Skip to main content
U.S. flag
Back to results

Mitigation and Response - Leadership

Department of Homeland Security
DHS Headquarters
This job announcement has closed

Summary

The Department of Homeland Security (DHS) is recruiting professionals to support a range of leadership roles in Mitigation and Response, including Lead Cyber Defense Incident Responder, Lead Cyber Incident Response Coordinator, Cyber Intrusion Detection Manager and Senior Cyber Incident Manager. All positions are in the DHS Cybersecurity Service.

Overview

Help
Reviewing applications
Open & closing dates
03/17/2023 to 04/16/2023
Salary
$137,800 to - $195,500 per year

Range reflects typical low and high starting salaries available to employees in most of the U.S. See Additional information: Salary for more info.

Pay scale & grade
DC 3
Locations
Many vacancies in the following locations:
Chandler, AZ
Washington
Pensacola, FL
Idaho Falls, ID
Remote job
No
Telework eligible
Yes—as determined by the agency policy.
Travel Required
Occasional travel - You may be expected to travel for this position about 1 to 5 days a month
Relocation expenses reimbursed
No
Appointment type
Permanent
Work schedule
Full-time
Service
Excepted
Promotion potential
None
Supervisory status
Yes
Security clearance
Sensitive Compartmented Information
Drug test
Yes
Position sensitivity and risk
Special-Sensitive (SS)/High Risk
Trust determination process
Announcement number
23-11882197-CBWQ
Control number
713654100

Duties

Help

There are a variety of Mitigation and Response opportunities across the Department, including supporting several specialized programs at the Cybersecurity and Infrastructure Security Agency (CISA) and DHS Office of the Chief Information Officer (OCIO).

Depending on your career level and role, DHS Cybersecurity Service employees in the Leadership Career Track, with a technical capability in Mitigation and Response, will generally apply their expertise to perform a range of tasks, including:

  • Leading and/or overseeing a team or program in monitoring, analysis, incident response, and handling for DHS or its constituents.
  • Proactively analyzing network traffic patterns to identify possible threats - includes analyzing log files from a variety of sources (e.g., individual host logs, network traffic logs, firewall logs, and intrusion detection system [IDS] logs) and using other analytic tools and data science methodologies.
  • Leading others in monitoring DHS environments for potential threats or vulnerabilities, providing DHS or external agency/private industry leadership with situational visibility across the enterprise.
  • Overseeing threat assessments for vulnerabilities on networks, systems software, and hardware and recommending appropriate mitigation.
  • Ensuring incidents are managed in accordance with NIST stages of incident handling guidelines and assisting others who are less seasoned in properly applying these standards.
  • Customizing communications for different levels of leadership and audiences to provide strategic direction and support to DHS, Component leadership and/or their SOCs, or external constituents to enable mission capabilities.
  • Collaborating with internal and external DHS stakeholders in performing critical security operations and incident handling.
  • Working with HQ and/or Component NOC/SOCs to block or deny access by hostile sites or restrict access by specific ports/protocols.
  • Managing processes to implement, configure, monitor, and maintain Security Information and Event Management (SIEM) tools to monitor, detect and respond to threats on DHS or federal/national partner networks and enclaves.
  • Managing techniques for gathering, recovering, analyzing, interpreting, preserving, and presenting information and digital evidence (from computers, mobile devices, websites, network packets, et al.) to support legal prosecution or other departmental requirements.
  • Integrating stakeholder feedback when recommending recovery action plans for repairs, including mitigation strategies for interim system vulnerabilities/deficiencies.
  • Customizing communications (e.g., incident updates and after-action reports) to emphasize the most critical information and address anticipated follow-up concerns of specific target audiences.
  • Proposing, managing, and maintaining, a suite of cybersecurity tools, to include SIEM and Endpoint Security Tools.
  • Overseeing designated managers, cyber incident responders, and cybersecurity service provider team members in handling suspected cyber incidents articulating the event's history, status, and potential impact for further action in accordance with the organization's cyber incident response plan.
  • Collaborating with team members to collect intrusion artifacts (e.g., source code, malware, trojans) and using discovered data to enable mitigation of potential cyber defense incidents within the enterprise in accordance with recovery action plans.

Requirements

Help

Conditions of employment

  • You must be a U.S. Citizen or national.
  • You must be 18 years of age.
  • Must be registered for the Selective Service (if you are a male).
  • Must be able to obtain and maintain a security clearance. Security clearance levels may vary.
  • Must be able to submit to a drug test and receive a negative result.
  • Must be able to comply with ethics and standards of conduct requirements, including completing any applicable financial disclosure.
  • May be required to serve a 3 year probationary period.
  • Remote work may be available for some positions.
  • While many these positions are considered telework, some individuals must live within 2 hours driving distance to a DHS SCIF in either Chandler, AZ; Stennis, MS; Idaho Falls; Arlington, VA; Pensacola, FL; or Washington, D.C.

Qualifications

This position is in the Leadership Track across a range of career levels. Employees in this career track generally:

  • Have between 5-15 years of cybersecurity work experience.
  • Have between 0-5 years of cybersecurity leadership experience.

DHS Cybersecurity Service employees with a technical capability in Mitigation and Response will generally:

  • Track and respond to prioritized urgent IT and cyber events and indicators of compromise (IOCs) to mitigate threats to networks, systems, and applications.
  • Investigate and analyze response activities and employs various advanced response and recovery approaches as appropriate.
  • Apply understanding of tactics, techniques, and procedures for investigative processes, including identifying adversaries' TTPs and applying corresponding defense or security controls.
  • Conduct root cause analysis and response coordination, providing recommendations for mitigation.
  • Execute recovery action plans and adapts plans to handle new developments.

DHS Cybersecurity Service employees start at career levels and salaries matching their experience and expertise. To learn more about DHS Cybersecurity Service career tracks and levels, visit our application portal.

This position is focused on Mitigation and Response.

DHS Cybersecurity Service jobs are structured cybersecurity specializations - called technical capabilities. To learn more about technical capabilities, visit our application portal.

Education

Degrees are not required for jobs in the DHS Cybersecurity Service, but DHS is interested in your level of education and the topics you studied. As you submit initial application information, you will be asked questions about your education.

Additional information

Salary: Listed salary ranges reflects typical starting salaries available to employees in most of the United States across applicable career levels. Within the provided range, average salaries vary for each career level.

Lead Cybersecurity Specialist: $137,800 - $149,500
Cybersecurity Manager: $158,100- $172,100
Senior Cybersecurity Manager: $179,400 - $195,500

In some geographic areas, average starting salaries will be higher because of a local cybersecurity labor market supplement (e.g., metro Washington, D.C. +10%).

Actual salaries of individual employees may be higher or lower than provided figures. For an overview of the salaries available in the DHS Cybersecurity Service, visit Resources.

Benefits: DHS Cybersecurity Service employees receive a range of federal employment benefits designed to support their professional and personal lives. To learn more about benefits, visit our application portal.

More information about the specific benefits available to you will be provided as you progress through the application process.

Background Investigation: To ensure the accomplishment of its mission, the Department of Homeland Security (DHS) requires each and every employee to be reliable and trustworthy. To meet those standards, all selected applicants must undergo and successfully complete a background investigation for a security clearance as a condition of placement in this position. This review includes financial issues such as delinquency in the payment of debts, child support and/or tax obligations, as well as certain criminal offenses and illegal use or possession of drugs.

Pursuant to Executive Order 12564 and DHS policy, DHS is committed to maintaining a drug-free workplace and, therefore, conducts random and other drug testing of its employees in order to ensure a safe and healthy work environment. Headquarters personnel in safety- or security-sensitive positions are subject to random drug testing and all applicants tentatively selected for employment at DHS Headquarters are subject to drug testing resulting in a negative test result.

How you will be evaluated

You will be evaluated for this job based on how well you meet the qualifications above.

All DHS Cybersecurity Service applicants participate in a multi-phase assessment process, which varies by career track. For the Leadership Career Track, applicants participate in a two-phase assessment process:

  • You must successfully complete each phase to advance to the next phase.
  • The total time commitment for the two phases is approximately 5-6 hours (many applicants require less time!)
  • Before each phase, DHS will e-mail you instructions and information to help you prepare.
  • Assessments are time sensitive, so monitor your e-mail to ensure you have plenty of time to complete them prior to any deadlines.
PHASE I: ONLINE ASSESSMENTS
  • Unproctored - you choose the time and location
  • Includes three assessments: (1) a work styles inventory that will take about 30 minutes to complete; (2) a work simulation that you will have up to 2 hours to complete; and (3) a leadership simulation that you will have up to 2.5 hours to complete
  • The three assessments take about 3 hours (on average) to complete
  • Requires a computer with audio (speakers or headphones) and a reliable internet connection.
  • No knowledge of DHS or cybersecurity is required for these assessments, which measure non-technical capabilities that are important for professional success in the DHS Cybersecurity Service. This includes how you communicate, analyze information, and collaborate with others:
    • The work styles inventory presents you with questions about your work-related interests and preferences.
    • The work simulation presents you with realistic, work-related scenarios and asks you to respond to them.
PHASE II: TECHNICAL CAPABILITY ASSESSMENT
  • Proctored - must be scheduled in advance and completed at a designated assessment center
  • There is a different assessment for each DHS Cybersecurity Service technical capability (visit Jobs to learn more about the technical capabilities).
  • Most individuals only have a primary technical capability and complete only one Technical Capability Assessment, but in limited circumstances, you may complete a second Technical Capability Assessment.
  • You will have up to 2.5 hours to complete each Technical Capability Assessment; each takes about 90 minutes (on average) to complete.
  • Assessments present realistic, work-related cybersecurity scenarios/questions to assess technical skills.
  • Cybersecurity knowledge is assessed, but no knowledge of DHS is required.
*Some applicants who successfully complete Phase II may be asked to participate in a Phase III: Advanced Technical Interview. This scenario-based interview is used to further assess an applicant's proficiency in a technical capability. More information will be provided to such applicants as they progress through the application process.

To learn about the assessment process, visit our portal and read the "Assessment Process" guide.

Your session is about to expire!

Your USAJOBS session will expire due to inactivity in 8 minutes. Any unsaved data will be lost if you allow the session to expire. Click the button below to continue your session.