Skip to main content
U.S. flag
Back to results

Physical Embedded and Control Systems Security (PECSS)

Department of Homeland Security
DHS Headquarters
This job announcement has closed

Summary

The Department of Homeland Security (DHS) is recruiting professionals with varying levels of expertise to support a range of Physical, Embedded, and Control Systems Security (PECSS) roles, including some focused on Industrial Control Systems (ICS) Security. These individuals will serve as members of the DHS Cybersecurity Service across the Department, including supporting several specialized programs at the DHS Cybersecurity and Infrastructure Security Agency (CISA).

Overview

Help
Reviewing applications
Open & closing dates
04/18/2022 to 04/29/2022
Salary
$74,000 to - $211,300 per year
Pay scale & grade
DC 2
Locations
Many vacancies in the following locations:
Pensacola, FL
Idaho Falls, ID
Arlington, VA
Remote job
No
Telework eligible
Yes—as determined by the agency policy.
Travel Required
Occasional travel - You may be expected to travel for this position.
Relocation expenses reimbursed
No
Appointment type
Permanent
Work schedule
Full-time
Service
Excepted
Promotion potential
None
Supervisory status
No
Security clearance
Sensitive Compartmented Information
Drug test
Yes
Position sensitivity and risk
Special-Sensitive (SS)/High Risk
Trust determination process
Announcement number
22-11459072-CBWQ
Control number
649238000

Duties

Help

Depending on their career level and track, DHS Cybersecurity Service employees with the primary technical capability of PECSS will work in roles such as ICS Security Engineer, ICS Network Security Engineer, ICS Security Specialist, Senior ICS Advisor, ICS Security Lead, Physical Security Consultant or Advisor, and Embedded Systems Cybersecurity Engineer.

Generally, these individuals apply their expertise to:

  • Understand designs, protocols, and physical configurations of "purpose-built interconnected systems," such as industrial control systems (ICS), physical systems, and embedded systems - And define and/or implement comprehensive countermeasures to detect threats and maintain the overall cybersecurity posture of these systems.
  • Perform technical and nontechnical risk and vulnerability assessments of Information and Operational Technology (IOT) environments, such as ICS/Supervisory Control and Data Acquisition (SCADA)/Distributed Control Systems (DCS), local computing environment, network and infrastructure, enclave boundary, supporting infrastructure, and applications.
  • Actively monitor and support the design/build/configure/operate/maintain cycle of interconnected systems, and proactively increase security situational awareness of, and minimize risks to, DHS physical or embedded systems and facilities (e.g., heating, ventilation, and air conditioning (HVAC), telecommunications, wireless technologies).
  • Assess effectiveness of security controls through penetration testing, vulnerability scanning, or security architecture review on enterprise network or control systems assets to improve understanding of organizational or national cybersecurity risks.
  • Engage with other experts in cybersecurity risk assessment, automated information sharing, threat analysis, vulnerability management, and network defense to enable holistic, integrated views of security threats to an organization, the Department, or the nation's security posture.
  • Apply knowledge of computer-controlled systems that monitor and impact industrial processes across physical systems and elements of the Critical National Infrastructure (e.g., nuclear power plants, reprocessing facilities, chemical plants, oil refineries, ports, maritime transport systems, ships and aircraft).

Requirements

Help

Conditions of employment

  • You must be a U.S. Citizen or national.
  • You must be 18 years of age.
  • Must be registered for the Selective Service (if you are a male).
  • Must be able to obtain and maintain a security clearance. Security clearance levels may vary.
  • Must be able to submit to a drug test and receive a negative result.
  • Must be able to comply with ethics and standards of conduct requirements, including completing any applicable financial disclosure.
  • May be required to serve a 3 year probationary period.

Qualifications

DHS plans to hire for PECCS professionals in developmental, technical, and leadership tracks. These DHS Cybersecurity Service employees will start at specific career levels and salaries matching their experience and expertise and may progress to higher salaries and/or career levels over time. When applicants submit initial application information, they will have an opportunity to indicate which career track best describes their years of experience and level of expertise in PECCS. Your application responses will determine the focus of the assessments you complete to demonstrate your expertise.

To learn more about DHS Cybersecurity Service career tracks and levels, visit our application portal.

DESIRED CERTIFICATIONS

  • Certified Information Systems Security Professional (CISSP)
  • Global Industrial Cybersecurity Professional (GICSP)
  • Security +
  • ISA/IEC Cybersecurity Risk Assessment Specialist
DESIRED TOOLS/INDUSTRY EXPERIENCE
  • Tools: Wireshark, Nmap, Tenable, Defender for IoT, Kali, Cobalt Strike, Splunk Technologies, network infrastructure, boundary protection devices, enterprise LAN/WAN, ICS/SCADA
  • Industries: FCEB Enterprise, SLTT, ICS/OT environments of critical infrastructure sectors

Education

Degrees are not required for jobs in the DHS Cybersecurity Service, but DHS is interested in your level of education and the topics you studied. As you submit initial application information, you will be asked questions about your education.

Additional information

Benefits: DHS Cybersecurity Service employees receive a range of federal employment benefits designed to support their professional and personal lives. To learn more about benefits, visit our application portal.

More information about the specific benefits available to you will be provided as you progress through the application process.

Background Investigation: To ensure the accomplishment of its mission, the Department of Homeland Security (DHS) requires each and every employee to be reliable and trustworthy. To meet those standards, all selected applicants must undergo and successfully complete a background investigation for a security clearance as a condition of placement in this position. This review includes financial issues such as delinquency in the payment of debts, child support and/or tax obligations, as well as certain criminal offenses and illegal use or possession of drugs.

Pursuant to Executive Order 12564 and DHS policy, DHS is committed to maintaining a drug-free workplace and, therefore, conducts random and other drug testing of its employees in order to ensure a safe and healthy work environment. Headquarters personnel in safety- or security-sensitive positions are subject to random drug testing and all applicants tentatively selected for employment at DHS Headquarters are subject to drug testing resulting in a negative test result.

How you will be evaluated

You will be evaluated for this job based on how well you meet the qualifications above.

All DHS Cybersecurity Service applicants participate in a multi-phase assessment process, which varies by career track. Applicants will participate in a three-phase assessment process:

  • You must successfully complete each phase to advance to the next phase.
  • The total time commitment for all three phases is approximately 5-6 hours (many applicants require less time!).
  • Before each phase, DHS will e-mail you instructions and information to help you prepare.
  • Assessments are time sensitive, so monitor your e-mail to ensure you have plenty of time to complete them prior to any deadlines.
PHASE I: ONLINE ASSESSMENTS
  • Unproctored - you choose the time and location.
  • Includes two assessments: (1) a work styles inventory that will take about 30 minutes to complete; (2) a work simulation that you will have up to 2 hours to complete.
  • The two assessments take about 90 minutes (on average) to complete.
  • Requires a computer with audio (speakers or headphones) and a reliable internet connection.
  • No knowledge of DHS or cybersecurity is required for these assessments, which measure non-technical capabilities that are important for professional success in the DHS Cybersecurity Service. This includes how you communicate, analyze information, and collaborate with others:
    • The work styles inventory presents you with questions about your work-related interests and preferences.
    • The work simulation presents you with realistic, work-related scenarios and asks you to respond to them.

PHASE II: TECHNICAL CAPABILITY ASSESSMENT

  • Proctored - must be scheduled in advance and completed at a designated assessment center.
  • There is a different assessment for each DHS Cybersecurity Service technical capability (visit Jobs to learn more about the technical capabilities).
  • Most individuals only have a primary technical capability and complete only one Technical Capability Assessment, but in limited circumstances, you may complete a second Technical Capability Assessment.
  • You will have up to 2.5 hours to complete each Technical Capability Assessment; each takes about 90 minutes (on average) to complete
  • Assessments present realistic, work-related cybersecurity scenarios and questions to assess technical skills.
  • Cybersecurity knowledge is assessed, but no knowledge of DHS is required.
PHASE III: STRUCTURED INTERVIEW*
  • Online, recorded video interview - you choose the time and location.
  • 45 minutes to complete.
  • Record and review your responses to interview questions.
  • Requires a computer, phone, or tablet with a reliable internet connection, webcam, and audio.
  • No knowledge of DHS or cybersecurity is required for this assessment, which measures non-technical capabilities that are important for professional success in the DHS Cybersecurity Service:
    • You will be asked to verbally respond to a series of questions focused on your previous experience and hypothetical work situations or scenarios.
*Some applicants who successfully complete Phase III may be asked to participate in a Phase IV: Advanced Technical Interview. This scenario-based interview is used to further assess an applicant's proficiency in a technical capability. More information will be provided to such applicants as they progress through the application process.

To learn about the assessment process for the different career tracks, visit our application portal and read the "Assessment Process" guide.

Your session is about to expire!

Your USAJOBS session will expire due to inactivity in 8 minutes. Any unsaved data will be lost if you allow the session to expire. Click the button below to continue your session.