Skip to main content
U.S. flag
Back to results

Cybersecurity Analyst, 31STS

Department of the Air Force
Space Systems Command
United States Space Force / Space Systems Command / 31 Sustainment Squadron

Summary

Do not email applications. To submit your resume for this Direct Hire opportunity click here.

For additional information on other USSF direct hire opportunities visit the
Air Force Civilian Careers Space Force website and follow USSF on LinkedIn.

Overview

Help
Accepting applications
Open & closing dates
03/17/2026 to 03/24/2026
Salary
$99,800 to - $154,280 per year

Salary is dependent upon duty location, grade, step, and locality pay. GS-12/13 Equivalent.

Pay scale & grade
NH 3
Location
1 vacancy in the following location:
Colorado Springs, CO
Remote job
No
Telework eligible
Yes—as determined by the agency policy.
Travel Required
25% or less - You may be expected to travel for this position.
Relocation expenses reimbursed
Yes—You may qualify for reimbursement of relocation expenses in accordance with agency policy.
Appointment type
Permanent
Work schedule
Full-time
Service
Competitive
Promotion potential
None
Supervisory status
No
Security clearance
Top Secret
Drug test
Yes
Position sensitivity and risk
Critical-Sensitive (CS)/High Risk
Trust determination process
Financial disclosure
Yes
Bargaining unit status
No
Announcement number
SF-FY26-6S-NH-2210-03-SPLSH
Control number
861502100

Videos

Duties

Help

The United States Space Force (USSF) at Peterson Space Force Base, Colorado Springs, CO is searching for a Cybersecurity Analyst to support 31STS (NH-2210-03, GS-12/13 Equivalent).

Description:
The 31st Sustainment Squadron's Cyber Branch is responsible for reviewing proposed modifications to the Global Positioning System (GPS) and the Satellite Control Network (SCN) to ensure that hardware/software solutions are sound from a cybersecurity perspective. The branch manages cyber authorization packages for GPS and SCN systems including artifact verification, eMASS entry, and compliance plans. This includes coordinating Security Control Assessments and meeting Risk Management Framework requirements. The Cyber Branch analyzes test results from a variety of cyber assessments and proposes system modifications to mitigate vulnerabilities. The branch also coordinates internal and external penetration test activities and develops continuous monitoring and incident response capabilities used by cyber defenders


Ideal Candidate:
The ideal candidate will possess a background in mission system sustainment (cyber analysis of system modifications, contract verbiage), mission system authorizations (Risk Management Framework, Security Control Assessments, ISSM/ISSO), defensive Cyber operations (cyber tools, cyber incident response, exercise planning), vulnerability management (patch, scan, STIG, cyber orders processing) and penetration testing (analysis of vulnerabilities, red/blue team activities, scenario planning). Possess an Undergraduate or Graduate Education degree in computer science, engineering, information science, information systems management, mathematics, operations research, statistics, or technology management or degree that provided a minimum of 24 semester hours in one or more of the fields identified above and required the development or adaptation of applications, systems, or networks.

Key Skills and Abilities:
1. IT professional who demonstrates that they can manage a cybersecurity program at the enterprise level using the DoD's cybersecurity / RMF management system, currently eMASS, Xacta, and ITIPS. Can maintain cybersecurity documentation including: creating policies, SSPs, network topologies, POA&Ms.
2. Knowledge of the missions, roles, functions, organizational structures, and operation of the Department of Defense, and entities that govern, interface with, and/or influence management control of proposed and ongoing service contracts.
3. Knowledge of the principles, methods, and techniques of IT assessment, planning, management, monitoring, and evaluation as well as knowledge of the principles, methods, or tools for developing, scheduling, coordinating, managing IT projects and resources, monitoring and inspecting costs, work, and contractor performance. Ability to lead and manage information systems planning, development, implementation, operation, and maintenance.
4. Knowledge of the principles, methods, and tools for the coordinated management of IT programs to include providing oversight of multiple IT projects, integrating dependent schedules and deliverables, and related activities such as life cycle management and program governance.
5. Knowledge of the principles and methods to identify, analyze, specify, design, and manage functional and infrastructure requirements; includes translating functional requirements into technical requirements used for logical design or alternative technologies or approaches. Ability to research and analyze external products to determine their potential for meeting mission requirements and business needs.
6. Knowledge of concepts, practices, and techniques used to identify, engage, influence and monitor relationships with individuals and groups connected to IT work/development efforts. Includes those who are actively involved, those who exert influence over the process and its results, and those who have a vested interest in the outcome. Ability to work effectively with customers to assess their requirements then provide information, expertise, and assistance to satisfy those needs.
7. Ability to communicate effectively, both orally and in writing, clearly, concisely, with technical accuracy and to use computers and a variety of software programs and databases, gather and analyze a variety of program information, make sound judgments concerning program progress, and effectively communicate recommendations orally and in writing to higher organizational management and contractors.

Requirements

Help

Conditions of employment

  • Must be a U.S Citizen.
  • Must be able to obtain and maintain a Top-Secret security clearance.
  • Safeguards classified or sensitive budget-related information and/or files.
  • May be required to work overtime on an unscheduled or emergency basis.
  • Eligible for situational telework only, including Emergency and OPM prescribed “Unscheduled Telework”.
  • This position will close after 5 business days or 75 applications, whichever comes first.
  • Employee may be required to perform travel by military or commercial passenger aircraft in the performance of temporary duty assignments.
  • PCS / relocation funding is authorized.
  • Required to handle and safeguard sensitive and/or classified information in accordance with regulations to reduce potential compromise; employee must obtain and maintain the appropriate security clearance.
  • Will attain appropriate DoD approved cybersecurity baseline certification applicable for cybersecurity functions required for the position held
  • This position is designated as a Testing Designated Position (TDP) under the Air Force Civilian Drug Testing Program.
  • Subject to Temporary Duty Assignment (TDY): 20 days a year.
  • Employee must within 30-days of assuming this position and by 31 October annually thereafter, file an OGE-450, “Confidential Financial Disclosure Report.
  • This position is designated a NON-CRITICAL APDP position.

Qualifications

The 2210 series has an individual occupational requirement that must be met and can be viewed here. There is no Group Coverage Qualification Standard for this series.

Additional information

Employed Annuitants (Reemployed Annuitants): Applicants in receipt of an annuity based on civilian employment in the Federal Service are subject to the DoD Policy on The Employment of Annuitants. Click here for more information.

Disabled veteran leave is available to a Federal employee hired on/after 5 Nov 2016, who is a veteran with a service-connected disability rating of 30% or more. For more information, click here.

Candidates should be committed to improving the efficiency of the Federal government, passionate about the ideals of our American republic, and committed to upholding the rule of law and the United States Constitution.

How you will be evaluated

You will be evaluated for this job based on how well you meet the qualifications above.

Knowledge, Skills and Abilities (KSAs): Your qualifications will be evaluated on the basis of your level of knowledge, skills, abilities and/or competencies as related to the series and grade of the position being filled. Final qualifications determinations will be assessed based on OPM's General Schedule Qualifications Standards found here:

Interviews: You will be contacted by e-mail and/or telephone if your application is identified as qualifying for a position being filled. An interview may be conducted. If interviewed, you will be asked to address the same knowledge, skills, abilities and/or competencies used to initially qualify your application for the position.

Your session is about to expire!

Your USAJOBS session will expire due to inactivity in 8 minutes. Any unsaved data will be lost if you allow the session to expire. Click the button below to continue your session.