designs that align with enterprise strategy and business architecture.
    • Brief authorizing officials on security risks and manage remediation of security vulnerabilities identified in annual assessments and continuous real time monitoring through creating and managing of plans of action and milestones
    • Implement standard ITIL data services within the Cybersecurity Data Warehouse program.
    • Create diagrams showing key data entities and create an inventory of the data needed to implement the architecture vision.
    • Establish data management and reporting technologies, emerging tools including columnar and NoSQL databases, predictive analytics, data visualization, and unstructured data.
    • Provide an enterprise cyber monitoring, analytics, and coordination capability 24x7x365
    • Performs forensic analysis (handling compromised machines), evaluate/deconstruct malware (e.g. obfuscated code) through open-source and vendor provided tools.
    • Develop intrusion detection signatures to identify those specific indicators that are unique to a particular exposure or zero-day vulnerability, delivering threat & awareness/education briefings, coordination of process development, & technical writing.
    • Develop and maintain Cybersecurity IT security policies.
    • Provide security control integration support to IRS system administrators.

    WHERE CAN I FIND OUT MORE ABOUT OTHER IRS CAREERS? If you want to find out more about IRS careers, visit us on the web at www.jobs.irs.gov 

    Travel Required

    Occasional travel - 1-5 nights per month may be required.

    Supervisory status


    Promotion Potential


This job originated on www.usajobs.gov. For the full announcement and to apply, visit www.usajobs.gov/GetJob/ViewDetails/542203000. Only resumes submitted according to the instructions on the job announcement listed at www.usajobs.gov will be considered.