Skip to main content
U.S. flag
Back to results

Vulnerability Management Lead

General Services Administration
Office of the Chief Information Officer
This job announcement has closed

Summary

As the Vulnerability Management Lead, you will manage and maintain GSA cybersecurity defenses.

Location of position: 

The Office of GSA IT, Security Operations Division (ISO)
1800 F St. NW, Washington, DC 20405


The Security Operations Division is responsible for providing real-time operational security through the security operations center and enterprise network security capabilities. 

We are currently filling one vacancy, but additional vacancies may be filled as needed.

Overview

Help
Reviewing applications
Open & closing dates
02/06/2026 to 02/12/2026
This job will close when we have received 150 applications which may be sooner than the closing date. Learn more
Salary
$143,913 to - $187,093 per year

If you are a new federal employee, your starting salary will likely be set at the Step 1 of the grade for which you are selected.

Pay scale & grade
GS 14
Location
1 vacancy in the following location:
Washington, DC
1 vacancy
Remote job
No
Telework eligible
Yes—This position is full-time in the office. In rare instances, situational telework may be approved on a case-by-case basis.
Travel Required
Occasional travel - Occasional travel may be required.
Relocation expenses reimbursed
No
Appointment type
Permanent
Work schedule
Full-time
Service
Competitive
Promotion potential
14
Supervisory status
No
Security clearance
Not Required
Drug test
No
Position sensitivity and risk
Moderate Risk (MR)
Trust determination process
Financial disclosure
No
Bargaining unit status
No
Announcement number
IS-2026-0004
Control number
856787300

This job is open to

Help

Clarification from the agency

This public notice is issued under Direct Hire Authority (DHA) to recruit talent to occupations for which there is a severe shortage of candidates or a critical hiring need. This means that we can hire any qualified candidate from this notice or any other source. About this DHA notice: -Current civil service employees will receive new appointments if selected under this DHA. -For information on DHA, please visit https://www.opm.gov/policy-data-oversight/hiring-information/direct-hire-authority/

Duties

Help

As a Vulnerability Management Lead you will perform the following duties:

  • Responsible for a variety of Information Security tasks and functions to ensure agency level compliance with GSA IT Security policies, Federal Information Security Management Act of 2002 (FISMA), Office of Management and Budget (OMB), Department of Homeland Security (DHS), and National Institute of Standards and Technology (NIST) requirements.
  • Provides expert advice to the Division Director. Represents the Division and OCIO in meetings with other GSA entities; and GSA in meetings with representatives of industry, other agencies, public organizations, etc. , to resolve problems, develop joining policies/standards; analyze, select and implement IT security products/services/solutions, and exchange information regarding areas of technical expertise.
  • Conducts, oversees, and monitors security analyses, testing, and evaluations of GSA information systems in support of Security Assessment and Authorization (A&A) of and ongoing Continuous Monitoring. Creates reports, guidance, and direction for enhancement of security for systems/networks.
  • Participates in the conduct and management of independent evaluations and compliance reviews of IT systems in accordance with FISMA. This includes, but is not limited to, POA&M reviews, assessment, and authorization package reviews, exhibit 300 reviews, vulnerability assessments and scanning activities, system configuration reviews, and system inventory reviews, IT audit findings and remediation, etc.
  • Mitigates data exfiltration and service disruption risks, and reduces detection and response times, and recommends and directs changes in network and system designs, plans, or documentation to ensure compliance with security and privacy policy. Accelerates AI/ML-driven analytics into defensive cyber operations, including automated threat intelligence, anomaly detection, and risk scoring.
  • Responsible for implementing Enterprise Security Shared Services across stakeholders, in conjunction with the Director and the CISO/DCISO, building product roadmaps, business use cases, technical specifications, wireframes, mockups, prototypes, launch plans, tracking key performance metrics and data analytics/reporting along with end user/customer surveys among other deliverables for identifying efficiencies for the rolled-out services.
  • Manages GSA's Vulnerability Disclosure Program and Bug Bounty Program. Provides oversight and manages notifications from public sources of information risks for these programs.
  • Evaluates, acquires, configures, and uses software intended to ensure that automated systems are secure from unauthorized use, viral infection, and other problems that would compromise sensitive information in terms of confidentiality, integrity, and availability, or would compromise other aspects of overall system security.

Requirements

Help

Conditions of employment

  • US Citizenship or National (Residents of American Samoa and Swains Island)
  • Meet all eligibility requirements within 30 days of the closing date.
  • Register with Selective Service if you are a male born after 12/31/1959
  • Direct Deposit of salary check to financial organization required.


If selected, you must meet the following conditions:

  • Current or Former Political Appointees: The Office of Personnel Management (OPM) must authorize employment offers made to current or former political appointees. If you are currently, or have been within the last 5 years, a political Schedule A, Schedule C or Non-­Career SES employee in the Executive Branch, you must disclose this information to the HR Office. Failure to disclose this information could result in disciplinary action including removal from Federal Service.
  • Serve a one year probationary period, if required.
  • Undergo and pass a background investigation (Tier 2 investigation level).
  • Have your identity and work status eligibility verified if you are not a GSA employee.  We will use the Department of Homeland Security’s e-Verify system for this. Any discrepancies must be resolved as a condition of continued employment.

Qualifications

For each job on your resume, provide:

  • the exact dates you held  each job (from month/year to month/year)
  • number of hours per week you worked (if part time).    

If you have volunteered your service through a National Service program (e.g., Peace Corps, Americorps), we encourage you to apply and include this experience on your resume.

The GS-14 salary range starts at $143,913 per year.

If you are a new federal employee, your starting salary will likely be set at the Step 1 of the grade for which you are selected.  

To qualify, you must have at least one year of specialized experience equivalent to the GS-13 level or higher in the Federal service and have IT-related experience demonstrating EACH of the four competencies below:

IT SPECIALIST COMPETENCY REQUIREMENTS:

  • Attention to Detail - This skill is generally demonstrated by assignments where the applicant investigates and evaluates "state of the art" technology of the industry.
  • Customer Service - This skill is generally demonstrated by assignments where the applicant confers with users to evaluate the effectiveness of, or identify the need for, computer programs or management systems.
  • Oral Communication - This skill is generally demonstrated by assignments where the applicant persuades others to take particular course of action or to accept findings, recommendations, changes, or alternative viewpoints.
  • Problem Solving - This skill is generally demonstrated by assignments where the applicant identifies and accommodates technology and resource constraints.


SPECIALIZED EXPERIENCE:  

In addition to the Basic Requirements listed above, you must have one year of specialized experience equivalent to the GS-13 in the Federal service.

Specialized experience is defined as experience conducting or assisting with security assessments, evaluations, or continuous monitoring of information systems and ensuring compliance with cybersecurity policies or regulatory requirements. This experience must also include identifying and addressing security vulnerabilities or risks, recommending improvements to system or network designs, or using security software or tools to safeguard systems. Such experience may be obtained in government, industry, or other related fields.

Education

This job does not have an education qualification requirement.

Additional information

Candidates will not be hired based on their race, sex, color, religion, or national origin.

Applicants are encouraged to make their resume searchable in their USAJOBS.gov profile. This will allow Federal hiring specialists and hiring managers across agencies to find their resume as part of agency recruitment campaigns or staffing searches.

If you apply to this position and are selected, we will not ask about your criminal history before you receive a conditional job offer. If you believe you were asked about your criminal history improperly, contact the agency or visit GSA's webpage.

Relocation-related expenses are not approved and will be your responsibility.  

On a case-by-case basis, the following incentives may be approved:

·       Credit toward vacation leave if you are new to the federal government

Additional vacancies may be filled through this announcement in this or other GSA organizations within the same commuting area as needed; through other means; or not at all.

Candidates should be committed to improving the efficiency of the Federal government, passionate about the ideals of our American republic, and committed to upholding the rule of law and the United States Constitution.

How you will be evaluated

You will be evaluated for this job based on how well you meet the qualifications above.

Applications will be evaluated against the basic qualifications. Qualified candidates will be considered in accordance with the Office of Personnel Management Direct Hire Guidelines. Applications will not be rated or ranked. Veterans’ Preference does not apply to the direct hire recruitment procedures.

You may not be considered for the position, if any part of the application is incomplete or missing the required supporting documentation. Falsifying your background, education and/or experience is cause for not hiring you or dismissing you if hired. 

ICTAP/CTAP Candidates: The Interagency Career Transition Assistance Plan (ICTAP) and Career Transition Assistance Plan (CTAP) provide eligible displaced Federal competitive service employees with selection priority over other candidates for competitive service vacancies. To be qualified you must submit appropriate documentation (a copy of the agency notice, your most recent performance rating, and your most recent SF-50 noting current position, grade level, and duty location) and be found “well-qualified" for this vacancy.

In addition to meeting the basic qualifications stated in the qualification section of this announcement, well qualified is defined as: experience that exceeds the minimum qualifications of the position, demonstrated by meeting at least 3 out of 5 KSA’s listed below:

  1. Skill in the IT Security area of specialization, its governing laws, regulations, methodologies, and/or policies to provide sound and authoritative technical guidance on all issues related to the assigned program.
  2. Skill in applying a wide range of qualitative and/or quantitative methods for the assessment and improvement of INFOSEC program effectiveness.
  3. Skill in information technology security application to advise System Owners, Business Lines, Industry Partners, and client agencies in the analysis of complex mission requirements and applying information technology security in efficiently and effectively meeting these requirements.
  4. Skill in the field of information technology focused on knowledge of vulnerability and application exploitation. Skill in written communication to support interactions with the general public and program management.
  5. Skill in Information Technology focused on the maintenance and operation of Infosec technology, vulnerability scanning, dynamic application scanning and static code analysis.

Demonstration of these KSA’s must be supported by your resume. Applicants should also make note of each KSA, as you will be asked to address them later in the application process.

Subject Matter Experts (SMEs) may be utilized in the evaluation of qualifications and KSAs


You may preview questions for this vacancy.

Your session is about to expire!

Your USAJOBS session will expire due to inactivity in 8 minutes. Any unsaved data will be lost if you allow the session to expire. Click the button below to continue your session.