The Department of Homeland Security (DHS) is recruiting professionals to support a range of leadership roles in Cybersecurity Threat Analysis, including Cybersecurity Threat Manager, Cybersecurity Threat Intelligence Branch Chief, and Deputy Section Chief Adversary Analysis. All positions are in the DHS Cybersecurity Service.
DHS Cybersecurity Service (DHS-CS) uses a multi-phase assessment process to qualify applicants seeking employment through the DHS-CS. Given the ever-advancing nature of cybersecurity and the ongoing need for cybersecurity talent, DHS-CS uses "Talent Pools" to pull qualified applicants (i.e., individuals who have successfully completed the multi-phase assessment process for their capability and career track/level) for consideration for these jobs.
This announcement is being used to fill the Cybersecurity Threat Analysis Talent Pool. By applying to this job announcement, you are opting to be part of the DHS-CS Talent Pool for ongoing consideration for employment for relevant open jobs and will remain eligible for consideration for up to one year from the date of completion.
There are a variety of Cybersecurity Threat Analysis opportunities across the Department, including supporting several specialized programs at the DHS Office of Strategy, Policy, and Plans (PLCY ), the Cybersecurity and Infrastructure Security Agency (CISA) , DHS Office of the Chief Information Officer (OCIO) , and the Federal Emergency Management Agency (FEMA) .
Depending on your career level and role, DHS Cybersecurity Service employees in the Leadership Career Track, with a technical capability in Cybersecurity Threat Analysis, will generally apply their expertise to perform a range of tasks, including:
- Overseeing and/or leading a team(s) identifying and analyzing cybersecurity threats to determine consequences and potential impacts on DHS and national infrastructures and develop mitigation strategies.
- Proactively performing code analysis, advanced traffic analysis, web log analysis, and pattern analysis to determine trends, patterns and suspicious activity on DHS, DHS Component, and/or DHS stakeholder networks.
- Leading or managing team(s) tracking technical network and host-based attack vectors, malicious actors, emerging cyber threats, new vulnerabilities, and current trends to prepare and present customized cyber threat intelligence briefings to a range of specific target audiences across DHS, Federal Government, and/or private industry.
- Providing key technical input to assist organizational leaders with decision-making and actions related to a variety of critical cybersecurity threats and providing strategic-level analysis to support broader DHS cyber missions and related future planning.
- Proposing, overseeing and or organizing collaborative Departmental, Component, and/or Federal working groups, task forces, and committees to develop, share or otherwise contextualize cyber indicators or information, recommending countermeasure or mitigation strategies for perceived threats.
- Overseeing others applying Intelligence Community (IC) standards to analyze all-source intelligence on current and emerging cyber threats and sharing these analyses with DHS customers and partners.
- Leading or managing a team(s) producing intelligence assessments and cyber warning assessments using analytic tradecraft and tools encompassing the full threat intelligence lifecycle (planning, collecting, processing, analyzing, disseminating) to identify and evaluate emerging threats.
- Monitoring DHS or Component architectures, networks, communications, applications, and systems by mining open source and classified data sources to maintain constant awareness of national and international cyber events/threats.
- Proactively working with Cyber Incident Response teams and cyber experts to implement advanced identification and protection measures against state sponsored threats, sharing intelligence and analysis.
- Overseeing a team(s) performing advanced scanning and probing activities to analyze and interpret all-source intelligence on current and emerging cyber threats using intelligence community analytical standards.
- Advising Federal and National DHS stakeholder organizations on handing highly complex cybersecurity threats and influencing policy decision making on a range of technical topics within and outside DHS.
- Leveraging collaborative networks of internal and/or external DHS partners and/or national technical experts to facilitate achievement of strategically important DHS and national cybersecurity goals.
- Serving as a teacher and technical mentor to DHS cybersecurity employees in applying Intelligence Community (IC) standards to analyze all-source intelligence on current and emerging cyber threats.
This position is in the Leadership Track across a range of career levels. Employees in this career track generally:
- Have between 5-15 years of cybersecurity work experience.
- Have between 0-5 years of cybersecurity leadership experience.
DHS Cybersecurity Service employees with a technical capability in Cybersecurity Threat Analysis will generally:
- Collect, analyze, and report on cybersecurity threats and threat actors to support operations.
- Understand and analyze different sources of information (e.g., INTs, open source, law enforcement data) on specific topics or targets.
- Provide tactical/operational analysis, including attribution of cyber actors using a variety of analytic techniques and tools. May also provide strategic-level analysis to support broader mission.
- Develop and communicate situational awareness of local, regional, and international cybersecurity threats impacting stakeholder missions and interests.
DHS Cybersecurity Service employees start at career levels and salaries matching their experience and expertise. In recruiting for this opportunity, DHS may hire employees at higher or lower career levels and associated salaries. To learn more about DHS Cybersecurity Service career tracks and levels, visit our application portal .
This position is focused on Cybersecurity Threat Analysis.
DHS Cybersecurity Service jobs are structured cybersecurity specializations - called technical capabilities. To learn more about technical capabilities, visit our application portal .