Skip to main content
U.S. flag
Back to results

Mitigation and Response - Technical

Department of Homeland Security
DHS Headquarters
This job announcement has closed

Summary

The Department of Homeland Security (DHS) is recruiting professionals to support a range of technical roles in Mitigation and Response, including Cyber Defense Incident Responder, Cyber Incident Response Analyst, and Cyber Intrusion Detection Specialist. All positions are in the DHS Cybersecurity Service.

Overview

Help
Reviewing applications
Open & closing dates
03/17/2023 to 04/16/2023
Salary
$115,400 to - $196,000 per year

Range reflects typical low and high starting salaries available to employees in most of the U.S. See Additional information: Salary for more info.

Pay scale & grade
DC 2
Locations
many vacancies in the following locations:
Chandler, AZ
Washington
Pensacola, FL
Idaho Falls, ID
Remote job
No
Telework eligible
Yes—as determined by the agency policy.
Travel Required
Occasional travel - You may be expected to travel for this position about 1 to 5 days a month.
Relocation expenses reimbursed
No
Appointment type
Permanent
Work schedule
Full-time
Service
Excepted
Promotion potential
None
Supervisory status
No
Security clearance
Sensitive Compartmented Information
Drug test
Yes
Position sensitivity and risk
Special-Sensitive (SS)/High Risk
Trust determination process
Announcement number
23-11880169-CBWQ
Control number
713556900

Duties

Help

There are a variety of Mitigation and Response opportunities across the Department, including supporting several specialized programs at the Cybersecurity and Infrastructure Security Agency (CISA) and DHS Office of the Chief Information Officer (OCIO).

Depending on your career level and role, DHS Cybersecurity Service employees in the Technical Career Track, with a technical capability in Mitigation and Response, will generally apply their expertise to perform a range of tasks, including:

  • Supporting a team or program in monitoring, analysis, incident response, and handling for DHS or its constituents
  • Proactively analyzing network traffic patterns to identify possible threats - includes analyzing log files from a variety of sources (e.g., individual host logs, network traffic logs, firewall logs, and intrusion detection system [IDS] logs) and using other analytic tools and data science methodologies
  • Actively monitoring DHS environments for potential threats or vulnerabilities, providing DHS or external agency/private industry leadership with situational visibility across the enterprise
  • Creating threat assessments for vulnerabilities on networks, systems software, and hardware and recommending appropriate mitigation
  • Ensuring incidents are managed in accordance with NIST stages of incident handling guidelines and assisting others who are less seasoned in properly applying these standards
  • Customizing communications for different levels of leadership and audiences to provide strategic direction and support to DHS, Component leadership and/or their SOCs, or external constituents to enable mission capabilities
  • Collaborating with internal and external DHS stakeholders in performing critical security operations and incident handling
  • Working with HQ and/or Component NOC/SOCs to block or deny access by hostile sites or restrict access by specific ports/protocols
  • Actively engaging processes to implement, configure, monitor, and maintain Security Information and Event Management (SIEM) tools to monitor, detect and respond to threats on DHS or federal/national partner networks and enclaves
  • Applying techniques for gathering, recovering, analyzing, interpreting, preserving, and presenting information and digital evidence (from computers, mobile devices, websites, network packets, et al.) to support legal prosecution or other departmental requirements
  • Integrating stakeholder feedback when recommending recovery action plans for repairs, including mitigation strategies for interim system vulnerabilities/deficiencies
  • Customizing communications (e.g., incident updates and after-action reports) to emphasize the most critical information and address anticipated follow-up concerns of specific target audiences
  • Proposing and maintaining, a suite of cybersecurity tools, to include SIEM and Endpoint Security Tools
  • Working with designated managers, cyber incident responders, and cybersecurity service provider team members in handling suspected cyber incidents articulating the event's history, status, and potential impact for further action in accordance with the organization's cyber incident response plan.
  • Collaborating with team members to collect intrusion artifacts (e.g., source code, malware, trojans) and using discovered data to enable mitigation of potential cyber defense incidents within the enterprise in accordance with recovery action plans.

Requirements

Help

Conditions of employment

  • You must be a U.S. Citizen or national.
  • You must be 18 years of age.
  • Must be registered for the Selective Service (if you are a male).
  • Must be able to obtain and maintain a security clearance. Security clearance levels may vary.
  • Must be able to submit to a drug test and receive a negative result.
  • Must be able to comply with ethics and standards of conduct requirements, including completing any applicable financial disclosure.
  • May be required to serve a 3 year probationary period.
  • Remote work may be available for some positions.
  • While many these positions are considered telework, some individuals must live within 2 hours driving distance to a DHS SCIF in either Chandler, AZ; Stennis, MS; Idaho Falls; Arlington, VA; Pensacola, FL; or Washington, D.C.

Qualifications

This position is in the Technical Track across a range of career levels. Employees in this career track generally:

  • Have between 5-15 years of cybersecurity work experience.
  • Range from experienced cybersecurity professionals who apply technical expertise and independent judgement to perform cybersecurity work - to - recognized Federal cybersecurity technical authorities with uncommon technical expertise who advise on cybersecurity challenges impacting DHS and the Nation.

DHS Cybersecurity Service employees with a technical capability in Mitigation and Response will generally:

  • Track and respond to prioritized urgent IT and cyber events and indicators of compromise (IOCs) to mitigate threats to networks, systems, and applications.
  • Investigate and analyze response activities and employs various advanced response and recovery approaches as appropriate.
  • Apply understanding of tactics, techniques, and procedures for investigative processes, including identifying adversaries' TTPs and applying corresponding defense or security controls.
  • Conduct root cause analysis and response coordination, providing recommendations for mitigation.
  • Execute recovery action plans and adapts plans to handle new developments.
DHS Cybersecurity Service employees start at career levels and salaries matching their experience and expertise. To learn more about DHS Cybersecurity Service career tracks and levels, visit our application portal.

Education

Degrees are not required for jobs in the DHS Cybersecurity Service, but DHS is interested in your level of education and the topics you studied. As you submit initial application information, you will be asked questions about your education.

Additional information

Salary: Listed salary ranges reflects typical starting salaries available to employees in most of the United States across applicable career levels. Within the provided range, average salaries vary for each career level.

Senior Cybersecurity Specialist: $115,400 - $123,700
Staff Cybersecurity Specialist: $140,400 - $150.200
Principal Cybersecurity Specialist: $167,400 - $177,800
Senior Principal Cybersecurity Specialist: $184,700 - $196,000

In some geographic areas, average starting salaries will be higher because of a local cybersecurity labor market supplement (e.g., metro Washington, D.C. +10%).

Actual salaries of individual employees may be higher or lower than provided figures. For an overview of the salaries available in the DHS Cybersecurity Service, visit Resources.

Benefits: DHS Cybersecurity Service employees receive a range of federal employment benefits designed to support their professional and personal lives. To learn more about benefits, visit our application portal.

More information about the specific benefits available to you will be provided as you progress through the application process.

Background Investigation: To ensure the accomplishment of its mission, the Department of Homeland Security (DHS) requires each and every employee to be reliable and trustworthy. To meet those standards, all selected applicants must undergo and successfully complete a background investigation for a security clearance as a condition of placement in this position. This review includes financial issues such as delinquency in the payment of debts, child support and/or tax obligations, as well as certain criminal offenses and illegal use or possession of drugs.

Pursuant to Executive Order 12564 and DHS policy, DHS is committed to maintaining a drug-free workplace and, therefore, conducts random and other drug testing of its employees in order to ensure a safe and healthy work environment. Headquarters personnel in safety- or security-sensitive positions are subject to random drug testing and all applicants tentatively selected for employment at DHS Headquarters are subject to drug testing resulting in a negative test result.

How you will be evaluated

You will be evaluated for this job based on how well you meet the qualifications above.

All DHS Cybersecurity Service applicants participate in a multi-phase assessment process, which varies by career track. For the Technical Career Track, applicants participate in a two-phase assessment process:

  • You must successfully complete each phase to advance to the next phase.
  • The total time commitment for the two phases is approximately 3 hours (many applicants require less time!).
  • Before each phase, DHS will e-mail you instructions and information to help you prepare.
  • Assessments are time sensitive, so monitor your e-mail to ensure you have plenty of time to complete them prior to any deadlines.
PHASE I: ONLINE ASSESSMENTS
  • Unproctored - you choose the time and location.
  • Includes two assessments: (1) a work styles inventory that will take about 30 minutes to complete; (2) a work simulation that you will have up to 2 hours to complete.
  • The two assessments take about 90 minutes (on average) to complete.
  • Requires a computer with audio (speakers or headphones) and a reliable internet connection.
  • No knowledge of DHS or cybersecurity is required for these assessments, which measure non-technical capabilities that are important for professional success in the DHS Cybersecurity Service. This includes how you communicate, analyze information, and collaborate with others:
    • The work styles inventory presents you with questions about your work-related interests and preferences.
    • The work simulation presents you with realistic, work-related scenarios and asks you to respond to them.

PHASE II: TECHNICAL CAPABILITY ASSESSMENT

  • Proctored - must be scheduled in advance and completed at a designated assessment center.
  • There is a different assessment for each DHS Cybersecurity Service technical capability (visit Jobs to learn more about the technical capabilities).
  • Most individuals only have a primary technical capability and complete only one Technical Capability Assessment, but in limited circumstances, you may complete a second Technical Capability Assessment.
  • You will have up to 2.5 hours to complete each Technical Capability Assessment; each takes about 90 minutes (on average) to complete
  • Assessments present realistic, work-related cybersecurity scenarios and questions to assess technical skills.
  • Cybersecurity knowledge is assessed, but no knowledge of DHS is required.
*Some applicants who successfully complete Phase II may be asked to participate in a Phase III: Advanced Technical Interview. This scenario-based interview is used to further assess an applicant's proficiency in a technical capability. More information will be provided to such applicants as they progress through the application process.

To learn about the assessment process for this Technical Track position, visit our portal and read the "Assessment Process" guide.

Your session is about to expire!

Your USAJOBS session will expire due to inactivity in 8 minutes. Any unsaved data will be lost if you allow the session to expire. Click the button below to continue your session.