Job Description
Join the Department of Homeland Security's cybersecurity division to protect critical infrastructure and safeguard national security interests. We're seeking a visionary IT Security Specialist to lead advanced threat detection initiatives and implement cutting-edge defense strategies for federal systems. This role offers unparalleled opportunity to shape national cybersecurity policy while working alongside top-tier professionals in a mission-driven environment.
Our team offers comprehensive benefits including federal retirement plans, generous paid leave, and professional development stipends. Enjoy competitive compensation with locality adjustments for Washington D.C. and flexible work arrangements to support work-life balance.
Responsibilities
- Design and implement enterprise-wide cybersecurity frameworks compliant with NIST and FISMA standards
- Lead incident response coordination during security breaches and cyber attacks
- Conduct vulnerability assessments across classified and unclassified federal systems
- Develop risk mitigation strategies for critical infrastructure protection
- Collaborate with cross-agency task forces on national security initiatives
- Mentor junior security professionals and conduct specialized training programs
- Stay current with emerging threats and defensive technologies through continuous research
Qualifications
- Bachelor's degree in Cybersecurity, Computer Science, or related field (Master's preferred)
- 5+ years of experience in federal IT security with CISSP or CompTIA Security+ certification
- Expertise in risk assessment methodologies and threat intelligence analysis
- Proven experience with SIEM platforms (Splunk, QRadar) and penetration testing tools
- Active Secret security clearance with ability to obtain Top Secret clearance
- Demonstrated success in developing cybersecurity policy documentation
- Strong analytical skills with ability to translate technical concepts for non-technical stakeholders
- Experience with cloud security architectures (AWS, Azure) and zero-trust models