Skip to main content
U.S. flag
Back to results

Mitigation and Response - Developmental

Department of Homeland Security
DHS Headquarters
This job announcement has closed

Summary

The Department of Homeland Security (DHS) is recruiting professionals to support a range of developmental roles in Mitigation and Response including, Incident Response Analyst, Intrusion Analyst, and Computer Network Defense Incident Response Analyst. All positions are in the DHS Cybersecurity Service.

Overview

Help
Reviewing applications
Open & closing dates
04/26/2023 to 05/26/2023
Salary
$91,500 to - $100,000 per year

Range reflects typical low and high starting salaries available to employees in most of the U.S. See Additional information: Salary for more info.

Pay scale & grade
DC 2
Locations
MANY vacancies in the following locations:
Chandler, AZ
Washington
Pensacola, FL
Idaho Falls, ID
Remote job
No
Telework eligible
Yes—as determined by the agency policy.
Travel Required
Occasional travel - You may be expected to travel for this position about 1 to 5 days a month.
Relocation expenses reimbursed
No
Appointment type
Permanent
Work schedule
Full-time
Service
Excepted
Promotion potential
None
Supervisory status
No
Security clearance
Sensitive Compartmented Information
Drug test
Yes
Position sensitivity and risk
Special-Sensitive (SS)/High Risk
Trust determination process
Announcement number
23-11931461-CBWQ
Control number
721813500

Duties

Help

There are a variety of Mitigation and Response opportunities across the Department, including supporting several specialized programs at the Cybersecurity and Infrastructure Security Agency (CISA) and DHS Office of the Chief Information Officer (OCIO).

As an employee in the Development Track, you will continually and proactively participate in learning activities to enhance and apply your developing expertise in the technical capability of Mitigation and Response,and depending on your role, you willperform a range of routine tasks, including:

  • Applying knowledge of defensive measures to detect, respond, and protect information, information systems, and networks from threats.
  • Proactively analyzing network traffic for patterns using analytic tools and data science methodologies.
  • Handling incidents in accordance with NIST stages of incident handling guidelines
  • Appling knowledge of malicious software programs and code that interfere with normal computer functions or send data to unauthorized parties to identify threat actors' TTPs (via root cause analysis).
  • Using information known about incidents and their effects on networks, systems, and applications to identify and prioritize short- and long-term recovery and repair actions.
  • Creates recovery action plans for repairs, including mitigation strategies for interim system vulnerabilities/deficiencies.
  • Executing recovery action plans and adapts plans to handle new developments.
  • Actively engaging with and notifying designated incident managers, cyber incident responders, and cybersecurity service provider team members of suspected cyber incidents articulating the event's history, status, and potential impact for further action in accordance with the organization's cyber incident response plan.
  • Supporting efforts to collect intrusion artifacts (e.g., source code, malware, trojans) using discovered data to enable mitigation of potential cyber defense incidents in accordance with recovery action plans.
  • Providing routine technical and nontechnical support to cyber defense technicians to resolve cyber incidents.
  • Documenting and publishing cyber defense techniques, trend analysis, guidance, reports, and after-action reviews on incident findings for appropriate constituencies.
  • Monitoring external data sources (e.g., cyber defense vendor sites, Computer Emergency Response Teams, Security Focus) to maintain currency of cyber defense threat conditions and determine which security issues may have an impact on the enterprise.
  • Proactively performing initial, forensically sound collection of images and inspecting to discern possible mitigation/remediation on enterprise systems.
  • Using analytic tools and data science methodologies to receive and analyze network alerts for patterns from various sources within the enterprise and determining possible causes of such alerts.

Requirements

Help

Conditions of employment

  • You must be a U.S. Citizen or national.
  • You must be 18 years of age.
  • Must be registered for the Selective Service (if you are a male).
  • Must be able to obtain and maintain a security clearance. Security clearance levels may vary.
  • Must be able to submit to a drug test and receive a negative result.
  • Must be able to comply with ethics and standards of conduct requirements, including completing any applicable financial disclosure.
  • May be required to serve a 3 year probationary period.
  • While these positions are considered telework, some individuals must live within 2 hours driving distance to a DHS SCIF in either Chandler, AZ; Stennis, MS; Idaho Falls; Arlington, VA; Pensacola, FL; or Washington, D.C.
  • Remote work may be available for some positions.

Qualifications

This position is in the Developmental Track at the Associate Cybersecurity Specialist career level. At this level, individuals generally:

  • Have 2+ years of cybersecurity work experience
  • Can serve as a cybersecurity professional with some experience who applies still-burgeoning technical expertise to perform routine work with significant supervision and clear guidance.

DHS Cybersecurity Service employees with a technical capability in Mitigation and Response will generally:

  • Track and respond to prioritized urgent IT and cyber events and indicators of compromise (IOCs) to mitigate threats to networks, systems, and applications.
  • Investigate and analyze response activities and employs various advanced response and recovery approaches as appropriate.
  • Apply understanding of tactics, techniques, and procedures for investigative processes, including identifying adversaries' TTPs and applying corresponding defense or security controls.
  • Conduct root cause analysis and response coordination, providing recommendations for mitigation.
  • Execute recovery action plans and adapts plans to handle new developments.

DHS Cybersecurity Service employees start at career levels and salaries matching their experience and expertise. To learn more about DHS Cybersecurity Service career tracks and levels, visit our application portal.

This position is focused on Mitigation and Response.

DHS Cybersecurity Service jobs are structured cybersecurity specializations - called technical capabilities. To learn more about technical capabilities, visit our application portal.

Education

Degrees are not required for jobs in the DHS Cybersecurity Service, but DHS is interested in your level of education and the topics you studied. As you submit initial application information, you will be asked questions about your education.

Additional information

Salary: Listed salary ranges reflects typical starting salaries available to employees in most of the United States across applicable career levels. In some geographic areas, average starting salaries will be higher because of a local cybersecurity labor market supplement (e.g., metro Washington, D.C. +10%). Actual salaries of individual employees may be higher or lower than provided figures. For an overview of the salaries available in the DHS Cybersecurity Service, visit Resources.

Benefits: DHS Cybersecurity Service employees receive a range of federal employment benefits designed to support their professional and personal lives. To learn more about benefits, visit our application portal.

More information about the specific benefits available to you will be provided as you progress through the application process.

Background Investigation: To ensure the accomplishment of its mission, the Department of Homeland Security (DHS) requires each and every employee to be reliable and trustworthy. To meet those standards, all selected applicants must undergo and successfully complete a background investigation for a security clearance as a condition of placement in this position. This review includes financial issues such as delinquency in the payment of debts, child support and/or tax obligations, as well as certain criminal offenses and illegal use or possession of drugs.

Pursuant to Executive Order 12564 and DHS policy, DHS is committed to maintaining a drug-free workplace and, therefore, conducts random and other drug testing of its employees in order to ensure a safe and healthy work environment. Headquarters personnel in safety- or security-sensitive positions are subject to random drug testing and all applicants tentatively selected for employment at DHS Headquarters are subject to drug testing resulting in a negative test result.

How you will be evaluated

You will be evaluated for this job based on how well you meet the qualifications above.

You will be evaluated for this job based on how well you meet the qualifications above.

All DHS Cybersecurity Service applicants participate in a multi-phase assessment process, which varies by career track. For the Developmental Career Track, applicants participate in a two-phase assessment process:

  • You must successfully complete each phase to advance to the next phase.
  • The total time commitment for the two phases is approximately 3 hours (many applicants require less time!)
  • Before each phase, DHS will e-mail you instructions and information to help you prepare.
  • Monitor your e-mail to ensure you have plenty of time to complete assessments prior to any deadlines or request an extension, if necessary

PHASE I: ONLINE ASSESSMENTS
  • Unproctored - you choose the time and location
  • Includes two assessments: (1) a work styles inventory that will take about 30 minutes to complete; (2) a work simulation that you will have up to 2 hours to complete.
  • The two assessments take about 90 minutes (on average) to complete.
  • Requires a computer with audio (speakers or headphones) and a reliable internet connection.
  • No knowledge of DHS or cybersecurity is required for these assessments, which measure non-technical capabilities that are important for professional success in the DHS Cybersecurity Service. This includes how you communicate, analyze information, and collaborate with others:
    • The work styles inventory presents you with questions about your work-related interests and preferences.
    • The work simulation presents you with realistic, work-related scenarios and asks you to respond to them.

PHASE II: TECHNICAL CAPABILITY ASSESSMENT

  • Proctored - must be scheduled in advance and completed at a designated assessment center.
  • There is a different assessment for each DHS Cybersecurity Service technical capability (visit Jobs to learn more about the technical capabilities).
  • Most individuals only have a primary technical capability and complete only one Technical Capability Assessment, but in limited circumstances, you may complete a second Technical Capability Assessment.
  • You will have up to 2.5 hours to complete each Technical Capability Assessment; each takes about 90 minutes (on average) to complete.
  • Assessments present realistic, work-related cybersecurity scenarios and questions to assess technical skills.
  • Cybersecurity knowledge is assessed, but no knowledge of DHS is required.

To learn about the assessment process for this Developmental Track position, visit our portal and read the "Assessment Process" guide.

Your session is about to expire!

Your USAJOBS session will expire due to inactivity in 8 minutes. Any unsaved data will be lost if you allow the session to expire. Click the button below to continue your session.