Skip to content
  Friday 12 December 2025
Trending
October 21, 2025Cybersecurity – Tech Risk Lead November 12, 2024Revolutionizing Incident Response: 5 Game-Changing Ways Behavioral Analytics is Leading the Charge January 13, 2025AI Technology is the Future of NRI Banking for Indians December 31, 2024Chinese Hackers Breach U.S. Treasury Systems Using BeyondTrust API Key November 20, 2025Intern, Cybersecurity October 20, 2023Senior Cybersecurity Project Manager September 18, 2025Engineer – Infra & Cloud Cybersecurity November 17, 2023Ami Daniel of Windward: Gaining Insights from Israel October 31, 2023CISA Releases Three Industrial Control Systems Advisories March 11, 2025<h3>Pro-Palestinian Hacktivists’ Botnet Linked to X Knockout!</h3>
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
  Careers  IT CYBERSECURITY SPECIALIST
Careers

IT CYBERSECURITY SPECIALIST

SecuredyouadmSecuredyouadm—August 20, 20250
FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail

A .gov website belongs to an official government organization in the United States.Secure .gov websites use HTTPS A lock ( LockA locked padlock ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.MENUFind your federal government jobKeywordsLocation or RemoteSearchIT CYBERSECURITY SPECIALISTSelective Service SystemPrintShareSaveSummaryThis vacancy is being filled through the Office of Personnel Management’s Direct Hire Authority. All applicants who meet the basic and minimum qualification requirements will be forwarded to the selecting official for consideration. Traditional rating and ranking of applications and veteran’s preference does not apply.This position is responsible for formulating cybersecurity policy and guidance; and establishing appropriate, organization-wide cybersecurity management structures.SummaryThis vacancy is being filled through the Office of Personnel Management’s Direct Hire Authority. All applicants who meet the basic and minimum qualification requirements will be forwarded to the selecting official for consideration. Traditional rating and ranking of applications and veteran’s preference does not apply.This position is responsible for formulating cybersecurity policy and guidance; and establishing appropriate, organization-wide cybersecurity management structures.OverviewAccepting applicationsOpen & closing dates08/19/2025 to 08/25/2025This job will close when we have received 100 applications which may be sooner than the closing date. Salary$120,579 to – $156,755 per year Pay scale & gradeGS 13Location1 vacancy in the following location:Arlington, VARemote jobNo Telework eligibleNo Travel RequiredOccasional travel – You may be expected to travel for this position. Relocation expenses reimbursedNo Appointment typePermanent Work scheduleFull-time ServiceCompetitivePromotion potential13Job family (Series)
Supervisory statusNo Security clearanceDrug testNo Position sensitivity and riskTrust determination process
Financial disclosureBargaining unit statusAnnouncement numberSSS-25-DH-12785073LBM Control number843614700This job is open toDuties

  • Establishes, manages and sets cybersecurity program, goals and objectives.
  • Writes systems security plans to meet public law, Office of Management and Budget (OMB) and agency information security requirements.
  • Interprets regulations and writes alert procedures of incidents that affect computer network defense.
  • Compiles cybersecurity resource requirements from subordinate activities and develops cybersecurity budget to include training and equipment.

RequirementsConditions of employment

  • US Citizenship is required.
  • Suitable for Federal employment, determined by background investigation.
  • Direct Deposit of pay is required.
  • Selective Service registration required for male applicants, unless exempt.
  • Must be able to lift 50 lbs.

QualificationsAt the GS-13 level, you must meet the following qualifications:One year of specialized experience equivalent to at least the GS-12 level. Specialized experience is that which has equipped the applicant with the competencies to successfully perform the duties of the position, and that is typically in or related to the position to be filled. Examples of specialized experience for this position includes:
1) developing cybersecurity policies and procedures to implement security initiatives and/or requirements including authorization to operate packages (ATO), System Security plans, and Plan of Action and Milestone (POAMs);
2) conducting cybersecurity assessments and recommending solutions to protect local and/or cloud networks and to protect information system security; and
3) briefing management officials on cybersecurity finding and recommendations; and
4) ensuring adherence to Federal Information Security Modernization (FISMA) and Governance, Risk, and Compliance (GRC) elements for both on-premises and cloud based (Fedramp) systems.
AND
IT-related experience which demonstrates the (four) required competencies – Attention to Detail, Customer Service, Oral Communication, and Problem Solving.MINIMUM QUALIFICATION REQUIREMENTS: All applicants must meet the qualification requirements above to be considered minimally qualified for this position. The qualification requirements are in accordance with the OPM Qualification Standards.Applicants must carefully review the information in the “How You Will Be Evaluated” section for important information and instructions pertaining to the multi-hurdle assessment process for this position.Only experience and education obtained by the closing date of this announcement will be considered.Experience refers to paid and unpaid experience, including volunteer work done through National Service programs (e.g., Peace Corps, AmeriCorps) and other organizations (e.g., professional; philanthropic; religious; spiritual; community, student, social). You will receive credit for all qualifying experience, including volunteer experience.EducationEducation cannot be substituted for specialized experience at this series/grade level.Additional informationTelework Suitability:
The duties of this position are suitable for telework only during an emergency or natural disaster.Stipulations of Employment:Selection may require completion of a 1-year probationary period.Work Schedule:This position requires a fixed work schedule; flexible work schedules will not be authorized; position may be required to serve during continuity of operation events without regard to declarations of liberal leave or government closures due to weather, protests, acts of terrorism or lack of funding. Upon notice, requires shift work on a 24 x 7 x 365 basis. May be required to work weekends, nights and/or holidays.Miscellaneous:SSS uses E-Verify to confirm the employment eligibility of all newly hired employees. To learn more about E-Verify, including your rights and responsibilities, please visit .This vacancy announcement may be used to fill similar positions within 90 days. Expand Hide additional informationCandidates should be committed to improving the efficiency of the Federal government, passionate about the ideals of our American republic, and committed to upholding the rule of law and the United States Constitution.BenefitsA career with the U.S. government provides employees with a comprehensive benefits package. As a federal employee, you and your family will have access to a range of benefits that are designed to make your federal career very rewarding. .
Read More

FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail

Securedyouadm

TGEA A&W Cybersecurity Test Manager
CyberSecurity Ops. Leader
Related posts
  • Related posts
  • More from author
Careers

Cybersecurity Information System Security Officer (ISSO) L3

December 11, 20250
Careers

Cybersecurity SME

December 11, 20250
Careers

Cybersecurity Engineer

December 11, 20250
Load more
Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Read also
Threat Advisories

Siemens Energy Services | CISA

December 12, 20250
Threat Advisories

Johnson Controls iSTAR | CISA

December 12, 20250
Threat Advisories

Varex Imaging Panoramic Dental Imaging Software

December 12, 20250
Threat Advisories

CISA Adds One Known Exploited Vulnerability to Catalog

December 12, 20250
Threat Advisories

Siemens SINEMA Remote Connect Server

December 12, 20250
Threat Advisories

Siemens Building X – Security Manager Edge Controller

December 12, 20250
Load more
Stay Social!
192Likes
4,500Followers
13Subscribers
46Followers
Recent posts
  • Siemens Energy Services | CISA
  • Johnson Controls iSTAR | CISA
  • Varex Imaging Panoramic Dental Imaging Software
  • CISA Adds One Known Exploited Vulnerability to Catalog
  • Siemens SINEMA Remote Connect Server

    # TRENDING

    how old is my computerhow old is my dell laptophow old is my HP laptophow old is my laptophow old is my toshiba laptophow to find computer ageverify computer agestar wars theme wallpapersThe Best Hacking Bookswiresharkusb device not found windows 10/11usb device not recognized windows 10/11 errorWhat is AIGPUSnifferuTorrentvulnerability scanner downloadWifi Hacking SoftwareWifi Hacking Appsolved windows 10/11 usb device not recognizedstar wars windows 7 theme downloadTwitter Account Security
    © Copyright Mister Cybersecurity LLC 2023, All Rights Reserved
    • About
    • Contact
    • Privacy
    • ToS
    • Disclosures