Skip to main content
U.S. flag
Back to results

Cybersecurity Defensive Operations - Leadership

Department of Homeland Security
DHS Headquarters
This job announcement has closed

Summary

The Department of Homeland Security (DHS) is recruiting professionals to support a range of technical and leadership roles in Cybersecurity Defensive Operations - Intelligence Collection & Analysis as well as Planning, Execution & Analysis, including Cyber Operations Lead, All Source-Collection Manager, All Source-Collection Requirements Manager and Network Operations Security Center Lead. All positions are in the DHS Cybersecurity Service.

Overview

Help
Reviewing applications
Open & closing dates
05/22/2023 to 06/21/2023
Salary
$137,800 to - $195,500 per year

Range reflects typical low and high starting salaries available to employees in most of the U.S. See Additional information: Salary for more info.

Pay scale & grade
DC 3
Locations
Many vacancies in the following locations:
Chandler, AZ
Washington, DC
Pensacola, FL
Idaho Falls, ID
Remote job
No
Telework eligible
Yes—as determined by the agency policy.
Travel Required
Occasional travel - You may be expected to travel for this position about 1 to 5 days a month.
Relocation expenses reimbursed
No
Appointment type
Permanent
Work schedule
Full-time
Service
Excepted
Promotion potential
None
Supervisory status
Yes
Security clearance
Sensitive Compartmented Information
Drug test
Yes
Position sensitivity and risk
Special-Sensitive (SS)/High Risk
Trust determination process
Announcement number
23-11965433-CBWQ
Control number
726696200

Duties

Help

There are a variety of Cybersecurity Defensive Operations opportunities across the Department, including supporting several specialized programs at the Cybersecurity and Infrastructure Security Agency (CISA), DHS Office of the Chief Information Officer (OCIO), the Federal Emergency Management Agency (FEMA).

Depending on your career level and role, DHS Cybersecurity Service employees in the Leadership Career Track, with a technical capability in Cybersecurity Defensive Operations, may apply their expertise to perform a range of tasks, including:

  • Leading the creation and implementation of end-to-end tactical and strategic level cyber defense operations plans based on technical cybersecurity expertise, applicable policies, and rules of engagement.
  • Overseeing and directing actions and reports around immediate remediation and containment processes.
  • Leading development of primary and contingency action plans, organizing teams to select the most appropriate and effective methods of defense/attack that align with operational protocols.
  • Employing senior-level knowledge of national strategies, plans, policies, and directives for offensive and/or defensive cyber operations including but not limited to U.S. Department of Defense (DoD) Directive 3600.1, Director of Central Intelligence Directives (DCIDs), National Security Presidential Directives (NSPDs), Homeland Security Presidential Directives (NSPDs).
  • Maintaining and leveraging a robust network of cyber defenders as well as other intelligence components to better understand identified intrusion sets and deviations and to build better defensive cybersecurity strategies.
  • Supervising teams, projects, and employees in the application of reverse malware analysis and engineering techniques to prevent incidents or mitigate threats to DHS or Federal systems and networks.
  • Managing teams and efforts to identify, gather, and disseminate information on cyber threats from security data and all-source intelligence.
  • Organizing and supervising the collection of information needs and requirements of customers and overseeing the execution of plans and strategies to meet those needs.
  • Providing leadership and subject matter expertise to cyber intelligence collection and analysis efforts to inform and execute DHS or Federal government-wide cyber operations.
  • Managing and contributing expertise to the development of high-level intelligence products - including written reports or briefings - coordinating with teams and counterparts in the intelligence community to report to a variety of audiences, including government officials and other decision makers, planners, or network defenders.
  • Delivering intelligence briefings and other relevant communications to senior Department leaders, external stakeholders, and high-level officials in federal agencies or entities that influence policy making (e.g., Congress, OMB, White House councils) on matters of security and cyber defense to explain and defend policies and programs or guide alternative courses of action.
  • Serving as leader and administrative supervisor to subordinate cyber defense teams, overseeing subordinates' technical development and work and ensuring their impact is focused on DHS cyber defense objectives.
  • Driving the development and tracking of cybersecurity defensive operations team goals, ensuring both alignment with DHS's strategic goals and individual accomplishments and outcomes.

Requirements

Help

Conditions of employment

  • You must be a U.S. Citizen or national.
  • You must be 18 years of age.
  • Must be registered for the Selective Service (if you are a male).
  • Must be able to obtain and maintain a security clearance. Security clearance levels may vary.
  • Must be able to submit to a drug test and receive a negative result.
  • Must be able to comply with ethics and standards of conduct requirements, including completing any applicable financial disclosure.
  • May be required to serve a 3 year probationary period.
  • While many of these positions are considered telework eligible, some individuals must live within 2 hrs driving distance to a DHS SCIF in either Chandler, AZ; Stennis, MS; Idaho Falls, ID; Arlington, VA; Pensacola, FL; Springfield, VA or D.C.
  • Remote work may be available for some positions.

Qualifications

This position is in the Leadership Track across a range of career levels. Employees in this career track generally:

  • Have between 5-15 years of cybersecurity work experience.
  • Have between 0-5 years of cybersecurity leadership experience.
  • Are capable of serving as a seasoned cybersecurity manager who oversees multiple DHS or Federal cybersecurity programs or DHS organizations, including employees and contract resources, through subordinate managers.

DHS Cybersecurity Service employees with a technical capability in Cybersecurity Defensive Operations will generally:

  • Integrate, manage, and execute all aspects of the cyberattack lifecycle to inform cyber defense operations.
  • Plan and execute cybersecurity defense operations to protect assets.
  • Facilitate the flow and assessment of key intelligence data.
  • Determine system security monitoring and incoming intelligence feeds based on dynamic security environment.
  • Oversee immediate remediation and containment processes.
?DHS Cybersecurity Service employees start at career levels and salaries matching their experience and expertise. To learn more about DHS Cybersecurity Service career tracks and levels, visit our application portal.

This position is focused on Cybersecurity Defensive Operations- Intelligence Collection & Analysis and Planning, Execution & Analysis.

DHS Cybersecurity Service jobs are structured cybersecurity specializations - called technical capabilities. To learn more about technical capabilities, visit our application portal.

Education

Degrees are not required for jobs in the DHS Cybersecurity Service, but DHS is interested in your level of education and the topics you studied. As you submit initial application information, you will be asked questions about your education.

Additional information

Salary: Listed salary ranges reflects typical starting salaries available to employees in most of the United States across applicable career levels. Within the provided range, average salaries vary for each career level.

Lead Cybersecurity Specialist: $137,800 - $149,500
Cybersecurity Manager: $158,100- $172,100
Senior Cybersecurity Manager: $179,400 - $195,500

In some geographic areas, average starting salaries will be higher because of a local cybersecurity labor market supplement (e.g., metro Washington, D.C. +10%).

Actual salaries of individual employees may be higher or lower than provided figures. For an overview of the salaries available in the DHS Cybersecurity Service, visit Resources.

Benefits: DHS Cybersecurity Service employees receive a range of federal employment benefits designed to support their professional and personal lives. To learn more about benefits, visit our application portal.

More information about the specific benefits available to you will be provided as you progress through the application process.

Background Investigation: To ensure the accomplishment of its mission, the Department of Homeland Security (DHS) requires each and every employee to be reliable and trustworthy. To meet those standards, all selected applicants must undergo and successfully complete a background investigation for a security clearance as a condition of placement in this position. This review includes financial issues such as delinquency in the payment of debts, child support and/or tax obligations, as well as certain criminal offenses and illegal use or possession of drugs.

Pursuant to Executive Order 12564 and DHS policy, DHS is committed to maintaining a drug-free workplace and, therefore, conducts random and other drug testing of its employees in order to ensure a safe and healthy work environment. Headquarters personnel in safety- or security-sensitive positions are subject to random drug testing and all applicants tentatively selected for employment at DHS Headquarters are subject to drug testing resulting in a negative test result.

How you will be evaluated

You will be evaluated for this job based on how well you meet the qualifications above.

All DHS Cybersecurity Service applicants participate in a multi-phase assessment process, which varies by career track. For the Leadership Career Track, applicants participate in a two-phase assessment process:

  • You must successfully complete each phase to advance to the next phase.
  • The total time commitment for the two phases is approximately 5-6 hours (many applicants require less time!)
  • Before each phase, DHS will e-mail you instructions and information to help you prepare.
  • Assessments are time sensitive, so monitor your e-mail to ensure you have plenty of time to complete them prior to any deadlines.
PHASE I: ONLINE ASSESSMENTS
  • Unproctored - you choose the time and location
  • Includes three assessments: (1) a work styles inventory that will take about 30 minutes to complete; (2) a work simulation that you will have up to 2 hours to complete; and (3) a leadership simulation that you will have up to 2.5 hours to complete
  • The three assessments take about 3 hours (on average) to complete
  • Requires a computer with audio (speakers or headphones) and a reliable internet connection.
  • No knowledge of DHS or cybersecurity is required for these assessments, which measure non-technical capabilities that are important for professional success in the DHS Cybersecurity Service. This includes how you communicate, analyze information, and collaborate with others:
    • The work styles inventory presents you with questions about your work-related interests and preferences.
    • The work simulation presents you with realistic, work-related scenarios and asks you to respond to them.
PHASE II: TECHNICAL CAPABILITY ASSESSMENT
  • Proctored - must be scheduled in advance and completed at a designated assessment center
  • There is a different assessment for each DHS Cybersecurity Service technical capability (visit Jobs to learn more about the technical capabilities).
  • Most individuals only have a primary technical capability and complete only one Technical Capability Assessment, but in limited circumstances, you may complete a second Technical Capability Assessment.
  • You will have up to 2.5 hours to complete each Technical Capability Assessment; each takes about 90 minutes (on average) to complete.
  • Assessments present realistic, work-related cybersecurity scenarios/questions to assess technical skills.
  • Cybersecurity knowledge is assessed, but no knowledge of DHS is required.

*Some applicants who successfully complete Phase II may be asked to participate in a Phase III: Advanced Technical Interview. This scenario-based interview is used to further assess an applicant's proficiency in a technical capability. More information will be provided to such applicants as they progress through the application process.

To learn about the assessment process, visit our portal and read the "Assessment Process" guide.

Your session is about to expire!

Your USAJOBS session will expire due to inactivity in 8 minutes. Any unsaved data will be lost if you allow the session to expire. Click the button below to continue your session.