USA
23 days ago
Physical Embedded and Control Systems Security - Developmental
Summary The Department of Homeland Security (DHS) is recruiting professionals to support a range of developmental roles in Physical, Embedded, and Control Systems Security (PECSS) as well as those focused on Industrial Control Systems (ICS), including ICS Security Engineer, ICS Network Security Engineer, ICS Security Specialist, and Embedded Systems Cybersecurity Engineer. All positions are in the DHS Cybersecurity Service. Responsibilities DHS Cybersecurity Service (DHS-CS) uses a multi-phase assessment process to qualify applicants seeking employment through the DHS-CS. Given the ever-advancing nature of cybersecurity and the ongoing need for cybersecurity talent, DHS-CS uses "Talent Pools" to pull qualified applicants (i.e., individuals who have successfully completed the multi-phase assessment process for their capability and career track/level) for consideration for these jobs. This announcement is being used to fill the Physical, Embedded, and Control Systems Security (PECSS) Talent Pool. By applying to this job announcement, you are opting to be part of the DHS-CS Talent Pool for ongoing consideration for employment for relevant open jobs and will remain eligible for consideration for up to one year from the date of completion. There are a variety of Physical, Embedded, and Control Systems Security (PECSS) opportunities across the Department, including supporting several specialized programs at the DHS Office of Strategy, Policy, and Plans (PLCY), the Cybersecurity and Infrastructure Security Agency (CISA), DHS Office of the Chief Information Officer (OCIO), and the Federal Emergency Management Agency (FEMA). As a DHS Cybersecurity Service employee in the Developmental Career Track, you will continually engage in learning activities to enhance and apply your developing expertise in the technical capability of Physical, Embedded, and Control Systems Security (PECSS) to perform a range of routine tasks, which may include: Supporting designs, protocols, and physical configurations of "purpose-built interconnected systems," such as industrial control systems (ICS), physical systems, and embedded systems - And define and/or implement comprehensive countermeasures to detect threats and support activities to maintain the cybersecurity posture of these systems. Researching technical and nontechnical risk and vulnerability assessments of Information and Operational Technology (IOT) environments and proactively identifying significant cybersecurity challenges to be addressed, such as ICS/Supervisory Control and Data Acquisition (SCADA)/Distributed Control Systems (DCS), local computing environment, network and infrastructure, enclave boundary, supporting infrastructure, and applications. Actively supporting the effectiveness of security controls. Engaging with other experts in cybersecurity risk assessment, automated information sharing, threat analysis, vulnerability management, and network defense to support customer efforts for ensuring holistic, integrated views of security threats to an organization, the Department, or the Nation's security posture. Using Security Information and Event Management (SIEM) technologies to monitor alerts, triage activity, and analyze network traffic to provide ongoing analysis on potentially malicious activity. Proactively analyzing network traffic for patterns using analytic tools and data science methodologies. Supporting efforts to identify, develop, share or otherwise contextualize cyber indicators to maintain constant awareness of the status of the highly dynamic operating environment. Collecting, processing, analyzing, and disseminating cyber warning assessments. Presenting and explaining findings and recommending action based on cybersecurity threat analysis including insider threats, to determine their probability and consequences. Supporting mitigation strategies by performing scanning and probing activities to augment assessment. Requirements Conditions of Employment Qualifications This position is in the Developmental Track at the Associate Cybersecurity Specialist career level. At this level, individuals generally: Have 3+ years of cybersecurity work experience, and Can serve as a cybersecurity professional with some experience who applies still-burgeoning technical expertise to perform routine work with significant supervision and clear guidance. DHS Cybersecurity Service employees with a technical capability in Physical, Embedded, and Control Systems Security (PECSS) will generally apply their expertise to: Understand designs, protocols, and physical configurations of purpose-built interconnected systems-such as industrial control systems, physical systems, and embedded systems-and can define and implement comprehensive countermeasures to detect threats and maintain the overall cybersecurity posture of these systems. DHS Cybersecurity Service employees start at career levels and salaries matching their experience and expertise. In recruiting for this opportunity, DHS may hire employees at higher or lower career levels and associated salaries. To learn more about DHS Cybersecurity Service career tracks and levels, visit our application portal. This position is focused on Physical, Embedded, and Control Systems Security (PECSS). DHS Cybersecurity Service jobs are structured cybersecurity specializations - called technical capabilities. To learn more about technical capabilities, visit our application portal. DESIRED CERTIFICATION: Certified Information Systems Security Professional (CISSP) Global Industrial Cyber Security Professional (GICSP) ISA/IEC Cybersecurity Risk Assessment Specialist Security+ DESIRED TOOLS/INDUSTRY EXPERIENCE: Tools: Wireshark, Nmap, Tenable, Defender for IoT, Kali, Cobalt Strike, Splunk Technologies, network infrastructure, boundary protection devices, enterprise LAN/WAN, ICS/SCADA Industries: FCEB Enterprise, SLTT, ICS/OT environments of critical infrastructure sectors Education Degrees are not required for jobs in the DHS Cybersecurity Service, but DHS is interested in your level of education and the topics you studied. As you submit initial application information, you will be asked questions about your education. Additional Information Salary: Listed salary ranges reflects typical starting salaries available to employees in most of the United States across applicable career levels. In some geographic areas, average starting salaries will be higher because of a local cybersecurity labor market supplement (e.g., metro Washington, D.C. +10%). Actual salaries of individual employees may be higher or lower than provided figures. For an overview of the salaries available in the DHS Cybersecurity Service, visit Resources. Benefits: DHS Cybersecurity Service employees receive a range of federal employment benefits designed to support their professional and personal lives. To learn more about benefits, visit our application portal. More information about the specific benefits available to you will be provided as you progress through the application process. Background Investigation: To ensure the accomplishment of its mission, the Department of Homeland Security (DHS) requires each and every employee to be reliable and trustworthy. To meet those standards, all selected applicants must undergo and successfully complete a background investigation for a security clearance as a condition of placement in this position. This review includes financial issues such as delinquency in the payment of debts, child support and/or tax obligations, as well as certain criminal offenses and illegal use or possession of drugs. Pursuant to Executive Order 12564 and DHS policy, DHS is committed to maintaining a drug-free workplace and, therefore, conducts random and other drug testing of its employees in order to ensure a safe and healthy work environment. Headquarters personnel in safety- or security-sensitive positions are subject to random drug testing and all applicants tentatively selected for employment at DHS Headquarters are subject to drug testing resulting in a negative test result.
Confirm your E-mail: Send Email